diff --git a/bitcoin-fundamentals-review.asciidoc b/bitcoin-fundamentals-review.asciidoc index 0ca9dcb..136d18d 100644 --- a/bitcoin-fundamentals-review.asciidoc +++ b/bitcoin-fundamentals-review.asciidoc @@ -97,7 +97,7 @@ Using these features of cryptographic hashes, we can do build some interesting a Fingerprints:: A hash can be used to fingerprint a file or message so that it can be uniquely identified. Hashes can be used as universal identifiers of any data set. -Integrity Proof:: A fingerprint of a file or message demonstrates its integrity, as the file or message cannot be tampered with or modified in any way without changing the fingeprirnt. This is often use to ensure software has not been tampered with before installing it on your computer. +Integrity Proof:: A fingerprint of a file or message demonstrates its integrity, as the file or message cannot be tampered with or modified in any way without changing the fingerprint. This is often use to ensure software has not been tampered with before installing it on your computer. Commitment/Non-repudiation:: You can commit to a specific preimage (e.g. a number or message) without revealing it, by publishing its hash. Later, you can reveal the secret and everyone can verify that it is the same thing you committed to earlier because it produces the published hash.