Ken Shirriff's blog
Computer history, restoring vintage computers, IC reverse engineering, and whatever
Bitcoin mining the hard way: the algorithms, protocols, and bytes
›
This article explains Bitcoin mining in details, right down to the hex data and network traffic. If you've ever wondered what really h...
71 comments:
Hidden surprises in the Bitcoin blockchain and how they are stored: Nelson Mandela, Wikileaks, photos, and Python software
›
Every Bitcoin transaction is stored in the distributed database known as the Bitcoin blockchain. However, people have found ways to hack ...
25 comments:
The Bitcoin malleability attack graphed hour by hour
›
I have a new Bitcoin article: Hidden surprises in the Bitcoin blockchain The Bitcoin network was subject to a strange attack this week. U...
23 comments:
Bitcoin transaction malleability: looking at the bytes
›
"Malleability" of Bitcoin transactions has recently become a major issue. This article looks at how transactions are modified, a...
7 comments:
Bitcoins the hard way: Using the raw Bitcoin protocol
›
All the recent media attention on Bitcoin inspired me to learn how Bitcoin really works, right down to the bytes flowing through the netwo...
88 comments:
‹
›
Home
View web version