Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore: remove repetitive words #1579

Merged
merged 2 commits into from
Sep 6, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -126,7 +126,7 @@ In the following section we explain how to do this.

![](./6.png)

To configure your miner to point to your mining pool, go to the the “Settings” tab again, and then click the “Miner” link.
To configure your miner to point to your mining pool, go to the “Settings” tab again, and then click the “Miner” link.

In the next screen you will see forms with fields to enter the data for several pools. This is for backup in case one pool is down, so your miner can jump to the other.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -48,7 +48,7 @@ Accounts and balances and smart contracts are the components that enable basic r

**Accounts and balances:** The addresses and accounts in blockchains such as Bitcoin and ETC are the actual property registries. These accounts with their balances and other assets assigned to them enable users to exclusively control their wealth and applications through their private keys.

**Decentralized applications (Dapps):** As smart contracts are unstoppable and provide general programmability, dapps (which is the the name applications inside these decentralized systems) enable a more ample number of rights that are very difficult to tamper with, attack, interrupt, or intervene.
**Decentralized applications (Dapps):** As smart contracts are unstoppable and provide general programmability, dapps (which is the name applications inside these decentralized systems) enable a more ample number of rights that are very difficult to tamper with, attack, interrupt, or intervene.

## The Security Attributes of These Components

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -38,7 +38,7 @@ The history of how proof of work ended up inside Bitcoin and then in Ethereum Cl

When Nick Szabo saw the mechanics of HashCash he immediately realized that the proof of work and the computational work that computers had to do to create them was analogous to gold, hence [Bit Gold](https://nakamotoinstitute.org/bit-gold/).

In the the real world a unit of gold is like a proof that a gold miner did a lot of work to find it, this is the reason for the use of the term “mining” in proof of work blockchains.
In the real world a unit of gold is like a proof that a gold miner did a lot of work to find it, this is the reason for the use of the term “mining” in proof of work blockchains.

However, POW is not the consensus mechanism itself, as we explained in the previous section, it is just one of the steps, albeit the most critical one, in Nakamoto Consensus.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -56,7 +56,7 @@ The great majority of users in ETC send transactions and do their queries using

## The Risks of Third Party Nodes

In a way, a blockchain is a kind of trusted third party, but the fact the the network is decentralized, and the data is replicated in all nodes globally, minimizes the influence of these trusted third parties to a sufficient degree that the security to users’ is very high.
In a way, a blockchain is a kind of trusted third party, but the fact the network is decentralized, and the data is replicated in all nodes globally, minimizes the influence of these trusted third parties to a sufficient degree that the security to users’ is very high.

However, even if one uses their own private keys and addresses, if the sending of transactions and querying of the blockchain is done through remote trusted third party nodes, then a significant part of the security to users is diminished.

Expand Down