Return-Path: Received: from smtp3.osuosl.org (smtp3.osuosl.org [140.211.166.136]) by lists.linuxfoundation.org (Postfix) with ESMTP id 6074CC002D for ; Wed, 15 Jun 2022 01:16:58 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by smtp3.osuosl.org (Postfix) with ESMTP id 5C91460EA8 for ; Wed, 15 Jun 2022 01:16:58 +0000 (UTC) X-Virus-Scanned: amavisd-new at osuosl.org X-Spam-Flag: NO X-Spam-Score: -2.099 X-Spam-Level: X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no Authentication-Results: smtp3.osuosl.org (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com Received: from smtp3.osuosl.org ([127.0.0.1]) by localhost (smtp3.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tl6qZ79LiEFD for ; Wed, 15 Jun 2022 01:16:57 +0000 (UTC) X-Greylist: whitelisted by SQLgrey-1.8.0 Received: from mail-yw1-x112e.google.com (mail-yw1-x112e.google.com [IPv6:2607:f8b0:4864:20::112e]) by smtp3.osuosl.org (Postfix) with ESMTPS id 8DA7860ABE for ; Wed, 15 Jun 2022 01:16:57 +0000 (UTC) Received: by mail-yw1-x112e.google.com with SMTP id 00721157ae682-30fdbe7467cso47092637b3.1 for ; Tue, 14 Jun 2022 18:16:57 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=LTGkSthJb5t1NEGPA655cpAvIxFCakvy5VvAPB9IKsg=; b=W/ReJUhDOWkz7XSCMGudvkYPv/PCbGXa90uz/VhMVOqVx06MNJlfyAm13W9Tca1dpY nssJ8DcFDQok4LmUnNAVRWV3fXXLY0zbMQoH1ntEtxNw4vcgE6PD8wAPFNyX8QFI6s2r kQFi9ca0Z3+g8AdK1ExaGoPTbnUpAAedELJWpbbvVL5wiCh6K4jGuhTS5imUVx72gZXZ gCaLkFdLVIvg8s1hgmGukzbaxpA1PwSoKNsFa7oV2CVC8AlQEtsHNmDo304xRhkOOCCv wrzjQa75oK7XSJjPTRRQEXXb+j7jRh+gcB3pmBdfNFqHmQJfj/KWemI7BqIkm/2DXnZC gpHQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=LTGkSthJb5t1NEGPA655cpAvIxFCakvy5VvAPB9IKsg=; b=YlPz2jTNBOida2dtVh1ALtKwmogKoL9W5qVGzVnTke1XlXfSNVMdxgNg11TvYGtdjf DdLpPhQ864l/LzaZQDHn4IFXrcF3W6r1Fqsm8fVDWPpmz+3KSAB6becb79XJ9DrVh4fO YBTL7m3vy7NUiQY++0fzI+9tlCbW/RJrPn+32KlnyaukeRsFoRoLMAoZfvAk6NJqQDxq rNR/AVIANDb9fXc0QB8c/fXG13AK9oShnaL1Ed0Uze41fTb082IW0yHlfiJn6CltTcK9 sSBp9mrKJrMh/dVwb1WM9za41cpTyBViCIJZuqyLkvWT/CNws8U4ilarimynP4LwDo0x 2uVQ== X-Gm-Message-State: AJIora/IwbdG0FVJWesxGafpTrAMin2cgERRDhljWUqlGYGVLT1upahY LgU1R7A+lqjGp8iUCWaVFtWajwZcBgLdsjM1gdpHFICg/M0= X-Google-Smtp-Source: AGRyM1tNIX/Y24IhLLLQHNb2dpXgo7Pa2tAe1/y3ZWF2PpO3GKWla0r876SYa3Riw4UE9BfXQYWKzgmapuVNMlWUIrQ= X-Received: by 2002:a81:915:0:b0:310:f2e:1559 with SMTP id 21-20020a810915000000b003100f2e1559mr8846773ywj.225.1655255816461; Tue, 14 Jun 2022 18:16:56 -0700 (PDT) MIME-Version: 1.0 Received: by 2002:a05:7000:dd05:0:0:0:0 with HTTP; Tue, 14 Jun 2022 18:16:55 -0700 (PDT) In-Reply-To: References: From: "Undiscussed Horrific Abuse, One Victim of Many" Date: Tue, 14 Jun 2022 21:16:55 -0400 Message-ID: To: Andrew Poelstra Content-Type: text/plain; charset="UTF-8" X-Mailman-Approved-At: Wed, 15 Jun 2022 08:06:32 +0000 Cc: Bitcoin Protocol Discussion Subject: Re: [bitcoin-dev] Why OpenTimestamps does not "linearize" its transactions X-BeenThere: bitcoin-dev@lists.linuxfoundation.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: Bitcoin Protocol Discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 15 Jun 2022 01:16:58 -0000 On 6/14/22, Andrew Poelstra wrote: > On Tue, Jun 14, 2022 at 01:15:08PM -0400, Undiscussed Horrific Abuse, One > Victim of Many via bitcoin-dev wrote: >> I'm replying to Peter, skipping the other emails. >> >> I perceive all these emails as disruptive trolling, ignoring the >> importance of real timestamping, while handwaving about things that >> are roughly false and harmful. >> >> Since the start of cryptocurrency, Bitcoin has been used to write >> timestamps that stay intact despite malicious action to arbitrary >> systems and records, showing the earliest on-chain publication of >> data. It seems misleading that OTS does not do that, when it is such a >> prominent system. >> > > Please be cautious with tone and when assuming bad faith. I don't believe > that Peter is trolling. Also, as politely as I can, when something like > OTS whose model is dead-simple, well-documented, and has been running for > years providing significant value to many people, comes under attack for > being underspecified or failing to do what it says ... this is a > surprising claim, to say the least. Thank you for your reply, Andrew. I don't think Peter is trolling, but I do suspect some body like a spy agency of strengthening the timestamping solutions that have nonces in their merkle trees, avoiding usability for storing public records in a way that could be verified by anonymous and censored third parties. > After talking to a few people offline, all of whom are baffled at this > entire conversation, I think the issue might come down to the way that > people interpret "timestamping". > > If you believe that "timestamping" means providing a verifiable ordering > to events, then of course OTS does not accomplish this, nor has it ever > claimed to. If you think that "timestamping" means proving that some > data existed at a particular time, then this is exactly what OTS does. > > Personally -- and I suspect this is true of Peter as well -- I have always > read the word as having the latter meaning, and it never occurred to me > until now that others might have a different interpretation. I looked some into the history of timestamping and I see that what you are saying is the academic norm. I don't see OTS as proving the data existed at a particular time, because the proof is held in a document the user must protect. I understand somewhat now that it is designed for users who can actually protect that data sufficiently. I do reiterate that it is blindingly easy to pin a public hash to the bitcoin blockchain that asserts the earliest publication of a document or collection of documents, and that this is desperately needed, to protect the accuracy of history when it is not safe. I worry that this form of "rfc timestamping" misleads its users into believing the timestamps of their documents are preserved. These kinds of user interaction issues can be very dangerous. I would recommend uploading .ots files to chains with cheap storage, such as arweave or bitcoin sv. This way people can prove which one was first, when there is more than one. For that to work, we need a norm of how and where to do it, so that users look in the same place, and it is the people who make the public services and standards, that set that norm. Thank you for your reply, and I apologise for my poor support. It is obvious that Peter has put incredible hard and long work into providing OTS to the community in a clean and robust fashion, and that is always very wonderful, and I have very thoroughly failed to acknowledge that.