Most Popular
1074 questions
6
votes
3 answers
How can I verify whether an address I've created offline is valid?
For security reasons I've created an IOTA address offline. Before I transfer into this address, how can I ensure this address is valid?
James Donnelly
- 395
- 2
- 9
6
votes
2 answers
What are the differences between Qubic smart contracts and Ethereum smart contracts?
I would like to know the differences between Qubic smart contracts and Ethereum smart contracts (for example: Turing-completeness, oracle-like behaviors...).
Bayequentist
- 985
- 7
- 23
6
votes
1 answer
What prevents someone from using a Precomputed POW Spam Attack against the network?
What prevents someone from using a Precomputed POW Spam Attack against the network?
A theoretical attack could use pre-made transactions to be released before their network expiry dates.
Rounds of fictitious transactions can be created and…
user1543
6
votes
1 answer
IOTA API error when making send transaction call with Node.js client library
I made some test codes to send transactions with Node.js client library, and received the below error response. I cannot find the cause of this error. Did this happen to anyone before? And can anyone explain what went wrong here?
Error: Request…
Michael Li
- 61
- 2
6
votes
1 answer
If the bundleHash is normalized how is the private key is revealed
In IOTA you should never re-use an address for outgoing value transactions because part of the private key is 'revealed'.
But if the bundleHash is normalized, thus avoiding the M bug, than the signatureFragment will never reveal part of the private…
Robert Lie
- 363
- 1
- 5
6
votes
1 answer
Very high index addresses, will they limit scalability?
In Iota, addresses are defined by an incremental index from 0 to 2,147,483,647 (potentially infinite depending on the IRI implementation).
For the sake of the example, let's say the last address you used was at index 1,000,000
In order to get the…
aguadoe
- 241
- 1
- 7
6
votes
1 answer
What is the purpose of including extra CRC32 packet data in the TCP/IP communications flow?
The TCP communications in the IRI sends and receives packets with 16 additional CRC32 bytes after the transaction data.
Internet TCP/IP data is already check-summed. Furthermore, malformed data will already be rejected by the IRI in processing.
It…
user1543
6
votes
2 answers
Why are three trits in a tryte?
What was the motivation behind making a tryte equal to three trits? Seems counter-intuitive that a byte contains more combinations than a tryte—at least from a semantical perspective.
shoe
- 251
- 1
- 2
6
votes
2 answers
Why would PoW not be enabled by default in full-node installation instructions?
So I had went through the steps in this "IOTA Full Node Copy-Paste
Installation Guide" and got the full node installed and running.
I had earlier read in this "Making a Transaction" article here at iota.readme.io about what it said about Proof of…
Dee
- 297
- 1
- 4
6
votes
3 answers
Iota White paper section 4.4. Random walkers
My question is regarding section 4.1 of Iota white paper. I really don't understand how particles or random walkers will be actually placed by the nodes in the tangle. What they state is : "The node just use their own pseudo-random number generators…
rumaisa_niazi
- 61
- 3
6
votes
1 answer
findTransaction not finding tag
I was experimenting with some transactions and I wonder why the node cant find a transaction when I search for it by its TAG, yet finds it when I search for it by its transaction hash.
Example:
curl http://iota.love:16000 \
-X POST \
-H…
Marcus K.
- 61
- 1
6
votes
1 answer
Will allowing light wallets to manually connect to server increase the risk of DDoS?
According to my knowledge, blockchains like Bitcoin and Ethereum provide great DDoS-resistant infrastructure since transactions are broadcasted to the network through random paths/nodes.
But since IOTA allows manually assigning lightwallet servers,…
Daniel
- 61
- 1
6
votes
1 answer
Difference between node and site
In the whitepaper is written:
A quick note on terminology: sites are transactions represented on the tangle
graph. The network is composed of nodes; that is, nodes are entities that issue and validate transactions
I am not able to understand the…
Santiago de Diego
- 173
- 3
6
votes
1 answer
What's the incentive to use recommended tip selection algorithm for MAM transactions?
As far as I understand MAM users don't care if their transactions will be ever confirmed. They use the tangle just as a transport layer.
So my question is:
Why would they use any tip selection algorithm at all and not just pick any two random…
alexpods
- 498
- 3
- 7
6
votes
1 answer
How do I enable my fullnode to do POW?
It is basically all in the title. What iri settings are needed to delegate my POW to my Fullnode?
Tobi MZ
- 1,607
- 1
- 12
- 31