Ken Shirriff's blog

Computer history, restoring vintage computers, IC reverse engineering, and whatever

Hidden surprises in the Bitcoin blockchain and how they are stored: Nelson Mandela, Wikileaks, photos, and Python software

›
Every Bitcoin transaction is stored in the distributed database known as the Bitcoin blockchain. However, people have found ways to hack ...
26 comments:

The Bitcoin malleability attack graphed hour by hour

›
I have a new Bitcoin article: Hidden surprises in the Bitcoin blockchain The Bitcoin network was subject to a strange attack this week. U...
23 comments:

Bitcoin transaction malleability: looking at the bytes

›
"Malleability" of Bitcoin transactions has recently become a major issue. This article looks at how transactions are modified, a...
7 comments:

Bitcoins the hard way: Using the raw Bitcoin protocol

›
All the recent media attention on Bitcoin inspired me to learn how Bitcoin really works, right down to the bytes flowing through the netwo...
88 comments:

How Hacker News ranking really works: scoring, controversy, and penalties

›
The basic formula for Hacker News ranking has been known for years , but questions remained. Does the published code give the real algorithm...
15 comments:
‹
›
Home
View web version
Powered by Blogger.