Ken Shirriff's blog
Computer history, restoring vintage computers, IC reverse engineering, and whatever
The Bitcoin malleability attack graphed hour by hour
›
I have a new Bitcoin article: Hidden surprises in the Bitcoin blockchain The Bitcoin network was subject to a strange attack this week. U...
23 comments:
Bitcoin transaction malleability: looking at the bytes
›
"Malleability" of Bitcoin transactions has recently become a major issue. This article looks at how transactions are modified, a...
7 comments:
Bitcoins the hard way: Using the raw Bitcoin protocol
›
All the recent media attention on Bitcoin inspired me to learn how Bitcoin really works, right down to the bytes flowing through the netwo...
88 comments:
How Hacker News ranking really works: scoring, controversy, and penalties
›
The basic formula for Hacker News ranking has been known for years , but questions remained. Does the published code give the real algorithm...
15 comments:
The Z-80's 16-bit increment/decrement circuit reverse engineered
›
The 8-bit Z-80 processor was very popular in the late 1970s and early 1980s, powering many personal computers such as the Osborne 1, TRS-80,...
13 comments:
‹
›
Home
View web version