2017-04-03 19:14:01 +00:00
|
|
|
== Chapter 1 - What is Bitcoin?
|
|
|
|
* Updated Bitcoin history
|
|
|
|
* More user stories and updates
|
|
|
|
* More examples of bitcoin uses and clients
|
|
|
|
* Updated guide on how to get, use, spend bitcoin
|
|
|
|
|
|
|
|
== Chapter 2 - How Bitcoin Works
|
|
|
|
* Many small changes, updates and improvements
|
|
|
|
|
|
|
|
== Chapter 3 - Bitcoin Core
|
|
|
|
* Improved and updated examples and code
|
|
|
|
* Configuration options and examples
|
|
|
|
* Running a bitcoin node
|
|
|
|
* Updated libraries
|
|
|
|
|
|
|
|
== Chapter 4 - Keys and Addresses
|
|
|
|
|
|
|
|
* Many small improvements
|
|
|
|
* Improved and new diagrams
|
|
|
|
|
|
|
|
== Chapter 5 - Wallets
|
|
|
|
|
|
|
|
* Much more detail on BIP39 Mnemonic Code Words
|
|
|
|
* BIP39 Passphrases and use-cases
|
|
|
|
* Using public extended keys on an e-commerce server
|
|
|
|
* Improved and new diagrams
|
|
|
|
|
|
|
|
== Chapter 6 - Transactions
|
|
|
|
|
|
|
|
* Transaction Structure
|
|
|
|
* More detail on inputs and outputs
|
|
|
|
* Transaction serialization/deserialization
|
|
|
|
|
|
|
|
* Transaction Fees
|
|
|
|
* Dynamic fees
|
|
|
|
* Fee estimation
|
|
|
|
* Third-party fee estimation services
|
|
|
|
|
|
|
|
* Digital Signatures
|
|
|
|
* Signature creation and verification
|
|
|
|
* Signature serialization (DER encoding)
|
|
|
|
* SIGHASH flags
|
|
|
|
* ECDSA Math overview
|
2017-04-04 19:52:05 +00:00
|
|
|
|
|
|
|
|
|
|
|
== Chapter 7
|
|
|
|
|
|
|
|
* Time Locks
|
|
|
|
* Transaction level absolute (nLocktime)
|
|
|
|
* UTXO/Script level absolute (CHECKLOCKTIMEVERIFY)
|
|
|
|
* Input level relative (nSequence)
|
|
|
|
* UTXO/Script level relative (CHECKSEQUENCEVERIFY)
|
|
|
|
* Median Time Past
|
|
|
|
* Timelock defense against fee sniping
|
|
|
|
* Script Flow Control
|
|
|
|
* VERIFY guard clauses
|
|
|
|
* Time lock guard clauses
|
|
|
|
* Complex script (example and analysis)
|
|
|
|
|
|
|
|
== Chapter 8
|
|
|
|
|
|
|
|
* Relay networks
|
|
|
|
* SPV node improvements
|
|
|
|
* Bloom filters and SPV
|
|
|
|
* SPV nodes and privacy
|
|
|
|
* Encrypted and Authenticated connections (BIP150/151)
|
|
|
|
|
|
|
|
== Chapter 9
|
|
|
|
|
|
|
|
* Merkle trees and SPV
|
|
|
|
* Test blockchains
|
|
|
|
* Testnet
|
|
|
|
* Using testnet
|
|
|
|
* Segnet
|
|
|
|
* Regtest
|
|
|
|
* Using regtest
|
|
|
|
* Development with test blockchains
|
2017-04-23 13:03:07 +00:00
|
|
|
|
|
|
|
== Chapter 10
|
|
|
|
|
|
|
|
* Hard forks, soft forks and signaling
|
|
|
|
* Diverging hard forks
|
|
|
|
* Soft forks for feature upgrades
|
|
|
|
* Signaling soft forks with block version
|
|
|
|
* BIP-9 (versionbits) signaling and activation
|
|
|
|
* Consensus software development
|
|
|
|
|
|
|
|
== Chapter 11
|
|
|
|
|
|
|
|
* Security principles
|
|
|
|
|
|
|
|
== Chapter 12 (all new chapter)
|
|
|
|
|
|
|
|
* Blockchain application
|
|
|
|
* Building blocks of the trust platform
|
|
|
|
* Constructing blockchain applications
|
|
|
|
* Colored Coins
|
|
|
|
* Counterparty
|
|
|
|
* Payment channels
|
|
|
|
* Video streaming example
|
|
|
|
* Timelock payment channels
|
|
|
|
* Asymmetric revocable commitments
|
|
|
|
* Hash Time Locked Contracts (HTLC)
|
|
|
|
* Lightning Network
|
|
|
|
* Routed payment channels
|
|
|
|
* Transport and Onion routing
|
|
|
|
* Lightning Network Benefits
|
|
|
|
|
|
|
|
== Appendix - Segregated Witness (all new chapter)
|
|
|
|
|
|
|
|
* Introduction to Segregated Witness
|
|
|
|
* Why segwit?
|
|
|
|
* Segwit transactions, outputs and scripts
|
|
|
|
* P2WPKH
|
|
|
|
* P2WSH
|
|
|
|
* Nested segwit
|
|
|
|
* Considerations for backwards compatibility
|
|
|
|
* P2SH(P2WPKH)
|
|
|
|
* P2SH(P2WSH)
|
|
|
|
* Transaction Identifiers (txid) and Malleability Fix
|
|
|
|
* New Signing Algorithm
|
|
|
|
* Economic Incentives for Segwit
|