diff --git a/ch13_security.adoc b/ch13_security.adoc index a16b797c..4d01ba9a 100644 --- a/ch13_security.adoc +++ b/ch13_security.adoc @@ -30,7 +30,6 @@ is based on independent verification, the network can be open and no encryption is required for Bitcoin traffic (although encryption can still be useful). -[role="less_space pagebreak-before"] On a traditional payment network, such as a credit card system, the payment is open-ended because it contains the user's private identifier (the credit card number). After the initial charge, anyone with access @@ -80,7 +79,6 @@ removes control from users and centralizes control over keys in a single system. Many such systems have been hacked, with disastrous consequences for their customers. -[role="less_space pagebreak-before"] Unless you are prepared to invest heavily in operational security, multiple layers of access control, and audits (as the traditional banks do), you should think very carefully before taking funds outside of @@ -184,7 +182,6 @@ an escalation in both hacking techniques and security solutions. In simple terms, hackers now have a very juicy target and users have a clear incentive to defend themselves. -[role="less_space pagebreak-before"] Over the past three years, as a direct result of Bitcoin adoption, we have seen tremendous innovation in the realm of information security in the form of hardware encryption, key storage and hardware signing devices, @@ -283,7 +280,6 @@ funds if the user is not available to unlock them. In most cases, in fact, the families of Bitcoin users might be completely unaware of the existence of the bitcoin funds. -[role="less_space pagebreak-before"] If you have a lot of bitcoins, you should consider sharing access details with a trusted relative or lawyer. A more complex survivability scheme can be set up with multisignature access and estate planning through a