mirror of
https://github.com/comit-network/xmr-btc-swap.git
synced 2024-10-01 01:45:40 -04:00
Clarify what manual check for tainted coins could mean
This commit is contained in:
parent
5246eece9e
commit
7a30555aa9
@ -133,7 +133,10 @@ In order to be able to spot tainted Bitcoin, the receiver has to validate the ad
|
|||||||
In the current protocol the party funding (sending) Bitcoin always moves first.
|
In the current protocol the party funding (sending) Bitcoin always moves first.
|
||||||
|
|
||||||
The party receiving the Bitcoin would have to request the address to be used by the sender.
|
The party receiving the Bitcoin would have to request the address to be used by the sender.
|
||||||
For the beginning it might be good enough to let the taker verify that the Bitcoin are not tainted manually, eventually it can be done automated against a service listing tainted Bitcoin.
|
For the beginning it might be good enough to let the taker verify that the Bitcoin are not tainted manually, by enabling the taker to provide e.g. a CSV file with tainted addresses by themselves.
|
||||||
|
Eventually, an automated service could be integrated, that keeps listings of tainted Bitcoin up to date.
|
||||||
|
More research is needed to evaluate if reliable services exist.
|
||||||
|
|
||||||
Once the daemon of the party receiving the Bitcoin sees the Bitcoin transaction of the sender, the address has to be evaluated to ensure the correct address has been used for funding.
|
Once the daemon of the party receiving the Bitcoin sees the Bitcoin transaction of the sender, the address has to be evaluated to ensure the correct address has been used for funding.
|
||||||
This can be done automated.
|
This can be done automated.
|
||||||
In case a tainted address was used the swap execution should halt and give a warning to the receiving party.
|
In case a tainted address was used the swap execution should halt and give a warning to the receiving party.
|
||||||
|
Loading…
Reference in New Issue
Block a user