On 03/12/2014 09:10 PM, William Yager wrote: > implement this is to allow semi-trusted devices (like desktop PCs) to do > all the "heavy lifting". The way the spec is defined, it is easy to have a > more powerful device do all the tough key stretching work without > significantly compromising the security of the wallet.
By disclosing "preH" to compromised computer (between steps 4 and 5) you make further steps 5-9 quite less important. Too bad you started to work on spec just recently. :-/ -- Best Regards / S pozdravom, Pavol Rusnak <st...@gk2.sk> ------------------------------------------------------------------------------ Learn Graph Databases - Download FREE O'Reilly Book "Graph Databases" is the definitive new guide to graph databases and their applications. Written by three acclaimed leaders in the field, this first edition is now available. Download your free book today! http://p.sf.net/sfu/13534_NeoTech _______________________________________________ Bitcoin-development mailing list Bitcoin-development@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/bitcoin-development