> On Feb 26, 2017, at 1:36 AM, Pieter Wuille wrote:
>
> Typical hash function breaks produce collision attacks, while a preimage
> attack is needed to reduce single-key address security.
Thank you Pieter - that was really helpful. I realize now that I was thinking
of a preimage attack but had
You've made many salient points, Shaolin, though I have a few questions:
1) How well does this model work under adversarial conditions? Fair point
about signaling not being reliable, though it seems more vague in terms of
safety given that you can't actually know what percentage of hashrate that
i