mirror of
https://github.com/bitcoinbook/bitcoinbook
synced 2025-02-03 03:12:02 +00:00
removed the last of the 2e index tags
This commit is contained in:
parent
8de4c3fe1e
commit
ea547997bd
@ -968,8 +968,7 @@ know the secret +R+.
|
|||||||
[[lightning_network]]
|
[[lightning_network]]
|
||||||
=== Routed Payment Channels (Lightning Network)
|
=== Routed Payment Channels (Lightning Network)
|
||||||
|
|
||||||
((("Lightning Network",
|
The Lightning Network is a proposed routed network of
|
||||||
"defined")))The Lightning Network is a proposed routed network of
|
|
||||||
bidirectional payment channels connected end-to-end. A network like this
|
bidirectional payment channels connected end-to-end. A network like this
|
||||||
can allow any participant to route a payment from channel to channel
|
can allow any participant to route a payment from channel to channel
|
||||||
without trusting any of the intermediaries. The Lightning Network was
|
without trusting any of the intermediaries. The Lightning Network was
|
||||||
|
@ -311,8 +311,7 @@ image::images/mbc2_0606.png["Tx_Script_P2PubKeyHash_2"]
|
|||||||
[[multisig]]
|
[[multisig]]
|
||||||
=== Scripted multisignatures
|
=== Scripted multisignatures
|
||||||
|
|
||||||
((("multisignature
|
Multisignature scripts set a condition where _k_ public keys
|
||||||
scripts")))Multisignature scripts set a condition where _k_ public keys
|
|
||||||
are recorded in the script and at least _t_ of those must provide
|
are recorded in the script and at least _t_ of those must provide
|
||||||
signatures to spend the funds, called t-of-k.
|
signatures to spend the funds, called t-of-k.
|
||||||
For example, a 2-of-3 multisignature is one
|
For example, a 2-of-3 multisignature is one
|
||||||
@ -676,8 +675,7 @@ spent.
|
|||||||
[[op_return]]
|
[[op_return]]
|
||||||
=== Data Recording Output (OP_RETURN)
|
=== Data Recording Output (OP_RETURN)
|
||||||
|
|
||||||
((("blockchain (the)",
|
Bitcoin's
|
||||||
"nonpayment data recording")))Bitcoin's
|
|
||||||
distributed and timestamped blockchain has potential uses
|
distributed and timestamped blockchain has potential uses
|
||||||
beyond payments. Many developers have tried to use the transaction
|
beyond payments. Many developers have tried to use the transaction
|
||||||
scripting language to take advantage of the security and resilience of
|
scripting language to take advantage of the security and resilience of
|
||||||
@ -766,8 +764,7 @@ It is important to understand the limitations of transaction lock time. The only
|
|||||||
|
|
||||||
==== Check Lock Time Verify (OP_CLTV)
|
==== Check Lock Time Verify (OP_CLTV)
|
||||||
|
|
||||||
((("bitcoin improvement proposals",
|
In December 2015, a new form of
|
||||||
"OP_CHECKLOCKTIMEVERIFY (BIP65)")))In December 2015, a new form of
|
|
||||||
timelock was introduced to Bitcoin as a soft fork upgrade. Based on a
|
timelock was introduced to Bitcoin as a soft fork upgrade. Based on a
|
||||||
specification in BIP65, a new script operator called
|
specification in BIP65, a new script operator called
|
||||||
_OP_CHECKLOCKTIMEVERIFY_ (_CLTV_) was added to the scripting language.
|
_OP_CHECKLOCKTIMEVERIFY_ (_CLTV_) was added to the scripting language.
|
||||||
|
@ -1110,8 +1110,7 @@ spot the difference.
|
|||||||
[[alt_libraries]]
|
[[alt_libraries]]
|
||||||
=== Alternative Clients, Libraries, and Toolkits
|
=== Alternative Clients, Libraries, and Toolkits
|
||||||
|
|
||||||
((("toolkits, libraries, and clients",
|
There
|
||||||
id="toolkit03")))There
|
|
||||||
are many alternative clients, libraries, toolkits, and even full-node
|
are many alternative clients, libraries, toolkits, and even full-node
|
||||||
implementations in the bitcoin ecosystem. These are implemented in a
|
implementations in the bitcoin ecosystem. These are implemented in a
|
||||||
variety of programming languages, offering programmers native interfaces
|
variety of programming languages, offering programmers native interfaces
|
||||||
|
@ -620,8 +620,7 @@ you intended.
|
|||||||
[[fee_sniping]]
|
[[fee_sniping]]
|
||||||
=== Timelock Defense Against Fee Sniping
|
=== Timelock Defense Against Fee Sniping
|
||||||
|
|
||||||
((("security", "defense
|
Fee-sniping is a theoretical
|
||||||
against fee-sniping")))Fee-sniping is a theoretical
|
|
||||||
attack scenario, where miners attempting to rewrite past blocks "snipe"
|
attack scenario, where miners attempting to rewrite past blocks "snipe"
|
||||||
higher-fee transactions from future blocks to maximize their
|
higher-fee transactions from future blocks to maximize their
|
||||||
profitability.
|
profitability.
|
||||||
|
@ -140,8 +140,7 @@ authority_, represents a breakthrough in distributed computing.
|
|||||||
|
|
||||||
=== Getting Started
|
=== Getting Started
|
||||||
|
|
||||||
((("bitcoin", "getting started",
|
Bitcoin is a protocol that can be accessed using an
|
||||||
id="BCbasic01")))Bitcoin is a protocol that can be accessed using an
|
|
||||||
application that speaks the protocol. A "Bitcoin wallet" is the
|
application that speaks the protocol. A "Bitcoin wallet" is the
|
||||||
most common user interface to the Bitcoin system, just like a web
|
most common user interface to the Bitcoin system, just like a web
|
||||||
browser is the most common user interface for the HTTP protocol. There
|
browser is the most common user interface for the HTTP protocol. There
|
||||||
@ -407,8 +406,7 @@ Here are some methods for acquiring bitcoin as a new user:
|
|||||||
|
|
||||||
[TIP]
|
[TIP]
|
||||||
====
|
====
|
||||||
((("digital currencies", "benefits of
|
One of the advantages of
|
||||||
bitcoin")))One of the advantages of
|
|
||||||
Bitcoin over other payment systems is that, when used correctly, it
|
Bitcoin over other payment systems is that, when used correctly, it
|
||||||
affords users much more privacy. Acquiring, holding, and spending
|
affords users much more privacy. Acquiring, holding, and spending
|
||||||
bitcoin does not require you to divulge sensitive and personally
|
bitcoin does not require you to divulge sensitive and personally
|
||||||
|
@ -158,8 +158,7 @@ visible universe is estimated to contain 10^80^ atoms.
|
|||||||
[[elliptic_curve]]
|
[[elliptic_curve]]
|
||||||
==== Elliptic Curve Cryptography Explained
|
==== Elliptic Curve Cryptography Explained
|
||||||
|
|
||||||
((("cryptography", "elliptic curve cryptography",
|
Elliptic curve cryptography is a type of asymmetric
|
||||||
id="Celliptic04")))Elliptic curve cryptography is a type of asymmetric
|
|
||||||
or public key cryptography based on the discrete logarithm problem as
|
or public key cryptography based on the discrete logarithm problem as
|
||||||
expressed by addition and multiplication on the points of an elliptic
|
expressed by addition and multiplication on the points of an elliptic
|
||||||
curve.
|
curve.
|
||||||
@ -605,8 +604,7 @@ look at compact encoding and reliable checksums.
|
|||||||
[[base58]]
|
[[base58]]
|
||||||
=== Base58Check Encoding
|
=== Base58Check Encoding
|
||||||
|
|
||||||
((("addresses", "base58 and base58check encoding",
|
In order to represent long numbers in a compact way,
|
||||||
id="Abase5804")))In order to represent long numbers in a compact way,
|
|
||||||
using fewer symbols, many computer systems use mixed-alphanumeric
|
using fewer symbols, many computer systems use mixed-alphanumeric
|
||||||
representations with a base (or radix) higher than 10. For example,
|
representations with a base (or radix) higher than 10. For example,
|
||||||
whereas the traditional decimal system uses 10 numerals, 0 through 9,
|
whereas the traditional decimal system uses 10 numerals, 0 through 9,
|
||||||
|
@ -1873,8 +1873,7 @@ described next.
|
|||||||
[[bip9]]
|
[[bip9]]
|
||||||
==== BIP9 Signaling and Activation
|
==== BIP9 Signaling and Activation
|
||||||
|
|
||||||
((("bitcoin improvement proposals", "Strict DER signatures
|
The mechanism used by BIP34, BIP66, and BIP65 was
|
||||||
(BIP66)")))The mechanism used by BIP34, BIP66, and BIP65 was
|
|
||||||
successful in activating three soft forks. However, it was replaced
|
successful in activating three soft forks. However, it was replaced
|
||||||
because it had several limitations:
|
because it had several limitations:
|
||||||
|
|
||||||
|
@ -599,8 +599,7 @@ rather than fixed patterns.
|
|||||||
[[bloom_filters]]
|
[[bloom_filters]]
|
||||||
=== Bloom Filters
|
=== Bloom Filters
|
||||||
|
|
||||||
((("security", "maintaining privacy",
|
A bloom filter is a probabilistic search filter, a way
|
||||||
id="Sprivacy08")))A bloom filter is a probabilistic search filter, a way
|
|
||||||
to describe a desired pattern without specifying it exactly. Bloom
|
to describe a desired pattern without specifying it exactly. Bloom
|
||||||
filters offer an efficient way to express a search pattern while
|
filters offer an efficient way to express a search pattern while
|
||||||
protecting privacy. They are used by lightweight clients to ask their peers for
|
protecting privacy. They are used by lightweight clients to ask their peers for
|
||||||
|
Loading…
Reference in New Issue
Block a user