[SYMBOL][A][B][C][D][E][F][G][H][I][J][K][L][M][N][O][P][Q][R][S][T][U][V][W][X]
absolute time-locked output
account-based systems
ACTIVE state, 2nd, 3rd
addition modulo n
addresses
reusing
addr message
alternative coins (alt-coins)
anyone-can-spend
ASCII characters
atomic swaps, 2nd
backups, of private keys, 2nd
password-encrypted, problems with
password strength
backward-compatible
bandwidth
saving
waste of
bank accounts
base58check encoding scheme
Base64 encoding scheme
Bech32 encoding scheme
best chain
BIP9
to deploy relative lock time
to deploy segwit
BIP16, 2nd, 3rd
BIP32
BIP34, 2nd, 3rd
BIP37
BIP39
BIP44
BIP65, 2nd
BIP66, 2nd, 3rd
BIP68
BIP112, 2nd
BIP113
BIP125
BIP130
BIP141
BIP143
BIP148
BIP152
BIP157
BIP158
BIP173
BIPs (Bitcoin Improvement Proposals), 2nd, 3rd
Bitcoin
for cross-border payments
for savings
for shopping
limited supply of
noncurrency uses
overview of
permissionless nature of, 2nd
speculation
tokens, creating
value of
when not to use
Bitcoin addresses.
See cookie token addresses.
Bitcoin Cash, 2nd
bitcoin-cli, 2nd, 3rd, 4th
Bitcoin Core, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th, 9th
downloading
private key
public key
getting, 2nd
signing as trusted
signature file
downloading
verifying
verifying hash of downloaded file
software
unpacking and starting
verifying
bitcoind, 2nd, 3rd
communicating with
Bitcoin developers
Bitcoin Improvement Proposals.
See BIPs (Bitcoin Improvement Proposals).
Bitcoin ledger
Bitcoin network, 2nd
overview, 2nd
transactions in
Bitcoin nodes.
See nodes.
bitcoin-qt, 2nd
Bitcoin services
bit unit
blockchain, 2nd, 3rd
building
block template creation
publishing the block
signing the block, 2nd
transaction selection
download, initial
reasons for using
storing stuff in
bloated UTXO set
overview
blockchain explorer
blockchain split, 2nd, 3rd
block collisions
Block header
block headers, 2nd
block-header signature
block height
block ID, 2nd, 3rd, 4th
block messages, 2nd
block producers.
See miners.
block propagation
block rate
block rewards, 2nd, 3rd
blocks
bigger, slower nature of
size of, limitations on
subsidy of 0
block subsidy, 2nd, 3rd
blocktxn message
block version bits signaling
block-version signaling
block weight
bloom filters, 2nd, 3rd, 4th, 5th
creating
problems with
throttling privacy and data traffic
using
bootstrapping network
connecting to nodes
normal operation
running the software
synchronization
branch
strongest
brute-force attack
censoring transactions
censorship
censorship-resistant transactions, 2nd, 3rd, 4th
central authority, 2nd, 3rd, 4th
centralized systems
chain
split
strength
strongest, 2nd
tip
chain code
chain reorganization (reorg)
change
checksum, 2nd, 3rd, 4th
child keys
extended private key, deriving
private key
public key
coinbase signaling
coinbase transactions, 2nd, 3rd
coin creation
collision resistance
compact blocks
confirmations
connectivity
consensus rules, 2nd, 3rd
contracts
converted PKH
cookie token addresses, 2nd, 3rd, 4th
cookie token spreadsheet
cookie token wallet
corporate users
creating new addresses
cross-border payments, 2nd
cryptocurrencies, other than Bitcoin, 2nd
cryptographic hashes
functions, 2nd, 3rd, 4th, 5th
properties of
well-known
how works
overview
usefulness of
CT seed
curl tool
daemons
decentralized systems, 2nd, 3rd
decryption, 2nd
DEFINED state
deletes, protection from
denial-of-service (DoS) attacks, 2nd
deployment mechanisms
depth-first, 2nd
difficulty adjustment
digests
digital contracts
digital signatures, 2nd, 3rd, 4th, 5th
key pairs and
overview
preparation phase
signing
signing process
uses of
verification of
verifying
DNS (Domain Name System), 2nd
DoS (denial-of-service) attacks, 2nd
double SHA256
double spending, 2nd, 3rd, 4th, 5th
economic majority
elliptic curves, 2nd
encoded signatures
encrypted wallets
backing up
creating
receiving money into
sending money from
encryption, 2nd
encryptwallet command
end users
entropy, 2nd
exchanges
extended private key (xprv), 2nd, 3rd, 4th, 5th
extended public key (xpub), 2nd
FAILED state, 2nd
false positive match
fee-bumping
fee market
fees, 2nd, 3rd, 4th, 5th, 6th
fiat currency, 2nd, 3rd
fingerprints, 2nd, 3rd
first-seen policy
forgotten passwords, 2nd
FORKID type
forks, 2nd, 3rd
hard forks, 2nd
overview
soft forks
forward-compatible
full nodes, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th, 9th
mining vs. non-mining
running own
downloading Bitcoin Core
initial blockchain download
unpacking and starting software
verifying software
tests performed by
genesis block
getaddr message
getbalance command
getblocktxn message
getdata message, 2nd, 3rd
getheaders message
getrawtransaction command
getwalletinfo command
GnuPG (Gnu Privacy Guard), 2nd, 3rd
gossip networks
GUI (graphical user interface), 2nd
handshake
hardened xprv derivation
hard forks, 2nd, 3rd, 4th, 5th, 6th
hardware wallets
Hash Based Message Authentication Code (HMAC)
hashes, 2nd, 3rd, 4th, 5th
hash functions, 2nd
hashrate, 2nd, 3rd, 4th, 5th
hash values, 2nd
HD wallets.
See hierarchical deterministic (HD) wallets.
headers message, 2nd, 3rd, 4th
help command
hexadecimal (hex) encoding
hierarchical deterministic (HD) wallets, 2nd, 3rd
deriving child extended private key
deriving master extended private key
HMAC (Hash Based Message Authentication Code)
HMAC-SHA512 cryptographic hash function
hyperinflation
immature_balance
implicit height
imposters
inbound connections
index (idx)
inflation, 2nd
initial blockchain download, 2nd
initialblockdownload field
initial nodes
inputs, 2nd, 3rd, 4th
invalid transactions
inv message, 2nd, 3rd, 4th, 5th, 6th
IP (Internet Protocol) address
JSON (JavaScript Object Notation)
key-derivation function
key generation
key pairs
digital signatures and
reusing
keys, 2nd
key servers
kill message
leaves
ledger
length-extension attack
Lightning Network, 2nd
lightweight wallets, 2nd, 3rd, 4th, 5th, 6th
notification
security of
limited supply of Bitcoin, 2nd
listtransactions command, 2nd
LOCKED_IN state, 2nd, 3rd, 4th
lock time
lucky numbers
drawing
delayed resolution
immediate resolution
probability of splits
split of split
honest, forcing
malleability
malleated transaction
market capitalization (market cap)
master extended private key, 2nd
master private key, 2nd
master xpub
MD5 cryptographic hash function
median time past, 2nd
memory pool (mempool)
merkleblock messages, 2nd, 3rd
merkle proof, 2nd, 3rd
merkle root, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th
merkle trees, 2nd, 3rd, 4th
handling thousands of transactions in a block
overview
partial
creating
verifying
proving transaction is in a block
miner-activated soft forks, 2nd, 3rd
miners, 2nd, 3rd, 4th, 5th, 6th
drawing lucky numbers
honest
incentives for
multiple, to avoid central authority
peer-to-peer networks and
proof-of-work and
unique blocks built by
minimizing trust
mining centralization
mnemonic sentences, 2nd, 3rd
decoding into seeds
encoding from seeds
modulo, 2nd, 3rd
Multi-Account Hierarchy for Deterministic Wallets
multiple signatures
namecoin (NMC), 2nd
named arguments
name parameter
national borders, moving value across, 2nd
natural splits, 2nd, 3rd
network effect
network protocol
forwarding of transaction
lightweight wallet notification
notifying wallets
transaction through network
NMC (namecoin), 2nd
nodes.
See also full nodes.
connecting to
decentralization and, 2nd
multiple, connecting to
trusted, 2nd, 3rd
nonces, 2nd
noncurrency uses, 2nd
one-way functions, 2nd, 3rd, 4th, 5th, 6th
OP_CHECKLOCKTIMEVERIFY operator, 2nd, 3rd, 4th, 5th
OP_CHECKMULTISIG operator, 2nd, 3rd, 4th, 5th
OP_CHECKSEQUENCEVERIFY operator, 2nd, 3rd, 4th, 5th
OP_CHECKSIG operator, 2nd
OP_CLTV operator.
See OP_CHECKLOCKTIMEVERIFY operator.
OP_CSV operator.
See OP CHECKSEQUENCEVERIFY operator.
OP_DROP operator, 2nd, 3rd
OP_DUP operator, 2nd
OpenPGP (Pretty Good Privacy)
open source software
OP_EQUAL operator, 2nd
OP_EQUALVERIFY operator
OP_HASH160 operator
OP_NOP1 operator
OP_NOP2 operator
OP_NOP10 operator
OP_NOP operators, 2nd, 3rd
OP_RETURN operator, 2nd, 3rd, 4th
OP_SHA256 operator
outbound connections
p2pkh (pay-to-public-key-hash), 2nd, 3rd, 4th, 5th, 6th
p2sh address, 2nd, 3rd, 4th, 5th
p2wpkh (pay-to-witness-public-key-hash)
p2wsh (pay-to-witness-script-hash)
parent private key
parent public key
partial merkle tree, 2nd, 3rd
password-manager software
password-protected backups
passwords
password-encrypted private keys, problems with
random
strength of
payment URI
pay-to-public-key-hash (p2pkh), 2nd, 3rd, 4th, 5th
pay-to-script-hash
pay-to-witness-public-key-hash (p2wpkh)
pay-to-witness-script-hash (p2wsh), 2nd
peers
peer-to-peer network
bootstrapping
connecting to nodes
normal operation
running the software
synchronization
building
communication in
network protocol
forwarding of transaction
lightweight wallet notification
notifying wallets
transaction through network
running own full node
downloading Bitcoin Core
initial blockchain download
unpacking and starting software
verifying software
pending transactions
permissionless nature of Bitcoin, 2nd
PKH (public key hash), 2nd, 3rd, 4th, 5th, 6th, 7th, 8th, 9th
point addition
point doubling
point on the curve
Port 8333
positional arguments
POST request
pre-image, 2nd, 3rd, 4th, 5th, 6th
pre-image resistance
Pretty Good Privacy (OpenPGP)
price volatility
privacy, 2nd, 3rd, 4th
address reuse and
bloom filters and, 2nd
private keys, 2nd, 3rd, 4th, 5th, 6th
backing up, 2nd
password-encrypted backups, problems with
password strength
digital signatures and
hardened, deriving
message hash encryption with
offline storage
online storage
security of
storing, 2nd, 3rd
programmable transactions, 2nd
proof of work, 2nd
protocol version
provably unspendable outputs
pubkey script, 2nd, 3rd, 4th
public key addition operation
public-key derivation, 2nd
public key hash (PKH), 2nd, 3rd, 4th, 5th, 6th, 7th, 8th, 9th
public keys, 2nd, 3rd, 4th, 5th, 6th
encoding
extended
public key math
replacing names with
typing errors, avoiding
public/private key pairs
QR (quick response) codes, 2nd, 3rd, 4th
QT library
random number generator
redeemScript, 2nd
relative time-locked outputs
relative time locks
relaxed rules
relaying
relay policies
reorg (chain reorganization)
replayed transactions
retarget, 2nd
retarget period, 2nd, 3rd
reverting transactions, 2nd
RIPEMD160 cryptographic hash function, 2nd, 3rd, 4th
satoshi
savings
scriptPubKey
scriptSig
scripts, transactions and
second-pre-image resistance
secp256k1 elliptic curve
security, 2nd, 3rd, 4th, 5th
seeds, 2nd, 3rd
backing up
decoding mnemonic sentence into
encoding, 2nd
encoding into mnemonic sentence
random, 2nd, 3rd
Segwit2x proposal
segwit addresses
human-readable part
segwit (segregated witness), 2nd, 3rd
overview
problems solved by
script upgrade difficulties
transaction malleability
waste of bandwidth
solutions provided by
bandwidth saving
including segwit transaction in a block
new hashing method for signatures
pay-to-witness-script-hash
segwit addresses
spending segwit output
upgradable script
verifying segwit transaction
sendtoaddress command
sequence numbers, 2nd
SHA-1 cryptographic hash function
SHA256 (Secure Hash Algorithm with 256-bit output), 2nd, 3rd, 4th, 5th, 6th, 7th, 8th, 9th
SHA256SUMS.asc file, 2nd, 3rd, 4th
SHA512 hash function
shared folders, 2nd
SIGHASH type, 2nd
signature-hashing algorithm
signatures, 2nd
signature script (scriptSig), 2nd, 3rd
signature verification, 2nd, 3rd
signing transactions
simplified payment verification (SPV) wallet, 2nd
soft forks, 2nd, 3rd, 4th, 5th
soft-fork signaling
user-activated
speculation, 2nd
spent amount
spent outpoint
spent script
split keys
splits, 2nd
accidental
deliberate
probability of
unintended
SPV (simplified payment verification) wallet, 2nd
STARTED state, 2nd, 3rd
start time parameter
stdin option, 2nd
synchronization
target
TCP (Transmission Control Protocol) connection, 2nd, 3rd, 4th
time-locked transactions, 2nd
outputs
absolute time-locked output
atomic swaps
relative time-locked outputs
overview
relative time locks
time measurement
time locks, 2nd
timeout parameter
timestamps, 2nd, 3rd, 4th, 5th, 6th
Token protocols
tokens, creating
transaction fees, 2nd, 3rd, 4th, 5th, 6th, 7th
transaction graphs
transaction ID (txid), 2nd, 3rd, 4th, 5th, 6th, 7th, 8th
transaction output (TXO)
transactions, 2nd
confirming
creating
deleting
forwarding of
malleability of, 2nd, 3rd, 4th, 5th
multiple signatures
overview
pay-to-script-hash
pending, replacing
child pays for parent
opt-in replace-by-fee
replay
scripts and
time-locked
output
overview
relative time locks
time measurement
verifying
Transmission Control Protocol (TCP) connection, 2nd, 3rd, 4th
tree structure, 2nd, 3rd, 4th
trusted nodes, 2nd, 3rd
txid (transaction ID), 2nd, 3rd, 4th, 5th, 6th, 7th, 8th
txinwitness
tx message
TXO (transaction output)
unconfirmed_balance
unconfirmed transactions
uniform resource identifier URI)
unlocked_until value
unsigned transactions
unspent transaction output (UTXO).
See UTXO (unspent transaction output).
upgradable script
upgrades
difficulties with
user-activated soft forks
using BIP9 to deploy relative lock time
using BIP9 to deploy segwit
using block version bits signaling
using coinbase signaling
using incremented block version number signaling
URI (uniform resource identifier)
user-activated soft forks, 2nd, 3rd, 4th, 5th, 6th
user agent
UTXO set
private
UTXO set, bloated
UTXO (unspent transaction output), 2nd, 3rd, 4th, 5th, 6th, 7th, 8th, 9th, 10th, 11th
value of Bitcoin
verack message
version message, 2nd, 3rd
vsize (virtual size)
walletlock command
walletpassphrase command
wallets, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th
bloom filters and, 2nd
creating
problems with
throttling privacy and data traffic
using
compatibility
deriving hardened private keys
encrypted
backing up
creating
receiving money into
sending money from
extended public keys
hierarchical deterministic
deriving child extended private key
deriving master extended private key
lightweight, 2nd, 3rd, 4th, 5th, 6th
notification
security of
notifying
offline
private key backups
password-encrypted, problems with
password strength
public key encoding
public key math, 2nd
witness commitment
witness field
witness program, 2nd
witness reserved value
witness root hash
witness script
wtxid (witness txid)
xprv (extended private keys), 2nd, 3rd, 4th
xpub (extended public keys), 2nd
xpub derivation