-
Hierarchical Deterministic (HD) wallets provide a structured and secure way to generate a tree of cryptographic keys from a single seed. Extending this technique to threshold-ecdsa enhances both secur…
-
The majority of cryptocurrency trading is conducted on centralised exchanges that provide hackers with a broad attack surface and are susceptible to a single point of failure. Trading privately and se…
-
looks like this script is just for fun
-
I was discussing with someone what you could do with bdk and bdk-kotlin at the moment, and it occurred to me that the API is currently small enough that you could write it all up in a single, simple, …
-
# API design considerations
## Background
There multiple different types of API that can be used by the software stack
related to LNP/BP. Here we analyze criteria to choose the proper API
tech…
-
Add a field for bip39 mnemonic, which automatically converts the mnemonic to entropy and fills the master secret.
Likewise when combining use the master secret to generate and display a bip39 mnemo…
-
"curl https://api.blockcypher.com/v1/btc/main
{
"name": "BTC.main",
"height": 360060,
"hash": "000000000000000000bf56ff4a81e399374a68344a64d6681039412de78366b8",
"time": "2015-06-08T22:57:08.…
-
When I apply the command I got zero output; it seems like Brainflayer doesn't accept the input of ./bip39helper, ofcourse the -i flag is not applied. I also copied all the brainflayer files into the B…
-
![Nytro Hackathon](https://user-images.githubusercontent.com/64868886/118121274-84b6e100-b3f1-11eb-851f-e7ef3e5282d3.png)
# [$3000-$10000 NYZO] Nytro Hackathon: Implementation of an application t…
-
_(From: https://github.com/Agorise/bsips/blob/master/bsip-1203.md)_
BSIP: 1203 (unassigned)
Title: Blockchain scanning for inbound Stealth transactions
Authors: Christopher J. Sanborn…