Author: Ryan Grant 2018-08-16 17:32:25
Published on: 2018-08-16T17:32:25+00:00
In a recent conversation on the bitcoin-dev mailing list, Jude Nelson raised concerns about whether miners can identify transactions coming from specific software and censor them. The response to this question involves the use of IPFS, a distributed file system. The hash of a file is deterministic and can be obtained using the `ipfs add` command whether or not the network is connected. However, files are not uploaded to IPFS until transactions have been settled with several confirmations. This means that miners cannot identify transactions by their hashes until after they have already been confirmed and added to the blockchain.
Updated on: 2023-06-13T04:03:37.431141+00:00