Bitcoin News / Bitcoin Stack Exchange - 5 years ago
private key - Can you recover seed words with passphrase on bitcoin node? - Bitcoin Stack Exchange
Bitcoin Stack Exchange is a question and answer site for Bitcoin crypto-currenc...
Bitcoin News / Bitcoin Stack Exchange - 5 years ago
What you are looking at is just an implementation detail that you really don't need to worry about. It's just converting from an internal format (which may use different coordinate systems and bit lengths, especially for tests) to the standard outpu...
Bitcoin News / Bitcoin Stack Exchange - 5 years ago
It is much easier to formally verify the behavior space of Bitcoin script vs. Solidity.
For example, the DAO project suffered from reentrancy vulnerabilities, given that one could not predict the behavior of anonymous smart contracts when they were...
Bitcoin News / Bitcoin Stack Exchange - 5 years ago
Neither client concretely checks that it's on the wrong chain: BCH and BSV had an unclean split.
Neither changed the network magic, nor did either change their transaction format, so their nodes continued to communicate and transactions remained rep...
Bitcoin News / Bitcoin Stack Exchange - 6 years ago
The Bitcoin system doesn't have just one network protocol: Any way of obtaining the blocks is equally valid-- blocks over freenet, over satellite broadcast, over the P2P network, all work just as well and are used in practice. UDP is used with bi...
Bitcoin News / Bitcoin Stack Exchange - 6 years ago
Issue on configuring the bitcoin core build on Ubuntu-18.0.4 - Bitcoin Stack Exchange
Bitcoin Stack Exchange is a question and answer site for Bitcoin crypto-currency enthusiasts...
Bitcoin News / Bitcoin Stack Exchange - 6 years ago
api - Calculate fees with Blocktrail/btc.com SDK - Bitcoin Stack Exchange
Last call to make your voice heard! Our 2022 Developer Survey closes in less than a wee...
Bitcoin News / Bitcoin Stack Exchange - 6 years ago
DNS seeds which give you a list of hard-coded stable nodes.
No, they don't do that and you are reading those answers incorrectly.
The DNS seeders give you a list of random nodes from a set of stable nodes. They are not hard coded and hard coding n...
Bitcoin News / Bitcoin Stack Exchange - 6 years ago
So I understand how blockchains work[1]. I understand how proof-of-work works[2]. And I understand how they work together. I also understand (or at least I think I do :) how transactions work (A block can contain arbitrary data insi...
Bitcoin News / Bitcoin Stack Exchange - 6 years ago
You will need:
the private key in WIF format
to know the context in which this key was used (for what type of scripts)
optionally, the approximate date at which you started using this key
Rescan the block chain for transactions
Let's take the OP's i...
Bitcoin News / Bitcoin Stack Exchange - 6 years ago
script - How to create a p2sh transaction with a scriptsig of OP_true? - Bitcoin Stack Exchange
Bitcoin Stack Exchange is a question and answer site for Bitcoin crypto-currency e...
Bitcoin News / Bitcoin Stack Exchange - 6 years ago
transactions - Clients without Isstandard() function - Bitcoin Stack Exchange
Bitcoin Stack Exchange is a question and answer site for Bitcoin crypto-currency enthusiasts. It onl...
Bitcoin News / Bitcoin Stack Exchange - 6 years ago
these questions would justify a whole section of a book. To avoid this, I put a link at the end of the message. In between, I'll try to answer some parts of your question.
I've gone through dozens of videos and texts, but haven't found properly how...
Bitcoin News / Bitcoin Stack Exchange - 6 years ago
The discrete logarithm problem is a cryptography concept that underlies the basis of much of modern cryptography.
In general the discrete logarithm problem states that for the equation bk (mod p) = a where b, a, and p are known values and p is prime...
Bitcoin News / Bitcoin Stack Exchange - 6 years ago
privacy - Can one trace a criminal with his Pubkey? - Bitcoin Stack Exchange
Last call to make your voice heard! Our 2022 Developer Survey closes in less than a...
Bitcoin News / Bitcoin Stack Exchange - 6 years ago
1. You will never be able to re-mine the previous block and get more fees.
The attack described in that paper consists on re-mining a block to claim less fees and incentivize other miners to continue it instead of mining in the honest chain. The thr...
Bitcoin News / Bitcoin Stack Exchange - 6 years ago
When you create a private key, this process is (or at least should be) completely random - meaning that in theory, the probability of creating some specific private key is 1/N where N is the number of possible private keys. There's nothing stopping...
Bitcoin News / Bitcoin Stack Exchange - 6 years ago
Firstly, there is no "each Bitcoin". On a technical level, there is no such an object as "a Bitcoin". Rather it is a ledger of transactions, and the Bitcoin that people own are entries on that ledger.
When Bitcoin is stolen, an additional transactio...
Bitcoin News / Bitcoin Stack Exchange - 6 years ago
architecture - What Software Patterns does the Bitcoin source code use? - Bitcoin Stack Exchange
Bitcoin Stack Exchange is a question and answer site for Bitcoin crypto-currency...
Bitcoin News / Bitcoin Stack Exchange - 6 years ago
Ports
One way that forks can deliberately separate themselves is by using a different TCP port number for network communications.
Currency
Port
Bitcoin
8333
Litecoin
9333
Handshake
When two Bitcoin-like programs communicate with one another, there...
Bitcoin News / Bitcoin Stack Exchange - 6 years ago
Easy. Someone has/had remote access to your wallet/files. They don't need access to the computer during the time of a transaction. Example: Send me your wallet and go ahead and secure your computer all you want.... I can simply use your wallet on my...
Bitcoin News / Bitcoin Stack Exchange - 6 years ago
charts - Different candle positions in coins with same OCHL values - Bitcoin Stack Exchange
Stack Exchange Network
Stack Exchange network consists of 181 Q&A communities including Stack Ov...
Bitcoin News / Bitcoin Stack Exchange - 7 years ago
There two ways to go from parent to child, non-hardened and hardened, the former allowing both (1) a parent private key -> child private key function and (2) a parent public key -> child public key function. (Hardened parent -> child relati...
Bitcoin News / Bitcoin Stack Exchange - 7 years ago
Q1) What are the possible attacks (even though completely theoretical) which are possible in case 2 but not in case 1. Please elaborate security-model change required to shift from Case 1 to Case 2.
None. If there happens to be a fork that makes...