Skip to content
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
8 changes: 4 additions & 4 deletions beampedia/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -48,15 +48,15 @@ Beam implements leading research across areas like Confidential Transactions, Bu

### Block

In blockchain networks, a block contains a batch of transactions to be verified and added to the chain. Blocks have a maximum size and contain a cryptographic hash of the previous block to link together.
In [blockchain](https://nym.com/blog/using-blockchain-privately) networks, a block contains a batch of transactions to be verified and added to the chain. Blocks have a maximum size and contain a cryptographic hash of the previous block to link together.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

rejected: word too generic


Valid blocks must follow the network's consensus rules. Nodes express acceptance by building on top of blocks, while invalid blocks are rejected. The mining process creates new blocks by solving a computational puzzle.

In Bitcoin and Beam, blocks contain a Merkle root hash of all transactions. This both batches transactions and establishes their order to prevent double spends. Blocks form the fundamental structure of blockchain ledgers.

### Blockchain

A blockchain is a decentralized ledger achieved by cryptographic linking of transaction batches (blocks) in an append-only data structure. This prevents revision and establishes an authoritative transaction history.
A [blockchain is a [decentralized](https://nym.com/blog/what-is-web3) ledger achieved by cryptographic linking of transaction batches (blocks) in an append-only data structure. This prevents revision and establishes an authoritative transaction history.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

rejected: word too generic


Satoshi Nakamoto proposed using proof-of-work and economic incentives to operate blockchains in a trustless way. Network nodes cryptographically agree on the valid chain with the greatest proof-of-work. Technologies like Mimblewimble improve privacy and scalability.

Expand Down Expand Up @@ -175,7 +175,7 @@ As the block reward decreases over time, transaction fees will become a larger p

### Encryption

Encryption encodes messages to prevent unauthorized access. Symmetric encryption uses a shared secret key. Asymmetric public key encryption uses public keys for encryption and private keys for decryption.
[Encryption](https://nym.com/blog/what-is-encryption) encodes messages to prevent unauthorized access. Symmetric encryption uses a shared secret key. Asymmetric public key encryption uses public keys for encryption and private keys for decryption.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

rejected: word too generic


Public key cryptography enabled e-commerce by providing authentication without prior shared secrets. RSA is the most common algorithm. Elliptic curve cryptography (ECC) provides stronger security per bit.

Expand Down Expand Up @@ -401,7 +401,7 @@ Commitments prevent external parties from inferring the hidden data. The blindin

### Privacy

Privacy is preventing unauthorized extraction of information in communications. Encryption protects privacy just as locked doors prevent unwanted entry.
[Privacy](https://nym.com/privacy-hub) is preventing unauthorized extraction of information in communications. Encryption protects privacy just as locked doors prevent unwanted entry.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

rejected: word too generic


While not enumerated explicitly, privacy is assumed as a right in liberal democracies. Wiretaps and invasive surveillance require judicial approval.

Expand Down