1
0
mirror of https://github.com/bitcoinbook/bitcoinbook synced 2024-11-25 01:18:18 +00:00

Edited ch13_security.adoc with Atlas code editor

This commit is contained in:
claylock 2023-11-03 19:51:21 +00:00
parent 703dde089e
commit 06ef594551

View File

@ -30,7 +30,6 @@ is based on independent verification, the network can be open
and no encryption is required for Bitcoin traffic (although encryption and no encryption is required for Bitcoin traffic (although encryption
can still be useful). can still be useful).
[role="less_space pagebreak-before"]
On a traditional payment network, such as a credit card system, the On a traditional payment network, such as a credit card system, the
payment is open-ended because it contains the user's private identifier payment is open-ended because it contains the user's private identifier
(the credit card number). After the initial charge, anyone with access (the credit card number). After the initial charge, anyone with access
@ -80,7 +79,6 @@ removes control from users and centralizes control over keys in a single
system. Many such systems have been hacked, with disastrous consequences system. Many such systems have been hacked, with disastrous consequences
for their customers. for their customers.
[role="less_space pagebreak-before"]
Unless you are prepared to invest heavily in operational security, Unless you are prepared to invest heavily in operational security,
multiple layers of access control, and audits (as the traditional banks multiple layers of access control, and audits (as the traditional banks
do), you should think very carefully before taking funds outside of do), you should think very carefully before taking funds outside of
@ -184,7 +182,6 @@ an escalation in both hacking techniques and security solutions. In
simple terms, hackers now have a very juicy target and users have a simple terms, hackers now have a very juicy target and users have a
clear incentive to defend themselves. clear incentive to defend themselves.
[role="less_space pagebreak-before"]
Over the past three years, as a direct result of Bitcoin adoption, we Over the past three years, as a direct result of Bitcoin adoption, we
have seen tremendous innovation in the realm of information security in have seen tremendous innovation in the realm of information security in
the form of hardware encryption, key storage and hardware signing devices, the form of hardware encryption, key storage and hardware signing devices,
@ -283,7 +280,6 @@ funds if the user is not available to unlock them. In most cases, in
fact, the families of Bitcoin users might be completely unaware of the fact, the families of Bitcoin users might be completely unaware of the
existence of the bitcoin funds. existence of the bitcoin funds.
[role="less_space pagebreak-before"]
If you have a lot of bitcoins, you should consider sharing access details If you have a lot of bitcoins, you should consider sharing access details
with a trusted relative or lawyer. A more complex survivability scheme with a trusted relative or lawyer. A more complex survivability scheme
can be set up with multisignature access and estate planning through a can be set up with multisignature access and estate planning through a