Most Popular
1074 questions
6
votes
1 answer
What's the makeup of the transaction object?
If you read "The Anatomy of a Transaction" it seems the transaction ends after the nonce but if you look at the IRI class "transaction.java"
I see the following:
buffer.put(Serializer.serialize(validity));
…
Andrew Arrow
- 127
- 6
6
votes
1 answer
What's "All Transactions" in IOTA Peer Manager?
All transactions does not seem to be the sum of the rest of transactions. What is it then?
See screenshot:
Apoge
- 215
- 1
- 7
6
votes
1 answer
How to read the Tangle database?
For infinite number of reasons it might be interesting to access transaction history stored on the Tangle. I tried to do that myself, because I was interested in how many addresses are at risk because of reuse, but right now I'm stuck and I don't…
doji
- 91
- 5
6
votes
2 answers
How does a reattached transaction impact the tangle?
Do reattached transactions get removed from their original position and can I reattach even if the transaction is referenced by other transactions?
Assume the tangle looks like this: (green: confirmed, red: unconfirmed, grey: tips)
Now, the yellow…
Akkumulator
- 1,468
- 9
- 19
6
votes
3 answers
Theoretical delay before first approval
I'm reading the white-paper about the tangle. In pages 8 to 10, the author is calculating the average time for first approval of a tip on a stationary tangle.
The first result is that under low load:
The first approval happens on an average…
ben75
- 5,344
- 11
- 32
6
votes
1 answer
Which transaction do I have to reattach?
I have 5 times reattached the same transaction. All five has status pending. Does it matter which one of them I use for another reattach? Maybe this was the mistake?
Vrom
- 1,946
- 7
- 14
6
votes
1 answer
Javascript Transaction object Message versus Tag
What is the difference between the Message and Tag values when creating a new transaction object via the JS library
GusGorman402
- 577
- 3
- 10
6
votes
2 answers
Good practice how to choose ports
I've setup a full node and while doing so was wondering about the following:
1. Would it be safer not to use the same prominent ports as everybody else does (e.g. 14600, 14700, 14265). If instead the last two digits would be randomly changed,…
grmmgrmm
- 171
- 4
6
votes
2 answers
Trying to create M of N multisig flash channel but getting invalid value transfer
I'm really new to Iota and specifically flash, so apologies if this is an obvious question!
I've been following the example in iota.flash.js under the examples folder, and want to modify this example to create an M of N multisig channel, where there…
Munawar
- 79
- 6
6
votes
1 answer
Why is logging into the seed so slow?
Why does it sometimes need such a long time to log into the light wallet?
Is it depending on how many transactions are already done inside the seed or is it depending on when was the last snapshot? Or is it a development problem that will be fixed…
Vrom
- 1,946
- 7
- 14
6
votes
2 answers
Will MAM not lead to network congestion?
In the MAM introduction article there is for example this part about the message size:
These messages can have any size; however, a heuristic evaluation
would demonstrate smaller messages yielding higher potential for data
integrity. For…
Jey DWork
- 160
- 6
6
votes
1 answer
Why does total transactions in log fluctuate
When viewing the logs I notice the totalTransactions value increases and decreases. Given data is constantly being added to the tangle, shouldn't this number constantly be increasing?
Scott Foster
- 429
- 2
- 7
6
votes
1 answer
Can I be forced to reuse an address by confirming a transaction that is part of a double-spend attempt?
Imagine somebody injects two transactions d1 and d2 into the network that together represent a double-spend attempt. Having only incomplete information of all latest transactions in the network, I see one of them first, let's say d1, and confirm it…
lex82
- 1,087
- 7
- 18
6
votes
2 answers
Why do we reattach instead of sending a second transaction that confirms our first?
The spam attacks prove that its possible to attach a transaction to whichever tip you want. Normal operation of the tangle is to attach a transaction to two random tips and then wait for another node to randomly choose your transaction as a tip for…
Spamalot
- 470
- 2
- 9
6
votes
1 answer
Difficulty of cracking the seed based on checksum?
Assuming you know the checksum of a seed. How much does the brute-force difficulty decrease? By 27^3, or more?
Muppet
- 908
- 5
- 8