Search results

Jump to navigation Jump to search
  • ...ctions have an [[Confirmation#How_Many_Confirmations_Is_Enough|appropriate number of confirmations]]. ...tore which is so widely distributed. There is a tradeoff between the exact number of messages and how quickly they can be embedded. But as of December 2013, ...
    34 KB (5,321 words) - 20:21, 30 August 2022
  • You need to protect yourself from both forward attacks (getting something that identifies you using coins that you got wit There are a number of ways to get evidence used for identifying wallet software: ...
    162 KB (25,330 words) - 17:11, 9 February 2025