On Tue, Nov 5, 2013 at 6:43 PM, Ittay <ittay.eyal@cornell.edu> wrote:The attack can be easily hidden. And be sure that before today, today,
and after today, very smart people are at their computer planning attackson Bitcoin. Exploits must be published and fixed FAST.I think it would be helpful if you actually implemented and pulled off this attack, by becoming the dominant miner capable of reversing spends at will. Then we'd know how quickly it can be done.
------------------------------------------------------------------------------
November Webinars for C, C++, Fortran Developers
Accelerate application performance with scalable programming models. Explore
techniques for threading, error checking, porting, and tuning. Get the most
from the latest Intel processors and coprocessors. See abstracts and register
http://pubads.g.doubleclick.net/gampad/clk?id=60136231&iu=/4140/ostg.clktrk
_______________________________________________
Bitcoin-development mailing list
Bitcoin-development@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/bitcoin-development