Skip to content

Commit

Permalink
Edited ch08.asciidoc with Atlas code editor
Browse files Browse the repository at this point in the history
  • Loading branch information
IndexPro committed May 1, 2017
1 parent 0a005bc commit 004956d
Showing 1 changed file with 2 additions and 2 deletions.
4 changes: 2 additions & 2 deletions ch08.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -281,7 +281,7 @@ The network protocol and bloom filter mechanism for SPV nodes is defined in http

Nodes that implement SPV have weaker privacy than a full node. A full node receives all transactions and therefore reveals no information about whether it is using some address in its wallet. An SPV node receives a filtered list of transactions related to the addresses that are in its wallet. As a result, it reduces the privacy of the owner.

Bloom filters are a way to reduce the loss of privacy. Without them, an SPV node would have to explicitly list the addresses it was interested in, creating a serious breach of privacy. However, even with bloom filters, an adversary monitoring the traffic of an SPV client or connected to it directly as a node in the P2P network can collect enough information over time to learn the addresses in the wallet of the SPV client.((("", startref="BNospv08")))((("", startref="privacy08")))((("", startref="Sprivacy08")))
Bloom filters are a way to reduce the loss of privacy. Without them, an SPV node would have to explicitly list the addresses it was interested in, creating a serious breach of privacy. However, even with bloom filters, an adversary monitoring the traffic of an SPV client or connected to it directly as a node in the P2P network can collect enough information over time to learn the addresses in the wallet of the SPV client.

=== Encrypted and Authenticated Connections

Expand Down Expand Up @@ -315,7 +315,7 @@ BIP-150 and BIP-151 allow users to run SPV clients that connect to a trusted ful

Additionally, authentication can be used to create networks of trusted bitcoin nodes and prevent Man-in-the-Middle attacks. Finally, peer-to-peer encryption, if deployed broadly, would strengthen the resistance of bitcoin to traffic analysis and privacy eroding surveillance, especially in totalitarian countries where internet use is heavily controlled and monitored.

The standard is defined in https://github.com/bitcoin/bips/blob/master/bip-0150.mediawiki[BIP-150 (Peer Authentication)] and https://github.com/bitcoin/bips/blob/master/bip-0151.mediawiki[BIP-151 (Peer-to-Peer Communication Encryption)].
((("", startref="BNospv08")))((("", startref="privacy08")))((("", startref="Sprivacy08")))The standard is defined in https://github.com/bitcoin/bips/blob/master/bip-0150.mediawiki[BIP-150 (Peer Authentication)] and https://github.com/bitcoin/bips/blob/master/bip-0151.mediawiki[BIP-151 (Peer-to-Peer Communication Encryption)].

=== Transaction Pools

Expand Down

0 comments on commit 004956d

Please sign in to comment.