00:22:41 Torr, is there a Tiktoc about it that I can watch? 00:45:11 Mochi101: Not that I'm aware of. 00:47:50 I was joking hey. 00:48:10 All about the attention span of many people these days. 00:50:07 I know XD 00:50:22 The best part is seeing how anxious they get when away from social media. 00:50:53 Literally frenetic. 00:53:33 Torr, younger generations... I can't see how they're going to survive. 00:59:51 They'll find a way. 01:03:11 Will have a walk now. 01:03:13 See ya 02:22:44 hey folks, question: how exactly does the network protect from malicious users broadcasting one transaction to one node, while broadcasting another version of that transaction to other nodes? how does that get handled? i know it has something to do with confirmations, but how exactly does that work? 05:15:47 winter: it uses PoW to pick one of these as "canonical". 05:25:12 moneromooo: so is it based off majority - how does that selection work? 05:37:17 The canonical chain is the one with the most cumulative work. And it can include only one of the two txes, or it'd be invalid. 05:37:48 Typically, the first one mined in time is selected, but not always if they're mined close in time. 05:51:24 To be clear, what exactly do you mean by the two txes -- how is one TX shown to be related to another, at least in terms of being added into the chain? How does the network differentiate between a node announcing a legitimate transaction and an illegitimate one, assuming the transactor only announced it to one node? 05:59:34 By "the two txes" I mean the transactions in your question. The rest of what you said I do not understand. 05:59:49 Ask more precise questions. 06:01:39 "a legitimate transaction and an illegitimate one" wrong, both are legitimate 06:01:46 first come, first served 06:02:12 whichever gets mined first will be what's actually spent 06:23:57 what I failed to elaborate on the first time is that why wouldn't both txes get spent? 06:24:19 (if possible based on funds) 06:24:26 because they use the same key image 06:24:44 if they spend the same input 06:25:43 ah, okay, those are some terms i'd have to look into -- thanks 16:06:28 winter the money in every transaction is "held" in something called a key image. Imagine something like a serial number on a $5 US dollar. This key image can only be included in a mined block one time. If a miner attempts to include it a second time in a second block, the network will reject the second block 16:08:00 So if I submit two transactions that reference the same key image, the transaction that becomes spent is the first one mined by a miner that ends up in the longest chain 16:08:32 The longest proof of work chain 17:26:24 sup 17:41:03 not crypto