-
Notifications
You must be signed in to change notification settings - Fork 6
Update README.md #23
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Update README.md #23
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -48,15 +48,15 @@ Beam implements leading research across areas like Confidential Transactions, Bu | |
|
|
||
| ### Block | ||
|
|
||
| In blockchain networks, a block contains a batch of transactions to be verified and added to the chain. Blocks have a maximum size and contain a cryptographic hash of the previous block to link together. | ||
| In [blockchain](https://nym.com/blog/using-blockchain-privately) networks, a block contains a batch of transactions to be verified and added to the chain. Blocks have a maximum size and contain a cryptographic hash of the previous block to link together. | ||
|
|
||
| Valid blocks must follow the network's consensus rules. Nodes express acceptance by building on top of blocks, while invalid blocks are rejected. The mining process creates new blocks by solving a computational puzzle. | ||
|
|
||
| In Bitcoin and Beam, blocks contain a Merkle root hash of all transactions. This both batches transactions and establishes their order to prevent double spends. Blocks form the fundamental structure of blockchain ledgers. | ||
|
|
||
| ### Blockchain | ||
|
|
||
| A blockchain is a decentralized ledger achieved by cryptographic linking of transaction batches (blocks) in an append-only data structure. This prevents revision and establishes an authoritative transaction history. | ||
| A [blockchain is a [decentralized](https://nym.com/blog/what-is-web3) ledger achieved by cryptographic linking of transaction batches (blocks) in an append-only data structure. This prevents revision and establishes an authoritative transaction history. | ||
|
Member
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. rejected: word too generic |
||
|
|
||
| Satoshi Nakamoto proposed using proof-of-work and economic incentives to operate blockchains in a trustless way. Network nodes cryptographically agree on the valid chain with the greatest proof-of-work. Technologies like Mimblewimble improve privacy and scalability. | ||
|
|
||
|
|
@@ -175,7 +175,7 @@ As the block reward decreases over time, transaction fees will become a larger p | |
|
|
||
| ### Encryption | ||
|
|
||
| Encryption encodes messages to prevent unauthorized access. Symmetric encryption uses a shared secret key. Asymmetric public key encryption uses public keys for encryption and private keys for decryption. | ||
| [Encryption](https://nym.com/blog/what-is-encryption) encodes messages to prevent unauthorized access. Symmetric encryption uses a shared secret key. Asymmetric public key encryption uses public keys for encryption and private keys for decryption. | ||
|
Member
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. rejected: word too generic |
||
|
|
||
| Public key cryptography enabled e-commerce by providing authentication without prior shared secrets. RSA is the most common algorithm. Elliptic curve cryptography (ECC) provides stronger security per bit. | ||
|
|
||
|
|
@@ -401,7 +401,7 @@ Commitments prevent external parties from inferring the hidden data. The blindin | |
|
|
||
| ### Privacy | ||
|
|
||
| Privacy is preventing unauthorized extraction of information in communications. Encryption protects privacy just as locked doors prevent unwanted entry. | ||
| [Privacy](https://nym.com/privacy-hub) is preventing unauthorized extraction of information in communications. Encryption protects privacy just as locked doors prevent unwanted entry. | ||
|
Member
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. rejected: word too generic |
||
|
|
||
| While not enumerated explicitly, privacy is assumed as a right in liberal democracies. Wiretaps and invasive surveillance require judicial approval. | ||
|
|
||
|
|
||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
rejected: word too generic