Most Popular
1074 questions
5
votes
1 answer
"Received an Invalid TransactionViewModel. Dropping it..." after upgrading to 1.4.1.4
These are the first messages in the log after booting
12/19 07:08:03.158 [pool-2-thread-1] INFO c.i.iri.network.TransactionRequester - Removed existing tx from request list: ZQRK9RDRQZIL9XEYDAMMABTWSSNED9GMD …
Daniel F
- 921
- 1
- 7
- 15
5
votes
2 answers
In a transaction, what are "trunk", "branch" and "bundle" exactly?
I'm browsing the tangle explorer and found that transactions have fields called Branch, Bundle & Trunk, but cannot figure out what their meaning is exactly.
As second part of my question, I cannot see who are "sender" and "recipient" of the…
Davide C
- 209
- 1
- 4
5
votes
2 answers
How to prevent bloating if all tangle is supposed to be known by everyone?
I'm new to IOTA, from the reading of the whitepaper and from this question, "Does every node in the network have to know about all transactions issued by other nodes eventually?" I understand that every node finally must know all transactions in the…
Davide C
- 209
- 1
- 4
5
votes
1 answer
Why is "getTransactionsToApprove" returning identical trunk & branch hashes
When I set the depth low (1-3) in the "getTransfersToApprove" function, I will often times get the same hash in trunk & branch transactions, they are supposed to be different. Why? The "attachToTangle" function will still run if I input identical…
GusGorman402
- 577
- 3
- 10
5
votes
0 answers
Can the cCurl algorithm run on an Arduino?
Has anyone tried running cCurl on a microcontroller, such as Arduino or ESP8266? So that microcontrollers can do the Proof of Work. Would this even be efficient? I know how the algorithm works (hashing until hash has 14 trailing zeroes), but I don't…
GusGorman402
- 577
- 3
- 10
5
votes
3 answers
Should full nodes be public?
Since part of the security comes from it being hard to find enough nodes to peer with to influence the selected transactions, should full nodes be mostly hidden?
Will a IOTA attack consist of botnets scanning for nodes to peer with?
Should all full…
w00t
- 185
- 4
5
votes
1 answer
How many people joined the ICO?
I know they spent all IOTA coins for 500.000$. And everyone had to buy the coins with their own money. But how many people participated in the initial coin offering?
Vrom
- 1,946
- 7
- 14
5
votes
1 answer
What does it mean that "the tangle is network-bound instead of hash-power-bound like blockchain"?
Can someone explain me in a very simple way what should an attacker do to double spend in IOTA?
In the whitepaper I read that a double spend transaction should outweigh the legitimate subtangle. Supposing all transactions have the same weight,…
Ale
- 53
- 3
5
votes
1 answer
Is it safe to send iota to a pending receiving address?
I have created a few receiving addresses using iota wallet. Is it safe to send iota to those addresses, or do I have to wait until addresses are confirmed?
bumblebee
- 137
- 4
5
votes
1 answer
Is loggin in from 2 different light wallets at the same time possible?
Is it possible to log into my seed from one computer (light node) and at the same time log in from another computer or from android wallet?
Vrom
- 1,946
- 7
- 14
5
votes
1 answer
Who approves changes/fixes to IOTA?
For Bitcoin, whenever the repository owner pushes changes, the miners approve or reject them. That takes away the central control.
But since IOTA doesn't have miners, what's the process of making changes to IOTA?
Is the entire control with the…
Thirupathi Thangavel
- 161
- 5
5
votes
2 answers
How much of my security is improved using other levels of security when generating the seed?
I had a hard time answering this question because I do not know how much security levels improve security in quantitative terms.
Is this right?
e.g. (Hashspace increment)
81 trits => 27^81 ^1 (low security)
162 trits => 27^81 ^2 (medium security)…
Avelino
- 435
- 3
- 8
5
votes
3 answers
Can the IOTA protocol/network be adapted in the future?
Let's assume there are some unforeseen challenges in the future that require the IOTA network to be adapted. I've read there is no hard-forking possible in IOTA. Hence, would it be problematic to push protocol changes at a future date?
For example…
Muppet
- 908
- 5
- 8
5
votes
1 answer
Why are some transactions directly confirmed by two other transactions?
https://blog.iota.org/a-primer-on-iota-with-presentation-e0a6eb2cc621
On the presentation Dominik describes the transaction initiation process, in which
the second step is random tip selection, where a tip according to the definition is an…
serega
- 179
- 3
5
votes
1 answer
How does a full-node validate transactions?
A full-node "validates" the incoming transactions and discards invalid ones.
What algorithms, mechanisms are involved in determining a valid transaction.
Appending a transaction by doing the POW also does some validation.
So where are the…
Akkumulator
- 1,468
- 9
- 19