Binance Square

Jarbij

Giao dịch mở
Trader tần suất cao
{thời gian} năm
20 Đang theo dõi
54 Người theo dõi
199 Đã thích
27 Đã chia sẻ
Tất cả nội dung
Danh mục đầu tư
--
Dịch
加油
加油
投研看剑
--
Gửi các anh em một bao lì xì nhé, đợt này cất cánh rồi

Anh Li đã hoàn thành tất cả các tài khoản, còn 5000 hàng hóa chưa bán, cứ thế này đi, bán bay là luôn có lãi!

Đợt này tổng thể tài khoản cũng có thể từ 1000U đạt đến 38000 đô, cố lên các anh em!
Dịch
4
4
Max Maximalist
--
Tăng giá
#Max giáo dục từ thiện cộng đồng đồng thuận tại quảng trường Binance lần đầu ra mắt dữ liệu. Cảm ơn tất cả bạn bè đã tham gia buổi phát trực tiếp. $GIGGLE
{spot}(GIGGLEUSDT)
Dịch
4
4
Max Maximalist
--
$GIGGLE mang lại vốn, Max mang lại người dùng, tính khan hiếm của giá trị chiến lược của Max: Lấp đầy 'hố đen hạ tầng' trong tầm nhìn của CZ.
Trước tiên, hãy nói về kết luận: $GIGGLE mang lại vốn, Max mang lại người dùng, khi lượng biến đổi mang lại chất biến đổi, chúng ta sẽ thấy một cỗ máy khổng lồ.

Lời mở đầu: Tính khan hiếm của giá trị chiến lược: Lấp đầy 'hố đen hạ tầng' trong tầm nhìn của CZ.
Hoạt động từ thiện của CZ đang đối mặt với một thách thức hạ tầng lớn: Tài liệu khái niệm của Giggle Academy đã chỉ rõ rằng, 'truy cập internet và thiết bị' là vấn đề then chốt của thị trường mục tiêu, nhưng điều này không thuộc chuyên môn phần mềm cốt lõi của @GiggleAcademy, cần tìm kiếm các đối tác bên ngoài để giải quyết. Max chính là với sức mạnh của cộng đồng, chủ động đảm nhận chức năng 'đường dẫn đối tác tổ chức' khó khăn và tốn kém nhất này.
Xem bản gốc
MỘT LẦN NỮA LOOS😢
MỘT LẦN NỮA LOOS😢
Xem bản gốc
THUA LỖ LỚN HÔM NAY😓
THUA LỖ LỚN HÔM NAY😓
Xem bản gốc
#BNBATH và $BNB Đến nay, mọi Đề xuất Cải tiến Bitcoin (BIP) cần các nguyên thủy mật mã đều phải phát minh lại bánh xe. Mỗi cái đều đi kèm với việc triển khai Python tùy chỉnh riêng của đường cong elliptic secp256k1 và các thuật toán liên quan, mỗi cái khác nhau một cách tinh tế. Những sự không nhất quán này đã giới thiệu những trách nhiệm tiềm ẩn và làm cho việc xem xét BIPs trở nên phức tạp không cần thiết. Vấn đề này đã được nêu bật gần đây trong Bản tin Bitcoin Optech #348, và đây là điều mà ít nhất một số nhà phát triển trong cộng đồng phát triển Bitcoin đã cảm thấy từ lâu: cần có một tiêu chuẩn thống nhất, có thể tái sử dụng cho mã tham chiếu BIP mật mã secp256k1. Tuần trước, Jonas Nick và Tim Ruffing của Blockstream nghiên cứu và Sebastian Falbesoner đã đạt được tiến bộ lớn hướng tới điều này. Như một phần của đề xuất ChillDKG hiện tại của họ, nhóm đã phát hành secp256k1lab. Một thư viện Python mới, cố ý KHÔNG AN TOÀN cho việc nguyên mẫu, thử nghiệm và các đặc tả BIP. Nó không dành cho sử dụng trong sản xuất (bởi vì nó không phải là thời gian không đổi và do đó dễ bị tấn công kênh bên), nhưng nó lấp đầy một khoảng trống quan trọng: nó cung cấp một tham chiếu sạch sẽ và nhất quán cho chức năng secp256k1, bao gồm các chữ ký Schnorr kiểu BIP-340, ECDH và phép toán trường/nhóm cấp thấp. Mục tiêu rất đơn giản: làm cho việc viết các BIP trong tương lai dễ dàng và an toàn hơn bằng cách tránh các triển khai lặp lại, một lần duy nhất. Đối với các tác giả BIP, điều này có nghĩa là: ít mã tùy chỉnh hơn, ít vấn đề về đặc tả hơn và một con đường rõ ràng hơn từ nguyên mẫu đến đề xuất.
#BNBATH $BNB Đến nay, mọi Đề xuất Cải tiến Bitcoin (BIP) cần các nguyên thủy mật mã đều phải phát minh lại bánh xe. Mỗi cái đều đi kèm với việc triển khai Python tùy chỉnh riêng của đường cong elliptic secp256k1 và các thuật toán liên quan, mỗi cái khác nhau một cách tinh tế. Những sự không nhất quán này đã giới thiệu những trách nhiệm tiềm ẩn và làm cho việc xem xét BIPs trở nên phức tạp không cần thiết. Vấn đề này đã được nêu bật gần đây trong Bản tin Bitcoin Optech #348, và đây là điều mà ít nhất một số nhà phát triển trong cộng đồng phát triển Bitcoin đã cảm thấy từ lâu: cần có một tiêu chuẩn thống nhất, có thể tái sử dụng cho mã tham chiếu BIP mật mã secp256k1.
Tuần trước, Jonas Nick và Tim Ruffing của Blockstream nghiên cứu và Sebastian Falbesoner đã đạt được tiến bộ lớn hướng tới điều này. Như một phần của đề xuất ChillDKG hiện tại của họ, nhóm đã phát hành secp256k1lab. Một thư viện Python mới, cố ý KHÔNG AN TOÀN cho việc nguyên mẫu, thử nghiệm và các đặc tả BIP. Nó không dành cho sử dụng trong sản xuất (bởi vì nó không phải là thời gian không đổi và do đó dễ bị tấn công kênh bên), nhưng nó lấp đầy một khoảng trống quan trọng: nó cung cấp một tham chiếu sạch sẽ và nhất quán cho chức năng secp256k1, bao gồm các chữ ký Schnorr kiểu BIP-340, ECDH và phép toán trường/nhóm cấp thấp. Mục tiêu rất đơn giản: làm cho việc viết các BIP trong tương lai dễ dàng và an toàn hơn bằng cách tránh các triển khai lặp lại, một lần duy nhất. Đối với các tác giả BIP, điều này có nghĩa là: ít mã tùy chỉnh hơn, ít vấn đề về đặc tả hơn và một con đường rõ ràng hơn từ nguyên mẫu đến đề xuất.
Dịch
#Plume $PLUME Until now, every Bitcoin Improvement Proposal (BIP) that needed cryptographic primitives had to reinvent the wheel. Each one came bundled with its own custom Python implementation of the secp256k1 elliptic curve and related algorithms, each subtly different from one another. These inconsistencies introduced quiet liabilities and made reviewing BIPs unnecessarily complicated. This problem was recently highlighted in Bitcoin Optech Newsletter #348, and it’s something at least a handful of developers in the Bitcoin development community have long felt: there should be a unified, reusable standard for cryptographic BIP reference secp256k1 code. Last week, Jonas Nick and Tim Ruffing of Blockstream research and Sebastian Falbesoner made big progress towards this. As part of their existing ChillDKG proposal, the team released secp256k1lab. A new, intentionally INSECURE Python library for prototyping, experimenting, and BIP specifications. It’s not for production use (because it’s not constant-time and therefore vulnerable to side-channel attacks), but it fills a critical gap: it offers a clean, consistent reference for secp256k1 functionality, including BIP-340-style Schnorr signatures, ECDH, and low-level field/group arithmetic. The goal is simple: make it easier and safer to write future BIPs by avoiding redundant, one-off implementations. For BIP authors, this means: less custom code, fewer spec issues, and a clearer path from prototype to proposal.
#Plume $PLUME Until now, every Bitcoin Improvement Proposal (BIP) that needed cryptographic primitives had to reinvent the wheel. Each one came bundled with its own custom Python implementation of the secp256k1 elliptic curve and related algorithms, each subtly different from one another. These inconsistencies introduced quiet liabilities and made reviewing BIPs unnecessarily complicated. This problem was recently highlighted in Bitcoin Optech Newsletter #348, and it’s something at least a handful of developers in the Bitcoin development community have long felt: there should be a unified, reusable standard for cryptographic BIP reference secp256k1 code.
Last week, Jonas Nick and Tim Ruffing of Blockstream research and Sebastian Falbesoner made big progress towards this. As part of their existing ChillDKG proposal, the team released secp256k1lab. A new, intentionally INSECURE Python library for prototyping, experimenting, and BIP specifications. It’s not for production use (because it’s not constant-time and therefore vulnerable to side-channel attacks), but it fills a critical gap: it offers a clean, consistent reference for secp256k1 functionality, including BIP-340-style Schnorr signatures, ECDH, and low-level field/group arithmetic. The goal is simple: make it easier and safer to write future BIPs by avoiding redundant, one-off implementations. For BIP authors, this means: less custom code, fewer spec issues, and a clearer path from prototype to proposal.
Dịch
#Dolomite $DOLO Until now, every Bitcoin Improvement Proposal (BIP) that needed cryptographic primitives had to reinvent the wheel. Each one came bundled with its own custom Python implementation of the secp256k1 elliptic curve and related algorithms, each subtly different from one another. These inconsistencies introduced quiet liabilities and made reviewing BIPs unnecessarily complicated. This problem was recently highlighted in Bitcoin Optech Newsletter #348, and it’s something at least a handful of developers in the Bitcoin development community have long felt: there should be a unified, reusable standard for cryptographic BIP reference secp256k1 code. Last week, Jonas Nick and Tim Ruffing of Blockstream research and Sebastian Falbesoner made big progress towards this. As part of their existing ChillDKG proposal, the team released secp256k1lab. A new, intentionally INSECURE Python library for prototyping, experimenting, and BIP specifications. It’s not for production use (because it’s not constant-time and therefore vulnerable to side-channel attacks), but it fills a critical gap: it offers a clean, consistent reference for secp256k1 functionality, including BIP-340-style Schnorr signatures, ECDH, and low-level field/group arithmetic. The goal is simple: make it easier and safer to write future BIPs by avoiding redundant, one-off implementations. For BIP authors, this means: less custom code, fewer spec issues, and a clearer path from prototype to proposal.
#Dolomite $DOLO
Until now, every Bitcoin Improvement Proposal (BIP) that needed cryptographic primitives had to reinvent the wheel. Each one came bundled with its own custom Python implementation of the secp256k1 elliptic curve and related algorithms, each subtly different from one another. These inconsistencies introduced quiet liabilities and made reviewing BIPs unnecessarily complicated. This problem was recently highlighted in Bitcoin Optech Newsletter #348, and it’s something at least a handful of developers in the Bitcoin development community have long felt: there should be a unified, reusable standard for cryptographic BIP reference secp256k1 code.
Last week, Jonas Nick and Tim Ruffing of Blockstream research and Sebastian Falbesoner made big progress towards this. As part of their existing ChillDKG proposal, the team released secp256k1lab. A new, intentionally INSECURE Python library for prototyping, experimenting, and BIP specifications. It’s not for production use (because it’s not constant-time and therefore vulnerable to side-channel attacks), but it fills a critical gap: it offers a clean, consistent reference for secp256k1 functionality, including BIP-340-style Schnorr signatures, ECDH, and low-level field/group arithmetic. The goal is simple: make it easier and safer to write future BIPs by avoiding redundant, one-off implementations. For BIP authors, this means: less custom code, fewer spec issues, and a clearer path from prototype to proposal.
Dịch
 #BounceBitPrime $BB Until now, every Bitcoin Improvement Proposal (BIP) that needed cryptographic primitives had to reinvent the wheel. Each one came bundled with its own custom Python implementation of the secp256k1 elliptic curve and related algorithms, each subtly different from one another. These inconsistencies introduced quiet liabilities and made reviewing BIPs unnecessarily complicated. This problem was recently highlighted in Bitcoin Optech Newsletter #348, and it’s something at least a handful of developers in the Bitcoin development community have long felt: there should be a unified, reusable standard for cryptographic BIP reference secp256k1 code. Last week, Jonas Nick and Tim Ruffing of Blockstream research and Sebastian Falbesoner made big progress towards this. As part of their existing ChillDKG proposal, the team released secp256k1lab. A new, intentionally INSECURE Python library for prototyping, experimenting, and BIP specifications. It’s not for production use (because it’s not constant-time and therefore vulnerable to side-channel attacks), but it fills a critical gap: it offers a clean, consistent reference for secp256k1 functionality, including BIP-340-style Schnorr signatures, ECDH, and low-level field/group arithmetic. The goal is simple: make it easier and safer to write future BIPs by avoiding redundant, one-off implementations. For BIP authors, this means: less custom code, fewer spec issues, and a clearer path from prototype to proposal.
 #BounceBitPrime $BB Until now, every Bitcoin Improvement Proposal (BIP) that needed cryptographic primitives had to reinvent the wheel. Each one came bundled with its own custom Python implementation of the secp256k1 elliptic curve and related algorithms, each subtly different from one another. These inconsistencies introduced quiet liabilities and made reviewing BIPs unnecessarily complicated. This problem was recently highlighted in Bitcoin Optech Newsletter #348, and it’s something at least a handful of developers in the Bitcoin development community have long felt: there should be a unified, reusable standard for cryptographic BIP reference secp256k1 code.
Last week, Jonas Nick and Tim Ruffing of Blockstream research and Sebastian Falbesoner made big progress towards this. As part of their existing ChillDKG proposal, the team released secp256k1lab. A new, intentionally INSECURE Python library for prototyping, experimenting, and BIP specifications. It’s not for production use (because it’s not constant-time and therefore vulnerable to side-channel attacks), but it fills a critical gap: it offers a clean, consistent reference for secp256k1 functionality, including BIP-340-style Schnorr signatures, ECDH, and low-level field/group arithmetic. The goal is simple: make it easier and safer to write future BIPs by avoiding redundant, one-off implementations. For BIP authors, this means: less custom code, fewer spec issues, and a clearer path from prototype to proposal.
Dịch
#walletconnect $WCT Until now, every Bitcoin Improvement Proposal (BIP) that needed cryptographic primitives had to reinvent the wheel. Each one came bundled with its own custom Python implementation of the secp256k1 elliptic curve and related algorithms, each subtly different from one another. These inconsistencies introduced quiet liabilities and made reviewing BIPs unnecessarily complicated. This problem was recently highlighted in Bitcoin Optech Newsletter #348, and it’s something at least a handful of developers in the Bitcoin development community have long felt: there should be a unified, reusable standard for cryptographic BIP reference secp256k1 code. Last week, Jonas Nick and Tim Ruffing of Blockstream research and Sebastian Falbesoner made big progress towards this. As part of their existing ChillDKG proposal, the team released secp256k1lab. A new, intentionally INSECURE Python library for prototyping, experimenting, and BIP specifications. It’s not for production use (because it’s not constant-time and therefore vulnerable to side-channel attacks), but it fills a critical gap: it offers a clean, consistent reference for secp256k1 functionality, including BIP-340-style Schnorr signatures, ECDH, and low-level field/group arithmetic. The goal is simple: make it easier and safer to write future BIPs by avoiding redundant, one-off implementations. For BIP authors, this means: less custom code, fewer spec issues, and a clearer path from prototype to proposal.
#walletconnect $WCT Until now, every Bitcoin Improvement Proposal (BIP) that needed cryptographic primitives had to reinvent the wheel. Each one came bundled with its own custom Python implementation of the secp256k1 elliptic curve and related algorithms, each subtly different from one another. These inconsistencies introduced quiet liabilities and made reviewing BIPs unnecessarily complicated. This problem was recently highlighted in Bitcoin Optech Newsletter #348, and it’s something at least a handful of developers in the Bitcoin development community have long felt: there should be a unified, reusable standard for cryptographic BIP reference secp256k1 code.
Last week, Jonas Nick and Tim Ruffing of Blockstream research and Sebastian Falbesoner made big progress towards this. As part of their existing ChillDKG proposal, the team released secp256k1lab. A new, intentionally INSECURE Python library for prototyping, experimenting, and BIP specifications. It’s not for production use (because it’s not constant-time and therefore vulnerable to side-channel attacks), but it fills a critical gap: it offers a clean, consistent reference for secp256k1 functionality, including BIP-340-style Schnorr signatures, ECDH, and low-level field/group arithmetic. The goal is simple: make it easier and safer to write future BIPs by avoiding redundant, one-off implementations. For BIP authors, this means: less custom code, fewer spec issues, and a clearer path from prototype to proposal.
Dịch
  #Mitosis $MITO Until now, every Bitcoin Improvement Proposal (BIP) that needed cryptographic primitives had to reinvent the wheel. Each one came bundled with its own custom Python implementation of the secp256k1 elliptic curve and related algorithms, each subtly different from one another. These inconsistencies introduced quiet liabilities and made reviewing BIPs unnecessarily complicated. This problem was recently highlighted in Bitcoin Optech Newsletter #348, and it’s something at least a handful of developers in the Bitcoin development community have long felt: there should be a unified, reusable standard for cryptographic BIP reference secp256k1 code. Last week, Jonas Nick and Tim Ruffing of Blockstream research and Sebastian Falbesoner made big progress towards this. As part of their existing ChillDKG proposal, the team released secp256k1lab. A new, intentionally INSECURE Python library for prototyping, experimenting, and BIP specifications. It’s not for production use (because it’s not constant-time and therefore vulnerable to side-channel attacks), but it fills a critical gap: it offers a clean, consistent reference for secp256k1 functionality, including BIP-340-style Schnorr signatures, ECDH, and low-level field/group arithmetic. The goal is simple: make it easier and safer to write future BIPs by avoiding redundant, one-off implementations. For BIP authors, this means: less custom code, fewer spec issues, and a clearer path from prototype to proposal.
  #Mitosis $MITO Until now, every Bitcoin Improvement Proposal (BIP) that needed cryptographic primitives had to reinvent the wheel. Each one came bundled with its own custom Python implementation of the secp256k1 elliptic curve and related algorithms, each subtly different from one another. These inconsistencies introduced quiet liabilities and made reviewing BIPs unnecessarily complicated. This problem was recently highlighted in Bitcoin Optech Newsletter #348, and it’s something at least a handful of developers in the Bitcoin development community have long felt: there should be a unified, reusable standard for cryptographic BIP reference secp256k1 code.
Last week, Jonas Nick and Tim Ruffing of Blockstream research and Sebastian Falbesoner made big progress towards this. As part of their existing ChillDKG proposal, the team released secp256k1lab. A new, intentionally INSECURE Python library for prototyping, experimenting, and BIP specifications. It’s not for production use (because it’s not constant-time and therefore vulnerable to side-channel attacks), but it fills a critical gap: it offers a clean, consistent reference for secp256k1 functionality, including BIP-340-style Schnorr signatures, ECDH, and low-level field/group arithmetic. The goal is simple: make it easier and safer to write future BIPs by avoiding redundant, one-off implementations. For BIP authors, this means: less custom code, fewer spec issues, and a clearer path from prototype to proposal.
Dịch
 #Somnia and $SOMI Until now, every Bitcoin Improvement Proposal (BIP) that needed cryptographic primitives had to reinvent the wheel. Each one came bundled with its own custom Python implementation of the secp256k1 elliptic curve and related algorithms, each subtly different from one another. These inconsistencies introduced quiet liabilities and made reviewing BIPs unnecessarily complicated. This problem was recently highlighted in Bitcoin Optech Newsletter #348, and it’s something at least a handful of developers in the Bitcoin development community have long felt: there should be a unified, reusable standard for cryptographic BIP reference secp256k1 code. Last week, Jonas Nick and Tim Ruffing of Blockstream research and Sebastian Falbesoner made big progress towards this. As part of their existing ChillDKG proposal, the team released secp256k1lab. A new, intentionally INSECURE Python library for prototyping, experimenting, and BIP specifications. It’s not for production use (because it’s not constant-time and therefore vulnerable to side-channel attacks), but it fills a critical gap: it offers a clean, consistent reference for secp256k1 functionality, including BIP-340-style Schnorr signatures, ECDH, and low-level field/group arithmetic. The goal is simple: make it easier and safer to write future BIPs by avoiding redundant, one-off implementations. For BIP authors, this means: less custom code, fewer spec issues, and a clearer path from prototype to proposal.
 #Somnia and $SOMI Until now, every Bitcoin Improvement Proposal (BIP) that needed cryptographic primitives had to reinvent the wheel. Each one came bundled with its own custom Python implementation of the secp256k1 elliptic curve and related algorithms, each subtly different from one another. These inconsistencies introduced quiet liabilities and made reviewing BIPs unnecessarily complicated. This problem was recently highlighted in Bitcoin Optech Newsletter #348, and it’s something at least a handful of developers in the Bitcoin development community have long felt: there should be a unified, reusable standard for cryptographic BIP reference secp256k1 code.
Last week, Jonas Nick and Tim Ruffing of Blockstream research and Sebastian Falbesoner made big progress towards this. As part of their existing ChillDKG proposal, the team released secp256k1lab. A new, intentionally INSECURE Python library for prototyping, experimenting, and BIP specifications. It’s not for production use (because it’s not constant-time and therefore vulnerable to side-channel attacks), but it fills a critical gap: it offers a clean, consistent reference for secp256k1 functionality, including BIP-340-style Schnorr signatures, ECDH, and low-level field/group arithmetic. The goal is simple: make it easier and safer to write future BIPs by avoiding redundant, one-off implementations. For BIP authors, this means: less custom code, fewer spec issues, and a clearer path from prototype to proposal.
Dịch
#OpenLedger and $OPEN Until now, every Bitcoin Improvement Proposal (BIP) that needed cryptographic primitives had to reinvent the wheel. Each one came bundled with its own custom Python implementation of the secp256k1 elliptic curve and related algorithms, each subtly different from one another. These inconsistencies introduced quiet liabilities and made reviewing BIPs unnecessarily complicated. This problem was recently highlighted in Bitcoin Optech Newsletter #348, and it’s something at least a handful of developers in the Bitcoin development community have long felt: there should be a unified, reusable standard for cryptographic BIP reference secp256k1 code. Last week, Jonas Nick and Tim Ruffing of Blockstream research and Sebastian Falbesoner made big progress towards this. As part of their existing ChillDKG proposal, the team released secp256k1lab. A new, intentionally INSECURE Python library for prototyping, experimenting, and BIP specifications. It’s not for production use (because it’s not constant-time and therefore vulnerable to side-channel attacks), but it fills a critical gap: it offers a clean, consistent reference for secp256k1 functionality, including BIP-340-style Schnorr signatures, ECDH, and low-level field/group arithmetic. The goal is simple: make it easier and safer to write future BIPs by avoiding redundant, one-off implementations. For BIP authors, this means: less custom code, fewer spec issues, and a clearer path from prototype to proposal.
#OpenLedger and $OPEN Until now, every Bitcoin Improvement Proposal (BIP) that needed cryptographic primitives had to reinvent the wheel. Each one came bundled with its own custom Python implementation of the secp256k1 elliptic curve and related algorithms, each subtly different from one another. These inconsistencies introduced quiet liabilities and made reviewing BIPs unnecessarily complicated. This problem was recently highlighted in Bitcoin Optech Newsletter #348, and it’s something at least a handful of developers in the Bitcoin development community have long felt: there should be a unified, reusable standard for cryptographic BIP reference secp256k1 code.
Last week, Jonas Nick and Tim Ruffing of Blockstream research and Sebastian Falbesoner made big progress towards this. As part of their existing ChillDKG proposal, the team released secp256k1lab. A new, intentionally INSECURE Python library for prototyping, experimenting, and BIP specifications. It’s not for production use (because it’s not constant-time and therefore vulnerable to side-channel attacks), but it fills a critical gap: it offers a clean, consistent reference for secp256k1 functionality, including BIP-340-style Schnorr signatures, ECDH, and low-level field/group arithmetic. The goal is simple: make it easier and safer to write future BIPs by avoiding redundant, one-off implementations. For BIP authors, this means: less custom code, fewer spec issues, and a clearer path from prototype to proposal.
Dịch
@Openledger $OPEN Until now, every Bitcoin Improvement Proposal (BIP) that needed cryptographic primitives had to reinvent the wheel. Each one came bundled with its own custom Python implementation of the secp256k1 elliptic curve and related algorithms, each subtly different from one another. These inconsistencies introduced quiet liabilities and made reviewing BIPs unnecessarily complicated. This problem was recently highlighted in Bitcoin Optech Newsletter #348, and it’s something at least a handful of developers in the Bitcoin development community have long felt: there should be a unified, reusable standard for cryptographic BIP reference secp256k1 code. Last week, Jonas Nick and Tim Ruffing of Blockstream research and Sebastian Falbesoner made big progress towards this. As part of their existing ChillDKG proposal, the team released secp256k1lab. A new, intentionally INSECURE Python library for prototyping, experimenting, and BIP specifications. It’s not for production use (because it’s not constant-time and therefore vulnerable to side-channel attacks), but it fills a critical gap: it offers a clean, consistent reference for secp256k1 functionality, including BIP-340-style Schnorr signatures, ECDH, and low-level field/group arithmetic. The goal is simple: make it easier and safer to write future BIPs by avoiding redundant, one-off implementations. For BIP authors, this means: less custom code, fewer spec issues, and a clearer path from prototype to proposal.
@OpenLedger $OPEN
Until now, every Bitcoin Improvement Proposal (BIP) that needed cryptographic primitives had to reinvent the wheel. Each one came bundled with its own custom Python implementation of the secp256k1 elliptic curve and related algorithms, each subtly different from one another. These inconsistencies introduced quiet liabilities and made reviewing BIPs unnecessarily complicated. This problem was recently highlighted in Bitcoin Optech Newsletter #348, and it’s something at least a handful of developers in the Bitcoin development community have long felt: there should be a unified, reusable standard for cryptographic BIP reference secp256k1 code.
Last week, Jonas Nick and Tim Ruffing of Blockstream research and Sebastian Falbesoner made big progress towards this. As part of their existing ChillDKG proposal, the team released secp256k1lab. A new, intentionally INSECURE Python library for prototyping, experimenting, and BIP specifications. It’s not for production use (because it’s not constant-time and therefore vulnerable to side-channel attacks), but it fills a critical gap: it offers a clean, consistent reference for secp256k1 functionality, including BIP-340-style Schnorr signatures, ECDH, and low-level field/group arithmetic. The goal is simple: make it easier and safer to write future BIPs by avoiding redundant, one-off implementations. For BIP authors, this means: less custom code, fewer spec issues, and a clearer path from prototype to proposal.
Dịch
why not available in all region 😓😓
why not available in all region 😓😓
Binance Announcement
--
Thử thách Tháng của Binance: Hoàn thành Thử thách tháng 9 để nhận phần chia của bạn từ 4.000.000 HUMA!
Đây là thông báo chung và thông tin tiếp thị. Các sản phẩm và dịch vụ được đề cập ở đây có thể không có sẵn ở khu vực của bạn.
Các bạn Binancians,
Hãy chuẩn bị cho Thử thách Tháng của Binance! Bắt đầu hành trình với những nhiệm vụ đơn giản và thú vị và có cơ hội chia sẻ 4.000.000 HUMA trong các voucher token.
Thời gian hoạt động: 2025-09-01 00:00 (UTC) đến 2025-09-30 23:59 (UTC)
Cách để bắt đầu
Bước 1: Truy cập [landing page](https://www.%suffixOrigin%/%locale%/activity/challenge-competition/BN11167384860527226689?utm_source=announcement).
Bước 2: Nhấp vào nút “Thực hiện” bên cạnh một thử thách.
Bước 3: Hoàn thành các thử thách trong Thời gian Hoạt động để nhận số cơ hội hoạt động tương ứng. Các cách hoàn thành thử thách khác sẽ bị coi là không hợp lệ.
Dịch
AND LIGHT SPEED 🤣🤣
AND LIGHT SPEED 🤣🤣
Dịch
I get some reward from Binance❤️
I get some reward from Binance❤️
Dịch
Complate your first future trade And get 5$ Free😎
Complate your first future trade And get 5$ Free😎
Dịch
Are yoy complate the task??
Are yoy complate the task??
Xem bản gốc
LỖI Binance cây🤣
LỖI Binance cây🤣
Đăng nhập để khám phá thêm nội dung
Tìm hiểu tin tức mới nhất về tiền mã hóa
⚡️ Hãy tham gia những cuộc thảo luận mới nhất về tiền mã hóa
💬 Tương tác với những nhà sáng tạo mà bạn yêu thích
👍 Thưởng thức nội dung mà bạn quan tâm
Email / Số điện thoại

Tin tức mới nhất

--
Xem thêm

Bài viết thịnh hành

SonTis Research
Xem thêm
Sơ đồ trang web
Tùy chọn Cookie
Điều khoản & Điều kiện