, Thomas Kerin wrote:
>
> On 12/02/15 22:13, Luke Dashjr wrote:
>> Where is the Specification section?? Does this support arbitrary
scripts, or
>> only the simplest CHECKMULTISIG case?
>
> The BIP is a process for deriving only the type of scripts you would
encounter doing
t; ___
>>> Bitcoin-development mailing list
>>> Bitcoin-development@lists.sourceforge.net
>>> https://lists.sourceforge.net/lists/listinfo/bitcoin-development
>>>
> ---
like to request a BIP
number for this now.
All the best,
- --
Thomas Kerin
- -
My PGP key can be found here
<http://pgp.mit.edu/pks/lookup?op=get&search=0x3F0D2F83A2966155>
-BEGIN PGP SIGNATURE-
Version
o these
validation rules - just a convention for people to follow for now. I
think it's fair that implementers are free to order them however they
please. But I think there is good reason for wallets to opt in to the
convention and declare this, for ease of rec
s and their
addresses by all parties.
BIP: XX
Title: Deterministic Pay-to-script-hash multi-signature addresses
through public key sorting
Author: Thomas Kerin, Jean-Pierre Rupp, Ruben de Vries
Status: Draft
Type: Standards Track
Created: 8 February 2015
==Abstract==
This BIP descri
their
addresses by all parties.
BIP: XX
Title: Deterministic Pay-to-script-hash multi-signature addresses
through public key sorting
Author: Thomas Kerin, Jean-Pierre Rupp, Ruben de Vries
Status: Draft
Type: Standards Track
Created: 8 February 2015
==Abstract==
This BIP describes a
Ooh, I had a very similar proposal, except it involved sharing generic P2SH
scripts. It also involved facilitating requesting of signatures.. We should
talk.On 31 Jan 2015 01:30, Martin Habovštiak
wrote:
>
> Hello,
>
> I've been thinking about how to solve security problems of the servers
> h
th 100TB of bandwidth.
> Higher redundancy.Lower latency.Increased capacity.Completely compliant.
> http://p.sf.net/sfu/gigenet
>
>
> ___
> Bitcoin-development mailing list
> Bitcoin-development@lists.sourceforge.net
> https://lists.s
Isn't the length of the seed arbitrary anyway? Once decoded using whatever
mnemonic implementation (electrums, or BIP0039) the bytestream is
immediately passed to HMAC-SHA256 to generate the master key. No matter
what your initial entropy is, it would be hashed anyway.
On Thu, Mar 27, 2014 at 12:
9 matches
Mail list logo