Mike Schmidt: Last question from the Stack Exchange is, “What does it mean that the security of 256-bit ECDSA, and therefore Bitcoin keys, is 128 bits? Mike Schmidt: Next question from the Stack Exchange is, “How do route hints affect pathfinding? Mike Schmidt: I’m excited for the new edition of Mastering Bitcoin for a variety of reasons, but especially due to the thoroughness that appears to be going into the authorship and review. T-bast, I’m not sure if you’re still listening in, but is that right? Today, we have a large number of central banks that have this independence and an excellent track record-and yes, we also have still a fair number of central banks that lack independence and/or competence. Yes, you can buy bitcoin on the Cash app with a credit card, add money to the Cash app using a credit card, and 바이낸스 (to Keromaissaude) buy bitcoin. I’m not doing a great job of explaining this right now, but yes, oftentimes there is a quadratic reduction of the security due to algorithms and what sort of attack model or threat scenario you’re applying, and I think this happens to be the case here. And yeah, I hope it’ll all be for the better and we’ll have a great book that we can thoroughly recommend by the end of the year.
In the case of Bitcoin, this can be measured by its growing base of users, merchants, and startups. Regardless of where you buy your Bitcoin, you’ll need a Bitcoin wallet in which to store it. This week, I actually went through Appendix B in Mastering Bitcoin, which is a list of all the opcodes, and read all the descriptions and looked at which ones I found, or refamiliarized myself with the entire script language. The initial public offering this spring of Coinbase, a San Francisco-based cryptocurrency exchange that lets customers trade digital currencies for real ones and vice versa, has provided rivals with a blueprint – and a glimpse of the money to be made. No form of insurance has been developed for owners of bitcoin comparable to the deposit insurance relied on by bank customers in most economies. Ever since Bitcoin came into existence a lot of techno savvy people started small companies in the form of Bitcoin startups. Bastien Teinturier: Yeah, and in a way, blinded path will just allow you to do that again because whenever you choose your blinded path, you can choose to make them go through your friend who wants to collect some fees through exactly the channels where you need them, when you know you have a lot of inbound liquidity and want to balance the channel.
So, there’s been a lot of eyeballs on it, so looking forward to that coming out. So, you can run Jade on non-Blockstream hardware, and now with this HWI 2.3.0 release, you can also now use HWI with those DIY devices. So, there actually are a number of different hardware devices that can run the Jade firmware. Mike Schmidt: The person asking this question was also asking about seed security and was maybe mixing up this 256-bit ECDSA versus 128 versus like the security of a seed, which sometimes can be 512. So, there’s some details in the answer on the Stack Exchange there. NOT, which would turn a 0 into a 1. But generally, you would want to – well, you have to handle that 0 element on the stack one way or another. And if you have information about your peers, channels, liquidity as well, because you’re sharing that somehow, then that will also impact how you build your blinded path. If I’m understanding the reason behind that, it’s that the reason that sipa points out here, that there are known algorithms that are more effective than just brute-forcing 256-bit keys, so that it’s technically then 128-bit security; am I getting that right?
Mark Erhardt: I think that there might also be a couple of issues here with if you, for example, have one peer that you closely work with and you want to funnel more fees to, you could always route boost them and then make sure that they collect the fees rather than other peers you have, which may be sort of a downside of prioritizing boosted peers. But then I look at the Stack Exchange questions, the discussions I have with my colleagues, the back and forth that I have in emails with Dave, and so forth. I see tweets about it, I see reviewers commenting on it, I see Stack Exchange questions about it. But there’s also this technique that Christian Decker mentioned in his answer to this question on the Stack Exchange, which is route boost, which means that I can also provide some sort of hints about channels that I’m aware of that have adequate capacity for the payment that I wish to receive. During these first labs, we assigned students to systems, checked that they can log in, and verified they had all of the permissions and tools they need to solve their assignments.