From defcff8c560d61924f5a63479f98b386f5b740df Mon Sep 17 00:00:00 2001 From: Stephen DeLorme Date: Tue, 11 Jun 2024 17:04:40 -0400 Subject: [PATCH] Update content/events/2024-06-12-mastering-bitcoin-chapters-13-14.md --- ...-06-12-mastering-bitcoin-chapters-13-14.md | 26 ++++++++++++++++++- 1 file changed, 25 insertions(+), 1 deletion(-) diff --git a/content/events/2024-06-12-mastering-bitcoin-chapters-13-14.md b/content/events/2024-06-12-mastering-bitcoin-chapters-13-14.md index 0b4c503..fda02b4 100644 --- a/content/events/2024-06-12-mastering-bitcoin-chapters-13-14.md +++ b/content/events/2024-06-12-mastering-bitcoin-chapters-13-14.md @@ -29,4 +29,28 @@ In this session, somebody will lead us through a These questions are provided to help guide your thinking as read the material. We'll try to answer these together when we meet to discuss the chapter. -TODO: Craft Study Questions +#### Chapter 13: Bitcoin Security + +- Why is possession considered "ten-tenths of the law" in Bitcoin, and what implications does this have for security? +- How does decentralization impact the security model of Bitcoin compared to traditional centralized financial systems? +- What are the core principles developers should follow when designing secure Bitcoin applications? +- Explain the concept of the "root of trust" in Bitcoin's security architecture. +- What are some of the best practices for securing Bitcoin keys and wallets? +- How does cold storage work, and why is it considered an effective security technique for Bitcoin? +- What are hardware signing devices, and how do they enhance Bitcoin security? +- Why is it important to back up more than just private keys when using complex scripts or multisignatures? +- How can diversifying risk help protect Bitcoin holdings? +- What measures should be taken to ensure the survivability and availability of Bitcoin funds in case of the key holder's incapacity or death? + +#### Chapter 14: Second-Layer Applications + +- What are second-layer applications in the context of Bitcoin, and why are they important? +- Describe the concept of "no double-spend" and its significance as a building block for Bitcoin applications. +- How does the immutability of the blockchain contribute to the security and trustworthiness of Bitcoin applications? +- What role does secure timestamping play in the functionality of blockchain applications? +- Explain how payment channels work and their benefits for Bitcoin transactions. +- What are colored coins, and how do they represent extrinsic assets on the Bitcoin blockchain? +- How does the "pay to contract" (P2C) mechanism function in colored coin applications? +- What is client-side validation, and why is it essential for the privacy and security of colored coins? +- Describe the RGB protocol and its use of single-use seals, P2C, and client-side validation in Bitcoin applications. +- How do Taproot Assets differ from RGB, and what are their respective advantages and disadvantages?