Cryptocoins Exchanges / Binance - 3 years ago
I am using Binance.US and can’t seem to find any way of converting my shit coin dust to BNB. If anyone knows how to do it and can help I would very much appreciate it! Thanks! submitted by /u/historicalmoustache [link] [comments...
More / Bitcoin Reddit - 3 years ago
He wasn’t interested in investing or buying, he just wanted to know more about it. I told him what little I know, and pointed him in the direction of some good documentaries (the method I believe he personally will learn the most from). But I just c...
More / Etherum Reddit - 3 years ago
or do i have to change the wallet completely? i rather avoid that as i have miners pointed to it's address, btw i am using MyCrypto wallet submitted by /u/NoHetro [link] [comments]
Bitcoin News / Bitcoin Stack Exchange - 3 years ago
I have built a very basic custom payment gateway that accepts Bitcoin.
I am running a Bitcoin Core node in a Docker container. I have a backend web service that sends rpc calls to this node to read / send transactions. This web serv...
Bitcoin News / Bitcoin Stack Exchange - 4 years ago
I want to avoid physically importing addresses into a wallet. I want to write a UTXO indexing system on a per-address basis.
I often wonder how a wallet can keep track of all of its addresses' UTXOs, seeing as transaction outputs ca...
Bitcoin News / Bitcoin Stack Exchange - 5 years ago
You generally don't publish your public keys, you give clients an address (which is usually computed from a public key, but not exactly the same).
You can definitely put an address in a QRCode. Putting a logo in the QRCode doesn't change anything ab...
Bitcoin News / Bitcoin Stack Exchange - 6 years ago
The discrete logarithm problem is a cryptography concept that underlies the basis of much of modern cryptography.
In general the discrete logarithm problem states that for the equation bk (mod p) = a where b, a, and p are known values and p is prime...
Bitcoin News / Bitcoin Stack Exchange - 7 years ago
Q1) What are the possible attacks (even though completely theoretical) which are possible in case 2 but not in case 1. Please elaborate security-model change required to shift from Case 1 to Case 2.
None. If there happens to be a fork that makes...