mirror of
https://github.com/bitcoin/bips.git
synced 2025-02-23 23:27:22 +01:00
[trivial] expression
This commit is contained in:
parent
bde3793421
commit
2b419aba88
1 changed files with 1 additions and 1 deletions
|
@ -33,7 +33,7 @@ Many wallets will place spending outputs first and change outputs second, leakin
|
||||||
Such information should remain private not only for the benefit of consumers, but in higher order financial systems must be kept secret to prevent fraud.
|
Such information should remain private not only for the benefit of consumers, but in higher order financial systems must be kept secret to prevent fraud.
|
||||||
A researcher recently demonstrated this principle when he detected that Bitstamp leaked information when creating exchange transactions, enabling potential espionage among traders. [1]
|
A researcher recently demonstrated this principle when he detected that Bitstamp leaked information when creating exchange transactions, enabling potential espionage among traders. [1]
|
||||||
|
|
||||||
One way to address these privacy weaknesses is by randomly ordering inputs and outputs. [2]
|
One way to address these privacy weaknesses is by randomizing the order of inputs and outputs. [2]
|
||||||
After all, the order of inputs and outputs does not impact the function of the transaction they belong to, making random sorting viable.
|
After all, the order of inputs and outputs does not impact the function of the transaction they belong to, making random sorting viable.
|
||||||
Unfortunately, it can be difficult to prove that this sorting process is genuinely randomly sorted based on code or run-time analysis, especially if the software is closed source.
|
Unfortunately, it can be difficult to prove that this sorting process is genuinely randomly sorted based on code or run-time analysis, especially if the software is closed source.
|
||||||
A malicious software developer can abuse the ordering of inputs and outputs as a side channel of leaking information.
|
A malicious software developer can abuse the ordering of inputs and outputs as a side channel of leaking information.
|
||||||
|
|
Loading…
Add table
Reference in a new issue