Edited ch13_security.adoc with Atlas code editor

develop
claylock 6 months ago
parent 703dde089e
commit 06ef594551

@ -30,7 +30,6 @@ is based on independent verification, the network can be open
and no encryption is required for Bitcoin traffic (although encryption
can still be useful).
[role="less_space pagebreak-before"]
On a traditional payment network, such as a credit card system, the
payment is open-ended because it contains the user's private identifier
(the credit card number). After the initial charge, anyone with access
@ -80,7 +79,6 @@ removes control from users and centralizes control over keys in a single
system. Many such systems have been hacked, with disastrous consequences
for their customers.
[role="less_space pagebreak-before"]
Unless you are prepared to invest heavily in operational security,
multiple layers of access control, and audits (as the traditional banks
do), you should think very carefully before taking funds outside of
@ -184,7 +182,6 @@ an escalation in both hacking techniques and security solutions. In
simple terms, hackers now have a very juicy target and users have a
clear incentive to defend themselves.
[role="less_space pagebreak-before"]
Over the past three years, as a direct result of Bitcoin adoption, we
have seen tremendous innovation in the realm of information security in
the form of hardware encryption, key storage and hardware signing devices,
@ -283,7 +280,6 @@ funds if the user is not available to unlock them. In most cases, in
fact, the families of Bitcoin users might be completely unaware of the
existence of the bitcoin funds.
[role="less_space pagebreak-before"]
If you have a lot of bitcoins, you should consider sharing access details
with a trusted relative or lawyer. A more complex survivability scheme
can be set up with multisignature access and estate planning through a

Loading…
Cancel
Save