You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
bitcoinbook/third_edition_changes.asciidoc

250 lines
7.1 KiB

This file contains ambiguous Unicode characters!

This file contains ambiguous Unicode characters that may be confused with others in your current locale. If your use case is intentional and legitimate, you can safely ignore this warning. Use the Escape button to highlight these characters.

== Third Edition Changes
=== 1. Introduction
* Bitcoin Uses, Users, and Their Stories
Minor changes to the stories, updating to reflect current common uses and current price
=== 2. How Bitcoin Works
* Buying a [line-through]#Cup of Coffee# Laptop
Updated Alice and Bob's story. Buying a cup of coffee is no longer sensible "on-chain", due to the value of Bitcoin and on-chain fees. Instead, small retail purchases are now a use-case for the Lightning Network. In the updated story, Alice is buying a laptop from an e-commerce store run by Bob.
* Bitcoin Transactions
Updated all the transactions to use native-Segwit addresses that start with "bc1", instead of legacy bitcoin addresses that start with "1".
* Transaction Inputs and Outputs
* Transaction Chains
* Making Change
* Common Transaction Forms
* Constructing a Transaction
* Getting the Right Inputs
* Creating the Outputs
* Adding the Transaction to the Ledger
* Bitcoin Mining
* Mining Transactions in Blocks
* Spending the Transaction
=== 3. Bitcoin Core: The Reference Implementation
* Bitcoin Development Environment
* Compiling Bitcoin Core from the Source Code
* Selecting a Bitcoin Core Release
* Configuring the Bitcoin Core Build
* Building the Bitcoin Core Executables
* Running a Bitcoin Core Node
* Configuring the Bitcoin Core Node
* Bitcoin Core Application Programming Interface (API)
* Getting Information on the Bitcoin Core Client Status
* Exploring and Decoding Transactions
* Exploring Blocks
* Using Bitcoin Cores Programmatic Interface
* Alternative Clients, Libraries, and Toolkits
* C/C++
* JavaScript
* Java
* PHP
* Python
* Ruby
* Go
* Rust
* C#
* Objective-C
=== 4. Keys, Addresses
* Introduction
* Public Key Cryptography and Cryptocurrency
* Private and Public Keys
* Private Keys
* Public Keys
* Elliptic Curve Cryptography Explained
* Generating a Public Key
* Bitcoin Addresses
* Base58 and Base58Check Encoding
* Key Formats
* Implementing Keys and Addresses in C++
* Implementing Keys and Addresses in Python
* Advanced Keys and Addresses
* Encrypted Private Keys (BIP-38)
* Pay-to-Script Hash (P2SH) and Multisig Addresses
* Vanity Addresses
* Paper Wallets
=== 5. Wallets
* Wallet Technology Overview
* Nondeterministic (Random) Wallets
* Deterministic (Seeded) Wallets
* HD Wallets (BIP-32/BIP-44)
* Seeds and Mnemonic Codes (BIP-39)
* Wallet Best Practices
* Using a Bitcoin Wallet
* Wallet Technology Details
* Mnemonic Code Words (BIP-39)
* Creating an HD Wallet from the Seed
* Using an Extended Public Key on a Web Store
=== 6. Transactions
* Introduction
* Transactions in Detail
* Transactions—Behind the Scenes
* Transaction Outputs and Inputs
* Transaction Outputs
* Transaction Inputs
* Transaction Fees
* Adding Fees to Transactions
* Transaction Scripts and Script Language
* Turing Incompleteness
* Stateless Verification
* Script Construction (Lock + Unlock)
* Pay-to-Public-Key-Hash (P2PKH)
* Digital Signatures (ECDSA)
* How Digital Signatures Work
* Verifying the Signature
* Signature Hash Types (SIGHASH)
* ECDSA Math
* The Importance of Randomness in Signatures
* *NEW: Schnorr Signatures*
*
Bitcoin Addresses, Balances, and Other Abstractions
=== 7. Advanced Transactions And Scripting
* Introduction
* Multisignature
* Pay-to-Script-Hash (P2SH)
* P2SH Addresses
* Benefits of P2SH
* Redeem Script and Validation
* Data Recording Output (RETURN)
* Timelocks
* Transaction Locktime (nLocktime)
* Check Lock Time Verify (CLTV)
* Relative Timelocks
* Relative Timelocks with nSequence
* Relative Timelocks with CSV
* Median-Time-Past
* Timelock Defense Against Fee Sniping
* Scripts with Flow Control (Conditional Clauses)
* Conditional Clauses with VERIFY Opcodes
* Using Flow Control in Scripts
* Complex Script Example
* Segregated Witness
* Why Segregated Witness?
* How Segregated Witness Works
* Soft Fork (Backward Compatibility)
* Segregated Witness Output and Transaction Examples
* Upgrading to Segregated Witness
* Segregated Witness New Signing Algorithm
* Economic Incentives for Segregated Witness
* *NEW: Segwit v1: Taproot*
* *NEW: MAST *
* *NEW: Tapscript*
* *NEW: Taproot *
=== 8. The Bitcoin Network
* Peer-to-Peer Network Architecture
* Node Types and Roles
* The Extended Bitcoin Network
* Bitcoin Relay Networks
* Network Discovery
* Full Nodes
* Exchanging “Inventory”
* Simplified Payment Verification (SPV) Nodes
* Bloom Filters
* How Bloom Filters Work
* How SPV Nodes Use Bloom Filters
* SPV Nodes and Privacy
* NEW Neutrino
* NEW Compact Blocks
* Encrypted and Authenticated Connections
* Tor Transport
* Peer-to-Peer Authentication and Encryption
* Transaction Pools
=== 9. The Blockchain
* Introduction
* Structure of a Block
* Block Header
* Block Identifiers: Block Header Hash and Block Height
* The Genesis Block
* Linking Blocks in the Blockchain
* Merkle Trees
* Merkle Trees and Simplified Payment Verification (SPV)
* Bitcoins Test Blockchains
* Testnet—Bitcoins Testing Playground
* Segnet—The Segregated Witness Testnet
* Regtest—The Local Blockchain
* *NEW: Signet - The POA Test Blockchain*
* Using Test Blockchains for Development
=== 10. Mining And Consensus
* Introduction
* Bitcoin Economics and Currency Creation
* Decentralized Consensus
* Independent Verification of Transactions
* Mining Nodes
* Aggregating Transactions into Blocks
* The Coinbase Transaction
* Coinbase Reward and Fees
* Structure of the Coinbase Transaction
* Coinbase Data
* Constructing the Block Header
* Mining the Block
* Proof-of-Work Algorithm
* Target Representation
* Retargeting to Adjust Difficulty
* Successfully Mining the Block
* Validating a New Block
* Assembling and Selecting Chains of Blocks
* Blockchain Forks
* Mining and the Hashing Race
* The Extra Nonce Solution
* Mining Pools
* Consensus Attacks
* Changing the Consensus Rules
* Hard Forks
* Hard Forks: Software, Network, Mining, and Chain
* Diverging Miners and Difficulty
* Contentious Hard Forks
* Soft Forks
* Criticisms of Soft Forks
* Soft Fork Signaling with Block Version
* BIP-34 Signaling and Activation
* BIP-9 Signaling and Activation
* NEW BIP-8 Activation
* *NEW: Speedy Trial Activation*
* Consensus Software Development
=== 11. Bitcoin Security
* Security Principles
* Developing Bitcoin Systems Securely
* The Root of Trust
* User Security Best Practices
* Physical Bitcoin Storage
* Hardware Wallets
* Balancing Risk
* Diversifying Risk
* Multisig and Governance
* Survivability
* Conclusion
=== 12. Blockchain Applications
* Introduction
* Building Blocks (Primitives)
* Applications from Building Blocks
* Colored Coins
* Using Colored Coins
* Issuing Colored Coins
* Colored Coins Transactions
* Counterparty
* Payment Channels and State Channels
* State Channels—Basic Concepts and Terminology
* Simple Payment Channel Example
* Making Trustless Channels
* Asymmetric Revocable Commitments
* Hash Time Lock Contracts (HTLC)
* Routed Payment Channels (Lightning Network)
* Basic Lightning Network Example
* Lightning Network Transport and Routing
* Lightning Network Benefits
* Conclusion
=== A. The Bitcoin Whitepaper By Satoshi Nakamoto
=== B. Transaction Script Language Operators, Constants, And Symbols
=== C. Bitcoin Improvement Proposals
=== D. Bitcore
=== E. Pycoin, Ku, And Tx
=== F. Bitcoin Explorer (Bx) Commands
=== *NEW: BTCD*