Bitcoin Q&A: Malicious updates and deterministic builds


Could a hacker change the client software of Bitcoin Core to accept fraudulent updates to the consensus rules? Is there a manual update process? What are deterministic builds? Can fraudulent transactions be validated and propagated? Why are there progressive time-outs for nodes that propagate incorrect information? Would miners deliberately propagate invalid blocks? These questions are from the second and third sessions of MOOC 11, which took place on February 7th and February 14th 2019 respectively. If you want early-access to talks and a chance to participate in the monthly live Q&As with Andreas, become a patron: RELATED:
What is a private key? –
Public keys vs. addresses –
Re-using addresses –
Cryptographic primitives –
Derivation paths and watch-only wallets –
Key storage best practices –
Key management and inheritance –
Data integirty and validation of keys –
SIGHASH_NOINPUT and custodial wallets –
Governance and social attack immunity –
Wallets, nodes, and monetary sovereignty – Andreas M. Antonopoulos is a technologist and serial entrepreneur who has become one of the most well-known and respected figures in Bitcoin. He is the author of “Mastering Bitcoin,” “The Internet of Money" series, and "Mastering Ethereum." Follow on Twitter: @aantonop
Website: Subscribe to the channel to learn more about Bitcoin & open blockchains; click on the red bell to enable notifications about new videos! MASTERING BITCOIN, 2nd Edition: Translations of MASTERING BITCOIN: THE INTERNET OF MONEY, v1:
Spanish, 'Internet del Dinero' (v1) –
German, 'Das Internet des Geldes' (v1) –
German, 'Das Internet des Geldes' (v2) –
French, 'L'internet de l'argent' (v1) –
Russian, 'Интернет денег' (v1) –
Vietnamese, 'Internet Của Tiền Tệ' (v1) – MASTERING ETHEREUM: Music: "Unbounded" by Orfan (
Outro Graphics: Phneep (
Outro Art: Rock Barcellos (