Most Popular

1074 questions
7
votes
1 answer

What are the maths to convert bytes <-> trytes?

I've heard that one byte contains as much data as "about 5 trits". However, I'm not entirely clear on how the conversion works. How do I convert binary data into balanced ternary (and vice versa)? In particular, I am asking because I'd like to…
todofixthis
  • 1,320
  • 8
  • 23
7
votes
2 answers

What is the chance that a supercomputer finds a Seed with money

I know that today it is almost impossible to find someones Seed. But what happens in the future. Will it ever be possible that a very fast supercomputer is checking million seeds per second to find Seeds with a balance. Maybe someday it will be like…
Vrom
  • 1,946
  • 7
  • 14
7
votes
2 answers

What is the difference between "double-spending" and "address-reuse"?

As far as I understood: double-spending: is when you do a second outgoing transaction while another one is still in pending. (this is possible only with Android wallet, because the light wallet [computer] has a protection [called…
overkill22
  • 590
  • 3
  • 11
7
votes
2 answers

What are tips and what is the tip selection algorithm?

What are tips and what do they do? And what is the tip select algorithm and where is it used for?
Jader Troe
  • 467
  • 3
  • 8
7
votes
1 answer

Why are there no safeguards in place to prevent sending a transaction to a used-up address?

I have offered up one of my addresses to be used for donation purposes; I withdrew funds to a different address, and a now a third party has deposited funds to an address that has already been emptied out; meaning that if I withdraw funds a second…
Matt Clark
  • 815
  • 5
  • 14
7
votes
1 answer

Spam Attack on the tangle worst scenario

Sometimes there is a spam attack on the IOTA network where there are up to 2000 transactions per minute where normally we only have 50 t/m. I know that the spam makes the tangle even stronger, but I also heard of many full nodes that had to close…
Vrom
  • 1,946
  • 7
  • 14
7
votes
2 answers

How do I burn IOTA?

Regardless of why I'd want to do this, I'd like to know how. Are there any specific "burn addresses" that are reserved for this? Or is there a technique I can use to guarantee the IOTA are destroyed? (For comparison: In Ethereum you can send ether…
Richard Horrocks
  • 1,185
  • 8
  • 22
7
votes
1 answer

What prevents a malicious node from receiving a transaction and, instead of relaying it, attempting to compromise the now-weakened address?

For example, this scenario: I broadcast a transaction from a previously-unspent-from address, for a large amount, say 1 Ti. The full node I broadcast to is a malicious actor who has been waiting for a large transaction to be broadcast to him. Since…
dreid
  • 1,102
  • 9
  • 16
7
votes
1 answer

What's the difference between Milestones and Snapshots?

As far as I understand Milestones are done by the Coordinator to verify transactions. What do Snapshots do? Do they serve as backup? Do they clean up dead tips? Who issues them?
Muppet
  • 908
  • 5
  • 8
7
votes
1 answer

How to Securely Outsource Proof of Work Calculation?

In another question about proof of work on Internet of Things devices one answer mentions "it would be capable of outsourcing PoW within it's local area network". This piques my interest. How is outsourcing the PoW done securely? Premise: Use of…
Helmar
  • 1,293
  • 1
  • 15
  • 28
7
votes
1 answer

Where does the encryption start - from the reader or the sensor? or just in the tangle?

Regarding the Zebra Savanna and the IOTA Track & Trace API that we have seen at the workshop on the 3rd December, I have picked this question from the YouTube chat as it might be interesting: Where does the encryption start - from the reader or the…
Antonio Nardella
  • 1,074
  • 5
  • 17
7
votes
1 answer

Inclusion State - when true?

in iota docs it says: Inclusion State - is used to determine if a transaction was accepted and confirmed by the network. more specifically, given a transaction and a list of tips: Inclusion State is true if tip references that …
instantlink
  • 528
  • 2
  • 10
7
votes
2 answers

What are swarm nodes ? What is their role in the network?

I was following some discussion in tanglemath the other day and it was said, that full nodes are not needed and that swarm nodes will represent 99% of all nodes. Which brings me to the question: What exactly are swarm nodes ? Why are they better…
7
votes
2 answers

Can you reuse a receive address that was created before the last snapshot?

Can you reuse a very old receive address even if it was created before the last snapshot?
Mr Robot
  • 71
  • 3
7
votes
1 answer

What is the benefit of dropping random packets and/or dropping random cached message data?

In the IRI, there is code designed to randomly drop TCP/UDP packets and/or to randomly thwart the data from TCP/UDP packets from being processed. Given that this is a random application to all data, from any peers, how does this help? What is the…
user1543