Search results

Jump to navigation Jump to search
View ( | next 20) (20 | 50 | 100 | 250 | 500)
  • | title = Bitcoins create truly democratic policy, followers say | link = http://www.canada.com/Bitcoins+create+truly+democratic+policy+followers/5144669/story.html ...
    21 KB (2,914 words) - 22:30, 2 September 2015
  • ...ustomised service serving pre-existing addresses. This is left up to sysop policy, and deliberately not defined here. ...
    19 KB (2,806 words) - 04:41, 29 May 2024
  • ...work, developers should test the scripts on testnet with the default relay policy turned on, and with a small amount of money after BIP141 is activated on ma ...
    26 KB (3,935 words) - 23:08, 26 April 2024
  • ...his spec does not change the requirement that nodes only relay information about blocks which they have fully validated in response to GETDATA/GETHEADERS/GE ...ocktxn RTT around 90% of the time. With a smart compact-block-announcement policy, it is thus expected that this work might allow blocks to be relayed betwee ...
    30 KB (4,803 words) - 21:36, 23 April 2024
  • ...individual public key and signature, as would be required by an ''n-of-n'' policy implemented using <code>OP_CHECKSIGADD</code> as introduced in ([https://gi ...rs. This prevents publishing invalid signatures which may leak information about the secret key. It is recommended but can be omitted if the computation cos ...
    68 KB (10,863 words) - 04:28, 29 May 2024
  • ...ers, TV channels, websites etc, as to make it impossible for anyone to lie about them. ...should get "the latest lottery results" appended to it. There is no hurry about this, it doesn't need to be exactly every week, or even the same lottery ev ...
    32 KB (5,261 words) - 12:10, 15 January 2018
  • ...stricted to only permit one of the two variants (as Bitcoin does through a policy rule on the network), it can be [https://nbn-resolving.de/urn:nbn:de:hbz:29 ...choosing secret and public keys, and we avoid introducing new assumptions about the security of elliptic curves and hash functions. ...
    39 KB (6,291 words) - 17:37, 6 May 2024
  • ...d a noticeable footprint in the blockchain, potentially revealing metadata about the sender and receiver. Notification schemes also allow the receiver to li ...egrading the anonymity set of the CoinJoin and giving Bob more information about Alice. If instead all inputs are used, Bob has no way of knowing which inpu ...
    49 KB (7,978 words) - 04:49, 31 May 2024
  • ...t software.</ref>. Specifically, it seeks to minimize how much information about the spendability conditions of a transaction output is revealed on chain at ...revealed Merkle branches. This is possible because we do not actually care about the position of specific scripts in the tree; only that they are actually c ...
    43 KB (6,814 words) - 18:04, 29 June 2023
  • Answers to commonly-asked questions and concerns about scaling Bitcoin, including “level 1” solutions such as increasing the block ...bout how Bitcoin currently works (related to scaling) as well as questions about the technical terminology related to the scaling discussion. ...
    44 KB (6,696 words) - 00:36, 16 July 2021
  • * Think about what you're hiding from, what is your threat model and what is your adversa * Try to reveal as little information as possible about yourself when transacting, for example, avoid AML/KYC checks and be careful ...
    159 KB (24,866 words) - 08:59, 31 December 2023
View ( | next 20) (20 | 50 | 100 | 250 | 500)