2084d
https://cashy.tools/ . It was https://p2sh.cash/ . We used to discuss BCH puzzles on this site at topic https://memo.cash/topic/p2sh.cash
2084d
2084d
My solving transaction is ac85b12d9581af59f5ad17e9d4ddaeab6fee294ecbf438791a7a15c7b9cd30eb, browse this tx in block explorers
2084d
Puzzle#2 is far more easy than Puzzle#1 ( https://memo.cash/topic/p2sh.cash for puzzle#1 writeup )
2084d
Puzzle#2 is just a usecase of OP_CHECKDATASIG and oracles.
2084d
Redeem script is <SHA256 of subscribed email> <Oracle pubkey 036ced41254dd20a0584fa91028fdbd0af92724e33153a93d41cbd65a836a3d406> OP_CHECKDATASIG
2084d
Unlocking script is <signature for email from Oracle>
2084d
Full script is <signature for email from Oracle> <SHA256 of subscribed email> 036ced41254dd20a0584fa91028fdbd0af92724e33153a93d41cbd65a836a3d406 OP_CHECKDATASIG. Solved#
2084d
Vulnerability for Puzzle#2: Relay attack. In Puzzle#1, somebody have sent a tx with whose <SHA256 of subscribed email> in the unlock script.