Unanswered Questions
7 questions with no upvoted or accepted answers
5
votes
0
answers
250
views
MAM message encryption
According to the documentation message encryption is done in following way
Each message is encrypted with a one-time pad that consists of the channel ID and the index of the key used to sign the ...
3
votes
0
answers
113
views
Is MAM encrypted message has perfect secrecy?
Here I am referring to MAM in restricted mode, where side key is used to encrypt the message.
One time pad is known for perfect secrecy. Since MAM uses the one-time pad, is MAM encrypted message has ...
2
votes
0
answers
110
views
Can the coordinator be found or identified?
The coordinator is currently vital to the operation of the Iota network. There are both security (leaking the seed used to generate milestones) and availability (it must be able to issue milestones) ...
2
votes
0
answers
70
views
How is the secrecy of the Iota seed maintained on IoT devices?
Iota is intended to be deployed on IoT devices.
A problem with IoT devices is that they are placed in insecure locations, allowing attackers to gain physical access and perform advance/prolonged ...
2
votes
0
answers
101
views
How to compute the % of network computing power the attacker hold?
It is known generally that Tangle is susceptible to 34% attack(of total computing power) that gives a 100% successful attack. The example given on page 19 of white paper says that an upper limit to ...
2
votes
0
answers
55
views
Security implications of storing seed on Trezor password manager
I'm wondering about using Trezor password manager to store an IOTA seed and whether there are any security implications I should be aware of?
Many thanks!
0
votes
0
answers
60
views
If the coordinator were to be identified or located, what attacks could be carried out against it?
The coordinator is currently vital to the operation of the Iota network. There are both security (leaking the seed used to generate milestones) and availability (it must be able to issue milestones) ...