Search results

Jump to navigation Jump to search
View ( | ) (20 | 50 | 100 | 250 | 500)
  • This document is a proposed protocol (RFC) for issuing new alt-chains. It would be unwise to create more by introducing competing crypto-currencies for no reason. ...
    7 KB (1,117 words) - 04:20, 13 August 2014
  • {{BipMoved|bip-0310.mediawiki}} Comments-Summary: No comments yet. ...
    12 KB (1,756 words) - 23:18, 1 May 2024
  • ...a 256-bit number (extremely large) that all Bitcoin clients share. The SHA-256 [[hash]] of a [[block]]'s header must be lower than or equal to the curr ...asically gives you a random number between 0 and the maximum value of a 256-bit number (which is huge). If your hash is below the target, then you win. ...
    2 KB (334 words) - 01:47, 15 January 2016
  • [http://www.makomk.com/%7Eaidan/shortfin-dcmwd4e-20120822.7z makomk dcmwd4e bitstreams] (compressed with 7zip, available [http://7-zip.org/download.html here]) ...
    11 KB (1,809 words) - 08:14, 16 September 2012
  • ...t commitment, which is a script satisfying the block script (usually a k-of-n multisig) * You want to test long-term running software and don't want to deal with tens of thousands of block ...
    9 KB (1,450 words) - 14:48, 29 September 2024
  • {{BipMoved|bip-0023.mediawiki}} Title: getblocktemplate - Pooled Mining ...
    14 KB (2,058 words) - 18:00, 24 September 2019
  • {{BipMoved|bip-0050.mediawiki}} Title: March 2013 Chain Fork Post-Mortem ...
    7 KB (1,062 words) - 17:59, 24 September 2019
  • {{BipMoved|bip-0068.mediawiki}} Title: Relative lock-time using consensus-enforced sequence numbers ...
    14 KB (1,904 words) - 17:59, 24 September 2019
  • ..., GPU, FPGA or ASICs are expending their effort creating hashcash proofs-of-work which act as a vote in the blockchain evolution and validate the blockc ...functions, hashcash-SHA1 (original), hashcash-SHA256^2 (bitcoin), hashcash-Scrypt(iter=1). ...
    17 KB (2,742 words) - 16:33, 8 April 2022
  • ...or won't be lost. People can assume that all they want, but coins can be un-lost numerous ways, and should not be prevented. For example, someone may fi --[[User:Luke-jr|Luke-jr]] ([[User talk:Luke-jr|talk]]) 15:11, 5 January 2013 (GMT) ...
    2 KB (328 words) - 23:22, 6 May 2013
  • First examples of bitcoins being accepted for various goods and services and other notable first occurrences. See discussion for more regarding what is suita | 2009-01-12 ...
    10 KB (1,422 words) - 01:53, 10 June 2019
  • ...ing it to Bob directly. This message would function much like a share in a mining pool. Out of 10000 nanopayments, on average, 9999 will be worthless and 1 w .... We're going to randomize the prevout identifying Bob's transaction. Multi-input transactions are not valid unless all their inputs exist, so if Bob's ...
    5 KB (924 words) - 06:09, 15 February 2018
  • {{BipMoved|bip-0052.mediawiki}} Comments-Summary: No comments yet. ...
    22 KB (3,346 words) - 19:40, 16 January 2022
  • ...the [[block chain]]). New transactions are constantly being processed by [[Mining|miners]] into new blocks which are added to the end of the chain. As blocks ...be submitted to the network without the correct answer - the process of "[[mining]]" is essentially the process of competing to be the next to find the answe ...
    6 KB (915 words) - 16:48, 13 May 2019
  • ...propose a new BIP to supercede it with something based on p2pool's merged mining. ...exist; it is the relationship between two blockchains for one to trust the other's work as their own and accept AuxPOW blocks. ...
    17 KB (2,390 words) - 12:31, 8 August 2015
  • ...to the hands of those of you who can’t afford to buy bitcoins or expensive mining hardware used to mine bitcoins. ...
    2 KB (392 words) - 23:54, 6 June 2011
  • ...rong engineering teams, or due to widespread awareness thereof. Direct, low-level scams should not be listed here. | 2009-01-03 ...
    6 KB (781 words) - 13:10, 28 July 2020
  • ...be possible as hardforking changes in Bitcoin too but '''<span style="font-size:125%;">some represent different security and economic tradeoffs and I d (Some of these ideas are mine, some are from other people, some are old and obvious) ...
    13 KB (2,176 words) - 18:53, 19 April 2017
  • ...and acceptance can be global, national, or in some cases local or community-based. Alice need not provide currency to Bob in-person. She may instead transfer this value by first entrusting her currency ...
    10 KB (1,677 words) - 13:23, 3 July 2023
  • ...ore ECDSA private keys. The general use case is when a user generates a key-pair and only shares his public key. Everybody can use this public key to fi A split-key vanity address is generated by a specialized software, called a generato ...
    3 KB (432 words) - 20:13, 11 March 2024
View ( | ) (20 | 50 | 100 | 250 | 500)