On 03/08/2014 01:55 AM, Edmund Edgar wrote: > On 4 March 2014 14:07, Odinn Cyberguerrilla > > wrote: > > Nothing is safe. > > > This is true. To rephrase, imagine I gave you an ECC public key > , you gave me back a public key of your own > devising, then I paid some money to the address resulting from > add_pubkeys(,) [1]. Can anyone either: > > a) Think of a way that Odinn could make an such that they > could spend the resulting money without having . > b) Opine, somewhat knowledgeably, that this probably wouldn't be an > easy thing to do, and they wouldn't be alarmed to see people running > software that did this kind of thing. > > [1] https://github.com/vbuterin/pybitcointools/blob/master/pybitcointools/main.py#L173 Consider that I see your public key before I create and send you my public key . I create a new keypair, with which I know (it can be any arbitrary key pair). But I don't give you , I give you = minus (which I can do because I've seen before doing this). Sure, I don't know the private key for , but it doesn't matter... because what + = (mine) You have no way to detect this condition, because you don't know what c_pub/c_priv I created, so you can only detect this after it's too late (after I abuse the private key) -Alan