From a2ab875e108e345024da9d9288f840bca20e830e Mon Sep 17 00:00:00 2001 From: tradewind886 <38669586+tradewind886@users.noreply.github.com> Date: Tue, 19 Dec 2023 15:38:49 +0800 Subject: [PATCH] Update 2023-12-19-socratic-seminar-15.md --- _posts/2023-12-19-socratic-seminar-15.md | 13 +++++++++++++ 1 file changed, 13 insertions(+) diff --git a/_posts/2023-12-19-socratic-seminar-15.md b/_posts/2023-12-19-socratic-seminar-15.md index d337a63..cbbe4b8 100644 --- a/_posts/2023-12-19-socratic-seminar-15.md +++ b/_posts/2023-12-19-socratic-seminar-15.md @@ -169,8 +169,21 @@ Nodes which apply the patch have the drawbacks of fee-estimations being off and Note: demonstration available on how to apply the patch (homework!) [CVE-2023-50428]([https://nvd.nist.gov/vuln/detail/CVE-2023-50428]) + [Pull Request/Patch]([https://github.com/bitcoin/bitcoin/pull/28408/commits]) +### AntPool to Return 83 BTC Fee to Person Who Signs Message From the Compromised Wallet + +AntPool said that it will return the 83 BTC fee if the owner of the compromised wallet comes forward before December 10, though its verification method appears to be far from ideal in the current situation. + +Note: This actually doesn't work, the theft in question refers to a (possible) low-entropy wallet, if the key can be known by anyone than signing messages would be useless + +[Antpool Post]([https://www.antpool.com/newsDetail/457?ref=nobsbitcoin.com]) + +[Cold Wallet Hack?]([https://www.nobsbitcoin.com/83-btc-fee-cold-wallet-hack/]) + +[Cracking Brain wallets (2015)]([https://www.youtube.com/watch?v=foil0hzl4Pg]) + ### Lightning HTLCs, in detail! A very nice explanation on the HTLCs that traverse the lightning network