8.7 C
New York
Tuesday, April 1, 2025

Can all consensus legitimate 64 byte transactions be (third get together) malleated to alter their dimension?


The Nice Consensus Cleanup proposes to make 64 byte transactions consensus invalid, for varied causes. They’ve been non-standard for years and seem to serve no helpful objective.

It seems that any such transaction will be malleated into a unique dimension, in order that in observe there is no such thing as a confiscation threat even when such a transaction have been helpful. I am making an attempt to know this side higher.

Given a UTXO A, which both already exists or is freshly mined below the present consensus guidelines (e.g. via a non-standard transaction).

Given a 64 byte transaction T that spends it (non-standard by definition).

With out entry to the secrets and techniques (if any) that have been used to generate T (non-public key, hash pre-image, and many others.)

Is it at all times potential to alter T right into a consensus legitimate transaction T' that spends A?

Moreover, if I perceive appropriately, it isn’t potential for any 64 byte transaction T to ship cash to a vacation spot B that could be a safe (i.e. >= 20 byte) public key (hash).

Regardless, for each B, is there a malleated T' that preserves B (no less than nonetheless spendable by the non-public key b)?

If the latter is just too onerous to show, may one may present that any T will be malleated by an attacker to divert cash away from B.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles