Is there a list of software impacted by this CVE, and the versions it is fixed
in?
(Note this isn't a vulnerability in Bitcoin Core; BIP125 is strictly a policy
matter, not part of the consensus rules and never safe to rely on in any
case...)
On Thursday 06 May 2021 13:55:53 Antoine Riard
Hi Antoine,
Thanks for bringing this up.
It seems spacechains[0] are impacted by this. Simply explained, the idea is
to allow for fee-bidding Blind Merged Mining[1] by creating one transaction
for each block, to which anyone can attach a block hash. The preferred
mechanism utilizes
Hi Chris,
I apologise if I did not make it clear enough, but the 24 seed words used
to make the quantum passphrase are separate, newly generated 24 seed words,
and not the same as those for the main wallet.
With both layers (seed words + quantum passphrase) the security provided is
Good morning ZmnSCPxj,
This will be a long email because I want to cover all the things and difficult
to express them in few sentences or respond to the tweets about use of futures
markets in Bitcoin.
TL;DR: Prediction markets or futures markets can be helpful in collecting more
information
Hi Chris,
Thank you for your thoughts.
Unfortunately, your analysis is incorrect.
This is a non-destructive adaptation of the BIP39 standard, and is
certainly not "rolling your own security".
The 'quantum' passphrase is relying on the well established security of the
existing BIP39 standard.