From ea547997bd5fb78b03cf58f32399914e33d75612 Mon Sep 17 00:00:00 2001 From: theresa jones Date: Fri, 8 Sep 2023 19:29:11 -0700 Subject: [PATCH] removed the last of the 2e index tags --- applications.adoc | 3 +-- authorization-authentication.adoc | 9 +++------ bitcoin-core.adoc | 3 +-- fees.adoc | 3 +-- intro.adoc | 6 ++---- keys.adoc | 6 ++---- mining.adoc | 3 +-- network.adoc | 3 +-- 8 files changed, 12 insertions(+), 24 deletions(-) diff --git a/applications.adoc b/applications.adoc index ddfe6d62..8d76eb04 100644 --- a/applications.adoc +++ b/applications.adoc @@ -968,8 +968,7 @@ know the secret +R+. [[lightning_network]] === Routed Payment Channels (Lightning Network) -((("Lightning Network", -"defined")))The Lightning Network is a proposed routed network of +The Lightning Network is a proposed routed network of bidirectional payment channels connected end-to-end. A network like this can allow any participant to route a payment from channel to channel without trusting any of the intermediaries. The Lightning Network was diff --git a/authorization-authentication.adoc b/authorization-authentication.adoc index 90a413a5..bfec3f81 100644 --- a/authorization-authentication.adoc +++ b/authorization-authentication.adoc @@ -311,8 +311,7 @@ image::images/mbc2_0606.png["Tx_Script_P2PubKeyHash_2"] [[multisig]] === Scripted multisignatures -((("multisignature -scripts")))Multisignature scripts set a condition where _k_ public keys +Multisignature scripts set a condition where _k_ public keys are recorded in the script and at least _t_ of those must provide signatures to spend the funds, called t-of-k. For example, a 2-of-3 multisignature is one @@ -676,8 +675,7 @@ spent. [[op_return]] === Data Recording Output (OP_RETURN) -((("blockchain (the)", -"nonpayment data recording")))Bitcoin's +Bitcoin's distributed and timestamped blockchain has potential uses beyond payments. Many developers have tried to use the transaction scripting language to take advantage of the security and resilience of @@ -766,8 +764,7 @@ It is important to understand the limitations of transaction lock time. The only ==== Check Lock Time Verify (OP_CLTV) -((("bitcoin improvement proposals", -"OP_CHECKLOCKTIMEVERIFY (BIP65)")))In December 2015, a new form of +In December 2015, a new form of timelock was introduced to Bitcoin as a soft fork upgrade. Based on a specification in BIP65, a new script operator called _OP_CHECKLOCKTIMEVERIFY_ (_CLTV_) was added to the scripting language. diff --git a/bitcoin-core.adoc b/bitcoin-core.adoc index a7948ea5..7703ca06 100644 --- a/bitcoin-core.adoc +++ b/bitcoin-core.adoc @@ -1110,8 +1110,7 @@ spot the difference. [[alt_libraries]] === Alternative Clients, Libraries, and Toolkits -((("toolkits, libraries, and clients", -id="toolkit03")))There +There are many alternative clients, libraries, toolkits, and even full-node implementations in the bitcoin ecosystem. These are implemented in a variety of programming languages, offering programmers native interfaces diff --git a/fees.adoc b/fees.adoc index b4ae9637..e3580589 100644 --- a/fees.adoc +++ b/fees.adoc @@ -620,8 +620,7 @@ you intended. [[fee_sniping]] === Timelock Defense Against Fee Sniping -((("security", "defense -against fee-sniping")))Fee-sniping is a theoretical +Fee-sniping is a theoretical attack scenario, where miners attempting to rewrite past blocks "snipe" higher-fee transactions from future blocks to maximize their profitability. diff --git a/intro.adoc b/intro.adoc index 3954af4a..d2332b7c 100644 --- a/intro.adoc +++ b/intro.adoc @@ -140,8 +140,7 @@ authority_, represents a breakthrough in distributed computing. === Getting Started -((("bitcoin", "getting started", -id="BCbasic01")))Bitcoin is a protocol that can be accessed using an +Bitcoin is a protocol that can be accessed using an application that speaks the protocol. A "Bitcoin wallet" is the most common user interface to the Bitcoin system, just like a web browser is the most common user interface for the HTTP protocol. There @@ -407,8 +406,7 @@ Here are some methods for acquiring bitcoin as a new user: [TIP] ==== -((("digital currencies", "benefits of -bitcoin")))One of the advantages of +One of the advantages of Bitcoin over other payment systems is that, when used correctly, it affords users much more privacy. Acquiring, holding, and spending bitcoin does not require you to divulge sensitive and personally diff --git a/keys.adoc b/keys.adoc index 165c99e1..158aa888 100644 --- a/keys.adoc +++ b/keys.adoc @@ -158,8 +158,7 @@ visible universe is estimated to contain 10^80^ atoms. [[elliptic_curve]] ==== Elliptic Curve Cryptography Explained -((("cryptography", "elliptic curve cryptography", -id="Celliptic04")))Elliptic curve cryptography is a type of asymmetric +Elliptic curve cryptography is a type of asymmetric or public key cryptography based on the discrete logarithm problem as expressed by addition and multiplication on the points of an elliptic curve. @@ -605,8 +604,7 @@ look at compact encoding and reliable checksums. [[base58]] === Base58Check Encoding -((("addresses", "base58 and base58check encoding", -id="Abase5804")))In order to represent long numbers in a compact way, +In order to represent long numbers in a compact way, using fewer symbols, many computer systems use mixed-alphanumeric representations with a base (or radix) higher than 10. For example, whereas the traditional decimal system uses 10 numerals, 0 through 9, diff --git a/mining.adoc b/mining.adoc index c9e956b5..75f3979a 100644 --- a/mining.adoc +++ b/mining.adoc @@ -1873,8 +1873,7 @@ described next. [[bip9]] ==== BIP9 Signaling and Activation -((("bitcoin improvement proposals", "Strict DER signatures -(BIP66)")))The mechanism used by BIP34, BIP66, and BIP65 was +The mechanism used by BIP34, BIP66, and BIP65 was successful in activating three soft forks. However, it was replaced because it had several limitations: diff --git a/network.adoc b/network.adoc index 0b572a71..abb7d3d0 100644 --- a/network.adoc +++ b/network.adoc @@ -599,8 +599,7 @@ rather than fixed patterns. [[bloom_filters]] === Bloom Filters -((("security", "maintaining privacy", -id="Sprivacy08")))A bloom filter is a probabilistic search filter, a way +A bloom filter is a probabilistic search filter, a way to describe a desired pattern without specifying it exactly. Bloom filters offer an efficient way to express a search pattern while protecting privacy. They are used by lightweight clients to ask their peers for