-
Notifications
You must be signed in to change notification settings - Fork 150
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Trustless mining #98
base: master
Are you sure you want to change the base?
Trustless mining #98
Conversation
i think that before this commit the miner could recover your private key after you set the hidden service up. whoops
A really cool feature suggested by adapt-L. I'm still not certain the math checks out, not to mention the lack of any automated tests.
that's what i get for coding on my phone
makes it a bit more foolproof, as I can check if they used the right keys etc. also requires you to actually combine it with your base key before slamming it into tor and wondering why it doesn't work
regarding ref10 not having proper functionality, "correct" solution would be enabling trustless code only when configure flag is set to true, which could be true by default & conflict with ref10. whatever you've done here right now is probably fine for now, I can make decision later. |
I'll dig into this deeper when i have more time. |
Solves #60.
It's not really mergeable yet. The current issues are:
ed25519_impl_{pre,post}.h
inmain.c
, which is pretty horrible.I tried to make it somewhat idiotproof by ensuring you won't get a private key that'll work with Tor unless you did everything right. I did not protect against someone using the same base key for multiple .onions - maybe I could add a disclaimer when using
--combine
if you think that's necessary.Thanks in advance for any feedback ^^