removed the last of the 2e index tags

develop
theresa jones 8 months ago
parent 8de4c3fe1e
commit ea547997bd

@ -968,8 +968,7 @@ know the secret +R+.
[[lightning_network]]
=== Routed Payment Channels (Lightning Network)
((("Lightning Network",
"defined")))The Lightning Network is a proposed routed network of
The Lightning Network is a proposed routed network of
bidirectional payment channels connected end-to-end. A network like this
can allow any participant to route a payment from channel to channel
without trusting any of the intermediaries. The Lightning Network was

@ -311,8 +311,7 @@ image::images/mbc2_0606.png["Tx_Script_P2PubKeyHash_2"]
[[multisig]]
=== Scripted multisignatures
((("multisignature
scripts")))Multisignature scripts set a condition where _k_ public keys
Multisignature scripts set a condition where _k_ public keys
are recorded in the script and at least _t_ of those must provide
signatures to spend the funds, called t-of-k.
For example, a 2-of-3 multisignature is one
@ -676,8 +675,7 @@ spent.
[[op_return]]
=== Data Recording Output (OP_RETURN)
((("blockchain (the)",
"nonpayment data recording")))Bitcoin's
Bitcoin's
distributed and timestamped blockchain has potential uses
beyond payments. Many developers have tried to use the transaction
scripting language to take advantage of the security and resilience of
@ -766,8 +764,7 @@ It is important to understand the limitations of transaction lock time. The only
==== Check Lock Time Verify (OP_CLTV)
((("bitcoin improvement proposals",
"OP_CHECKLOCKTIMEVERIFY (BIP65)")))In December 2015, a new form of
In December 2015, a new form of
timelock was introduced to Bitcoin as a soft fork upgrade. Based on a
specification in BIP65, a new script operator called
_OP_CHECKLOCKTIMEVERIFY_ (_CLTV_) was added to the scripting language.

@ -1110,8 +1110,7 @@ spot the difference.
[[alt_libraries]]
=== Alternative Clients, Libraries, and Toolkits
((("toolkits, libraries, and clients",
id="toolkit03")))There
There
are many alternative clients, libraries, toolkits, and even full-node
implementations in the bitcoin ecosystem. These are implemented in a
variety of programming languages, offering programmers native interfaces

@ -620,8 +620,7 @@ you intended.
[[fee_sniping]]
=== Timelock Defense Against Fee Sniping
((("security", "defense
against fee-sniping")))Fee-sniping is a theoretical
Fee-sniping is a theoretical
attack scenario, where miners attempting to rewrite past blocks "snipe"
higher-fee transactions from future blocks to maximize their
profitability.

@ -140,8 +140,7 @@ authority_, represents a breakthrough in distributed computing.
=== Getting Started
((("bitcoin", "getting started",
id="BCbasic01")))Bitcoin is a protocol that can be accessed using an
Bitcoin is a protocol that can be accessed using an
application that speaks the protocol. A "Bitcoin wallet" is the
most common user interface to the Bitcoin system, just like a web
browser is the most common user interface for the HTTP protocol. There
@ -407,8 +406,7 @@ Here are some methods for acquiring bitcoin as a new user:
[TIP]
====
((("digital currencies", "benefits of
bitcoin")))One of the advantages of
One of the advantages of
Bitcoin over other payment systems is that, when used correctly, it
affords users much more privacy. Acquiring, holding, and spending
bitcoin does not require you to divulge sensitive and personally

@ -158,8 +158,7 @@ visible universe is estimated to contain 10^80^ atoms.
[[elliptic_curve]]
==== Elliptic Curve Cryptography Explained
((("cryptography", "elliptic curve cryptography",
id="Celliptic04")))Elliptic curve cryptography is a type of asymmetric
Elliptic curve cryptography is a type of asymmetric
or public key cryptography based on the discrete logarithm problem as
expressed by addition and multiplication on the points of an elliptic
curve.
@ -605,8 +604,7 @@ look at compact encoding and reliable checksums.
[[base58]]
=== Base58Check Encoding
((("addresses", "base58 and base58check encoding",
id="Abase5804")))In order to represent long numbers in a compact way,
In order to represent long numbers in a compact way,
using fewer symbols, many computer systems use mixed-alphanumeric
representations with a base (or radix) higher than 10. For example,
whereas the traditional decimal system uses 10 numerals, 0 through 9,

@ -1873,8 +1873,7 @@ described next.
[[bip9]]
==== BIP9 Signaling and Activation
((("bitcoin improvement proposals", "Strict DER signatures
(BIP66)")))The mechanism used by BIP34, BIP66, and BIP65 was
The mechanism used by BIP34, BIP66, and BIP65 was
successful in activating three soft forks. However, it was replaced
because it had several limitations:

@ -599,8 +599,7 @@ rather than fixed patterns.
[[bloom_filters]]
=== Bloom Filters
((("security", "maintaining privacy",
id="Sprivacy08")))A bloom filter is a probabilistic search filter, a way
A bloom filter is a probabilistic search filter, a way
to describe a desired pattern without specifying it exactly. Bloom
filters offer an efficient way to express a search pattern while
protecting privacy. They are used by lightweight clients to ask their peers for

Loading…
Cancel
Save