mirror of
https://github.com/bitcoinbook/bitcoinbook
synced 2025-01-23 14:11:00 +00:00
removed the last of the 2e index tags
This commit is contained in:
parent
8de4c3fe1e
commit
ea547997bd
@ -968,8 +968,7 @@ know the secret +R+.
|
||||
[[lightning_network]]
|
||||
=== Routed Payment Channels (Lightning Network)
|
||||
|
||||
((("Lightning Network",
|
||||
"defined")))The Lightning Network is a proposed routed network of
|
||||
The Lightning Network is a proposed routed network of
|
||||
bidirectional payment channels connected end-to-end. A network like this
|
||||
can allow any participant to route a payment from channel to channel
|
||||
without trusting any of the intermediaries. The Lightning Network was
|
||||
|
@ -311,8 +311,7 @@ image::images/mbc2_0606.png["Tx_Script_P2PubKeyHash_2"]
|
||||
[[multisig]]
|
||||
=== Scripted multisignatures
|
||||
|
||||
((("multisignature
|
||||
scripts")))Multisignature scripts set a condition where _k_ public keys
|
||||
Multisignature scripts set a condition where _k_ public keys
|
||||
are recorded in the script and at least _t_ of those must provide
|
||||
signatures to spend the funds, called t-of-k.
|
||||
For example, a 2-of-3 multisignature is one
|
||||
@ -676,8 +675,7 @@ spent.
|
||||
[[op_return]]
|
||||
=== Data Recording Output (OP_RETURN)
|
||||
|
||||
((("blockchain (the)",
|
||||
"nonpayment data recording")))Bitcoin's
|
||||
Bitcoin's
|
||||
distributed and timestamped blockchain has potential uses
|
||||
beyond payments. Many developers have tried to use the transaction
|
||||
scripting language to take advantage of the security and resilience of
|
||||
@ -766,8 +764,7 @@ It is important to understand the limitations of transaction lock time. The only
|
||||
|
||||
==== Check Lock Time Verify (OP_CLTV)
|
||||
|
||||
((("bitcoin improvement proposals",
|
||||
"OP_CHECKLOCKTIMEVERIFY (BIP65)")))In December 2015, a new form of
|
||||
In December 2015, a new form of
|
||||
timelock was introduced to Bitcoin as a soft fork upgrade. Based on a
|
||||
specification in BIP65, a new script operator called
|
||||
_OP_CHECKLOCKTIMEVERIFY_ (_CLTV_) was added to the scripting language.
|
||||
|
@ -1110,8 +1110,7 @@ spot the difference.
|
||||
[[alt_libraries]]
|
||||
=== Alternative Clients, Libraries, and Toolkits
|
||||
|
||||
((("toolkits, libraries, and clients",
|
||||
id="toolkit03")))There
|
||||
There
|
||||
are many alternative clients, libraries, toolkits, and even full-node
|
||||
implementations in the bitcoin ecosystem. These are implemented in a
|
||||
variety of programming languages, offering programmers native interfaces
|
||||
|
@ -620,8 +620,7 @@ you intended.
|
||||
[[fee_sniping]]
|
||||
=== Timelock Defense Against Fee Sniping
|
||||
|
||||
((("security", "defense
|
||||
against fee-sniping")))Fee-sniping is a theoretical
|
||||
Fee-sniping is a theoretical
|
||||
attack scenario, where miners attempting to rewrite past blocks "snipe"
|
||||
higher-fee transactions from future blocks to maximize their
|
||||
profitability.
|
||||
|
@ -140,8 +140,7 @@ authority_, represents a breakthrough in distributed computing.
|
||||
|
||||
=== Getting Started
|
||||
|
||||
((("bitcoin", "getting started",
|
||||
id="BCbasic01")))Bitcoin is a protocol that can be accessed using an
|
||||
Bitcoin is a protocol that can be accessed using an
|
||||
application that speaks the protocol. A "Bitcoin wallet" is the
|
||||
most common user interface to the Bitcoin system, just like a web
|
||||
browser is the most common user interface for the HTTP protocol. There
|
||||
@ -407,8 +406,7 @@ Here are some methods for acquiring bitcoin as a new user:
|
||||
|
||||
[TIP]
|
||||
====
|
||||
((("digital currencies", "benefits of
|
||||
bitcoin")))One of the advantages of
|
||||
One of the advantages of
|
||||
Bitcoin over other payment systems is that, when used correctly, it
|
||||
affords users much more privacy. Acquiring, holding, and spending
|
||||
bitcoin does not require you to divulge sensitive and personally
|
||||
|
@ -158,8 +158,7 @@ visible universe is estimated to contain 10^80^ atoms.
|
||||
[[elliptic_curve]]
|
||||
==== Elliptic Curve Cryptography Explained
|
||||
|
||||
((("cryptography", "elliptic curve cryptography",
|
||||
id="Celliptic04")))Elliptic curve cryptography is a type of asymmetric
|
||||
Elliptic curve cryptography is a type of asymmetric
|
||||
or public key cryptography based on the discrete logarithm problem as
|
||||
expressed by addition and multiplication on the points of an elliptic
|
||||
curve.
|
||||
@ -605,8 +604,7 @@ look at compact encoding and reliable checksums.
|
||||
[[base58]]
|
||||
=== Base58Check Encoding
|
||||
|
||||
((("addresses", "base58 and base58check encoding",
|
||||
id="Abase5804")))In order to represent long numbers in a compact way,
|
||||
In order to represent long numbers in a compact way,
|
||||
using fewer symbols, many computer systems use mixed-alphanumeric
|
||||
representations with a base (or radix) higher than 10. For example,
|
||||
whereas the traditional decimal system uses 10 numerals, 0 through 9,
|
||||
|
@ -1873,8 +1873,7 @@ described next.
|
||||
[[bip9]]
|
||||
==== BIP9 Signaling and Activation
|
||||
|
||||
((("bitcoin improvement proposals", "Strict DER signatures
|
||||
(BIP66)")))The mechanism used by BIP34, BIP66, and BIP65 was
|
||||
The mechanism used by BIP34, BIP66, and BIP65 was
|
||||
successful in activating three soft forks. However, it was replaced
|
||||
because it had several limitations:
|
||||
|
||||
|
@ -599,8 +599,7 @@ rather than fixed patterns.
|
||||
[[bloom_filters]]
|
||||
=== Bloom Filters
|
||||
|
||||
((("security", "maintaining privacy",
|
||||
id="Sprivacy08")))A bloom filter is a probabilistic search filter, a way
|
||||
A bloom filter is a probabilistic search filter, a way
|
||||
to describe a desired pattern without specifying it exactly. Bloom
|
||||
filters offer an efficient way to express a search pattern while
|
||||
protecting privacy. They are used by lightweight clients to ask their peers for
|
||||
|
Loading…
Reference in New Issue
Block a user