Skip to content

Commit 206ee19

Browse files
bontusssadamjonas
authored andcommitted
update broken link
1 parent 7e97bd0 commit 206ee19

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ Soft Forks & protocol overview|IsSuperMajority signaling|[BIP 65](https://github
3434
Soft Forks & protocol overview|BIP9 signaling|[BIP9: versionbits In a Nutshell](https://rusty.ozlabs.org/?p=576), [BIP 9](https://github.com/bitcoin/bips/blob/master/bip-0009.mediawiki)|
3535
Soft Forks & protocol overview|BIP148 and BIP149|[BIP 148](https://github.com/bitcoin/bips/blob/master/bip-0148.mediawiki), [BIP 149](https://github.com/bitcoin/bips/blob/master/bip-0149.mediawiki), [UASF BIP148 Scenarios and Game Theory](https://medium.com/@jimmysong/uasf-bip148-scenarios-and-game-theory-9530336d953e), [User Activated Soft Forks: the BIP 148 alternative](https://medium.com/segwit-co/user-activated-soft-forks-the-bip-148-alternative-28e87ffdb76f)|
3636
Soft Forks & protocol overview|BIP91|[BIP 91](https://github.com/bitcoin/bips/blob/master/bip-0091.mediawiki)|
37-
Security Models|Overview|[Security models seminar video](https://youtu.be/6gGcS4N5Rg4), [Overview of Security Concerns](https://diyhpl.us/wiki/transcripts/scalingbitcoin/overview-of-security-concerns/), [Danger! Bitcoin Threat Models](https://www.youtube.com/watch?v=ddN58UqKPx0#t=750), [Bitcoin’s Security Model: A Deep Dive](https://www.coindesk.com/bitcoins-security-model-deep-dive), [Weaknesses](https://en.bitcoin.it/wiki/Weaknesses), [Speed-Security Tradeoffs in Blockchain Protocols](https://pdfs.semanticscholar.org/ac1a/918fc933b767d34574ec2cc6a33b4223dc1a.pdf), [The Onion Model of Blockchain Security](https://insights.deribit.com/market-research/the-onion-model-of-blockchain-security-part-1/)|
37+
Security Models|Overview|[Security models seminar video](https://youtu.be/6gGcS4N5Rg4), [Overview of Security Concerns](https://diyhpl.us/wiki/transcripts/scalingbitcoin/overview-of-security-concerns/), [Danger! Bitcoin Threat Models](https://www.youtube.com/watch?v=ddN58UqKPx0#t=750), [Bitcoin’s Security Model: A Deep Dive](https://www.coindesk.com/markets/2016/11/13/bitcoins-security-model-a-deep-dive), [Weaknesses](https://en.bitcoin.it/wiki/Weaknesses), [Speed-Security Tradeoffs in Blockchain Protocols](https://pdfs.semanticscholar.org/ac1a/918fc933b767d34574ec2cc6a33b4223dc1a.pdf), [The Onion Model of Blockchain Security](https://insights.deribit.com/market-research/the-onion-model-of-blockchain-security-part-1/)|
3838
Security Models|Checkpoints, assumevalid, minimumchainwork|[Bitcoin's Diversity of Use-Cases and Security Models](https://bluematt.bitcoin.ninja/2017/02/28/bitcoin-trustlessness/), [Dave Harding Tweet on assumed valid blocks and minimum chainwork](https://twitter.com/hrdng/status/869206705548271616)|
3939
Security Models|Defining SPV and lightclients|[Light Clients](https://gist.github.com/ariard/1034cd7624805d53334e80d4712fb8ee)|
4040
Security Models|BIP 37 (bloom filters)|[BIP 37](https://github.com/bitcoin/bips/blob/master/bip-0037.mediawiki), [On the Privacy Provisions of Bloom Filters in Lightweight Bitcoin Clients](https://eprint.iacr.org/2014/763.pdf)|

0 commit comments

Comments
 (0)