alexmiller.eth

4.1K posts

alexmiller.eth banner
alexmiller.eth

alexmiller.eth

@alexmillertech

Texas Katılım Mayıs 2016
670 Takip Edilen5.3K Takipçiler
alexmiller.eth
alexmiller.eth@alexmillertech·
@pcaversaccio @moo9000 K determinism was introduced by RFC6979 and is standard for most software based ECDSA signers, though unfortunately less so for HSMs. I think adoption is basically 100% in the crypto industry though (including hardware wallets) #section-3.2" target="_blank" rel="nofollow noopener">datatracker.ietf.org/doc/html/rfc69…
English
1
0
15
118
sudo rm -rf --no-preserve-root /
Any ECDSA signature is based on a random nonce value `k`. If u ever reuse the nonce for the same account (i.e. the `r` param is the same), ur private key can be easily recovered. For educational purposes, I summarised the math derivation & code in 1 repo. github.com/pcaversaccio/e…
English
11
46
284
23.1K
alexmiller.eth
alexmiller.eth@alexmillertech·
Funny enough, I *just* learned about this unfortunate syntax being idiomatic Go like 2 days ago. There has been a lot of discussion over whether or not to hard fork the language to remove it: github.com/golang/go/disc…
Péter Szilágyi@peter_szilagyi

Today we reduced the memory requirement of Geth during snap sync from 14GB to 2GB (benchmarks still running, numbers might change a bit). #golang #Ethereum Behold the epic change that made it possible...

English
3
0
10
1.8K
Evan Van Ness
Evan Van Ness@evan_van_ness·
ETH has been flat over the last 7 days, gas fees have been low and yet we've still been burning ETH. Very bullish in the long run.
Evan Van Ness tweet mediaEvan Van Ness tweet media
English
10
4
81
9.4K
Georgios Konstantopoulos
Georgios Konstantopoulos@gakonst·
Overheard someone at some event saying to some devs "don't use Forge, it's not nearly built enough for X" or some version of it. We've built all our tools with input from the community, mentoring, and tight feedback loops. We've helped competitive products grow and gave back all our learnings for free. Yes we are competitive. But we want the entire ecosystem to grow together. There is no room for zero sum thinking. If anything in Foundry doesn't work well, please open an issue with a repro or come to our chatrooms! We will happily discuss and iterate to a great solution like we have in the past. We need all the feedback we can get. More of it! Not less! What should we do?
English
21
14
118
46.9K
joseph.eth
joseph.eth@josephdelong·
Can you take me higher?
English
3
2
22
3.6K
Toghrul Maharramov 🇺🇦
Toghrul Maharramov 🇺🇦@toghrulmaharram·
@adamscochran @Timccopeland @banteg Validator ≠ full node. A single consensus participating full node can have hundreds or even thousands of validators running on top of it. No, it benefits everyone. Raising the upper bound decreases the network overhead, allowing to decrease the lower bound from 32 ETH.
English
6
3
60
2.6K
alexmiller.eth
alexmiller.eth@alexmillertech·
Interesting and important problem. Uniswap has done a lot of good for the industry, but I agree that this license wrapping precedent is dangerous for web3 development incentives and should be discussed more broadly.
Kenny White 🐚@white_kenny_

So our community noticed that @uniswap may have plagiarized @shellprotocol. I’m not mad, just disappointed. Uniswap’s actions point to a looming problem in web 3. I’ll explain what I mean, but first, let me go over some evidence:

English
0
0
0
485
sudo rm -rf --no-preserve-root /
It's not only important to understand what signature malleability is in theory, but also what it means in practice. Thus, I created a repo that implements a PoC that showcases how signature malleability attacks, using compact signatures, can be executed: github.com/pcaversaccio/m…
English
4
26
157
24.3K
alexmiller.eth
alexmiller.eth@alexmillertech·
@pcaversaccio What's the attack vector you had in mind? This shows that non-identical signatures validate against the same message, which is also true if the signer chooses any non-RFC6979 `k` value -- not sure where you're going with this.
English
1
0
2
99
sudo rm -rf --no-preserve-root /
TL;DR: Signatures must not be used as unique identifiers since the `ecrecover` precompile allows for malleable (non-unique) signatures!
English
5
0
14
1.6K
alexmiller.eth
alexmiller.eth@alexmillertech·
@mikedemarais It's more complicated, but you are not the only one who has brought this up...
English
0
0
2
193
mikedemarais.eth
mikedemarais.eth@mikedemarais·
can u imagine being Consensys and owning M*tam*sk AND GridPlus but never actually making it a cohesive unified experience / product
mikedemarais.eth tweet media
English
10
1
65
8.2K
alexmiller.eth
alexmiller.eth@alexmillertech·
@christine_dkim Where can I find more background information on this part? "Ryan reminded developers that the revamping of Beacon Chain attestation subnets (attnets) would be rolled out today on May 4"
English
1
0
0
145
Christine D. Kim
Christine D. Kim@christine_dkim·
Yesterday, Ethereum client teams gathered for ACDC Call #108. They talking about prepping EIP 4788 and EIP 6987 for inclusion in Deneb, SSZ considerations for EIP 4844, diversifying MEV relay client dependencies through PR 317, and more. Full writeup: galaxy.com/research/insig…
English
6
21
89
29.9K
alexmiller.eth
alexmiller.eth@alexmillertech·
@tomhschmidt @dwr Yeah Apple will never lift a finger to help public crypto and adding k1 support would fall into that bucket. @blasteasy got the door shut in his face for making the suggestion. But prob best to keep r1 keys off base layer ETH just in case the feds put a backdoor in that curve 😛
English
0
0
3
131
Tom Schmidt >|<
Tom Schmidt >|<@tomhschmidt·
@dwr Don't know about the above, but I actually think the opposite is maybe more interesting right now (doing other signature verification e.g. secp256r1 on chain), especially w/ 4337 or custom rollups
English
3
0
10
2.8K
Dan Romero
Dan Romero@dwr·
Anyone familiar with WebAuthn and Apple Passkeys know if there are plans to: - support ECDSA signatures from arbitrary curves? - allow for encrypt / decrypt actions?
English
19
6
61
26.9K