Show Posts
|
Pages: « 1 [2]
|
Is there any practical advantage in generating a hardened child key from an unhardened parent key within the framework of BIP32? For instance, are there real-world scenarios or applications where this specific key derivation approach is beneficial or commonly utilized? Apologies in advance if this is a silly question.
|
|
|
when you're dealing with multisignature wallets, the XPUB and ZPUB values can indeed vary based on the multisig configuration. This is because multisig wallets use a different derivation path and a combination of public keys from the participating wallets to create a unique multisig address.
|
|
|
How do I make a new wallet? One common way is to use a reputable wallet software or app, like Bitcoin Core, which is the original Bitcoin wallet. and here is its official website: https://bitcoin.org/en/bitcoin-core/The scriptSig contains the signature created by the private key of the sender to prove ownership of the funds being spent. It also includes the public key or address of the sender. This signature is used to verify that the sender is authorized to spend the funds. While the scriptWitness contains additional data required for certain types of transactions, such as Segregated Witness (SegWit) transactions. SegWit is a technology that separates the signature (witness data) from the transaction data, which helps reduce transaction malleability and increase block capacity.
|
|
|
I found a collection of links related to it that I hope will be helpful to people with similar questions. Here it is: https://merkle.fun/
|
|
|
Thank you all. It really helped me a lot.
|
|
|
I searched for information about ban score, but was still confused. Could you kindly provide insight into how the ban score algorithm calculates the ban score attributed to a node? Specifically, I'm interested in understanding the criteria for misbehaviors that trigger the ban score algorithm and result in a ban score being assigned to a node. Additionally, I would greatly appreciate guidance on where to access official documentation or resources to learn more comprehensively about this topic. Any views or responses will be greatly appreciated.
|
|
|
Have you confirm these transaction? Sometimes, issues can arise if transactions are still pending or haven't been confirmed, leading to issues with subsequent transactions. Review your wallet's transaction history to see if there are any pending or unconfirmed transactions. Clearing these out and allowing them to confirm might help resolve issues.
|
|
|
SegWit transactions enhance the security of the Bitcoin network by enforcing signature checks before any other checks. This prevents certain types of attacks and makes the network more resistant to vulnerabilities that exploit transaction malleability. Besides, SegWit's introduction was a soft fork, meaning that it did not require a majority consensus of miners to activate. This made the upgrade process smoother and allowed for a more gradual transition. And here is a link for beginner to learn Segwit, hope it will be helpful. https://blockgeeks.com/guides/what-is-segwit/
|
|
|
I'm curious to understand the limitations concerning the repetition of the same set of private keys within a multisig wallet. Specifically, if a 3 of 4 multisig wallet is established, could it be feasible to have two of the four keys identical? This way, withdrawals would require the signature of one of the remaining two unique keys. Your insights on this matter would be highly appreciated.
|
|
|
Some of the key advantages of lightning network
The lightning network has a theoretical throughput of 1 million transactions per second, which is better than that of bitcoins, which is only 7 transactions per second.
It is fine you have interest in LN and you made your research to know the importance of LN. From the title of your article above to the body, it seems you are comparing LN to bitcoin. It is not a right comparison. Bitcoin is a coin while LN is a network. But both the bitcoin network and the lightning network conveys and houses bitcoin. There is actually no need to compare LN to bitcoin. The LN is actually a second of bitcoin which was introduced to scale bitcoin. As you said above it handles transactions more effectively and it is worthy to know that it is an off chain solution. Have you tried using LN, because practical knowledge is better than theory. While it's true that the Lightning Network is often touted to have a theoretical throughput of 1 million transactions per second (TPS), this figure is highly optimistic and is more of a theoretical upper bound. The Lightning Network's actual TPS capacity depends on various factors, including network topology, channel capacity, routing algorithms, and more. Achieving this level of throughput in practice is currently far from being realized
|
|
|
Thanks for your assistance!
|
|
|
I've been diving into the fascinating world of Bitcoin scripting and have come across something intriguing: MATT opcodes. While I've done my fair share of research, I'm finding it a bit challenging to fully grasp their intricacies and applications.
Any recommended resources such as articles, documentation, or tutorials that delve deeper into MATT opcodes would be immensely helpful in furthering my understanding.
Thanx
|
|
|
Miners cannot obtain the longest chain by simply maintaining a low constant difficulty or altering timestamps. In essence, the concept of the longest chain is not determined solely by difficulty or timestamps, but by the cumulative computational effort (proof of work) expended by miners to extend the chain in a way that the rest of the network recognizes and accepts.
First, if miners were to artificially maintain a low constant difficulty, their blocks would be mined quickly, but they would not necessarily form the longest chain. Other miners with higher computational power would continue to mine blocks at the normal difficulty level, and their longer chain with more accumulated proof of work would eventually become the valid chain.
Second, the valid chain is the one with the most accumulated proof of work, and miners are incentivized to contribute their computational power to extend this chain honestly. Attempting to manipulate difficulty or timestamps would likely be detected by the network and rejected, as the protocol is designed to maintain the integrity and security of the blockchain.
|
|
|
And you also can consider having multiple backup on different medium.
right, and also regularly update the backups to include any changes or new addresses generated by the wallet. This ensures that your backup remains up-to-date.
|
|
|
|