@danielvf Some additional color... To protect against ECDSA malleability, low-s sigs are often used (required for sigs the LN protocol for example). Low-s was originally proposed in BIP146. But with Schnorr sigs this malleability goes away entirely!
Here’s how signature malleability attacks work.
Two attacks.
If a user signs the same message multiple times, they get a different signature each time. If your code uses a signature as an identifier for blocking actions, users can repeat that action. 1/3
Recently came across this from @kodylow@KodyLow/Base58-A-Tour-Of-Core-Lightning?v=1" target="_blank" rel="nofollow noopener">replit.com/@KodyLow/Base5…
What other resources are out there for learning to build on the #bitcoin lightning network?
1/ There are no other constitutional rights in substance without freedom to transact
Being meaning to write this for 6 months, but the Canadian response to the trucker protests is illustrating this so vividly, that today is the day.
If you don't, I encourage you to learn about why Bitcoin uses energy, the economics of mining, and most importantly to think bigger than your personal experience with money.