> I'm not sure this is the right example in this case. Knots proponents want to filter out transactions that embed arbitrary data. Is there any technical summary of all the possible ways data can be embedded arbitrarily in Bitcoin transactions?
nope, no way to do it.
People have been able to embed data into images, texts, sounds and more using codes and whatever schema they come up with.
Login to reply
Replies (2)
Fair point, yet I think it would be reasonable to think that the broad categories of techniques that allow storing arbitrary data on chain can be outlined.
I would imagine that everyone agrees that having to generate a trillion private keys until one is found that, when a bech32m address is created from it, has its first 5 characters after the human readable part be interpreted as the first bytes of some jpeg is quite more cumbersome than OP_FALSE OP_IF, right?
I believe not much would change in terms of actual transaction composition, in both mempools and blocks, even if v30 were to be broadly adopted - which does not seem the case to be honest - yet I cannot quite accept the idea that, since in principle spam cannot be prevented entirely, nothing should be done about it.
> I would imagine that everyone agrees that having to generate a trillion private keys until one is found that...
Yes, there are easier ways to spam than others.
> I cannot quite accept the idea that, since in principle spam cannot be prevented entirely, nothing should be done about it.
I understand your position, and I too am not sure what is the correct path.
The variables at play are:
- how damaging is the spam
- how effective are the anti-spam measures, at both technical layer and social layer (e.g. discouraging future spam because old spam was killed)
- how much effort, and technical complexity is introduced in trying to keep up with spam
I'm terms of software preference, I would not be willing to introduce all that growing complexity to half solve a problem. Mostly becaus I don't think this spam is doing much damage