Skip to content

Commit cbaedf2

Browse files
BIP53: Clarify wording around implementation complexity
Co-authored-by: Chris Stewart <stewart.chris1234@gmail.com>
1 parent 445e445 commit cbaedf2

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

bip-0053.mediawiki

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ are less constrained than the first 32 bytes) are constructed so that they colli
8484
with the hash of some other fake, invalid transaction F. The attacker can fool the SPV client into believing that F
8585
was included in a Bitcoin block rather than T with 81 bits<ref>[[bip-0053/2-BitcoinMerkle.pdf|An attacker who can do 81 bits of work (followed by another 40 bits of work, to
8686
construct the funding transaction whose coins will be spent by this one) is able
87-
to fool an SPV client in this way.]]</ref> of work. This also reduces implementation complexity for SPV wallets<ref>[https://delvingbitcoin.org/t/great-consensus-cleanup-revival/710/43 The steps needed to make sure a Merkle proof for a transaction is secure.]</ref>.
87+
to fool an SPV client in this way.]]</ref> of work. Disallowing 64-byte transactions reduces implementation complexity for SPV wallets<ref>[https://delvingbitcoin.org/t/great-consensus-cleanup-revival/710/43 The steps needed to make sure a Merkle proof for a 64-byte transaction is secure.]</ref>.
8888

8989
==Rationale==
9090

0 commit comments

Comments
 (0)