On Wed, Aug 15, 2018 at 8:40 PM, Jude Nelson via bitcoin-dev <bitcoin-dev@lists.linuxfoundation.org> wrote: > Can a miner identify which transactions came from your software simply by > running a copy themselves? If so, then they can censor your transactions no > matter how you encode them.
The hash of the file is deterministic and `ipfs add` tells us what it is whether the network is connected or disconnected. We don't upload files to IPFS until the transaction has settled with several confirmations. _______________________________________________ bitcoin-dev mailing list bitcoin-dev@lists.linuxfoundation.org https://lists.linuxfoundation.org/mailman/listinfo/bitcoin-dev