mirror of
https://github.com/bitcoinbook/bitcoinbook
synced 2024-11-25 01:18:18 +00:00
Edited ch13_security.adoc with Atlas code editor
This commit is contained in:
parent
703dde089e
commit
06ef594551
@ -30,7 +30,6 @@ is based on independent verification, the network can be open
|
|||||||
and no encryption is required for Bitcoin traffic (although encryption
|
and no encryption is required for Bitcoin traffic (although encryption
|
||||||
can still be useful).
|
can still be useful).
|
||||||
|
|
||||||
[role="less_space pagebreak-before"]
|
|
||||||
On a traditional payment network, such as a credit card system, the
|
On a traditional payment network, such as a credit card system, the
|
||||||
payment is open-ended because it contains the user's private identifier
|
payment is open-ended because it contains the user's private identifier
|
||||||
(the credit card number). After the initial charge, anyone with access
|
(the credit card number). After the initial charge, anyone with access
|
||||||
@ -80,7 +79,6 @@ removes control from users and centralizes control over keys in a single
|
|||||||
system. Many such systems have been hacked, with disastrous consequences
|
system. Many such systems have been hacked, with disastrous consequences
|
||||||
for their customers.
|
for their customers.
|
||||||
|
|
||||||
[role="less_space pagebreak-before"]
|
|
||||||
Unless you are prepared to invest heavily in operational security,
|
Unless you are prepared to invest heavily in operational security,
|
||||||
multiple layers of access control, and audits (as the traditional banks
|
multiple layers of access control, and audits (as the traditional banks
|
||||||
do), you should think very carefully before taking funds outside of
|
do), you should think very carefully before taking funds outside of
|
||||||
@ -184,7 +182,6 @@ an escalation in both hacking techniques and security solutions. In
|
|||||||
simple terms, hackers now have a very juicy target and users have a
|
simple terms, hackers now have a very juicy target and users have a
|
||||||
clear incentive to defend themselves.
|
clear incentive to defend themselves.
|
||||||
|
|
||||||
[role="less_space pagebreak-before"]
|
|
||||||
Over the past three years, as a direct result of Bitcoin adoption, we
|
Over the past three years, as a direct result of Bitcoin adoption, we
|
||||||
have seen tremendous innovation in the realm of information security in
|
have seen tremendous innovation in the realm of information security in
|
||||||
the form of hardware encryption, key storage and hardware signing devices,
|
the form of hardware encryption, key storage and hardware signing devices,
|
||||||
@ -283,7 +280,6 @@ funds if the user is not available to unlock them. In most cases, in
|
|||||||
fact, the families of Bitcoin users might be completely unaware of the
|
fact, the families of Bitcoin users might be completely unaware of the
|
||||||
existence of the bitcoin funds.
|
existence of the bitcoin funds.
|
||||||
|
|
||||||
[role="less_space pagebreak-before"]
|
|
||||||
If you have a lot of bitcoins, you should consider sharing access details
|
If you have a lot of bitcoins, you should consider sharing access details
|
||||||
with a trusted relative or lawyer. A more complex survivability scheme
|
with a trusted relative or lawyer. A more complex survivability scheme
|
||||||
can be set up with multisignature access and estate planning through a
|
can be set up with multisignature access and estate planning through a
|
||||||
|
Loading…
Reference in New Issue
Block a user