Sublime
An inspiration engine for ideas
Chaingrep
chaingrep.com
A compromise was reached that allows an output script starting with OP_RETURN to add nonpayment data to a transaction output. However, unlike the use of “fake” UTXOs, the OP_RETURN operator creates an explicitly provably unspendable output, which does not need to be stored in the UTXO set. OP_RETURN outputs are recorded on the blockchain, so they c
... See moreDavid A. Harding • Mastering Bitcoin

The two biggest challenges of security and access are solved by utilizing blockchain technology, as the end user is in full control over his or her data, and can, therefore, share it with whomever he or she likes, instead of relying on other
Tim Lea • Blockchain: Down The Rabbit Hole: (Discover The Power Of The Blockchain)
cryptography
Zach Horwitz • 1 card
Ledger • How to keep your crypto safe | School of Block
Also, Part II discusses methods that can be used to change the hardware address of a device or to ignore the address filter and read all packets on the network.
Douglas Jacobson • Introduction to Network Security (Chapman & Hall/CRC Computer and Information Science Series Book 19)
Although this process of paying to a public key hash (P2PKH) may seem convoluted, it allows Alice’s payment to Bob to contain only a 20 byte commitment to his public key instead of the key itself, which would’ve been 65 bytes in the original version of Bitcoin. That’s a lot less data for Bob to have to communicate to Alice.
David A. Harding • Mastering Bitcoin
There were two main aspects of the LulzSec arrests the Feds needed to pull off for the takedown to work properly. First, it was imperative that they capture every suspect at the exact same time, even though they were all in different states and countries. They had to ensure that the hackers didn’t alert anyone else about their arrests, or the entir
... See more