A new repo qtum-electrum-new has been built to add qtum-related features to the latest code for Bitcoin electrum.
Electrum is another popular Bitcoin wallet that has been around for nearly a decade. Electrum Bitcoin Wallet has been available for all devices since 2011 and was one of the most widely used wallet applications before other alternatives emerged. There are still a lot of people who are still swearing at the Electrum wallet.
Qtum Electrum synchronously updates electrum-related code and releases v0.18.9.
Electrum Wallet is one of the most popular Bitcoin wallets and has been around for several years. However, Electrum wallet users often rely on Electrum servers, which presents some security and privacy trade-offs. If you use electrum personal servers, Electrum wallet users can connect locally to their own private servers, enjoying the convenience of Electrum without any trade-offs.
Electrum also integrates Lightning with hardware support. Because hardware wallets store bitcoins offline within the reach of hackers, they are considered one of the best ways to protect them.
By default, electrum wallets are randomly connected to a set of Electrum servers. From a privacy perspective, this is not a good thing because it discloses your wallet address and balance to unknown third parties. And unfortunately, many public Electrum servers are run by individuals or groups of blockchain analytics companies or worse. Therefore, if you are using an Electrum wallet, it is generally recommended that you run your own Electrum server and then connect the wallet to that server.
Electron Cash is only a version of Electrum, so if you're used to Electrum, you won't have any problems.
Bitcoin Wallet Electrum confirms a phishing attack against its users, reminding them not to download Electrum Wallet software from any channel other than the official website. Earlier media reports said Electrum users had maliciously stolen millions of dollars worth of cryptocurrencies. Hackers create Electrum wallet software with malicious code, induce users to download, and trick users into providing login information such as passwords to commit theft.
By broadcasting CT update (u?) i1) and s (i1)) use Sig (u'i1) and s (i1) to replace Sig (u'i) and s (i1) respectively