WebOfTrustInfo / btcr-hackathon-2017

Virtual hackathon to create spec and code for Bitcoin-based Decentralized Identifiers (DIDs)
https://weboftrustinfo.github.io/btcr-hackathon-2017/
14 stars 7 forks source link

Censorship of OP_RETURN Transactions #3

Closed ChristopherA closed 7 years ago

ChristopherA commented 7 years ago

It has been raised by @petertodd and others that using an op_return to encode the pointer to the DDO could hurt censorship resistance, as minors could identify those transactions that are DID related and not include them.

Instead, they recommend encoding it into the script of a P2SH transaction as some form of pay-to-contract. However, I still don't have a proposal from @petertodd on the best way to do this (he wants a similar capability to prevent censorship of open timestamps transactions). Another concern about the pay-to-contract approach is that it may mean two transactions to do a DDO update. An advantage is that it may support P2SH multisig DDOs.

For the first prototypes of the DID:BTCR method, I suggest we stick to P2PKH and P2WPKH transactions and we can support more censorship resistant methods later.

petertodd commented 7 years ago

@apoelstra Submitted a pull-req to python-opentimestamps for pay-to-contract-hash that I'll be implementing sometime in august: https://github.com/opentimestamps/python-opentimestamps/pull/14

For now I'd just stick with op-return, but assume something else will be added in the future. You can easily disambiguate this stuff by pre-committing to which method will be used in the same way you commit to the txout to be spent.

kimdhamilton commented 7 years ago

This issue was moved to WebOfTrustInfo/rebooting-the-web-of-trust-fall2017#16