When the block is propagated then the block gets verified which also verifies the tx within it to remove the ones that are also in the mempool at the time.
Thanks for that info!
@filip
Hi Filip,
Thank you for an interesting lesson. I very much enjoyed it. I have a little question. As an individual if I wanted to send a payment through the blockchain to a third party would it possible for me to decide if the transaction was completed by Segwit protocol or normal transaction protocol? Would it depend which wallet or platform I am using? I hope this makes sense to you as it does to me. Always grateful.
It depends on the wallet. Ledger I know supports both, but you have to have a separate segwit and non-segwit account. Bitcoin core wallet allows you to generate generate legacy addresses as well. For other wallets I’m not so sure.
How can someone go in and change such a thing, and it still being decentralized?
Do miners for stale blocks get the block reward?
Change what, where?
No because the block reward is part of the transaction data. It is a special kind of transaction called a coinbase.
Hello guys,
I’m sick and tired to dig and never find the Quiz answers because they don’t tell if you’re right or not, its just general until you get all answers rights, please help?
That makes sense. Thanks
You can check your answers by clicking on the Results Breakdown
The future of bitcoin like segwit did change
Ahhh, proposals are being discussed in online by the community, usually on bitcointalk then its drafted in a BIP proposal end further discussed and eventually implemented (or not).
https://github.com/bitcoin/bips/blob/master/bip-0001.mediawiki
After Segwit separates the signature from the block, what happens if that signature is still changed by someone else?
hi filip
I would like to understand at what poin exactly the signature is being change?
Malleability happens because Bitcoin’s code allows digital signature to be altered while a transaction is still waiting to get confirmed. The signature alteration can be done in such a way that if you run a mathematical check on it, it is still valid according to the network , but if you run a hashing algorithm on it gives a different transaction id. So Bob doesn’t need a private key of Alice he just change the signature.
thank’s Maki
but what i would like to understand is at what poin exactly the signature is being change?
https://www.youtube.com/watch?v=7o5shPC0R2k
This video will answer your question in a descriptive way.
Are all nodes using the Segwit protocol today?
awesome so far, have understood segwit. thanks