Search results

Jump to navigation Jump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • * The passphrase on a wallet file that has become public, or that an attacker has otherwise gained access to. * The passphrase on a wallet file that may become public, or that an attacker could gain access to. ...
    16 KB (2,668 words) - 21:08, 12 February 2017
  • ...aced behind a tamper-evident security hologram on the back of a metal coin or bar, with the minikey printed on the inside such that it can only be read i To calculate SHA256 from the command line on OSX or Linux devices: ...
    11 KB (1,670 words) - 07:02, 11 November 2025
  • ...on that spends her own coin AND Bob's secret transaction. Here's where the random chance comes in. We're going to randomize the prevout identifying Bob's tra ...is in. If the hash is H, and we want a 1/N chance of the nanopayment being real, then Bob would take H1=H-rand(N) and tell Alice the hash is between H1 and ...
    5 KB (924 words) - 06:09, 15 February 2018
  • ...owever. It is a lot like TrueCrypt: it allows you to mount encrypted files or partitions and decrypt/encrypt them on-the-fly. ...password and then hashes it, adding the specified salt. The salt should be random, but it mustn't change. ...
    7 KB (1,116 words) - 23:55, 3 July 2013
  • ...table in memory until the parent transactions could be located in a block or the parent transaction was forwarded by a peer. ...tem began trashing. This situation probably leads to the victim's computer or application to hang. ...
    8 KB (1,102 words) - 15:52, 6 March 2015
  • ...ining shares of a private key on a device leave the key exposed to malware or a malicious user of the device which are usually the most important threats ...ttacker with the first share and any other share could recover the secret (or alternatively the N-th share plus any N additional ones). ...
    8 KB (1,293 words) - 11:09, 6 April 2021
  • Bitcoin Core's overall speed is significantly affected by the random-access speed of the contents of the chainstate directory; if your data dire If you're using a removable drive, make sure that the path to the real chainstate does not change. ...
    4 KB (728 words) - 21:31, 12 February 2017
  • ...or questions in progress, so feel free to ask new questions, or answer and/or refine existing answers. ...your computer found them by running the bitcoin software for a few months or a year-- they are not easy to find, and are harder to find the more people ...
    11 KB (1,781 words) - 03:09, 12 August 2021
  • '''Bitcoin mixer''' is software (or a service like [[CoinJoin]]) that accepts Bitcoin from multiple users, mixe ...wallet addresses. Hence, when you use this solution, you can send Bitcoin or receive it while remaining completely anonymous. ...
    8 KB (1,258 words) - 04:25, 9 June 2025
  • ...rface]. They also constantly leak information without the user’s knowledge or consent. Because Bitcoins can be stored directly on your computer and because they are real money, the motivation for sophisticated and targeted attacks against your s ...
    8 KB (1,326 words) - 03:41, 3 July 2023
  • ...e.) It doesn't need to be the case that real resources are consumed in the real economy. ...s being set up (i.e. [the fast early phase of] its initial distribution) - or, more precisely, while ''the first'' cryptocurrency is being set up; more o ...
    32 KB (5,261 words) - 12:10, 15 January 2018
  • ...sting P2P protocol to encode array lengths, among other things, in 1, 3, 5 or 9 bytes. Only CompactSize encodings which are minimally-encoded (ie the sho ...of 0 implies a real index of 0, a second index of 0 thereafter refers to a real index of 1, etc. ...
    30 KB (4,803 words) - 21:36, 23 April 2024
  • ...mart property also includes non-physical property like shares in a company or access rights to a remote computer. Making property smart allows it to be t ...hysical container (like a key or SIM card) and can't be easily transferred or manipulated. Smart property changes this, allowing ownership to be intermed ...
    9 KB (1,575 words) - 16:36, 16 July 2018
  • photonic processors. Without compromising the cryptographic or game-theoretical ...APEX)–i.e. electricity to hardware, without compromising the cryptographic or game-theoretical security of Hashcash. We provide an example implementation ...
    22 KB (3,346 words) - 19:40, 16 January 2022
  • ...all of them, perhaps those of specific people it wants to harass, perhaps random ones just to create fear that "I could be next" - from entering the winning ...nk you ought to buy, and donate to who we think you ought to donate to". - Or, more precisely, they can say it, but we can reply "we don't need you any m ...
    13 KB (2,096 words) - 22:42, 6 May 2013
  • * The right people were online and available in IRC or could be contacted directly. ...e for one 0.7.2 node to create a block that others are unable to validate, or for 0.7.2 nodes to create block re-orgs that peers cannot validate, because ...
    7 KB (1,062 words) - 17:59, 24 September 2019
  • ...ficult for outside parties to determine which spender paid which recipient or recipients. Unlike many other privacy solutions, coinjoin transactions do ...f>[https://bitcointalk.org/?topic=279249 CoinJoin: Bitcoin privacy for the real world]</ref> by gmaxwell. ...
    17 KB (2,820 words) - 13:16, 3 July 2023
  • ...ng network latency, while not compromising the strength of the blockchain, or the decentralized character of the network. ...ne transaction is desired, will usually have a fast link to either the net or specific counterparty bank(s), with paid-for higher bandwidth and lower lat ...
    11 KB (1,772 words) - 02:51, 25 November 2012
  • ...ten metered) and increases memory usage. All three problems are triggering real user complaints for the Android "Bitcoin Wallet" app which implements SPV m | 4 || nTweak || uint32_t || A random value to add to the seed value in the hash function used by the bloom filte ...
    17 KB (2,887 words) - 18:00, 24 September 2019
  • Feel free to add or correct errors if you are familiar with code. # Gets address to use for payout either from file or bitcoind. ...
    12 KB (1,917 words) - 22:38, 6 May 2014
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)