diff --git a/README.md b/README.md index 657911e..59b68cc 100644 --- a/README.md +++ b/README.md @@ -34,7 +34,7 @@ Soft Forks & protocol overview|IsSuperMajority signaling|[BIP 65](https://github Soft Forks & protocol overview|BIP9 signaling|[BIP9: versionbits In a Nutshell](https://rusty.ozlabs.org/?p=576), [BIP 9](https://github.com/bitcoin/bips/blob/master/bip-0009.mediawiki)| Soft Forks & protocol overview|BIP148 and BIP149|[BIP 148](https://github.com/bitcoin/bips/blob/master/bip-0148.mediawiki), [BIP 149](https://github.com/bitcoin/bips/blob/master/bip-0149.mediawiki), [UASF BIP148 Scenarios and Game Theory](https://medium.com/@jimmysong/uasf-bip148-scenarios-and-game-theory-9530336d953e), [User Activated Soft Forks: the BIP 148 alternative](https://medium.com/segwit-co/user-activated-soft-forks-the-bip-148-alternative-28e87ffdb76f)| Soft Forks & protocol overview|BIP91|[BIP 91](https://github.com/bitcoin/bips/blob/master/bip-0091.mediawiki)| -Security Models|Overview|[Security models seminar video](https://youtu.be/6gGcS4N5Rg4), [Overview of Security Concerns](https://diyhpl.us/wiki/transcripts/scalingbitcoin/overview-of-security-concerns/), [Danger! Bitcoin Threat Models](https://www.youtube.com/watch?v=ddN58UqKPx0#t=750), [Bitcoin’s Security Model: A Deep Dive](https://www.coindesk.com/bitcoins-security-model-deep-dive), [Weaknesses](https://en.bitcoin.it/wiki/Weaknesses), [Speed-Security Tradeoffs in Blockchain Protocols](https://pdfs.semanticscholar.org/ac1a/918fc933b767d34574ec2cc6a33b4223dc1a.pdf), [The Onion Model of Blockchain Security](https://insights.deribit.com/market-research/the-onion-model-of-blockchain-security-part-1/)| +Security Models|Overview|[Security models seminar video](https://youtu.be/6gGcS4N5Rg4), [Overview of Security Concerns](https://diyhpl.us/wiki/transcripts/scalingbitcoin/overview-of-security-concerns/), [Danger! Bitcoin Threat Models](https://www.youtube.com/watch?v=ddN58UqKPx0#t=750), [Bitcoin’s Security Model: A Deep Dive](https://www.coindesk.com/markets/2016/11/13/bitcoins-security-model-a-deep-dive), [Weaknesses](https://en.bitcoin.it/wiki/Weaknesses), [Speed-Security Tradeoffs in Blockchain Protocols](https://pdfs.semanticscholar.org/ac1a/918fc933b767d34574ec2cc6a33b4223dc1a.pdf), [The Onion Model of Blockchain Security](https://insights.deribit.com/market-research/the-onion-model-of-blockchain-security-part-1/)| Security Models|Checkpoints, assumevalid, minimumchainwork|[Bitcoin's Diversity of Use-Cases and Security Models](https://bluematt.bitcoin.ninja/2017/02/28/bitcoin-trustlessness/), [Dave Harding Tweet on assumed valid blocks and minimum chainwork](https://twitter.com/hrdng/status/869206705548271616)| Security Models|Defining SPV and lightclients|[Light Clients](https://gist.github.com/ariard/1034cd7624805d53334e80d4712fb8ee)| Security Models|BIP 37 (bloom filters)|[BIP 37](https://github.com/bitcoin/bips/blob/master/bip-0037.mediawiki), [On the Privacy Provisions of Bloom Filters in Lightweight Bitcoin Clients](https://eprint.iacr.org/2014/763.pdf)|