All Activity

Read the most recent individual posts in chronological order.

Concept Review: B-SSL (Bitcoin Secure Signing Layer) Covenant-Free Vault Model Using Taproot, CSV, and CLTV

2 replies

By ilghan

Involving marathon-gary

calendar icon

Original post on October 11, 2025 11:42 UTC

cyclic icon

Last reply on October 11, 2025 18:15 UTC

delvingbitcoin

Francesco Madonna introduces a novel vault construction concept known as B-SSL — Bitcoin Secure Signing Layer. This design is aimed at self-custody, leveraging existing Bitcoin primitives such as Taproot, CHECKSEQUENCEVERIFY, and CHECKLOCKTIMEVERIFY to address the issue of permanent key loss while ensuring on-chain enforceability without the need for covenants.

A Game-Theoretic Approach to Bitcoin’s Valuation in Equilibrium

4 replies

By josh

Involving taparoo , micah541

calendar icon

Original post on March 29, 2025 01:48 UTC

cyclic icon

Last reply on October 9, 2025 17:51 UTC

delvingbitcoin

The discourse on Bitcoin's role within the global economic system and its potential as a universal unit of account raises significant points about its game-theoretic vulnerabilities, academic inconsistencies in asset valuation, and the impact of economic laws on its acceptance and utility. The argument begins by highlighting a paradox in Bitcoin's path to becoming a universally agreed-upon unit of account: the more inevitable its success seems, the more vulnerable it becomes to monopolization by powerful coalitions, thereby undermining its stability and viability.

Response to Pieter Wuille's StackExchange Answer Re: Nuking the Opreturn Filter

13 replies

By mechanic

Involving ismaelsadeeq , cguida +5 others

calendar icon

Original post on September 17, 2025 17:50 UTC

cyclic icon

Last reply on October 8, 2025 16:22 UTC

delvingbitcoin

In the realm of Bitcoin and blockchain technology, discussions often pivot around the handling of data and transactions to maintain network efficiency and scalability while upholding the decentralized ethos foundational to these systems. One focal point of debate is the management of non-financial data within the Bitcoin blockchain, particularly concerning the implications of such practices on network functionality.

Bitcoin Core v29.2 release candidate available

By glozow

calendar icon

Original post on October 8, 2025 16:10 UTC

cyclic icon

Last reply on October 8, 2025 16:10 UTC

delvingbitcoin

The latest release candidate for Bitcoin Core, version 29.2rc2, is now available for download and testing. Interested users can access the binaries through the provided link, while developers looking to review or contribute to the source code can find it on GitHub under the signed tag here.

Bitcoin Core v30.0 release candidate is available

3 replies

By fanquake

Involving jsarenik , fjahr +1 other

calendar icon

Original post on September 12, 2025 10:10 UTC

cyclic icon

Last reply on October 8, 2025 09:33 UTC

delvingbitcoin

The recent communication highlights the availability of a third release candidate for Bitcoin Core version 30.0, which can be accessed at bitcoincore.org. The finalization of the release notes is underway and can be reviewed on GitHub at this link.

Eclipsing Bitcoin Nodes with BGP Interception Attacks

7 replies

By cedarctic

Involving xBC , gmaxwell +2 others

calendar icon

Original post on September 4, 2025 14:08 UTC

cyclic icon

Last reply on October 7, 2025 22:18 UTC

delvingbitcoin

The discourse centers on the nuanced vulnerabilities and potential defense mechanisms against network-level attacks within Bitcoin's infrastructure, particularly emphasizing the roles of fingerprinting and topology analysis in identifying susceptible nodes and mapping network structures. The discussion acknowledges the substantial research interest in both fingerprinting attacks and the mapping of network topologies to pinpoint vulnerabilities within the network, such as nodes connected through the same Autonomous System (AS) paths which may present heightened risk profiles.

Persisting Mutable Storage Inside The "T"EE

3 replies

By ZmnSCPxj

Involving ZmnSCPxj

calendar icon

Original post on October 7, 2025 17:50 UTC

cyclic icon

Last reply on October 10, 2025 06:21 UTC

delvingbitcoin

The exploration and analysis of Trusted Execution Environments (TEEs) highlight a significant vulnerability in their design, specifically regarding persistent mutable storage. This vulnerability is critical as it exposes TEEs to rollback attacks, which are particularly threatening to applications dealing with cryptocurrencies like Bitcoin.

Optimal Threshold Signatures in Bitcoin

3 replies

By sindurasaraswathi

Involving pyth , AdamISZ+1 other

calendar icon

Original post on October 2, 2025 03:55 UTC

cyclic icon

Last reply on October 3, 2025 18:30 UTC

delvingbitcoin

The discussion initiates with an acknowledgment of the complexities involved in the relationship between the probabilities of a user breaking into their own system versus an attacker doing so, within the framework of threshold systems. It is pointed out that these probabilities, denoted as $p(\tau)$ and $q(\tau)$ respectively, are not independent as they both operate within the same underlying threshold system.

Witnessless Sync for Pruned Nodes

2 replies

By JoseSK999

Involving gmaxwell

calendar icon

Original post on May 31, 2025 16:19 UTC

cyclic icon

Last reply on October 2, 2025 19:49 UTC

delvingbitcoin

Recent analyses have revealed significant insights into the structure and optimization of blockchain technology, particularly within the Bitcoin network. A notable finding from the last four years shows that witnesses account for approximately 53% of all block data.

Changes to BIP-360 - Pay to Quantum Resistant Hash (P2QRH)

29 replies

By EthanHeilman

Involving stevenroose , cryptoquick +7 others

calendar icon

Original post on July 7, 2025 16:01 UTC

cyclic icon

Last reply on October 1, 2025 18:58 UTC

delvingbitcoin

The evolving discourse on enhancing Bitcoin's cryptographic security against potential quantum computing threats has led to significant developments, particularly concerning the Pay to Quantum Resistant Hash (P2QRH) and its integration into the Taproot (P2TR) infrastructure. The latest amendments focus on transitioning P2QRH to a script-only version of Taproot, eliminating the quantum-vulnerable key-spend pathway.

Where does the 33.33% threshold for selfish mining come from?

11 replies

By AntoineP

Involving zawy , ajtowns +2 others

calendar icon

Original post on June 5, 2025 20:26 UTC

cyclic icon

Last reply on October 1, 2025 11:30 UTC

delvingbitcoin

The discourse around the inefficiencies introduced by knots in the Bitcoin network's mempool and block relay process sheds light on a nuanced understanding of blockchain dynamics. Observations suggest that an increase in stale blocks, which has risen from 1 per 1300 to 1 per 1000 over recent months, may be indicative of deeper systemic issues potentially exacerbated by knots.

Stealth addresses using nostr

9 replies

By bytes

Involving AdamISZ , setavenger +1 other

calendar icon

Original post on July 9, 2025 17:13 UTC

cyclic icon

Last reply on October 1, 2025 10:30 UTC

delvingbitcoin

The correspondence delves into the intricacies and potential vulnerabilities associated with implementing a wallet system that relies heavily on the Nostr protocol, particularly focusing on the risks of storing critical data without a robust fallback mechanism. It highlights concerns over the reliance on Nostr for critical data storage, pointing out instances where relays in the Cashu network have deleted their databases, underscoring the precariousness of depending solely on Nostr for important data retention.

JIT fees with TXHASH: comparing options for sponsorring and stacking

1 reply

By stevenroose

Involving ademan

calendar icon

Original post on June 9, 2025 10:29 UTC

cyclic icon

Last reply on September 30, 2025 20:25 UTC

delvingbitcoin

The discussion begins with an inquiry into the rationale behind not maintaining contiguous outputs in the stacking protocol, specifically within the context of Bitcoin transactions and the TXHASH Bitcoin Improvement Proposal (BIP). It raises a question about the potential efficiency or issues with different approaches to committing output indices in transaction stacking, hinting at an underlying complexity in optimizing blockchain transactions.

In addressing the complexities of fee payments in Bitcoin transactions, especially given the evolution toward second-layer solutions, the conversation shifts to traditional methods like Child Pays for Parent (CPFP) and introduces the concept of Tx Sponsors.

Bitcoin Inquisition 29.1

By ajtowns

calendar icon

Original post on September 30, 2025 07:27 UTC

cyclic icon

Last reply on September 30, 2025 07:27 UTC

delvingbitcoin

The latest version of Bitcoin Inquisition, 29.1, is now available for download at GitHub, building upon the foundation set by Bitcoin Core 29.1. This update introduces support for several proposed consensus changes aimed at enhancing the functionality and efficiency of the Bitcoin network.

Flattening Nested 2-of-2 Of a 1-of-1 And a k-of-n

1 reply

By ZmnSCPxj

Involving AdamISZ

calendar icon

Original post on September 28, 2025 15:59 UTC

cyclic icon

Last reply on September 29, 2025 13:00 UTC

delvingbitcoin

The exploration of flattening nested quorum signing groups, particularly a structure that combines a single signer with a k-of-n quorum signer into a unified layer, presents a significant advancement in cryptographic procedures. This innovative approach involves recalibrating the share distribution within the group to transform it into a larger, singular k-of-n entity.

LN routing and caveats

2 replies

By aqua

Involving garlonicon

calendar icon

Original post on September 22, 2025 13:20 UTC

cyclic icon

Last reply on September 29, 2025 11:30 UTC

delvingbitcoin

The exploration into Lightning Network (LN) transactions, particularly those that do not have a direct channel between the sender and recipient, reveals the nuanced infrastructure required to facilitate such payments. When an individual, referred to as Alice, wishes to transact over the LN without an existing direct channel to the recipient, Bob, she must first establish a channel with a node that acts as a gateway to the broader network.

Limiting OP_RETURN at consensus level

3 replies

By Malachi

Involving garlonicon , micah +1 other

calendar icon

Original post on September 24, 2025 20:08 UTC

cyclic icon

Last reply on September 27, 2025 10:05 UTC

delvingbitcoin

The discourse presents a multifaceted examination of current and potential challenges within the blockchain technology landscape, particularly focusing on Bitcoin's infrastructure and regulatory environment. It highlights the inherent issues associated with pruned nodes in blockchain networks.

MultiChannel and MultiPTLC: Towards A Global High-Availability Consistent - /Partition-TolerantDatabase For Bitcoin Payments

5 replies

By ZmnSCPxj

Involving tbast , ZmnSCPxj

calendar icon

Original post on September 17, 2025 04:37 UTC

cyclic icon

Last reply on September 24, 2025 12:22 UTC

delvingbitcoin

The discourse initiates with a reflection on the evolution of Bitcoin and a detailed exploration into an innovative approach for Lightning Service Providers (LSPs) to conduct transactions without necessitating mutual trust. This method employs a pseudo-Spilman scheme, allowing participants like Ursula to offer transactions to any other participant using a unique "single-use-seal" mechanism.

A Decker-Wattenhofer MultiChannel For Reduced Inter-LSP Trust

3 replies

By ZmnSCPxj

Involving ZmnSCPxj

calendar icon

Original post on September 17, 2025 20:26 UTC

cyclic icon

Last reply on September 24, 2025 11:48 UTC

delvingbitcoin

The Burchert-Decker-Wattenhofer channel factory, as discussed, presents a unique approach to managing liquidity and routing within the Bitcoin Lightning Network, focusing on optimizing availability for users like Ursula rather than establishing redundant channels between participants such as Alice and Bob. The architecture limits the number of hosted channels to N, diverging from the maximal potential, thereby allocating resources more efficiently toward enhancing Ursula's routing capabilities.

Disclosure: Eclair Preimage Extraction Exploit

1 reply

By morehouse

Involving t-bast

calendar icon

Original post on September 23, 2025 14:22 UTC

cyclic icon

Last reply on September 23, 2025 14:53 UTC

delvingbitcoin

The discovery of a critical vulnerability in Eclair versions up to 0.11.0 underscores the importance of thorough testing and inter-implementation communication in the development of cryptocurrency software. This vulnerability, which allowed attackers to steal node funds by exploiting a flaw in how Eclair monitored the blockchain for preimages during a force-close of a channel, highlights a crucial oversight.

Revisiting Multi-Commitments

By moonsettler

calendar icon

Original post on September 23, 2025 11:55 UTC

cyclic icon

Last reply on September 23, 2025 11:55 UTC

delvingbitcoin

The discourse on multi-commitments in Bitcoin script, inspired by conversations with notable figures such as Jeremy Rubin, salvatoshi, and reardencode, delves into the trade-offs among various proposed approaches. These include OP_CAT, OP_PAIRCOMMIT, OP_VECTORCOMMIT, OP_TWEAKADD, and OP_SHA256 related operations.

[Proposal] Guardian Address + GASPv1

By guardian

calendar icon

Original post on September 22, 2025 16:45 UTC

cyclic icon

Last reply on September 22, 2025 16:45 UTC

delvingbitcoin

The proposed Bitcoin Improvement Proposals (BIPs) aim to introduce a novel security mechanism to combat the increasing threat of theft against bitcoin users, by defining the Guardian Address Signal Protocol and detailing wallet implementation standards. These proposals are designed to allow bitcoin wallets to lock in response to an activation event, thereby preventing unauthorized spending of UTXOs under duress.

Dust Expiry: Clean the UTXO set from spam

33 replies

By RobinLinus

Involving orangesurf , anons +9 others

calendar icon

Original post on May 20, 2025 01:53 UTC

cyclic icon

Last reply on September 21, 2025 20:35 UTC

delvingbitcoin

The discourse surrounding the optimization and management of the Unspent Transaction Output (UTXO) set in blockchain systems, particularly Bitcoin, is multifaceted and addresses several key challenges and proposed solutions. One central concern is the UTXO set's rapid expansion, largely fueled by spam activities that contribute to its bloat, making it a pressing issue for network efficiency and scalability.

Measuring minrelaytxfee across the Bitcoin network

3 replies

By danielabrozzoni

Involving bytes , 0xB10C+1 other

calendar icon

Original post on September 17, 2025 13:22 UTC

cyclic icon

Last reply on September 18, 2025 15:17 UTC

delvingbitcoin

The analysis of Bitcoin network nodes has unveiled several intriguing aspects regarding their operational behavior, particularly in the context of minimum relay fees and the transmission of FEEFILTER messages. A detailed examination, leveraging a modified version of virtu’s p2p-crawler, focused on recording these messages from nodes that accept inbound connections.

Stats on compact block reconstructions

39 replies

By xBC

Involving CryptiQ , sipa +11 others

calendar icon

Original post on August 2, 2024 12:08 UTC

cyclic icon

Last reply on September 17, 2025 14:17 UTC

delvingbitcoin

The discussion centers on the analysis and improvement of Bitcoin's compact block reconstruction performance, with a focus on various strategies and configurations tested across different nodes within the network. A notable concern addressed is the occasional inefficiency in block reconstructions, particularly during periods of increased mempool activity, which prompts a deeper investigation into the underlying causes and potential optimizations.

A specific patch aimed at enhancing transaction handling was scrutinized for its impact on node behavior, highlighting a need to understand why certain transactions may not be acknowledged by nodes immediately or after some time.

Peer-observer: A tool and infrastructure for monitoring the Bitcoin P2P network for attacks and anomalies

1 reply

By 0xB10C

calendar icon

Original post on September 17, 2025 12:08 UTC

cyclic icon

Last reply on September 17, 2025 12:48 UTC

delvingbitcoin

The peer-observer project, initially focusing on extracting data through the tracing/eBPF interface, has evolved to include a wider range of functionalities aimed at enhancing Bitcoin network monitoring and analysis. The ebpf-extractor is designed to intercept tracepoints and relay events to various tools for real-time processing, such as creating Prometheus metrics or publishing JSON data via a websocket for web visualizations.

MultiChannel and MultiPTLC: Towards A Global High-Availability CP Database For Bitcoin Payments

5 replies

By ZmnSCPxj

Involving harding , cryptoquick +1 other

calendar icon

Original post on September 14, 2025 21:43 UTC

cyclic icon

Last reply on September 17, 2025 00:26 UTC

delvingbitcoin

The discussion around MultiPTLC (Multipath Point Time-Locked Contracts) introduces a nuanced perspective on the optimization of payment protocols within blockchain technologies, specifically addressing the challenges faced by users and liquidity providers in the current cryptographic and network framework. The core premise hinges on the strategic advantage provided by allowing Lightning Service Providers (LSPs) exclusive knowledge of receiver-can-claim scalars under a singular unit MultiPTLC arrangement.

Channel depletion, LN Topology, Cycles and rational behavior of nodes

6 replies

By renepickhardt

Involving ajtowns , sorukumar +2 others

calendar icon

Original post on November 15, 2024 12:27 UTC

cyclic icon

Last reply on September 16, 2025 17:50 UTC

delvingbitcoin

The discussion delves into the vulnerabilities present in payment systems, specifically highlighting how unresolved payments can lead to a backlog, causing new transactions to be rejected. This scenario is exacerbated when payers exploit the system by releasing payment shards below the maximum milli-satoshi limit and inserting waiting periods between each release, allowing them to bypass controls and accumulate numerous Hashed Time-Locked Contracts (HTLCs) within a payment channel.

Evolving the Ark protocol using CTV and CSFS

6 replies

By stevenroose

Involving instagibbs , roasbeef +3 others

calendar icon

Original post on April 15, 2025 11:54 UTC

cyclic icon

Last reply on September 16, 2025 16:52 UTC

delvingbitcoin

The discussion encompasses various aspects and advancements in blockchain transaction technologies, specifically focusing on the Ark protocol and its innovative approaches like CTV (CheckTemplateVerify) and CSFS (Covenants Secure Financial Systems). These technologies aim to enhance the security and efficiency of blockchain transactions by addressing limitations present in existing systems such as Lightning and rollups.

Addressing community concerns and objections regarding my recent proposal to relax Bitcoin Core's standardness limits on OP_RETURN outputs

8 replies

By AntoineP

Involving cguida , bytes +2 others

calendar icon

Original post on May 14, 2025 19:34 UTC

cyclic icon

Last reply on September 16, 2025 13:28 UTC

delvingbitcoin

The discourse surrounding Bitcoin Core's relay policy adjustments and the OP_RETURN output limit encapsulates a broader debate on network governance, user value, and technical evolution. The crux of the discussion lies in the tension between offering users configurable options that may lead to network bloat versus preserving the integrity and efficiency of the Bitcoin network.

Open letter to core devs (reflectio - ns/questionsfrom the op_return saga and proposal to establish a well-organized channel/link between devs and users)

1 reply

By FernandoTheKoala

Involving ArmchairCryptologist

calendar icon

Original post on September 14, 2025 13:19 UTC

cyclic icon

Last reply on September 14, 2025 18:41 UTC

delvingbitcoin

The discussion begins by highlighting the rationale behind recent changes in Bitcoin's protocol, such as the implementation of OP_RETURN, full-RBF (Replace-By-Fee), and adjustments to the minrelaytxfee. These modifications address the inefficacies of previous limitations that not only failed to prevent certain actions but also led to more problematic methods that could degrade network performance.

Bitcoin Core v29.1 Released

By glozow

calendar icon

Original post on September 10, 2025 15:35 UTC

cyclic icon

Last reply on September 10, 2025 15:35 UTC

delvingbitcoin

The latest release of Bitcoin Core version 29.1 is now available, marking a significant update that encompasses various bug fixes, performance enhancements, and updated translations. This version introduces notable changes aimed at improving the overall functionality and security of Bitcoin transactions and operations.

A Comprehensive OP_RETURN Limits Q&A Resource to Combat Misinformation

3 replies

By tidwell

Involving FernandoTheKoala , garlonicon+1 other

calendar icon

Original post on May 12, 2025 17:31 UTC

cyclic icon

Last reply on September 9, 2025 07:51 UTC

delvingbitcoin

The discussion around the increase of the OP_RETURN byte limit to 100,000 bytes within the blockchain and programming communities addresses a significant shift in how data can be embedded into the Bitcoin blockchain. This adjustment was made with the understanding that the concept of undemanded block space is outdated, allowing for larger OP_RETURN outputs to compete for block space alongside other transactions.

SwiftSync -- Speeding up IBD with pre-generated hints (PoC)

7 replies

By RubenSomsen

Involving sjors , lrinc +3 others

calendar icon

Original post on April 9, 2025 10:30 UTC

cyclic icon

Last reply on September 8, 2025 15:09 UTC

delvingbitcoin

SwiftSync is an ongoing development project aimed at optimizing synchronization across various platforms, ensuring a seamless user experience for users navigating between different operating systems and applications. The project focuses on creating a robust framework to facilitate real-time data exchange and synchronization, addressing the common challenges associated with cross-platform compatibility.

Who will run the CoinJoin coordinators?

23 replies

By kravens

Involving bytes , conduition +4 others

calendar icon

Original post on June 2, 2024 10:01 UTC

cyclic icon

Last reply on September 5, 2025 11:25 UTC

delvingbitcoin

The recent updates in the Wasabi Wallet, as detailed in their latest release, highlight a significant advancement towards enhancing privacy within the Bitcoin ecosystem. This version introduces an easier method for users to run their own anonymous coordinator as an onion service, accessible only via the Tor network.

Bitcoin Core v29.1 release candidate available

2 replies

By glozow

Involving fanquake , kravens

calendar icon

Original post on July 28, 2025 19:16 UTC

cyclic icon

Last reply on September 5, 2025 11:10 UTC

delvingbitcoin

The latest release candidate for Bitcoin Core, version v29.1rc1, has been officially made available, marking a significant step towards the forthcoming minor version release of this foundational cryptocurrency software. Users interested in exploring or testing the new features and improvements can download both the binaries and the source code.

A simple backup scheme for wallet accounts

30 replies

By reardencode

Involving josh , bytes +9 others

calendar icon

Original post on April 16, 2025 13:52 UTC

cyclic icon

Last reply on September 4, 2025 07:27 UTC

delvingbitcoin

The recent advancements in Bitcoin Core's wallet functionality include the introduction of a Remote Procedure Call (RPC) for backing up wallet descriptors and relevant information. This development responds to the need for securing private data related to user wallets, facilitating easier backups, and enhancing the resilience of user assets against potential threats.

CVE-2024-38365 public disclosure (btcd `FindAndDelete` bug)

11 replies

By AntoineP

Involving David Harding , ariard +1 other

calendar icon

Original post on October 10, 2024 09:02 UTC

cyclic icon

Last reply on September 3, 2025 13:13 UTC

delvingbitcoin

The document under discussion outlines a Bitcoin Core unit test designed to generate transactions that would be recognized as valid by Bitcoin Core but not by Btcd. This test, intended for Core v27.0, underscores the nuanced differences in how transactions and scripts are validated across different Bitcoin implementations.

Delving Simplicity Part Ⅲ: Building Data Types

By roconnor-blockstream

calendar icon

Original post on September 2, 2025 23:52 UTC

cyclic icon

Last reply on September 2, 2025 23:52 UTC

delvingbitcoin

The exploration of Simplicity, a blockchain programming language, reveals its potential for building complex computations from basic types and combinators. The language's foundation lies in its type system and a core set of computational combinators introduced earlier, raising questions about its practicality for real-world applications.

Confidential Script: Emulate soft forks using stateless TEEs

5 replies

By josh

Involving sanket , stutxo +2 others

calendar icon

Original post on August 12, 2025 21:11 UTC

cyclic icon

Last reply on August 30, 2025 20:26 UTC

delvingbitcoin

The email discussion highlights significant advancements and collaborative efforts in the field of blockchain technology, specifically focusing on smart contract development and Bitcoin's kernel enhancements. It introduces two key resources that contribute to the ongoing development in this domain.

Bitcoin and Quantum Computing

6 replies

By ClaraShk

Involving AdamISZ , AntoineP +1 other

calendar icon

Original post on May 28, 2025 14:25 UTC

cyclic icon

Last reply on August 29, 2025 16:34 UTC

delvingbitcoin

The recent discourse delves into the intricate relationship between quantum computing advancements and their potential impact on Bitcoin's cryptographic security infrastructure. The primary focus is on the Elliptic Curve Discrete Logarithm Problem (ECDLP), a cornerstone of current cryptographic standards, which, if compromised by quantum computational capabilities, could pose significant risks to Proof of Work (PoW) systems integral to cryptocurrencies like Bitcoin.

The state of bitcoinfuzz

By bruno

calendar icon

Original post on August 27, 2025 14:04 UTC

cyclic icon

Last reply on August 27, 2025 14:04 UTC

delvingbitcoin

Bitcoinfuzz: Elevating Security in Bitcoin and Lightning Network Implementations

The project bitcoinfuzz emerged as an experimental venture aimed at differential fuzzing of Bitcoin protocol implementations and libraries. It has significantly evolved from its initial version, adopting a modular approach for enhanced flexibility.

Writing Simplicity Programs with SimplicityHL

6 replies

By sanket

Involving niftynei , hodlinator+2 others

calendar icon

Original post on August 4, 2025 19:21 UTC

cyclic icon

Last reply on August 26, 2025 14:01 UTC

delvingbitcoin

The recent dialogue on Simplicity, a programming language designed for blockchain smart contracts, unveils significant strides towards enhancing its functionality and application. An integral part of this discussion is the exploration into the potential of integrating a universal sighash mode within Simplicity.

Taking a second look at OP_EXPIRE

2 replies

By cmp_ancp

Involving garlonicon

calendar icon

Original post on August 25, 2025 01:47 UTC

cyclic icon

Last reply on August 26, 2025 01:36 UTC

delvingbitcoin

The discourse surrounding the potential for transaction expiration in Bitcoin transactions highlights a nuanced understanding of the cryptocurrency's operational mechanics and its implications for network security, economic dynamics, and protocol development. The concept of Miner Extractable Value (MEV) plays a crucial role in this discussion.

Bitcoin c.h.i.p. - capital hash investment protocol bip

1 reply

By Caraveo

Involving harding

calendar icon

Original post on August 22, 2025 04:00 UTC

cyclic icon

Last reply on August 24, 2025 21:59 UTC

delvingbitcoin

The BITCOIN C.H.I.P (Capital Hash Investment Protocol) presents a novel lending framework that empowers Bitcoin miners to utilize their Bitcoin assets and HASH power as collateral for business financing. This initiative aims to establish a native Bitcoin Capital market, which simultaneously upholds network security and affords miners streamlined access to capital for legitimate business pursuits.

Chain Code Delegation: Private Access Control for Bitcoin Keys

4 replies

By jurvis

Involving marathongary , jaonoctus +2 others

calendar icon

Original post on July 15, 2025 00:41 UTC

cyclic icon

Last reply on August 24, 2025 00:01 UTC

delvingbitcoin

The innovative concept of using moderators in transactions was employed by OpenBazaar, where a unique protocol facilitated private transactions between buyers and sellers with the option of involving a moderator only when disputes arise. This system utilized a static public key posted by moderators, which could be tweaked for each transaction to include them in a dispute resolution path without their knowledge unless their intervention was required.

Delving Simplicity Part Ⅱ: Combinator Completeness of Simplicity

By roconnor-blockstream

calendar icon

Original post on August 18, 2025 14:26 UTC

cyclic icon

Last reply on August 18, 2025 14:26 UTC

delvingbitcoin

Simplicity is a programming language that offers a unique approach to composition through its type system, which includes unit types, sum types, and product types. The unit type in Simplicity, represented as 𝟙 or ONE, is essentially a zero-bit data type that contains a single value, symbolized by an empty tuple.

Selfish mining fix with a simulation

By zawy

calendar icon

Original post on August 18, 2025 14:01 UTC

cyclic icon

Last reply on August 18, 2025 14:01 UTC

delvingbitcoin

The document provided offers a detailed evaluation of a solution proposed to address a specific vulnerability in cryptocurrency mining algorithms. The analysis was conducted by an individual named Grok, who performed simulations to assess the impact of the proposed fix on an attacker's profit margins when controlling a significant portion of the network's hashrate.

The core of Grok's findings revolves around a simulation that demonstrates the economic outcome for an attacker possessing 40% of the network's hashrate under the new algorithm adjustments.

Proposal: Per-Block Legacy Transition Budget as Quantum Mitigation (Soft Fork)

By MartinS84

calendar icon

Original post on August 17, 2025 02:03 UTC

cyclic icon

Last reply on August 17, 2025 02:03 UTC

delvingbitcoin

In the realm of cryptocurrency, particularly Bitcoin, there's a growing concern over the potential threat posed by quantum computing to the security protocols currently in place, specifically regarding ECDSA and Schnorr signatures. This worry stems from the possibility that quantum computers could efficiently crack these cryptographic methods, thereby endangering the integrity of legacy Unspent Transaction Outputs (UTXOs) that utilize these signatures.

New paper on Proof of Usable Work

1 reply

By zawy

Involving VigSeth

calendar icon

Original post on July 25, 2025 18:54 UTC

cyclic icon

Last reply on August 15, 2025 17:12 UTC

delvingbitcoin

The initiation of a new high-performance Layer 1 (L1) protocol, named "Twinstor Blockchain," aims at leveraging the Proof of Useful Work (PoUW) consensus derived from arbitrary matrix multiplication. This innovative approach is designed to enhance distributed industrial-scale digital twin replication, diagnostics, and repair across key sectors such as automobile, aerospace, and consumer electronics.

Correcting the error in getnetwork - hashrateps

30 replies

By zawy

Involving sipa , zawy

calendar icon

Original post on June 2, 2025 10:53 UTC

cyclic icon

Last reply on August 15, 2025 14:00 UTC

delvingbitcoin

In the realm of blockchain technology, particularly within Bitcoin mining, an accurate estimation of the network's hashrate becomes a pivotal aspect due to its direct correlation with both the security and efficiency of the network. The hashrate signifies the aggregate computational power per second utilized for mining and processing transactions on the blockchain.

Changing the minimum relay feerate

12 replies

By glozow

Involving garlonicon , bytes +3 others

calendar icon

Original post on July 31, 2025 20:07 UTC

cyclic icon

Last reply on August 14, 2025 22:46 UTC

delvingbitcoin

In the discourse surrounding Bitcoin Core and its approach to managing transaction fees and network security, a multifaceted perspective emerges, highlighting both technical intricacies and broader economic considerations. The discussion begins with an analysis of the hardcoded values within Bitcoin Core releases, specifically focusing on the minimum relay feerate, which is instrumental in safeguarding against denial-of-service (DoS) attacks.

[Proposal] Bitcoin Deposits: A Zero UTXO Trust-Minimized Lightning Wallet

By ynniv

calendar icon

Original post on August 13, 2025 22:37 UTC

cyclic icon

Last reply on August 13, 2025 22:37 UTC

delvingbitcoin

The concept of a Layer 3 Protocol for Zero UTXO Trust-Minimized Lightning Wallets aims to revolutionize the way Bitcoin transactions are conducted by eliminating certain limitations currently faced by users and operators alike. This new protocol seeks to provide users with complete control over their private keys, enable Lightning payments without the need for Unspent Transaction Output (UTXO) fees, and remove the requirements for liquidity management and constant availability.

Qubic attack on Monero

By zawy

calendar icon

Original post on August 13, 2025 11:39 UTC

cyclic icon

Last reply on August 13, 2025 11:39 UTC

delvingbitcoin

The recent Qubic attack on Monero has been interpreted as a costly reminder of the importance of non-repurposability in the security of Proof of Work (PoW) systems. This concept suggests that ASIC-resistant PoWs, which are designed to be accessible to a broader range of miners by resisting optimization through specialized hardware, inherently lack security due to their potential for repurposing.

Solutions for this new centralization INSIDE Bitcoin?

3 replies

By davidtaubmann

Involving garlonicon , jcorgan +1 other

calendar icon

Original post on August 6, 2025 01:36 UTC

cyclic icon

Last reply on August 13, 2025 03:01 UTC

delvingbitcoin

The discourse presents a nuanced critique of proposals aimed at regulating the bitcoin market, particularly focusing on the idea of imposing restrictions based on personal criteria. The sender articulates a strong objection to the notion of controlling who can buy or sell bitcoin, arguing that such measures are overly restrictive and unjust.

Exploring Extended Relative Timelocks

24 replies

By pyth

Involving fjahr , stevenroose +7 others

calendar icon

Original post on July 10, 2025 04:50 UTC

cyclic icon

Last reply on August 12, 2025 03:35 UTC

delvingbitcoin

The examination of nSequence usage in Bitcoin transactions, particularly within the context of Lightning Network operations and potential improvements to relative timelock functionality, reveals a multifaceted discussion across several technical domains. Utilizing tools like nsequence_runner, it was observed that all bits in the nSequence field have been utilized, highlighting the complexity and versatility of Bitcoin's scripting capabilities.

RGB yellow paper: the formal specification of Bitcoin & Lightning smart contracts

1 reply

By drorlovsky

Involving VigSeth

calendar icon

Original post on July 31, 2025 04:40 UTC

cyclic icon

Last reply on August 9, 2025 14:59 UTC

delvingbitcoin

The recent completion of the RGB consensus layer's formal specification represents a watershed moment for both developers and researchers engaged with the RGB project. This document is crucial as it provides a detailed foundation for future development and integration efforts within the RGB ecosystem.

Krux: KEF Encryption Format

By jdlcdl

calendar icon

Original post on August 8, 2025 16:55 UTC

cyclic icon

Last reply on August 8, 2025 16:55 UTC

delvingbitcoin

The recent email from the Project Krux team highlights significant advancements in the KEF Encryption Format, specifically tailored for the encryption of bip39 mnemonics. This initiative, sparked during preparations for the krux release 23.09.0, aims to offer a robust solution for securely storing mnemonic phrases across various mediums such as SPI-flash, sd cards, and QR codes.

Delving Simplicity Part Ⅰ: Three Fundamental Ways of Combining Computations

By roconnor-blockstream

calendar icon

Original post on August 5, 2025 14:41 UTC

cyclic icon

Last reply on August 5, 2025 14:41 UTC

delvingbitcoin

The activation of Simplicity on the Liquid Network marks an important milestone in addressing the unique challenges of programming language design for Bitcoin's transaction validation. Unlike conventional programming, where code can be executed multiple times on various inputs, Bitcoin transactions necessitate compact programs that are executed once per input, shared by all.

Sharing block templates

22 replies

By ajtowns

Involving ajtowns , AntoineP +7 others

calendar icon

Original post on August 5, 2025 19:08 UTC

cyclic icon

Last reply on October 10, 2025 02:46 UTC

delvingbitcoin

The recent years have marked a transformative period in Bitcoin's transaction policies, with significant shifts towards initiatives like full replace-by-fee, enhanced spam filtering options by Bitcoin Knots, and adjustments in minimum fee rates. These changes are integral to the network's operations, influencing block relay efficiency, mining centralization dynamics, and security aspects such as the risk of selfish mining.

Paralel Bitcoin only for conscious living individuals

6 replies

By davidtaubmann

Involving davidtaubmann, danoprey

calendar icon

Original post on July 29, 2025 02:41 UTC

cyclic icon

Last reply on August 1, 2025 19:50 UTC

delvingbitcoin

The discourse begins with a critique of the current trajectory of Bitcoin and its implications on decentralization, expressing concern over the potential dominance of Western oligarchies regardless of Bitcoin's success or failure. The author argues this dominance undermines true decentralization, suggesting an alternative approach to Bitcoin that would prevent institutions from gaining significant control.

Fee-Based Spam Prevention For Lightning

18 replies

By JohnLaw

Involving harding , ClaraShk +1 other

calendar icon

Original post on March 14, 2025 23:58 UTC

cyclic icon

Last reply on August 1, 2025 15:50 UTC

delvingbitcoin

The complexity of managing and mitigating channel jamming within the Lightning Network, particularly through economic and protocol measures, presents both challenges and innovative solutions. A detailed analysis reveals that executing a jamming attack is relatively low-cost, especially when leveraging small payments to exploit the maximum number of accepted Hashed Time-Locked Contracts (HTLCs).

Fingerprinting nodes via addr requests

11 replies

By xBC

Involving CryptiQ , mzumsande +3 others

calendar icon

Original post on June 23, 2025 13:31 UTC

cyclic icon

Last reply on August 1, 2025 10:41 UTC

delvingbitcoin

The discourse surrounding the removal or modification of timestamps in network communications, particularly within the Bitcoin blockchain's peer-to-peer (P2P) protocols, underscores a multifaceted challenge in enhancing privacy and security. The primary concern revolves around the potential for synchronized patterns across batches of addresses due to their collective timestamping, which could lead to these addresses being marked as "Terrible" and filtered out simultaneously.

Bitcoin Logo

TLDR

Join Our Newsletter

We’ll email you summaries of the latest discussions from high signal bitcoin sources, like bitcoin-dev, lightning-dev, and Delving Bitcoin.

Explore all Products

ChatBTC imageBitcoin searchBitcoin TranscriptsSaving SatoshiDecoding BitcoinWarnet
Built with 🧡 by the Bitcoin Dev Project
View our public visitor count

We'd love to hear your feedback on this project.

Give Feedback