Test server Updated 2025-07-16
Quantum key distribution Updated 2025-07-16
Man-in-the-middle attack
BB84 is a good first algorithm to look into.
Long story short:
QKD uses quantum mechanics stuff to allow sharing unsnoopable keys: you can detect any snooping and abort communication. Unsnoopability is guaranteed by the known laws of physics, up only to engineering imperfections.
Furthermore, it allows this key distribution without having to physically take a box by car somewhere: once the channel is established, e.g. optical fiber, you can just keep generating perfect keys from it. Otherwise it would be pointless, as you could just drive your one-time pad key every time.
However, the keys likely have a limited rate of generation, so you can't just one-time pad the entire message, except for small text messages. What you would then do is to use the shared key with symmetric encryption.
Therefore, this setup usually ultimately relies on the idea that we believe that symmetric encryption is safer than , even though there aren't mathematical safety proofs of either as of 2020.
LevelDB Updated 2025-07-16
One "LevelDB" database contains multiple file in a directory. Off the bat inferior to SQLite which stores everything in a single file!
bsub Updated 2025-07-16
Submit a new job. The most important command!
OpenUSD Updated 2025-07-16
Bitcoin RPC command Updated 2025-07-16
These are commands that e.g. the Bitcoin CLI client can make to the server.
The commands can be listed with:
bitcoin-core.cli help
and full help with:
bitcoin-core.cli help getrawtransaction
For example. to run the Bitcoin getrawtransaction command, first in one shell we start bitcoind:
bitcoin-core.daemon
and then on another shell:
bitcoin-core.cli getrawtransaction 75b431e0a8c4617ca8adefe593ba66aa30907742b6dc8772761bfe7edabd74b4 true
bitcoin.org Updated 2025-07-16
Official Bitcoin domain registered by Satoshi Nakamoto.
Registration: 2008-08-18 by www.namecheap.com, an American company. But using a privacy oriented registrar: bitcoin.stackexchange.com/questions/89532/how-did-nakamoto-untraceably-pay-for-registering-bitcoin-org It is unknown how he could have paid anonymously, so it seems likely that the true identity could be obtained by law enforcement if needed.
First archive 2009-01-31: web.archive.org/web/20090131115053/http://bitcoin.org/ Also from the archive history web.archive.org/web/20100701000000*/bitcoin.org, things really started picking up on July 2010. This is almost certainly due to the opening of
Bitcoin IRC channel Updated 2025-07-16
A lot of important development discussion happened in those channels: en.bitcoin.it/wiki/IRC_channels
At www.reddit.com/r/Bitcoin/comments/5pvp6m/is_there_a_log_for_the_bitcoin_irc_channel/ "Is there a log for the bitcoin IRC channel?" Luke Dashjr comments:
No, it is meant to be private without logging allowed.
User "midmagic" (TODO identify) then comments:
The #bitcoin channel on Freenode is "officially unlogged." That means we officially don't publish the logs anywhere, and if we find that logs are published somewhere, we ask that they be taken down
Some IRC logs were dumped into the Bitcoin blockchain at: IRC log dumps where they cannot be deleted.
Quantum Intermediate Representation Updated 2025-07-16
Used e.g. by Oxford Quantum Circuits, www.linkedin.com/in/john-dumbell-627454121/ mentions:
Using LLVM to consume QIR and run optimization, scheduling and then outputting hardware-specific instructions.
Presumably the point of it is to allow simulation in classical computers?
This section is about the version of the course offered on Hilary term 2023 (January).
Bitcoin Core snap Updated 2025-07-16
Officially supported installation method on Ubuntu 23.10.
Quantum harmonic oscillator Updated 2025-07-16
Now, there are two ways to go about this.
The first is the stupid "here's a guess" + "hey this family of solutions forms a complete basis"! This is exactly how we solved the problem at Section "Solving partial differential equations with the Fourier series", except that now the complete basis are the Hermite functions.
The second is the much celebrated ladder operator method.

There are unlisted articles, also show them or only show them.