Le 03/11/2013 07:41, Timo Hanke a écrit : > No. You mean the computer would use B for this check? (k,K) could be > rigged by Trezor, who computes b as k-a. Timo
I was just asking a question, in order to understand how this device works, and what are its requirements. if you think you can help, please explain. ------------------------------------------------------------------------------ Android is increasing in popularity, but the open development platform that developers love is also attractive to malware creators. Download this white paper to learn more about secure code signing practices that can help keep Android apps secure. http://pubads.g.doubleclick.net/gampad/clk?id=65839951&iu=/4140/ostg.clktrk _______________________________________________ Bitcoin-development mailing list Bitcoin-development@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/bitcoin-development