Jan 6 - Jan 6, 2025
These inquiries aim to understand if it would have been feasible to identify a targeted attack through proactive monitoring or retrospective analysis, assuming that application logs were adequately maintained to facilitate such a review. The discussion touches upon the potential for attackers to manipulate the system by influencing the server to issue different RSA keys or round IDs, thereby enabling them to track specific Unspent Transaction Outputs (UTXOs). This scenario underscores the importance of log management and the ability to trace interactions within the system to safeguard against or identify malicious activities.
TLDR
We’ll email you summaries of the latest discussions from authoritative bitcoin sources, like bitcoin-dev, lightning-dev, and Delving Bitcoin.
We'd love to hear your feedback on this project?
Give Feedback