Section |
Page (published version) |
Page |
Correction | Credit |
6.2 | 143 | 170 |
The text states: Figure 6.1 shows a snippet of the Wikileaks donation page... Notice the refresh button next to the donation address. As you might expect, clicking the button will replace the donation address with an entirely new, freshly generated address. Similarly, if you refresh the page or close it and visit it later, it will have another address, never previously seen. That’s because Wikileaks wants to make sure that each donation they receive goes to a new public key that they create just for that purpose. Wikileaks is taking maximal advantage of the ability to create new pseudonyms. This is in fact the best practice for anonymity used by Bitcoin wallets. The text is correct about the behavior of the refresh button, but wrong about what happens if you refresh the page. Wikileaks and most other sites that accept cryptocurrency donations use a static address by default for receiving donations, provided they do their own payment processing. Some, like Wikileaks, offer the user the option of requesting a fresh donation address, but most don’t. Sites that use a payment processor such as Coinbase or BitPay (instead of doing their own payment processing) benefit from those processors' automatic generation of fresh addresesses. It is unclear why sites don’t take advantage of the opportunity for greater privacy. We can think of a few potential reasons: the cognitive benefits of having a single widely-advertised donation address; the engineering complexity of keeping track of an unbounded number of addresses and keys; and publicizing previously received donations as a way to generate social proof. |
Harry Kalodner |
8.3 | 200 | 225 | The text states that it has been proven that there are an infinite number of Mersenne primes (primes of the form 2p-1, where p is prime). This is incorrect, at least as of the time of writing. The statement is a conjecture backed by empirical evidence and widely believed to be true, but like many statements about the distribution of prime numbers, a proof remains elusive. | Andreas Bender |
9.3 | 226 | 250 |
In Figure 9.5 (Figure 9.7 in the draft version), the scriptSig for case 1 should be
<BobSignature> <AliceSignature> 1 and for case 2 should be x <AliceSignature> 0The 1 and 0 were swapped in the text. |
Dimaz Wijaya |
9.4 | 229 | 253 | The text states that NIST generates their beacon through the output of a quantum mechanical procedure. In fact they generate it using two standard hardware random number generators, although incorporating the output of a Bell violation experiment is a long-term goal. | Rene Peralta, NIST |