@ -870,7 +870,7 @@ The reference implemenation is written in a maintainable and testable way such t
can easily evolve as the Protocol evolves.
can easily evolve as the Protocol evolves.
It is hoped that in the future there will be many implementations of \HushList, running on
It is hoped that in the future there will be many implementations of \HushList, running on
various blockchains and using various software stacks. The design of \HushList is compatible with Simple Payment Verification (SPV) light wallets and a future version of \HushList will learn to speak an ElectrumX backend server.
various blockchains and using various software stacks. The design of \HushList is compatible with Simple Payment Verification (SPV) light wallets and a future version of \HushList will learn to speak to an ElectrumX backend server.
\nsection{Reference Implementation}
\nsection{Reference Implementation}
@ -993,11 +993,7 @@ a non-zero amount of 0.055555 HUSH. It is viewable on the Hush block explorer he
shielded addresses never show up directly in the public blockchain. Network transaction
shielded addresses never show up directly in the public blockchain. Network transaction
analysis is not possible on zaddrs. The explorer only
analysis is not possible on zaddrs. The explorer only
shows that a JoinSplit occured and that change was given to a taddr.
shows that a JoinSplit occured and that change was given to a taddr.
@ -1006,17 +1002,20 @@ Nevertheless, the follow text is forever embedded in the 512 byte memo field of
transaction:
transaction:
\begin{quotation}
\begin{quotation}
A beginning is the time for taking the most delicate care that the balances are correct.
A beginning is the time for taking the most delicate care that the balances are correct.
-- "Manual of Muad'Dib" by the Princess Irulan
-- "Manual of Muad'Dib" by the Princess Irulan
Once men turned their thinking over to machines in the hope that this would set them free. But that only permitted other men with machines to enslave them.
Once men turned their thinking over to machines in the hope that this would set them free. But that only permitted other men with machines to enslave them.
-- Reverend Mother Gaius Helen Mohiam
-- Reverend Mother Gaius Helen Mohiam
Polish comes from the cities; wisdom from the desert.
Polish comes from the cities; wisdom from the desert.
-- Arrakeen villager saying
-- Arrakeen villager saying
Be prepared to appreciate what you meet.
Be prepared to appreciate what you meet.
-- Fremen proverb
-- Fremen proverb
\end{quotation}
\end{quotation}
@ -1035,6 +1034,18 @@ The first case we call a "shielded top-up" and happens rarely but we would not w
In the second case, normal transactions will have amount=0 which will stand out and
In the second case, normal transactions will have amount=0 which will stand out and
network transaction analysis is possible. If these psuedonyms choose to actually send non-zero amounts, network analsysis can be made harder since most \HushList messages use amount=0.
network transaction analysis is possible. If these psuedonyms choose to actually send non-zero amounts, network analsysis can be made harder since most \HushList messages use amount=0.