mirror of
https://github.com/comit-network/xmr-btc-swap.git
synced 2024-10-01 01:45:40 -04:00
Merge pull request #47 from comit-network/feedback-feature-list
Add a list of potential features proposed by the community
This commit is contained in:
commit
dc8421fef7
@ -113,3 +113,30 @@ Through user interviews we plan to collect more information on the current setup
|
|||||||
Specific prototypes showcase specific answers to the questions listed above. We may use the prototypes in interviews to showcase scenarios.
|
Specific prototypes showcase specific answers to the questions listed above. We may use the prototypes in interviews to showcase scenarios.
|
||||||
|
|
||||||
|
|
||||||
|
## Feedback
|
||||||
|
|
||||||
|
### Possible Features List
|
||||||
|
|
||||||
|
This section points out features that were mentioned by the community. These features will be evaluated and prioritized before we start building.
|
||||||
|
|
||||||
|
#### Avoid receiving tainted Bitcoin
|
||||||
|
|
||||||
|
Mentions:
|
||||||
|
|
||||||
|
* [27.11.2020 on Reddit](https://www.reddit.com/r/Monero/comments/k14hug/how_would_an_atomic_swap_ui_look_like/gdplnt8?utm_source=share&utm_medium=web2x&context=3)
|
||||||
|
|
||||||
|
The receiver of the Bitcoin should be able to validate the address to be used by the sender to avoid receiving tainted Bitcoin (i.e. coins that were unlawfully used).
|
||||||
|
This feature is relevant for the receiving party of the Bitcoin, it is relevant for taker and maker.
|
||||||
|
This feature is relevant independent of the user use case.
|
||||||
|
|
||||||
|
In order to be able to spot tainted Bitcoin, the receiver has to validate the address to be used of the sender.
|
||||||
|
In the current protocol the party funding (sending) Bitcoin always moves first.
|
||||||
|
|
||||||
|
The party receiving the Bitcoin would have to request the address to be used by the sender.
|
||||||
|
For the beginning it might be good enough to let the taker verify that the Bitcoin are not tainted manually, by enabling the taker to provide e.g. a CSV file with tainted addresses by themselves.
|
||||||
|
Eventually, an automated service could be integrated, that keeps listings of tainted Bitcoin up to date.
|
||||||
|
More research is needed to evaluate if reliable services exist.
|
||||||
|
|
||||||
|
Once the daemon of the party receiving the Bitcoin sees the Bitcoin transaction of the sender, the address has to be evaluated to ensure the correct address has been used for funding.
|
||||||
|
This can be done automated.
|
||||||
|
In case a tainted address was used the swap execution should halt and give a warning to the receiving party.
|
||||||
|
Loading…
Reference in New Issue
Block a user