Most Popular
1074 questions
2
votes
1 answer
Will the CPU usage of a Fullnode increase?
Will the CPU usage of a Fullnode increase?
I run a Fullnode (2 Core, 2.1 GHz, 6GB RAM), since 3 months.
First the CPU usage was low but since then it increase a lot.
In the meantime, the CPU is almost fully utilized by many txs.
Oyren
- 804
- 5
- 16
2
votes
1 answer
Converting bytes to trites using IOTA libraries
Most IOTA libraries (at least C#, and Java) have a Converter, that has a getTrits method.
public static void GetTrits(
sbyte[] bytes,
int[] trits
)
It has two arrays as parameters. The input, bytes, and the output, trits. How can I compute…
mike
- 251
- 1
- 7
2
votes
1 answer
Raspberry Pi3 light node initialization error
I'would like to set up iri on a Raspberry Pi3 but when i try to build i receive the following error.
java.lang.NoClassDefFoundError: Could not initialize class org.rocksdb.RocksDB
alle.manfredi
- 63
- 5
2
votes
0 answers
Cannot start IOTA HUB
When running iota rpc hub, I am met with the fatal error
E0906 15:37:44.322824 11458 beast.cc:65] [json.exception.parse_error.101] parse error at 1: syntax error - invalid literal; last read: '<'
I am sure that this is a fault of my own, but I have…
Tsangares
- 808
- 5
- 13
2
votes
0 answers
Credits for the Pub/private key pair generation design in IOTA
I have understood that IOTA uses a constant Seed and a variable index to generate Winternitz private and keys, to sign transactions.
PK^-1 = Hash (Seed + index)
So we can have practically endless PK pairs. This is something beyond the Lamport,…
Makan
- 214
- 1
- 9
2
votes
1 answer
How do I decode the value (eg. 10i) in the signatureMessageFragment?
{'findTransactionsObjects': {'trytes':…
Nelson
- 21
- 1
2
votes
1 answer
Is part of the address private key revealed when the user reattaches a failed transaction?
A reattach is defined as follows:
Reattach: The process of reattaching a transaction is simply doing the proof of work and tip selection process to reattach the
transaction to a different part of the Tangle. Reattach once every 30
minutes that…
user1543
2
votes
1 answer
Purging lazy neighbors - When does this happen and how?
Node transaction propagation is a critical part of consensus and this feature can be seen as crucial so that the network operates as specified in the whitepaper.
In the Tangle whitepaper v1.4.3, a process is mentioned whereby 'lazy nodes' are…
user1543
2
votes
1 answer
Immutability in IOTA: How to be sure a transaction is not "removable" from Tangle?
In Bitcoin and Ethereum, the longest chain with the most proof-of-work (POW) invested in it is accepted as the true chain and used to determine balances and history on the network.
Because of this, if an adversary wants to change a block in a…
Questioner
- 552
- 2
- 8
2
votes
1 answer
How will Trinity or any other IOTA wallet keep up with hundreds of local snapshots per day?
So lets assume that in few years, each node is gonna make 50 or 100 snapshots each day. Trinity is gonna keep local data on each account like addresses, balance, etc.. while at the same time automatically switching between nodes which means that…
DisplayName
- 570
- 4
- 5
2
votes
1 answer
Why is the requested hash size 46 bytes when the transaction hash size is 243 bytes?
In the IRI, the byte size of a request hash is defined as having 46 bytes:
// Configuration.java
public static final String REQ_HASH_SIZE = "46";
However, in Hash.java the hash size of a regular transaction is 243 bytes.
For reference, it will be…
user1543
2
votes
0 answers
Can the coordinator be found or identified?
The coordinator is currently vital to the operation of the Iota network. There are both security (leaking the seed used to generate milestones) and availability (it must be able to issue milestones) impacts if it were to be attacked.
Most attacks…
Cybergibbons
- 305
- 1
- 6
2
votes
2 answers
Are inbound/outbound Iota connections encrypted?
If I am running a full node, what can an adversary determine from sniffing the traffic to and from my node, or is it all encrypted?
Cybergibbons
- 305
- 1
- 6
2
votes
0 answers
How is the secrecy of the Iota seed maintained on IoT devices?
Iota is intended to be deployed on IoT devices.
A problem with IoT devices is that they are placed in insecure locations, allowing attackers to gain physical access and perform advance/prolonged attacks without detection.
Under these condition, an…
Cybergibbons
- 305
- 1
- 6
2
votes
1 answer
How is authenticity of data gathered by Iota guaranteed?
Several of the proposed use cases of Iota seem to hinge around storing data on the tangle so that it is immutable.
Immutable data is only of use if it is authentic. Take, for example, a temperature sensor on shipment of food, which can easily be…
Cybergibbons
- 305
- 1
- 6