diff options
author | azuchi <azuchi@haw.co.jp> | 2017-01-28 18:55:50 +0900 |
---|---|---|
committer | azuchi <azuchi@haw.co.jp> | 2017-01-28 18:55:50 +0900 |
commit | 1761e8a4956e25a54a4e081da4573cc293bb824c (patch) | |
tree | eff3475effa0093005571475cba66672755f6510 /bip-0069.mediawiki | |
parent | 77cde96da1bf8a9811baedfadfea50102c695048 (diff) |
Remove duplication BIP69
Diffstat (limited to 'bip-0069.mediawiki')
-rw-r--r-- | bip-0069.mediawiki | 5 |
1 files changed, 0 insertions, 5 deletions
diff --git a/bip-0069.mediawiki b/bip-0069.mediawiki index f262126..e9f9245 100644 --- a/bip-0069.mediawiki +++ b/bip-0069.mediawiki @@ -30,11 +30,6 @@ Since wallet clients are left to their own devices to determine this ordering, t For example, a wallet client might naively order inputs based on when addresses were added to a wallet by the user through importing or random generation. Many wallets will place spending outputs first and change outputs second, leaking information about both the sender and receiver’s finances to passive blockchain observers. Such information should remain private not only for the benefit of consumers, but in higher order financial systems must be kept secret to prevent fraud. -Currently, there is no clear standard for how wallet clients ought to order transaction inputs and outputs. -Since wallet clients are left to their own devices to determine this ordering, they often leak information about their users’ finances. -For example, a wallet client might naively order inputs based on when addresses were added to a wallet by the user through importing or random generation. -Many wallets will place spending outputs first and change outputs second, leaking information about both the sender and receiver’s finances to passive blockchain observers. -Such information should remain private not only for the benefit of consumers, but in higher order financial systems must be kept secret to prevent fraud. A researcher recently demonstrated this principle when he detected that Bitstamp leaked information when creating exchange transactions, enabling potential espionage among traders. [1] One way to address these privacy weaknesses is by randomizing the order of inputs and outputs. [2] |