2019-01-10 05:04:55
[snowblossomcoin/snowblossom] Issue closed by fireduck64
GitHub
2019-01-10 05:05:11
[snowblossomcoin/snowblossom] Issue closed by fireduck64
GitHub
2019-01-10 05:06:11
[snowblossomcoin/snowblossom] #78 add vote tally page
GitHub
2019-01-10 05:06:22
[snowblossomcoin/snowblossom] #88 adding pool failover to pool miner
GitHub
2019-01-10 05:47:07
*https://github.com/snowblossomcoin/snowblossom/compare/fd4a0ce1177f...4135908cec39*
https://github.com/snowblossomcoin/snowblossom/commit/4135908cec39e0bad40b4e776fdb53e694e33fde - cleanup error on missing address history
GitHub
2019-01-10 05:50:02
*https://github.com/snowblossomcoin/snowblossom/compare/4135908cec39...8fcbe5ba22f9*
https://github.com/snowblossomcoin/snowblossom/commit/8fcbe5ba22f9209d0202bce52bedc80bbf0f746e - Improve performance and stability for large wallets
GitHub
2019-01-10 06:47:19
*https://github.com/snowblossomcoin/snowblossom/compare/8fcbe5ba22f9...1975e4068fc0*
https://github.com/snowblossomcoin/snowblossom/commit/1975e4068fc068a74c5aea30697a36a5c1b6cdff - Working on fee estimation.
GitHub
2019-01-10 07:26:38
*https://github.com/snowblossomcoin/snowblossom/compare/1975e4068fc0...75dbf36a5389*
https://github.com/snowblossomcoin/snowblossom/commit/75dbf36a5389c82771f0645095df37f5c0cf3442 - Don't really care about cluster notices
GitHub
2019-01-10 07:35:47
[snowblossomcoin/snowblossom] Issue closed by fireduck64
GitHub
2019-01-10 10:11:07
what's the sleep here?
https://github.com/snowblossomcoin/snowblossom/commit/75dbf36a5389c82771f0645095df37f5c0cf3442
Rotonen
2019-01-10 12:06:10
Slowing down adding transactions enough to see the fee shift before pool is full
Fireduck
2019-01-10 12:15:19
so use a semaphore pivoting on that?
Rotonen
2019-01-10 13:50:51
Just for testing, don't need very fancy
Fireduck
2019-01-10 19:56:29
Btw, I don't know if you need it, but I happen to have spent a lot of time messing with x509 certificates. Also happen to be testing my own CA library and command line tools.
Clueless
2019-01-10 19:58:28
In channels I have a thing that builds an x509 cert signed with the node's key pair
Fireduck
2019-01-10 19:58:55
and when a node connects to another it always knows what node id (and thus public key) it is expecting so can validate the cert
Fireduck
2019-01-10 20:21:09
that leads to a race to masquerade?
Rotonen
2019-01-10 20:23:17
in the case of channels, it isn't hard to create a new node and get it into the peer tables
Fireduck
2019-01-10 20:23:44
but pretending to be a different node that exists would involve finding a public key that hashed to the same node id (address)
Fireduck
2019-01-10 20:23:48
so basically impossible
Fireduck
2019-01-10 20:31:00
check
Rotonen