summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorMarcoFalke <falke.marco@gmail.com>2015-09-20 09:27:01 +0200
committerMarcoFalke <falke.marco@gmail.com>2015-09-20 09:27:01 +0200
commit2b419aba8874c24bb4d16dfa3728b4f2dcd0f19b (patch)
treeb7df3e21176b46ff8567cdfc8f063f96cd8d7ce8
parentbde3793421cb2d374749bb0295264394784829b1 (diff)
downloadbips-2b419aba8874c24bb4d16dfa3728b4f2dcd0f19b.tar.xz
[trivial] expression
-rw-r--r--bip-0069.mediawiki2
1 files changed, 1 insertions, 1 deletions
diff --git a/bip-0069.mediawiki b/bip-0069.mediawiki
index e868df3..e23ff04 100644
--- a/bip-0069.mediawiki
+++ b/bip-0069.mediawiki
@@ -33,7 +33,7 @@ Many wallets will place spending outputs first and change outputs second, leakin
Such information should remain private not only for the benefit of consumers, but in higher order financial systems must be kept secret to prevent fraud.
A researcher recently demonstrated this principle when he detected that Bitstamp leaked information when creating exchange transactions, enabling potential espionage among traders. [1]
-One way to address these privacy weaknesses is by randomly ordering inputs and outputs. [2]
+One way to address these privacy weaknesses is by randomizing the order of inputs and outputs. [2]
After all, the order of inputs and outputs does not impact the function of the transaction they belong to, making random sorting viable.
Unfortunately, it can be difficult to prove that this sorting process is genuinely randomly sorted based on code or run-time analysis, especially if the software is closed source.
A malicious software developer can abuse the ordering of inputs and outputs as a side channel of leaking information.