Bitcoin Core Flaw Raises Concerns Regarding Blockchain Integrity

The blockchain's defence against spam may have a weakness, as this discovery has sparked concerns in the cryptocurrency community.
According to Dashjr, Dashjr, Bitcoin Core users have been able to set limits on extra data in transactions using the -datacarriersize setting since 2013.
The clever Inscription method, on the other hand, has found a way around this limitation by concealing its data as program code.
The community is hoping for a fix before the anticipated release of v27 next year.
The cryptocurrency community is buzzing with different concerns and questions.
One important question concerns the economic incentives for miners involved in inscription transactions.
Dashjr emphasises Bitcoin's assumption that the majority of miners are honest.
He also mentions that spam-filtered blocks frequently have higher fees for unknown reasons.
Further questions look into the implications of addressing this vulnerability.
A key point of contention is whether fixing the bug will result in the abolition of ordinals and brc-20 tokens.
Dashjr confirms that resolving this issue would put an end to these practices.
Another community member calls for further clarification on how regular Bitcoin holders are directly impacted by this vulnerability.
Dashjr explains that although blockchain efficiency and integrity are the main technical concerns, security and value may also be indirectly impacted.
The topic of actionable steps users can take to address this issue is also discussed.
Dashjr suggests that in order to prevent the relaying of Inscription data, users of Bitcoin Knots set the datacarriersize to zero.
With the release of Bitcoin Core v26 rapidly approaching, everyone is awaiting the resolution that could determine the direction of Bitcoin transactions in the future.


This Cyber News was published on www.cysecurity.news. Publication date: Fri, 08 Dec 2023 15:43:04 +0000


Cyber News related to Bitcoin Core Flaw Raises Concerns Regarding Blockchain Integrity

Tracers in the Dark: The Global Hunt for the Crime Lords of Crypto - Y is the author of a book I can very greatly recommend, with the fascinating title Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency. As I dug into this cypherpunk world, around 2010 and 2011, I came upon this thing that ...
1 year ago Nakedsecurity.sophos.com
Exploring Blockchain's Revolutionary Impact on E-Commerce - The trend of choosing online shopping over traditional in-store visits is on the rise, with e-commerce transactions dominating the digital landscape. Blockchain technology emerges as a solution to bolster the security of online transactions. ...
1 year ago Cysecurity.news
AI and Blockchain Convergence: A Game Changer in the Digital Sector - AI and blockchain are two of the most revolutionary technologies of our time, and their combination will totally transform the tech sector. The two main axes around which blockchain is conceptualised are cryptocurrencies and the infrastructure ...
1 year ago Cysecurity.news
Integrating the Power of AI and Blockchain for Data Security and Transparency - In an ever-changing digital landscape, providing strong data security and transparency has become critical. This article explores the dynamic interaction of two transformational technologies: artificial intelligence and blockchain. Artificial ...
11 months ago Cysecurity.news
Crypto Enthusiasts Embrace New Frontier: Investing in Bitcoin ETFs Explained - This was the first time the Securities and Exchange Commission approved an exchange-traded fund that contained bitcoin, but the Commission stressed that its decision does not mean it endorses or approves Bitcoin, but that it remains deeply sceptical ...
11 months ago Cysecurity.news
Bitcoin Core Flaw Raises Concerns Regarding Blockchain Integrity - The blockchain's defence against spam may have a weakness, as this discovery has sparked concerns in the cryptocurrency community. According to Dashjr, Dashjr, Bitcoin Core users have been able to set limits on extra data in transactions using the ...
1 year ago Cysecurity.news
The United States is Monitoring Vulnerabilities in Bitcoin - The United States has shown a keen interest in the cybersecurity aspects of Bitcoin, particularly honing in on a vulnerability associated with the Ordinals Protocol in 2022. The National Vulnerability Database, overseen by the National Institute of ...
1 year ago Cysecurity.news
Here's Some Bitcoin: Oh, and You've Been Served! - The case is thought to be first in which a federal court has recognized the use of information included in a bitcoin transaction - such as a link to a civil claim filed in federal court - as reasonably likely to provide notice of the lawsuit to the ...
11 months ago Krebsonsecurity.com
CVE-2024-38365 - The btcd Bitcoin client (versions 0.10 to 0.24) did not correctly re-implement Bitcoin Core's "FindAndDelete()" functionality. This logic is consensus-critical: the difference in behavior with the other Bitcoin clients can lead to btcd clients ...
2 months ago Tenable.com
Navigating the Paradox: Bitcoin's Self-Custody and the Privacy Challenge - Self-custody in Bitcoin refers to individuals holding and controlling their private keys, which in turn control their bitcoin. This concept is akin to securing physical gold in a personal safe rather than relying on a bank or third-party custodian. ...
11 months ago Cysecurity.news
Brothers Indicted for Stealing $25 Million of Ethereum in 12 Seconds - It took two brothers who went to MIT months to plan how they were going to steal, launder and hide millions of dollars in cryptocurrency - and only 12 seconds to actually pull off the heist. The brothers, Anton Peraire-Bueno and James Pepaire-Bueno, ...
7 months ago Securityboulevard.com
Decentralised Identity: The Next Revolution Enabled by Block Chain Technology - Enter decentralised identity, a novel concept aimed at improving data privacy and user empowerment. In this article, we will delve into the world of decentralised identity, describing its principles, important components, and how decentralised ...
9 months ago Cysecurity.news
Learning To Use Web3: First Impressions - Come along with me as I learn about blockchain and web3: the good, the bad, why it's needed, how to learn it, and, in the end, if it's really what it's hyped up to be. Web3's potential to transform how businesses transact and perform merits ...
1 year ago Feeds.dzone.com
Integration of AI and Blockchain: Here's All You Need to Know - The relationship between blockchain technology and artificial intelligence is growing in prominence. Because AI has the potential to revolutionise a number of industries, it is essential to ensure the reliability and equity of the data it uses. ...
10 months ago Cysecurity.news
SEC Approves Bitcoin ETFs, Crypto Industry Rejoices - The US securities regulator has officially approved the first US-listed exchange traded funds to track bitcoin, in what is being labelled a watershed moment for the world's largest cryptocurrency, as well as the broader crypto industry. Earlier this ...
11 months ago Silicon.co.uk
Forging A New Era of Invoicing Security - Invoicing may not be the first thing that pops up in a conversation around cyber attacks, but undesirable incidents in the business world serve as glaring reminders as to why we shouldn't think of invoicing fraud as an afterthought. Across ...
11 months ago Cyberdefensemagazine.com
CVE-2023-52784 - In the Linux kernel, the following vulnerability has been resolved: bonding: stop the device in bond_setup_by_slave() Commit 9eed321cde22 ("net: lapbether: only support ethernet devices") has been able to keep syzbot away from net/lapb, until today. ...
7 months ago Tenable.com
The Limitations of Google Play Integrity API - This overview outlines the history and use of Google Play Integrity API and highlights some limitations. We also compare and contrast Google Play Integrity API with the comprehensive mobile security offered by Approov. Google provides app attestation ...
1 year ago Securityboulevard.com
CVE-2011-4543 - Multiple directory traversal vulnerabilities in osCommerce 3.0.2 allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the (1) set or (2) module parameter to (a) ...
6 years ago
Microsoft Employee Raises Alarms Over Copilot Designer and Urges Government Intervention - Shane Jones, a principal software engineering manager at Microsoft, has sounded the alarm about the safety of Copilot Designer, a generative AI tool introduced by the company in March 2023. His concerns have prompted him to submit a letter to both ...
9 months ago Cysecurity.news
SEC Twitter hacked to push fake news of Bitcoin ETF approval The Register - Breaking The SEC today said its Twitter/X account was hijacked to wrongly claim it had approved hotly anticipated Bitcoin ETFs, causing cryptocurrency to spike and then slip in price. In the past few minutes, the tweet was vanished. The SEC has not ...
11 months ago Go.theregister.com
El Salvador to Offer Citizenship for a $1 Million Bitcoin 'Investment' - Last week, the El Salvador government, along with the stablecoin company Tether, joined in an initiative called 'Adopting El Salvador Freedom,' which will enable foreigners to obtain a Salvadoran passport in exchange for a million dollars in Bitcoin. ...
1 year ago Cysecurity.news
Critical Apache Log4j2 flaw still threatens global finance - Critical Apache Log4j2 flaw still threatens global finance. CISA adds Apache Flink flaw to its Known Exploited Vulnerabilities catalog. CISA adds GitLab flaw to its Known Exploited Vulnerabilities catalog. Russia-linked APT28 used post-compromise ...
6 months ago Securityaffairs.com
Critical unauthenticated RCE flaw in OpenSSH server - MUST READ. Critical unauthenticated remote code execution flaw in OpenSSH server. Expert released PoC exploit code for Veeam Backup Enterprise Manager flaw CVE-2024-29849. CISA adds Oracle WebLogic Server flaw to its Known Exploited Vulnerabilities ...
5 months ago Securityaffairs.com
Orbit Chain loses $86 million in the last fintech hack of 2023 - Orbit Chain has experienced a security breach that has resulted in a loss of $86 million in cryptocurrency, particularly Ether, Dai, Tether, and USD Coin. Orbit Chain is a blockchain platform designed to function as a multi-asset hub, supporting ...
11 months ago Bleepingcomputer.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)