0 votes
by (240 points)

Wuille’s answer provides detail about the mechanism for accomplishing this, but both answers warn users about the dangers of trying to perform encryption with keys and tools that are intended for non-encrypted use with Bitcoin. Rusty Russell is organizing meetings to help speed up the specification process and has started a thread asking for feedback about what medium to use for the meeting (Google Hangout, IRC meeting, something else) and how formal to make the meeting. Anyone planning to participate in the process is recommended to at least monitor the thread. Rusty Russell has opened a PR to the BOLT repository and started a mailing list thread for feedback on a proposal to modify the construction and signing of some of the LN transactions in order to allow both BIP125 Replace-by-Fee (RBF) fee bumping and Child-Pays-For-Parent (CPFP) fee bumping. In a follow-up email, Matt Corallo indicated that the proposal is probably dependent on some changes being made to the methods and policies nodes use for relaying unconfirmed transactions.

>

UNSAFE, and briefly describes a proposal to simplify fee bumping for LN commitment transactions. Schmidt begins his talk by reviewing some statistics from recent Bitcoin fee events, both short events from the past couple of months and the longer event from January 2017 to January 2018 where the next-block fee for an average-sized transaction was consistently over $1 (and often over $2). ● Monitor feerates: recent reductions in the exchange rate are the likely cause of a modest decrease in hashrate and a possible increase in the number of coins traveling to or from exchanges, which could lead to increased feerates during the next week. Previously, using the -rpcallowip configuration option would cause Bitcoin Core to listen on all interfaces (although still only accepting connections from the allowed IP addresses); now, the -rpcbind configuration option also needs to be passed to specify the listening addresses. By default, nodes do not accept connections to RPC from any other computer-you have to enable a configuration option to allow RPC connections. If this option is present, you should remove it and restart your node unless you have a good reason to believe all RPC connections to your node are encrypted or are exclusive to a trusted private network.<<br>br>

If the result in the state field is "open", you should follow the instructions above to remove the rpcallowip parameter. ● Simplified fee bumping for LN: funds in a payment channel are protected in part by a multisig contract that requires both parties sign any state in which the channel can close. Maxwell explains that it’s easy-if you can trick people into skipping part of the verification procedure. Pieter Wuille and Gregory Maxwell each answer a question about using Bitcoin private and public keys for encryption rather than their typical use for signing and verification. 2081 adds RPCs that allow signing a transaction template where some inputs are controlled by LND. Although this provides trustless security, it has an unwanted side-effect related to transaction fees-the parties may be signing channel states weeks or months before the channel is actually closed, which means they have to guess what the transaction fees will be far in advanc
p>

First, the transaction fee is included in the hash in order to allow hardware wallets or https://www.youtube.com/ offline wallets to ensure they aren’t being tricked into sending excess fees to miners. This week’s newsletter contains a warning about communicating with Bitcoin nodes using RPC over unencrypted connections, links to two new papers about creating fast multiparty ECDSA keys and signatures that could reduce transaction fees for multisig users, and lists some notable merges from popular Bitcoin infrastructure projects. ● Close open RPC ports on nodes: about 13% of Bitcoin nodes appear to have their RPC ports open on unencrypted public connections, putting users of those nodes at risk. See the full news item below for additional details about the risk and recommended solutions. Even if you never connect to your node over the Internet, having an open RPC port carries a risk that an attacker will guess your login credentials. This script is the preferred way to generate login credentials for RPC access when not using bitcoin-cli as the same user that started the bitcoind daemon. So if you’re a Swedish citizen visiting the US and trying to access your Binance account from your hotel’s Wi-Fi, the website can figure out you’re not within their approved geographical borders.

Your answer

Your name to display (optional):
Privacy: Your email address will only be used for sending these notifications.
Welcome to GWBS FAQ, where you can ask questions and receive answers from other members of the community.
...