Your daily summary

Pieter Wuille's analysis underscores the critical role of the ValidationCache class in Bitcoin Core, emphasizing the balance between efficiency and adaptability through the use of signature and script validation caches. These caches expedite transaction validation by utilizing validation flags to match current consensus rules, though they face limitations with the advent of softforks which necessitate updates to maintain cache utility and network integrity source.

Antoine Riard proposes enhancements to the Bitcoin transaction-relay protocol to address security and efficiency concerns, recommending the enforcement of a strict message exchange sequence and introducing a new versioning system. These improvements aim to mitigate vulnerabilities like Denial-of-Service (DoS) attacks and privacy issues in transaction propagation, highlighting the significance of evolving the protocol to safeguard the network source.

David A. Harding discusses the challenges of implementing standardness rules within BIP385, focusing on accommodating transactions that exceed size limits through alternative methods without central coordination. His communication addresses the need for flexible solutions to support diverse transaction types within Bitcoin Core, advocating for adjustments in local verification processes to bypass conventional limitations source.

The dialogue shared by ClaraShk and ariard delves into the calculation of network reputation and the critique of Miner Extracted Value (MEV), respectively. ClaraShk outlines a Python-based methodology to assess reputation changes, emphasizing strategies for overcoming network attacks. In contrast, ariard critically examines MEV within the Ethereum and Bitcoin ecosystems, questioning the clarity and practical application of MEV concepts and advocating for simpler, more transparent contract designs and technological solutions to address MEV-related challenges ClaraShk's source and ariard's source.

Filter by List

Active Discussions 🔥

12 replies

Authored by

Agustin Cruz

Involving

Dustin Ray, Hunter Beast+1 other

  • The QRAMP targets quantum threats to Bitcoin, mandating a shift to quantum-resistant addresses.
  • It sets a strict timeline for migration, balancing risks like fund loss against quantum attacks.
  • The proposal details are open for review on GitHub, inviting community feedback for improvements.

10 replies

Authored by

Antoine Poinsot

Involving

Antoine Riard, Chris Stewart+3 others

  • The community addresses Bitcoin protocol vulnerabilities, inspired by Corallo's 2019 proposal.
  • Revised proposal includes updates for security, such as countering timewarp attacks and improving merkle tree integrity.
  • A draft BIP is being developed to detail these changes, aiming to enhance Bitcoin's network security.

6 replies

Authored by

Hunter Beast

Involving

Dustin Ray, Jonas Nick+1 other

  • The Bitcoin Development Community is refining the BIP-360 proposal for post-quantum security.
  • BIP-360 now excludes SQIsign in favor of algorithms like FALCON that allow efficient signature aggregation.
  • They seek more feedback on multisig configurations and emphasize using NIST-approved algorithms for FIPS compliance.

48 replies

Authored by

sipa

Involving

stefanwouldgo, Lagrang3+4 others

  • Optimizing transaction clusters in cryptocurrency is crucial for effective processing.
  • Advanced strategies and algorithms aim at efficiently sorting transactions by fee rate.
  • Implementation diverges from theory but incorporates key methods to minimize search space.

28 replies

Authored by

halseth

Involving

AdamISZ, MattCorallo+3 others

  • The proposal introduces a privacy-enhancing extension for the taproot gossip protocol using ZK-proofs.
  • It adds a new `channel_announcement_2` message type and suggests periodic refresh of channel announcements.
  • Documentation and a proof-of-concept in Rust detail the implementation and invite feedback on the approach.

12 replies

Authored by

t-bast

Involving

harding, morehouse+1 other

  • The proposal aims to improve mobile wallets in cryptocurrency with zero-fee commitments.
  • It addresses risks and operational challenges unique to mobile wallet security and fund safety.
  • Feedback and community consensus are sought to formalize these improvements in a bLIP.

Today in Bitcoin/LN History

17 replies

Posted February 25, 2017 23:55 UTC

Authored by

shaolinfry

Involving

Eric Voskuil, David Vorick+8 others

  • Current soft fork activation relies on hash power, facing limitations and "upgrade inertia."
  • Proposed "flag day activation" offers future enforcement without miner veto issues.
  • Combining user-activated with BIP9 offers dual activation pathways, enhancing flexibility.

5 replies

Posted April 27, 2017 01:19 UTC

Authored by

Rusty Russell

Involving

ZmnSCPxj

  • ZmnSCPxj's solution addresses transaction malleability by creating a revocable output with a secret revocation key.
  • The solution allows controlled access to Bitcoin after a set period, preventing unauthorized coin claims.
  • Rusty suggests using Tadge's watchers for DoS attack prevention, despite potential malleation challenges.

delvingbitcoin

Workgroup lifecycle

7 replies

Posted February 22, 2024 05:53 UTC

Authored by

ajtowns

Involving

MentalNomad, ariard+1 other

  • The cluster mempool working group was initiated in November 2023 to manage technical discussions.
  • By November 30, the group's discussions were made publicly readable to inform a broader audience.
  • The project concluded as it transitioned to Bitcoin Core 28.0, with discussions made fully accessible and tagged for future reference.

All Activity

10 replies

Posted February 23, 2025 22:35 UTC

Authored by

Antoine Poinsot

Involving

Murch, Antoine Riard+3 others

The discussion primarily centers around the advancements in the validation times of Bitcoin blocks, highlighting a significant improvement achieved through the implementation of new rules. This improvement is evidenced by a reduction in the worst-case scenario for block validation times by a factor of 40, which represents a considerable advancement in the efficiency of block validation within the Bitcoin network.


6 replies

Posted February 23, 2025 20:58 UTC

Authored by

Hunter Beast

Involving

Dustin Ray, Matt Corallo+1 other

The discourse initiated by Matt Corallo on the BIP 360 proposal delves into the integration of post-quantum cryptographic mechanisms within Bitcoin, emphasizing the challenges and considerations of implementing such advanced security measures. The discussion begins with an examination of selective disclosure in BIP 360, highlighting the potential vulnerability to quantum attacks due to the proposal's reliance on revealing public keys and signatures for spending.


4 replies

Posted February 23, 2025 08:37 UTC

Authored by

ajtowns

Involving

AntoineP , ariard +1 other

The dialogue surrounding the Bitcoin Core user base reveals insights into the diverse motivations and technical preferences of its users, ranging from those driven by a cypherpunk ethos to individuals fascinated by the software's technical intricacies. This discussion not only sheds light on the operating systems preferred by these users but also touches on their engagement levels with bitcoind, from daily interactions to more sporadic use.


10 replies

Posted February 22, 2025 03:08 UTC

Authored by

carla

Involving

ProofOfKeags , morehouse +2 others

The comprehensive analysis focuses on the mechanisms of reputation management within networks susceptible to jamming attacks, specifically examining how fluctuations in an attacker's reputation, influenced by variations in target node's incoming revenue and randomness of endorsed payments, affect network security. It elaborates on the strategies attackers may employ to manipulate their reputation through sending maximum amount endorsable payments post-reputation build-up and alternating between successful and failed jamming attempts.


5 replies

Posted February 21, 2025 23:58 UTC

Authored by

MattCorallo

Involving

ajtowns , ariard +2 others

The conversation delves into the nuanced domain of Maximal Extractable Value (MEV) and its sophisticated counterpart known as MEVil, highlighting the latter's reliance on advanced financial strategies reminiscent of those utilized by high-frequency trading firms. This includes a deep understanding of smart contracts on the Bitcoin blockchain and access to significant liquidity for exploiting transaction sequencing opportunities that demand an intricate comprehension of the domain.


8 replies

Posted February 21, 2025 20:04 UTC

Authored by

cryptoquick

Involving

conduition , xfffffffa +2 others

The discourse pivots around a preemptive strategy to fortify Bitcoin against the potential threats posed by quantum computing, underscoring an innovative solution that operates alongside the existing blockchain infrastructure. This proposed system is akin to the Lightning Network in its parallel operation but distinctively aims at transitioning into a new foundational layer if quantum advancements threaten the original blockchain’s integrity.


12 replies

Posted February 21, 2025 15:06 UTC

Authored by

tbast

Involving

harding , morehouse +2 others

The discussion engages with the complexities of managing transaction fees for Hashed Time-Locked Contracts (HTLCs) within the Lightning Network, focusing particularly on the interaction between mobile wallets and Lightning Service Providers (LSPs). It debates the merits of allowing LSPs to set transaction fees due to their continuous online presence and thus more accurate assessment of fee rates compared to mobile wallet users.


48 replies

Posted February 21, 2025 13:25 UTC

Authored by

sipa

Involving

hebasto , lorbax +4 others

The intricate process of optimizing transaction clusters within cryptocurrency networks, specifically through efficient linearization algorithms, underscores the importance of sorting transactions based on fee rates while ensuring adherence to their topological order. These algorithms, crucial for the effective processing of transactions, particularly in larger clusters, may incorporate post-processing steps to refine outcomes.


28 replies

Posted February 20, 2025 16:04 UTC

Authored by

halseth

Involving

sanket , roasbeef +4 others

The email exchange delves into a novel approach aimed at enhancing privacy within the Lightning Network through an extension of the taproot gossip protocol. This method leverages Utreexo and zero-knowledge proofs (ZK-proofs) to allow channels to conceal their outpoint, offering a significant leap towards ensuring user privacy.


12 replies

Posted February 19, 2025 22:05 UTC

Authored by

Agustin Cruz

Involving

Dustin Ray, Hunter Beast+1 other

The ongoing discourse within the Bitcoin development community has highlighted a critical juncture faced by the blockchain technology, particularly concerning its vulnerability to quantum computing threats. The discourse encompasses various perspectives and proposals aimed at safeguarding the integrity and security of Bitcoin against these emerging technological threats.


2 replies

Posted February 19, 2025 18:20 UTC

Authored by

John

Involving

Eric Voskuil, Pieter Wuille

Bitcoin Core's approach to transaction validation emphasizes efficiency and security, employing a signature validation cache and a script validation cache as outlined by Eric Voskuil. These caches facilitate the process by which transactions that have already been verified in the mempool do not require full re-validation when they are subsequently included in a block.


Posted February 19, 2025 03:36 UTC

Authored by

Antoine Riard

The ongoing efforts to enhance the Bitcoin transaction-relay protocol among full nodes have led to the proposal of two draft Bitcoin Improvement Proposals (BIPs). These proposals aim at addressing various issues inherent in the current protocol, which has largely remained unchanged since Bitcoin's inception.


2 replies

Posted February 19, 2025 02:29 UTC

Authored by

Jose Storopoli

Involving

Martin Habovštiak, David A. Harding

The communication delves into the development and application of the Bitcoin Output Script Descriptor (BOSD), a new specification designed to enhance the on-chain withdrawal process for Bitcoin Layer 2 (L2) solutions. BOSD aims to ensure that withdrawal outputs are standard by construction, removing the need for L2 solutions to implement separate rules for transaction compliance with the Bitcoin network's standardness requirements.


2 replies

Posted February 18, 2025 20:36 UTC

Authored by

xBC

Involving

glozow

The recent analysis of network activity has unveiled a significant volume of transaction removals across all nodes, with a spotlight on the data from node alice on September 14, 2024. This particular node experienced an unusually high rate of orphan transaction removals, suggesting an orchestrated attempt to flood the network with these transactions.


1 reply

Posted February 16, 2025 21:49 UTC

Authored by

ajtowns

Involving

ariard

The discourse on achieving consensus within the Bitcoin community highlights a critical challenge: fostering agreement on covenant and contract primitives. This issue is notably compounded by the diverse approaches to designing these primitives, driven by specific use-cases.


Posted February 16, 2025 11:31 UTC

Authored by

/dev /fd0

Pythcoiner recently shared insights on Twitter regarding the rust implementation of joinstr, a library aimed at facilitating the development of applications for coinjoin. This tool is currently in an experimental phase, with efforts underway to construct bindings.


Posted February 14, 2025 07:38 UTC

Authored by

ajtowns

Bitcoin Inquisition 28.1, a new release integrating features from Bitcoin Core 28.1, is now available for download at this GitHub link. This version not only continues to support TRUC, anchor relay, and full replace by fee behavior as established in Bitcoin Core 28.0 but also introduces backported support for ephemeral dust.


12 replies

Posted February 13, 2025 15:42 UTC

Authored by

Yuval Kogman

Involving

Sjors Provoost, waxwing/ AdamISZ+2 others

In a comprehensive examination of the cryptocurrency mixing services provided by Wasabi and other coinjoin implementations, Yuval Kogman presents a detailed critique of their vulnerabilities and the potential for deanonymization. Kogman, leveraging his expertise in the development of the joinstr protocol and contributions to Wasabi, highlights the limitations and misconceptions surrounding these services.


5 replies

Posted February 12, 2025 15:17 UTC

Authored by

joostjager

Involving

cguida , MattCorallo +2 others

The discourse surrounding the Lightning Network (LN) delves into the intricacies of pathfinding, probing practices, and the concept of High Availability (HA) nodes, underscoring the network's pursuit of optimal reliability in payment success rates. It emerges that while pathfinding is not currently seen as a significant hindrance to payment success, it presents challenges for specific sender groups.


Posted February 12, 2025 14:55 UTC

Authored by

jsarenik

The latest innovation in block hash shortening presents a practical application for naming time-sensitive entries, introducing two distinct codes: the "shortened kode" (sk) and the "anecdotal kode" (ak). These codes are designed to offer an efficient way of managing block hashes, with a live demonstration available at anyone.eu.org/niceblack.txt.


5 replies

Posted February 10, 2025 20:10 UTC

Authored by

josh

Involving

jsarenik , sipa +1 other

The innovative tool designed to avoid the creation of new Unspent Transaction Outputs (UTXOs) in Bitcoin transactions has been developed with the intention of minimizing blockchain bloat and reducing transaction costs. By generating a specific address that reveals an inscription when spent, and which can be spent by anyone, this tool leverages mempool.space webhook for listening to payments directed to this address.


8 replies

Posted February 10, 2025 16:12 UTC

Authored by

olkurbatov

Involving

harding , ajtowns +3 others

The email discussions delve into the complexities of employing probabilistic Hashed Time-Locked Contracts (HTLCs) within the Lightning Network, cryptographic transaction protocols, and enhancing privacy through innovative cryptographic operations. The discourse spans across the feasibility of using probabilistic HTLCs for not just small, but potentially significant values under specific conditions, emphasizing the importance of technological advancements in improving transaction efficiency and security.

Probabilistic HTLCs are posited as a potential game-changer for facilitating microtransactions on the Lightning Network by introducing a model where payments are made with a low probability but compensate with higher value.


70 replies

Posted February 9, 2025 18:29 UTC

Authored by

AntoineP

Involving

bytes , sjors +13 others

The Great Consensus Cleanup proposal by Matt Corallo offers a comprehensive review of Bitcoin's protocol, pinpointing vulnerabilities and inefficiencies that could be improved to enhance the network's security and performance. A key issue identified is the timewarp vulnerability in Bitcoin's mining difficulty adjustment mechanism, which poses a risk to network stability and security.


18 replies

Posted February 9, 2025 16:48 UTC

Authored by

zawy

Involving

ProofOfKeags , harding +6 others

The simulator developed by the programmer, available on GitHub, introduces a refined approach to simulating blockchain network behavior, specifically focusing on latency and cohort calculation improvements over previous models. The simulator's capability to distribute nodes randomly and compute distances accurately on a spherical surface allows for a more precise simulation of propagation latencies between nodes, a key factor in blockchain operations.


13 replies

Posted February 8, 2025 04:02 UTC

Authored by

tbast

Involving

instagibbs , ariard +5 others

In the complex landscape of blockchain and cryptocurrency transactions, particularly within the Lightning Network, discussions around security, efficiency, and the management of transaction fees take precedence. These conversations delve into the technicalities of ephemeral anchor outputs in lightning commitment transactions, focusing on the handling of dust HTLCs (Hash Time-Locked Contracts) and the strategic implications of each potential approach to managing these outputs.


1 reply

Posted February 7, 2025 20:20 UTC

Authored by

sipa

Involving

sipa

The recent advancements in cluster linearization algorithms have led to the development of a new approach known as the spanning-forest cluster linearization algorithm. This method is being considered for integration into Bitcoin Core as it shows potential in providing more efficient transaction processing by optimizing the way transactions are ordered.


Posted February 6, 2025 16:08 UTC

Authored by

jsarenik

The information provided highlights the availability and functionality of a particular Bitcoin faucet, which can be accessed through multiple URLs: https://alt.signetfaucet.com, https://signetfaucet.bublina.eu.org, and https://signet25.bublina.eu.org. This faucet predominantly dispenses the smallest amount of satoshis (sats) per transaction size (vsize), with occasional payouts that appear on Mempool.space as having a fee-rate slightly higher than previous ones by 0.9 sat/vB.


Posted February 5, 2025 21:36 UTC

Authored by

sr-gi

The blog post explores the intricacies of optimizing network bandwidth utilization in transaction relaying through the Erlay protocol. At the heart of this study is the concept that the efficiency of transaction propagation can be significantly enhanced by adjusting the fanout rate based on the transaction's stage within the propagation process.


21 replies

Posted February 5, 2025 04:51 UTC

Authored by

xBC

Involving

CryptiQ , sipa +6 others

The exploration into optimizing blockchain transactions, particularly within the Bitcoin network, reveals a multifaceted approach to enhancing data transfer efficiency and robustness. The application of FIBRE (Fast Internet Bitcoin Relay Engine) in a decentralized model presents a notable effort to circumvent delays attributed to TCP retransmissions by leveraging UDP for transaction data dissemination.


2 replies

Posted February 4, 2025 21:39 UTC

Authored by

Peter Todd

Involving

ArmchairCryptologist

The debate centers on the question of whether expiration-based mempool eviction is still relevant or beneficial within the Bitcoin network, highlighting a series of technical and philosophical concerns. Observations indicate that despite transactions lingering unconfirmed for extended periods, they are eventually processed without being exploited, prompting a reevaluation of the need for a mechanism that adds to computational and bandwidth overhead by repeatedly evicting and then re-accepting these transactions.


Posted February 4, 2025 19:21 UTC

Authored by

sr-gi

This post elaborates on the experiments conducted as part of implementing Erlay, a protocol aimed at enhancing Bitcoin's network efficiency. The primary thesis posits that for Erlay to function optimally, it necessitates a certain extent of transaction fanout - a method ensuring a quick and wide-reaching transaction dissemination among peers.


7 replies

Posted February 4, 2025 13:01 UTC

Authored by

morehouse

Involving

instagibbs , ajtowns +2 others

The conversation delves into the technical aspects of managing commitment transactions within blockchain technology, focusing specifically on the Lightning Network and its use of Hashed Time-Locked Contracts (HTLCs) and Point Time-Locked Contracts (PTLCs). This discussion is pivotal for understanding the intricacies involved in ensuring secure and efficient transactions between parties.


5 replies

Posted February 3, 2025 19:42 UTC

Authored by

Greg Tonoski

Involving

Sjors Provoost, Murch

The recent discussions on the Bitcoin Development Mailing List have brought several key topics to light, particularly focusing on the optimization and management of system resources like bandwidth and CPU in the context of Bitcoin's operational efficiency. The conversation underscored the importance of these resources in maintaining the scalability, speed, and reliability of Bitcoin transactions and operations.


Posted February 3, 2025 19:11 UTC

Authored by

Murch

The process of updating the Bitcoin Improvement Proposal (BIP) procedure has seen significant progress, as detailed by a developer who has been diligently working on refining the proposal. Initially, the work on the update was carried out privately in a personal repository for several months before transitioning to a more public phase with the opening of a pull request in the official BIPs Repository during early December.


Posted February 3, 2025 15:57 UTC

Authored by

sr-gi

The Erlay implementation experiments provide an insightful look into the efficiency of transaction relay processes in Bitcoin's network. The main focus is on how and when to select peers for the fanout during transaction relaying, which plays a crucial role in optimizing network resources while maintaining robustness against information delay and loss.


Posted January 31, 2025 21:15 UTC

Authored by

sr-gi

The development of Erlay for Bitcoin Core represents a significant stride towards optimizing the efficiency of transaction propagation within the Bitcoin P2P network. The core objective of Erlay is to minimize the bandwidth consumption that occurs when transactions are announced between peers.


35 replies

Posted January 31, 2025 11:12 UTC

Authored by

sjors

Involving

zawy , AntoineP +5 others

The discussion encompasses the intricacies of handling timestamps in blockchain technology, particularly focusing on the potential vulnerabilities and the strategies to mitigate them. A critical aspect under scrutiny is the handling of nTime in blockchain mining, emphasizing its implications for security and network integrity.


Posted January 29, 2025 18:02 UTC

Authored by

morehouse

The Lightning Development Kit (LDK) version 0.1 and earlier was found to be vulnerable to a specific griefing attack that could force the closure of a victim's channels. This issue was addressed in LDK version 0.1.1, with the update available on GitHub.


2 replies

Posted January 28, 2025 17:34 UTC

Authored by

Erik Aronesty

Involving

Eric Voskuil

In a recent discussion on the Bitcoin Development Mailing List, a novel proposal was introduced by Eric Voskuil regarding the potential implementation of UTXO checkpoint transactions within the Bitcoin network. The primary aim of this suggestion is to enhance the synchronization process for extremely lightweight nodes, which could significantly benefit from an expedited syncing mechanism without the need to rely heavily on traditional methods that demand considerable resources and time.

The proposed mechanism involves the submission of a unique transaction type that incorporates a substantial fee alongside a hash of the current UTXO (Unspent Transaction Output) set, paired with the block height as an opcode parameter.


2 replies

Posted January 27, 2025 23:01 UTC

Authored by

Antoine Riard

Involving

David A. Harding

The discussion revolves around a specific type of cyber attack targeting the Bitcoin network, known as "Transaction Traffic Hijack" or more technically, a variant of replacement cycling attacks. These attacks aim to manipulate Bitcoin's transaction flows, particularly exploiting the fee bump mechanism to hijack transaction traffic.


Posted January 27, 2025 15:38 UTC

Authored by

ariard

In recent developments within the cryptocurrency security domain, a significant vulnerability was identified and tested against Bitcoin Core's 26.0 branch, highlighting concerns regarding the replace-by-fee mechanism and its implications for the security integrity of Lightning channels. This vulnerability, initially disclosed on October 16, 2023, has sparked considerable attention among cryptocurrency experts and analysts, including Peter Todd, who have noted that replacement cycling attacks pose a real threat to the stability and reliability of miners' block templates.

The essence of these attacks lies in their ability to manipulate transaction replacements in a way that compromises the miners' ability to create valid and secure block templates, a critical component in the blockchain's operation.


8 replies

Posted January 26, 2025 13:47 UTC

Authored by

reardencode

Involving

Greg Sanders , jamesob +1 other

The discourse centers on the advancement of Bitcoin's transaction validation processes, particularly emphasizing the differentiation between hash types suitable for signature verification and those for simple comparison checks. This distinction has led to a proposal aiming to refine the implementation of ANYPREVOUT/NOINPUT hash styles, crucial for creating covenants and enabling dynamic binding capabilities within the Bitcoin protocol.


4 replies

Posted January 25, 2025 22:40 UTC

Authored by

moonsettler

Involving

AntoineP , moonsettler

The discourse begins with technical considerations related to a proposed change in the Bitcoin Core project, specifically focusing on the type used for script flags. A suggestion is made to improve readability and possibly enhance code maintainability by renaming flags_t to ScriptFlags, along with a reference to a commit on GitHub (view the commit).


Posted January 23, 2025 16:08 UTC

Authored by

morehouse

The blog post discusses a significant vulnerability in the Lightning Development Kit (LDK) version 0.0.125 and below, which affects anchor channels through a liquidity griefing attack. This attack makes funds unrecoverable unless a valid claim transaction is manually constructed and broadcasted.


31 replies

Posted January 17, 2025 19:46 UTC

Authored by

salvatoshi

Involving

sipa , josibake +7 others

The conversation around the creation and validation of NUMS key generators, as well as their integration into cryptographic protocols and Bitcoin Improvement Proposals (BIPs), highlights an evolving landscape in cryptocurrency technologies. The effort to develop a NUMS key generator and validator, following the method proposed in BIP-0341 where the resultant key is expressed as H + r*G, showcases a sophisticated approach to enhancing security and privacy within the Bitcoin network.


Posted January 17, 2025 14:54 UTC

Authored by

Andrew Toth

The email provides details on a Bitcoin Improvement Proposal (BIP) draft that introduces an innovative approach to generating provably unspendable keys through the use of a taproot internal key. This method leverages a descriptor to deterministically create a key that, while verifiable as unspendable by all participants, remains concealed from external observers.


5 replies

Posted January 17, 2025 14:53 UTC

Authored by

Sjors Provoost

Involving

Kalle Rosenbaum, Salvatore Ingala+1 other

The recent exchanges on the Bitcoin Development Mailing List bring to light several key discussions and updates regarding the Partially Signed Bitcoin Transaction (PSBT) protocol, specifically its version 2 (PSBTv2). Notably, PSBTv2 is essential for implementing silent payments through BIP375 by employing the PSBT_OUT_SCRIPT field.


6 replies

Posted January 16, 2025 18:43 UTC

Authored by

ismaelsadeeq

Involving

everythingSats , xBC +1 other

The recent scrutiny of F2Pool's block weight statistics unveiled discrepancies likely stemming from a mix-up in compiling data, leading to confusion between the minimum block weight and coinbase weight. A detailed examination pointed towards an anomaly in F2Pool's management of block weights, particularly after the introduction of a Bitcoin Core update GitHub that established a minimal reserved block weight.


10 replies

Posted January 16, 2025 12:32 UTC

Authored by

/dev /fd

Involving

moonsettler, Ethan Heilman

In the realm of Bitcoin development, a series of discussions and exchanges have unfolded on the Bitcoin Development Mailing List, revealing a vibrant collaborative effort aimed at refining and enhancing the functionality and efficiency of Bitcoin. A focal point of these discussions has been the evaluation and potential implementation of various proposals and opcodes designed to optimize Bitcoin contracts, including Resumeable LN channels, Multi-party LN channels, Vaults, and more.


3 replies

Posted January 15, 2025 23:37 UTC

Authored by

cooltexture

Involving

sjors , GaloisField2718

The discussion addresses the complexities of managing blockchain data storage, with a focus on the Bitcoin network. It explores the technical challenges associated with data pruning, particularly the removal of witness data from blocks once their validity is confirmed.


16 replies

Posted January 14, 2025 14:38 UTC

Authored by

instagibbs

Involving

JeremyRubin, cguida+9 others

The discussion encompasses various technical strategies aimed at enhancing the efficiency and security of blockchain transactions, particularly within Bitcoin's framework and related protocols. A significant focus is placed on optimizing transaction settlement times and introducing mechanisms to enforce contract conditions and state continuity across transactions.

One proposal suggests integrating the settlement transaction directly into the last allowed update in a channel, specifically for scenarios involving two parties.


7 replies

Posted January 13, 2025 08:47 UTC

Authored by

ajtowns

Involving

ariard , MentalNomad +1 other

The shift towards a Working Groups model within the Bitcoin Core community represents a significant evolution in how projects are organized and reviewed, as seen with the implementation of the wg-cluster-mempool group. This new structure necessitates a reevaluation of the lifecycle of working groups to enhance accessibility and reduce entry barriers for interested parties.


2 replies

Posted January 10, 2025 00:46 UTC

Authored by

rustyrussell

Involving

ariard , ariard

The email discusses a dispute between two individuals deeply involved in the rust-lightning project, highlighting a broader conflict within the open-source community. On one side is a person who perceives himself as a benevolent dictator of the projects he contributes to, expecting obedience and silence from other contributors.


Posted January 9, 2025 19:02 UTC

Authored by

Ava Chow

Bitcoin Core version 28.1 has been released and is available for download from Bitcoin Core's official website or via BitTorrent with the provided magnet link. This update introduces new features, various bug fixes, performance improvements, and updated translations.


6 replies

Posted January 9, 2025 12:24 UTC

Authored by

developer

Involving

Luke Dashjr, Owen Kemeys+2 others

The recent discussions on the Bitcoin Development Mailing List have sparked significant interest in the potential for adjusting the way transactions are processed and confirmed within the Bitcoin network. A major focus of these conversations has been on the utilization of the "nLockTime" feature, which traditionally is set to zero, suggesting its innovative application could enhance the protocol's resilience against control and censorship by indicating a transaction's readiness for immediate block inclusion.


54 replies

Posted January 9, 2025 11:16 UTC

Authored by

Fi

Involving

plebhash , marathongary +3 others

The complexity of implementing the share index and returning it to miners has been identified as a significant challenge, particularly due to the difficulty in ensuring both correctness and efficiency. The primary concern revolves around the necessity of this feature, especially when its main utility, preventing dishonesty about share indexes in slices, might be redundant given that the path provides sufficient information to determine the index of a leaf.


34 replies

Posted January 8, 2025 19:26 UTC

Authored by

EthnTuttle

Involving

davidcaseria , bytes +8 others

Exploring the future of cryptocurrency mining and payouts, a comprehensive discussion unfolds around the implementation of innovative protocols and systems designed to enhance the efficiency, security, and fairness of mining operations. At the core of this exploration is the development of mechanisms that facilitate the authentication of mining efforts and the distribution of rewards in a manner that addresses both current challenges and anticipates future needs within the digital currency space.

One significant proposal focuses on integrating the Blind Diffie-Hellman key exchange mechanism into the Stratum v2 Protocol as an extension, aiming to improve privacy and auditability, especially for small payouts.


6 replies

Posted January 8, 2025 00:15 UTC

Authored by

instagibbs

Involving

ariard, cdecker +3 others

The discourse around blockchain security, specifically within the context of channel finalization delays and potential attacks, sheds light on several sophisticated strategies employed by attackers and the countermeasures that can be implemented to mitigate these threats. A notable concern highlighted is the vulnerability to attacks where an attacker deliberately publishes outdated state updates to disrupt the settlement process.


11 replies

Posted January 7, 2025 13:40 UTC

Authored by

mcelrath

Involving

evoskuil , harding +4 others

The email discussions delve into the intricacies of managing transactions within decentralized networks, specifically focusing on Braidpool's approach to transaction handling and block template generation. The primary aim is to enhance block validation and transmission efficiency by adopting a deterministic block template strategy, which eliminates redundancies in the transaction validation process.


2 replies

Posted January 7, 2025 01:07 UTC

Authored by

ademan

Involving

instagibbs, ariard

The concept of a "punishable Eltoo" in multi-party settings has been previously explored by Lloyd Fournier and others, focusing on enhancing the Eltoo protocol with mechanisms that penalize dishonest behavior while aiming for a trustless design. This approach attempts to tackle the challenges inherent in multi-party constructions across the Bitcoin network, regardless of the security model employed.


Posted January 6, 2025 20:20 UTC

Authored by

mcelrath

The challenge revolves around developing specific covenant proposals to manage transactions within a Bitcoin mining pool constructively and securely. The primary objective is to utilize a covenant-based solution to ensure accurate and theft-proof payouts without requiring custody, aligning with a "can't-be-evil" philosophy.


7 replies

Posted January 5, 2025 09:34 UTC

Authored by

instagibbs

Involving

JeremyRubin , cguida +3 others

The concept of singletons and their application in blockchain technology presents a fascinating exploration into enhancing transactional integrity and efficiency. The notion, as discussed by @rijndael, revolves around the implementation of CAT (Chia Asset Token) in creating a standard token ecosystem, where the singleton emerges as a crucial element when the token aspects are stripped away.


11 replies

Posted January 4, 2025 15:51 UTC

Authored by

JeremyRubin

Involving

harding , ariard +3 others

The dynamic nature of Bitcoin and cryptocurrency innovation is marked by the frequent introduction and discontinuation of products. Each year, numerous Bitcoin-related products are launched with the hope of securing a sustainable user base, while others are phased out due to insufficient support.


10 replies

Posted January 3, 2025 21:44 UTC

Authored by

moonsettler

Involving

ProofOfKeags , harding +4 others

The discourse on programming, particularly in the context of Bitcoin's development, reflects a nuanced understanding of the balance between expressiveness and safety. The comparison between Bitcoin and Ethereum serves as a cautionary tale; Ethereum's maximally expressive contracts come with their own set of challenges, prompting a more measured approach for Bitcoin.


19 replies

Posted January 3, 2025 08:27 UTC

Authored by

ajtowns

Involving

bytes , AdamISZ +5 others

The effectiveness and utility of statistics in soft fork testing, particularly concerning signet bots and their impact on OP_CAT supporters advocating for mainnet activation, form a central theme in recent discussions among developers. The Bitcoin Wiki serves as a platform where various rationales and examples are cited, highlighting the divide in community opinion regarding the implementation strategies of soft forks.


Posted January 2, 2025 23:23 UTC

Authored by

ajtowns

The data provided highlights the trajectory of daily logged-in user visits to the delving website over a two-year period, specifically from January 2023 to December 2024. The figures show a progressive increase in site traffic, starting with 22 visits in January 2023 and experiencing significant growth to reach 1315 visits by December 2024.


11 replies

Posted January 2, 2025 00:43 UTC

Authored by

Matt Corallo

Involving

Luke Dashjr, Weikeng Chen+6 others

The ongoing discussions among Bitcoin developers about enhancing the network's security against potential quantum computing threats have shed light on various innovative proposals and considerations. One focal point is the challenge posed by post-quantum cryptography (PQC) and its integration into the Bitcoin protocol to safeguard against quantum attacks that could compromise cryptographic standards currently in place.


2 replies

Posted December 31, 2024 00:57 UTC

Authored by

stutxo

Involving

/dev /fd

The email delves into specific technical aspects of Bitcoin development, particularly focusing on the testing of packages and Pay-to-Address (P2A) functionality with the use of CHECKTEMPLATEVERIFY (CTV) on Signet. It highlights an issue identified in the README documentation concerning an incorrect example that involves an output value discrepancy.


2 replies

Posted December 30, 2024 15:15 UTC

Authored by

securitybrahh

Involving

HubertusVIE , moonsettler

The discussion sheds light on the critical challenges and potential pathways for Bitcoin and Monero in adapting to a future that might be influenced significantly by quantum computing. The narrative emphasizes that current cryptographic practices underpinning these cryptocurrencies, including Bitcoin's reliance on Taproot Schnorr signature aggregation and Monero's privacy and security mechanisms, are not inherently quantum-resistant.


Posted December 28, 2024 16:08 UTC

Authored by

Pioneer775

The Armenian Crypto Project (ARMCP) has emerged as a pivotal initiative aimed at integrating cryptocurrencies and blockchain technologies into the daily transactions of both private investors and large financial institutions. This project addresses two primary obstacles hindering the growth of cryptocurrencies: the absence of regulation and the complexities involved in their interaction with traditional financial systems.


Posted December 25, 2024 20:57 UTC

Authored by

moonsettler

In the ongoing discussions within the Bitcoin development community, there has been a notable emphasis on addressing challenges associated with working with CTV (CheckTemplateVerify), particularly in the realm of vaults. Developers have been exploring solutions to circumvent these issues, leading to propositions such as OP_TX and OP_TXHASH/VERIFY.


5 replies

Posted December 23, 2024 15:09 UTC

Authored by

Chris_Stewart_

Involving

bytes , harding +1 other

Soft forks within the Bitcoin network are designed with the intent to tighten existing rules, introducing a level of confiscation risk that can be subtle yet significant, affecting various stakeholders, especially miners. This risk is particularly evident in instances such as Bitmain's resistance to the Segregated Witness (SegWit) proposal, attributed to concerns over losing the benefits of covertly using ASICBoost technology.


2 replies

Posted December 21, 2024 23:03 UTC

Authored by

/dev /fd0

Involving

conduition

The discussion revolves around concerns and misconceptions regarding censorship resistance in ecash implementations, particularly with the Cashu protocol. The original assertion challenged the claim that all ecash implementations are inherently resistant to censorship, highlighting that specific mechanisms, such as P2PK (Pay to Public Key) and authentication processes, could potentially enable censorship of individual users.


2 replies

Posted December 19, 2024 20:00 UTC

Authored by

Anders

Involving

Michael Cassano

In an insightful exchange on the Bitcoin Development Mailing List, a significant concern was raised regarding the long-term sustainability of Bitcoin's difficulty adjustment mechanism amid observations of potential double exponential growth in the hash rate. This growth, if it continues, threatens to outpace the current mechanism designed to maintain a steady block time of approximately 10 minutes.


11 replies

Posted December 19, 2024 19:21 UTC

Authored by

JohnLaw

Involving

morehouse , harding +1 other

The revised paper, now available at https://github.com/JohnLaw2/ln-opr, introduces significant updates to the Offchain Payment Routing (OPR) protocol, focusing on speed and scalability enhancements while maintaining security analogues to the current Lightning protocol for small payments. By adhering to the protocol, parties aim to preserve their long-term reputation, which in turn prevents theft, illustrating a trust-based mechanism akin to traditional financial systems.


3 replies

Posted December 19, 2024 10:56 UTC

Authored by

Tim Ruffing

Involving

David A. Harding, Jonas Nick

Recent updates to a draft Bitcoin Improvement Proposal (BIP) have been shared, detailing numerous changes, improvements, and cleanups since its initial announcement. Significant amendments include fixing a security vulnerability concerning the CertEq signature not covering the entire message, adding blame functionality for identifying faulty parties with an investigation phase, making the threshold public key Taproot-safe by default, and allowing participants to encrypt the secret share intended for themselves.


2 replies

Posted December 18, 2024 12:47 UTC

Authored by

harding

Involving

ariard , everythingSats

The introduction of an upper limit on accepted feerate in the Lightning Development Kit (LDK) signifies a crucial advancement in addressing vulnerabilities associated with "irrevocable fees." This move, initiated in 2021, aimed to counter the risks posed by excessive trimmed HTLCs and dust HTLC exposure. By setting a cap on the feerate from a channel counterparty, LDK enables a more straightforward calculation of msat denominated worst-case scenarios for dust HTLCs exposure under various conditions.


16 replies

Posted December 17, 2024 12:54 UTC

Authored by

ajtowns

Involving

ZmnSCPxj , prozacchiwawa +6 others

The email discussion begins with a clarification on the use of the >s operator in programming, highlighting its application for checking lexicographical order among elements. The conversation then transitions into a playful suggestion for naming a new programming language "Thcript," which cleverly references both scripting capabilities and a nod to Lisp's syntactic characteristics.


2 replies

Posted December 16, 2024 13:14 UTC

Authored by

halseth

Involving

AdamISZ , salvatoshi

The discussion revolves around the utilization of OP_CAT and covenants within the context of blockchain technology, specifically focusing on their applications in creating vector commitments and executing protocols as arbitrary state machines across multiple Unspent Transaction Outputs (UTXOs). The usage of OP_CAT, although primarily for vector commitments that facilitate Merkle proof checking, highlights its interchangeable nature with other opcodes like OP_PAIRCOMMIT/VECTORCOMMIT.


3 replies

Posted December 14, 2024 17:51 UTC

Authored by

QbitsCode

Involving

cryptoquick , QbitsCode

The recent update to the repository has introduced significant enhancements to Bitcoin's security by integrating both cryptographic groups, Group 1 and Group 2, alongside updates to the PQC manager and the addition of suitable tests. This integration is aimed at bolstering Bitcoin's defenses against quantum computing threats.


2 replies

Posted December 13, 2024 17:16 UTC

Authored by

Bitcoin Error Log

Involving

George Burke, Michael Cassano

In a recent discourse within the Bitcoin development community, a novel proposal has been tabled that seeks to alter the conventional unit representation of Bitcoin. This proposition advocates for a radical departure from the current system, where one bitcoin is subdivided into 100 million base units (sats), each represented down to eight decimal places.


2 replies

Posted December 13, 2024 02:07 UTC

Authored by

Agustin Cruz

Involving

Jon Atack, Ian Quantum

The discourse on enhancing Bitcoin's security framework to counter the threats posed by advancements in quantum computing has been vibrant across various platforms, with significant contributions being made towards developing a Bitcoin Improvement Proposal (BIP) specifically designed to introduce quantum-resistant cryptographic measures into the Bitcoin protocol. This initiative is driven by the recognition of the potential vulnerabilities that quantum computing could exploit within the existing cryptographic foundations of Bitcoin.


7 replies

Posted December 11, 2024 15:11 UTC

Authored by

/dev /fd

Involving

Jonas Nick, Yuval Kogman+2 others

The email exchange primarily revolves around the clarification and critique of a misunderstood proposal regarding example scripts for Lightning Symmetry involving hypothetical opcodes not yet implemented, specifically OP_VAULT. Brandon, in his correspondence, emphasizes that his intention was to explore theoretical possibilities rather than present production-ready solutions.


99 replies

Posted December 10, 2024 22:37 UTC

Authored by

Ava Chow

Involving

LĂ©o Haf, Greg Tonoski+34 others

In the realm of Bitcoin development, discussions pertaining to the enhancement of the Bitcoin Improvement Proposal (BIP) process have been prominent. A key focus has been on addressing the current bottleneck in managing BIPs, emphasized by Luke Dashjr's acknowledgment of his limited capacity to actively maintain the BIPs repository.


1 reply

Posted December 9, 2024 15:11 UTC

Authored by

ariard

Involving

ariard

The recent discovery of vulnerabilities within Bitcoin's transaction-relay rules has sparked considerable debate and concern. A detailed report, which can be found at this link, offers an in-depth examination of the issues at hand, revealing their broad implications for a variety of Bitcoin applications, notably including the Lightning Network.


1 reply

Posted December 8, 2024 16:55 UTC

Authored by

sCryptts

Involving

40000bytes

The development of a smart contract that leverages OP_CAT for creating a sidechain covenant marks a significant leap in blockchain technology, offering a pathway to integrating sidechains with Bitcoin without the need for major protocol upgrades like those proposed in BIP300. This smart contract enables independent blockchains, or sidechains, to be pegged to Bitcoin, facilitating the transfer of BTC between the mainchain and these sidechains.


21 replies

Posted December 7, 2024 17:22 UTC

Authored by

jungly

Involving

marathongary , mcelrath +2 others

The discussion centers on the innovative approach to decentralized mining pools through Radpool, aiming to address the challenges posed by traditional centralized mining pools. Radpool's model involves a network of Mining Service Providers (MSPs) that decentralizes block template generation, offering a solution to combat centralization in the mining sector.


45 replies

Posted December 6, 2024 17:27 UTC

Authored by

AntoineP

Involving

instagibbs , andrewtoth +8 others

The recent discussions and analyses concerning blockchain synchronization processes, notably between Libbitcoin and Bitcoin Core, offer profound insights into the architectural and operational efficiencies intrinsic to different implementations. Eric Voskuil's comparison, which positions Libbitcoin's Initial Block Download (IBD) performance as significantly superior to that of Bitcoin Core—allegedly up to 15 times faster when utilizing options akin to -assumevalid—sheds light on the nuanced methodologies underpinning this enhanced capability.


14 replies

Posted December 6, 2024 14:31 UTC

Authored by

sjors

Involving

evoskuil , ajtowns +3 others

The discussion delves into the complexities of blockchain validation processes, particularly focusing on the challenges and potential strategies for managing blocks that are expensive or time-consuming to validate. A key point is the decision-making process miners undergo when presented with a new block, weighing whether to build upon it or continue mining on the previous tip based on its validity.


Posted December 5, 2024 17:48 UTC

Authored by

Antoine Riard

The report delves into a newly identified transaction-relay jamming attack targeting bitcoin time-sensitive contracting protocols, particularly affecting lightning channels. This attack exploits the transaction selection, announcement, and propagation mechanisms inherent in the base-layer full nodes of the Bitcoin network.


3 replies

Posted December 2, 2024 16:11 UTC

Authored by

ZmnSCPxj

Involving

renepickhardt , ZmnSCPxj

The discussion centers around the critical need for plugin software within the Lightning Network to independently monitor unilateral exits from channel factories on the blockchain. This requirement stems from the fact that even if the factory layer closes and channels are published directly on-chain, they can still operate independently.


6 replies

Posted December 1, 2024 19:36 UTC

Authored by

mpch

Involving

instagibbs , jonas +2 others

The conversation begins with a focus on the experimentation with replacement cycling using Warnet, delving into prior efforts and significant refactors led by Jonas. This exploration is rooted in Ariard's development of a replacement cycling example, detailed through GitHub links to Warnet Pull Request 422 and Warnet Pull Request 373.


;
Bitcoin Logo

TLDR

Join Our Newsletter

We’ll email you summaries of the latest discussions from authoritative bitcoin sources, like bitcoin-dev, lightning-dev, and Delving Bitcoin.

Explore all Products

ChatBTC imageBitcoin searchBitcoin TranscriptsSaving SatoshiBitcoin Transcripts Review
Built with 🧡 by the Bitcoin Dev Project
View our public visitor count

We'd love to hear your feedback on this project?

Give Feedback