bitcoinj 0.11 released, with p2sh, bip39 and payment protocol support



Summary:

In this context, the discussion is about the security of XOR as a digest scheme in comparison to a proper hash function. The argument being made is that while it may be easy to create collisions with XOR, it becomes problematic when trying to timestamp data at the bottom of a merkle tree. While the top digest can be successfully timestamped in the Bitcoin blockchain, the digests at the bottom may be susceptible to fake timestamps if using XOR. The discussion highlights the importance of using a proper hash function for greater security.


Updated on: 2023-06-08T02:18:02.697459+00:00