Thanks for the write up on this. Yes, I hear ya. I am trying to understand how technically a larger OP_RETURN would look on the timechain before any software interpreted it. I think this is the crux of the matter.
Login to reply
Replies (1)
It's raw hex bytes. Even though the Bitcoin core software doesn't continue to parse it, it is stored on disk and that's when a scanner could flag it on a hash table fingerprint match.
What I'm not saying (for the bystanders):
- Bitcoin embedded malware could be parsed and activated by the core software.
- Bitcoin has an image compiler
- an OP_RETURN could ALONE crash a VM.