monitoring, indexing, and archiving the Bitcoin mempool.
0.1.1
Digital cryptography! This is a subject I've been interested in since taking a class with Prof. Fred Schneider back in college. Articles pop up on Hacker News fairly often that pique my interest and this technique is the result of one of them.
Specifically, this is about Lamport signatures. There are many signature algorithms (ECDSA and RSA are the most commonly used) but Lamport signatures are unique because they are formed using a hash function. Many cryptographers believe that this makes them resistant to attacks made possible by quantum computers.
"tx-comment" : [ | |
{ | |
"message" : "\"test\"", | |
"sig" : "H8kfhAE+OIc3YhwTeif7Jj+YgTeSorhorPG0Y8hb07JobqZT+IncjIgOSisY1F5fLj7WxS/nanGGbmiSDF9tFBA=", | |
"address" : "oW5MJjjMVPCwYPVeVntFrog3CdaPvqj8Uv" | |
}, | |
"vin" : [ | |
{ | |
"txid" : "ce5e9c3a868289d5d5e4eec5b144b392b98fba32c58263ca42521a334e98b00f", | |
"vout" : 0, |
"tx-comment" : "[\"test\"]", | |
"vin" : [ | |
{ | |
"txid" : "ce5e9c3a868289d5d5e4eec5b144b392b98fba32c58263ca42521a334e98b00f", | |
"vout" : 0, | |
"scriptSig" : { | |
"asm" : "30440220182766befb3afcc90cb244a866c84b26debcd319cb7b53d4a2870a7583d67c1e022041baa511d8b672e80793ed2f05af102d26749c022a4ff8bb406b47cf90ac34de01 02eda34dd89bd66bdf2490b9d75395957d4919cc08304c3c74030cbf074fff6f75", | |
"hex" : "4730440220182766befb3afcc90cb244a866c84b26debcd319cb7b53d4a2870a7583d67c1e022041baa511d8b672e80793ed2f05af102d26749c022a4ff8bb406b47cf90ac34de012102eda34dd89bd66bdf2490b9d75395957d4919cc08304c3c74030cbf074fff6f75" | |
}, | |
"sequence" : 4294967295 |
/** | |
* smtp setting | |
* | |
* This will use smtp socket instead of the default php mail() function. | |
* Useful if you have another smtp application like dovecot on the server. | |
* | |
* Default: | |
* auth = 1 | |
* server = 'servername' | |
* port = 25 |