Your daily summary

AdamISZ's blog post on Reyify introduces the concept of adaptor signatures, exploring their potential to extend beyond current cryptographic limitations. The post outlines a theoretical framework for using adaptor signatures in Zero-Knowledge Proof constructions, despite practical verification challenges. It proposes a protocol allowing verification of Discrete Logarithm Equality statements through BIP340 signatures, aiming to broaden adaptor signatures' application in cryptographic protocols.

MishaKomarov discusses the implementation of Bitcoin PIPEs (Polynomial Inner Product Encryption) as a method to enable covenants in Bitcoin without a soft fork, detailed in a research paper. This advancement allows for the creation of sophisticated spending conditions, supporting functionalities like Zero-Knowledge Proofs and native tokens, thereby enhancing Bitcoin's versatility and security without altering its core protocol.

AntoineP addresses the complexities of executing a chain fork using specific opcodes and the pivotal role of public key recovery, as analyzed in a thread on delvingbitcoin.org. The discussion highlights the challenges of mutual commitments between the scriptCode and the signature, suggesting alternative approaches to facilitate chain forks without relying on public key recovery mechanisms.

The release of Bitcoin Inquisition 28.0, as detailed on GitHub, incorporates significant protocol enhancements including TRUC and anchor relay mechanisms, and proposes consensus changes like OP_CHECKTEMPLATEVERIFY. This version, building on Bitcoin Core 28.0, aims to improve transaction handling and network security, indicating a pivotal development in Bitcoin's ongoing evolution.

Subscribe to our weekly newsletter

Get the latest updates on the community, upcoming topics, and new discussions in your inbox every week.

Filter by List

Active Discussions 🔥

5 replies

Authored by

Antoine Riard

Involving

Peter Todd, waxwing/ AdamISZ

  • Antoine advocates for "free-to-pwn" lightning nodes on mainnet to test cross-layer attacks.
  • He stresses the difference between testing on mainnet versus private networks for realistic outcomes.
  • The initiative aims to expose vulnerabilities and discuss the protocol's security transparently.

bitcoin-dev

OP_ZKP updates

4 replies

Authored by

Weiji Guo

Involving

Weikeng Chen

  • The OP_ZKP proposal seeks to integrate Zero-Knowledge Proofs (ZKPs) within Bitcoin transactions.
  • A need for a ZKP scheme meeting criteria like minimal security assumptions and batched verification is highlighted.
  • Future adoption considerations involve performance impacts on devices and exploring alternatives like Dory if issues persist.

Authored by

Niklas Goegge

  • Significant security vulnerabilities identified in Bitcoin Core versions before 25.0 are highlighted.
  • A new vulnerability disclosure policy aims to enhance transparency and security within the Bitcoin Core community.
  • Future communications will disclose vulnerabilities affecting versions before 26.0, emphasizing ongoing security efforts.

30 replies

Authored by

ZmnSCPxj

Involving

ariard, t-bast+2 others

  • The SuperScalar mechanism enhances Bitcoin Lightning Network liquidity without blockchain consensus changes.
  • It incorporates Decker-Wattenhofer mechanisms, timeout trees, and laddering for efficiency and security.
  • Practical deployment includes incentivizing user activity and optimizing tree structures for effective liquidity.

26 replies

Authored by

salvatoshi

Involving

AntoineP, josibake+5 others

  • The integration of miniscript and taproot in Bitcoin enhances wallet development, posing challenges with unspendable keys.
  • Generating unique, indistinguishable unspendable keys remains complex, despite multiple considered approaches.
  • Among proposals, using a root xpub with a random chaincode is preferable for hardware signers, though improvements are sought.

15 replies

Authored by

halseth

Involving

Adam Gibson, 1440000bytes+3 others

  • The `utxozkp` tool advances Lightning Network privacy by proving UTXO set inclusion in zero knowledge.
  • It aims for future enhancements including detailed UTXO data revelation, despite current limitations.
  • Performance metrics and open feedback invitation suggest ongoing development and collaboration opportunities.

Today in Bitcoin/LN History

14 replies

Posted October 13, 2021 19:16 UTC

Authored by

vjudeu

Involving

K, yanmaani+4 others

  • Bitcoin Core may stop working in 2038 due to a potential issue with time checking.
  • The entire chain will halt in 2106 when it reaches median time 0xffffffff.
  • There is uncertainty if a soft-fork can resolve these issues, affecting Bitcoin Core's future.

12 replies

Posted October 14, 2021 07:48 UTC

Authored by

Joost Jager

Involving

ZmnSCPxj, Owen Gunden

  • Lightning wallets use probes to find fees, temporarily locking up liquidity.
  • A new protocol message could allow for fee probing without locking liquidity.
  • Proposed changes may improve user experience but increase costs for honest users.

5 replies

Posted August 16, 2023 15:22 UTC

Authored by

jamesob

Involving

Ajian, CubicEarth+3 others

  • Bitcoin's scalability involves establishing 50,000 off-chain entities for wide-scale transactions.
  • Concepts like Utreexo optimize storage but don't fully solve centralization and scalability issues.
  • Effective Layer 2 protocols and security measures are essential for Bitcoin's scalability and integrity.

All Activity

Posted October 14, 2024 20:27 UTC

Authored by

MishaKomarov

Bitcoin PIPEs (Polynomial Inner Product Encryption) introduce a method for implementing covenants in Bitcoin without necessitating a soft fork, thereby enhancing Bitcoin's capabilities by allowing users to set specific conditions on how their coins can be spent in the future. This innovative approach enables advanced spending rules such as restricting coins to be spent only at certain addresses or after specific conditions are met, paving the way for new use cases like native verification of Zero-Knowledge Proofs (ZKPs), native tokens with complex behaviors, and restaking mechanisms to secure other networks.


15 replies

Posted October 14, 2024 13:03 UTC

Authored by

halseth

Involving

bytes , ajtowns +4 others

The recent updates to a specific repository have introduced significant enhancements in the verification of schnorr signatures within a Zero-Knowledge (ZK) environment for blockchain transactions. This development eliminates the need to blind public keys during the verification process, focusing on proving the validity of a signature associated with a public key in the Unspent Transaction Output (UTXO) set without revealing the key itself.


4 replies

Posted October 14, 2024 09:00 UTC

Authored by

Weiji Guo

Involving

Weikeng Chen

The recent updates in cryptographic solutions within the domain of open application circuits emphasize a shift towards recursive verification to streamline the process. This approach negates the requirement to publish each application circuit's verification key on-chain, opting instead for a singular circuit verified through recursion.


30 replies

Posted October 14, 2024 01:08 UTC

Authored by

ZmnSCPxj

Involving

cryptoquick , ariard +3 others

The discussion surrounding Block's development of SuperScalar and its implications for the Lightning Network and broader Bitcoin community reveals a complex interplay between technological innovation, open-source principles, and community norms. SuperScalar, initially a rudimentary system, evolved significantly with the integration of the Decker-Wattenhofer algorithm and laddered timeout trees, showcasing a commitment to advancing the scalability and security of cryptocurrency transactions.


4 replies

Posted October 12, 2024 09:22 UTC

Authored by

AntoineP

Involving

David Harding , ariard +1 other

The discussion delves into the intricacies of Bitcoin's scripting capabilities, specifically focusing on the potential to achieve outcomes similar to those facilitated by public key recovery without actually employing it. The conversation touches upon the utility of opcodes such as OP_PICK and OP_ROLL for manipulating or inspecting the stack within the scriptCode, suggesting alternative approaches to addressing script-related vulnerabilities.


5 replies

Posted October 12, 2024 04:46 UTC

Authored by

Antoine Riard

Involving

Peter Todd, waxwing/ AdamISZ

The conversation starts with the recognition of a need for clear, step-by-step instructions for volunteers interested in setting up new nodes, focusing on the use of current and default installations of Core/btcd along with lnd/cln/ldk. It delves into specifics such as the amount required in channels, the necessary number of channels, the relevance of channel types, volunteer interconnectivity, desired network topology, and the significance of network connectivity and Tor usage.


3 replies

Posted October 11, 2024 20:17 UTC

Authored by

ZmnSCPxj

Involving

ariard , bytes +1 other

The discussion around Bitcoin's development and the challenges in implementing consensus changes delves into the complexities beyond the technical aspects, such as halving cycles and market speculation. It suggests that the evolution and stabilization of Bitcoin are significantly influenced by broader factors, including real-world power dynamics and the roles of influential figures and financial stakeholders.


26 replies

Posted October 10, 2024 22:36 UTC

Authored by

salvatoshi

Involving

sipa , josibake +6 others

In the realm of cryptocurrency security, especially within Bitcoin's framework, the conversation about enhancing the functionality and security of Extended Public Keys (XPUBs) through various hashing methods is gaining attention. The goal is to devise a system that can derive chain code from XPUBs in a manner immune to the order in which they are applied, addressing issues related to wallet policies or descriptors' sequence and their behaviors in multi-signature setups.


Posted October 10, 2024 12:56 UTC

Authored by

ajtowns

The latest release, Bitcoin Inquisition 28.0, is now publicly accessible at the provided GitHub link, building upon the foundations of Bitcoin Core 28.0. This version introduces several significant enhancements including support for TRUC and anchor relay mechanisms while implementing a default full replace by fee behavior to optimize transaction handling.


6 replies

Posted October 10, 2024 09:03 UTC

Authored by

AntoineP

Involving

roasbeef , ariard +3 others

The recent publication detailing a vulnerability in the btcd framework has sparked a comprehensive discussion regarding the ethics and practices surrounding the disclosure of security vulnerabilities within software, especially those critical to the infrastructure of digital currencies like Bitcoin. A notable aspect of this discourse is the contrasting approaches to vulnerability disclosure timelines between various projects, with Google's Project Zero providing a structured timeline that differs significantly from the more conservative approach adopted by Bitcoin Core.


Posted October 9, 2024 19:30 UTC

Authored by

Niklas Goegge

The recent communication highlights significant security vulnerabilities identified in Bitcoin Core versions preceding 25.0, marking an important development for users and contributors alike. These vulnerabilities are meticulously documented and can be found through the provided links, which include detailed discussions on issues like mutated blocks hindering propagation, challenges with sending large inventories, and a specific vulnerability that could lead to a crash when processing block transactions.


Posted October 9, 2024 16:32 UTC

Authored by

waxwing/ AdamISZ

The blog post authored by AdamISZ/waxwing, available at Reyify, delves into the concept of adaptor signatures and their potential expansion beyond traditional limitations. The initial inquiry revolves around the utility of on-chain verification for statements not confined to the secp256k1 generator G. This question branches into two directions: the recognition of its usefulness for Zero-Knowledge Proof (ZKP) constructions and the acknowledgment of its current impracticality due to limitations in verification capabilities.

The core of the investigation examines if adaptor signatures could enable a form of verification that is not directly possible.


Posted October 7, 2024 20:25 UTC

Authored by

MishaKomarov

This post introduces Bitcoin PIPEs (Polynomial Inner Product Encryption), a groundbreaking approach to implementing covenants on Bitcoin without necessitating a soft fork. Covenants are mechanisms that enable users to set specific conditions on how their coins can be spent in the future, thereby unlocking advanced spending rules and new use cases such as the native verification of Zero-Knowledge Proofs, the creation of native tokens with complex behaviors, and restaking mechanisms to pool Bitcoin for securing other networks.


Posted October 7, 2024 12:16 UTC

Authored by

Dr. Craig S. Wrong

The project Swift Bitcoin, accessible through GitHub and its website, represents a significant effort by the creator to delve deeply into the inner workings of Bitcoin. Initially, it was conceived as a platform for the developer to enhance their understanding of Bitcoin's mechanics, focusing on the implementation of various Bitcoin Improvement Proposals (BIPs) using Swift, a favorite programming language of the developer.


2 replies

Posted October 5, 2024 15:57 UTC

Authored by

andyschroder

Involving

andyschroder

The discussion opens with the observation that in BOLT12 specifications, there is no human-readable prefix defined for invoices, leading to the proposal of using lni as a prefix. This suggestion is underscored by its current utilization in CLN's fetchinvoice and pay RPC commands, as detailed in their documentation.


Posted October 4, 2024 23:31 UTC

Authored by

Ava Chow

Bitcoin Core version 28.0 is now available for download from bitcoincore.org, introducing new features, several bug fixes, performance improvements, and updated translations. Users encountering bugs are encouraged to report them on the project's GitHub issue tracker at GitHub.


Posted October 4, 2024 06:45 UTC

Authored by

ajtowns

The integration of Plotly.js for graphing capabilities within a Discourse theme component represents a significant advancement in data visualization directly within forums or discussion platforms. This development enables users to create and interact with traditional XY plots using simple text markup, eliminating the need for external image generation.


3 replies

Posted September 28, 2024 02:28 UTC

Authored by

James Ferguson

Involving

Pieter Wuille, Keagan McClelland

In the realm of cryptocurrency, particularly Bitcoin, managing small, unspendable residual amounts known as dust is a challenge that impacts network efficiency, transaction fees, and privacy. The proposal titled "Keep the Change," which introduces the concept of "OP_KEEPCHANGE," aims to address these issues by crediting small residual Unspent Transaction Outputs (UTXOs) to the primary recipient’s address instead of generating new change outputs.


4 replies

Posted September 27, 2024 18:42 UTC

Authored by

ajtowns

Involving

garlonicon , levantah +1 other

The discussion introduces a novel approach to Pay to Proof of Work (P2W) transactions on the Bitcoin testnet4, utilizing a specific address and script that leverages a less than 60-byte signature requirement. This method allows for a gradual increase in difficulty without necessitating any consensus changes, making it applicable across various networks including the mainnet.


4 replies

Posted September 26, 2024 23:03 UTC

Authored by

carla

Involving

ProofOfKeags , morehouse

The discussion surrounding the reputation system for managing Hashed Timelock Contracts (HTLCs) within a network highlights several critical points related to the decision-making process of forwarding and receiving HTLCs. It emphasizes the dual focus of nodes on both incoming and outgoing directions, ensuring that transactions are endorsed by nodes with reputable histories.


7 replies

Posted September 26, 2024 18:02 UTC

Authored by

renepickhardt

Involving

AntonioPerez , harding +2 others

The discussion centers on the nuances of network state weighting, liquidity distribution in channels, and their implications for node balance uniformity within the context of minimum cost flow (MCF) computations and wealth distribution. The sender initially corrects a miscount in states to ten, which alters the basis of their argument regarding the probability models used to compare wealth distributions and payment feasibility.


3 replies

Posted September 26, 2024 15:02 UTC

Authored by

Jonas Nick

Involving

Antoine Riard, Weikeng Chen

The discussion revolves around several key challenges and innovations in the realm of blockchain technology, with a particular focus on privacy, scalability, and efficiency. One significant challenge highlighted is the process of bridging within blockchain protocols, which is crucial for enhancing Bitcoin's capabilities, including the introduction of strong privacy measures.


2 replies

Posted September 26, 2024 12:59 UTC

Authored by

sCryptts

Involving

benthecarman, ajtowns

The exploration of enhancing Bitcoin's covenant mechanism through the use of OP_CAT combined with the Schnorr signature scheme represents a significant stride in streamlining the signature computation process. By adopting a specialized technique for key selection, this method addresses the inherent limitations of Bitcoin Script's OP_ADD operation, which struggles with directly incrementing a 256-bit integer.


9 replies

Posted September 25, 2024 12:04 UTC

Authored by

Hunter Beast

Involving

PierreLuc DallaireDemers, Antoine Riard+1 other

The recent discussions and updates surrounding the development of a Bitcoin Improvement Proposal (BIP) to introduce quantum resistance into Bitcoin's cryptographic framework underscore the community's proactive approach towards safeguarding the cryptocurrency against potential quantum computing threats. Central to these discussions is the acknowledgment of IBM's advancements in quantum computing, particularly with its Quantum System Two, which potentially supports up to 16,000 qubits.


3 replies

Posted September 25, 2024 02:22 UTC

Authored by

ZmnSCPxj

Involving

renepickhardt , ZmnSCPxj

The discussion on the incorporation of multiparty channel constructs within payment channel networks highlights both potential benefits and challenges. The primary advantage of these constructs is their ability to enhance payment reliability and offer service level guarantees.


delvingbitcoin

Lightning Cheques

Posted September 24, 2024 21:23 UTC

Authored by

andyschroder

The concept of Lightning Cheques is introduced as an innovative paper-based payment method within the cryptocurrency domain, specifically tailored for offline transactions using the Lightning Network. These instruments combine a BOLT12 invoice_request on the front side with an offer on the back, facilitating a new way to conduct transactions without direct internet access.


1 reply

Posted September 24, 2024 15:36 UTC

Authored by

rustaceanrob

Involving

valuedmammal

The discussion focuses on improving the wallet recovery process for cryptocurrency users and their heirs, highlighting the necessity for an intuitive and standardized approach. The current recovery methods, which often require manual insertion of descriptors from various file formats like txt or json, are deemed inadequate and cumbersome.


20 replies

Posted September 23, 2024 18:48 UTC

Authored by

kravens

Involving

bytes , conduition +5 others

The conversation largely focuses on the intricacies and challenges associated with implementing privacy-centric protocols in cryptocurrency transactions, particularly those that enhance anonymity without relying on centralized coordination. A key point of discussion is the SINGLE|ACP protocol, which, despite its potential for maintaining transaction privacy, faces scrutiny over its requirement for matching input/output indices.


10 replies

Posted September 23, 2024 14:33 UTC

Authored by

virtu

Involving

sipa , bytes +1 other

The discussion begins by addressing a novel encoding mechanism devised to maintain the integrity of response entries' order. This is crucial given that recursive resolvers may alter the sequence, potentially leading to data misinterpretation.


4 replies

Posted September 23, 2024 03:34 UTC

Authored by

andyschroder

Involving

ZmnSCPxj , tbast +1 other

The proposal presented in the GitHub pull request aims to enhance security within the Bitcoin Lightning Network by establishing a standard for secure communication between remote nodes and high-uptime home nodes through BOLT8. It emphasizes the pairing of remote nodes with hardware wallets, such as Ledger and Coldcard, to improve both ease of use and security for users managing their nodes remotely.


98 replies

Posted September 19, 2024 18:48 UTC

Authored by

Ava Chow

Involving

LĂ©o Haf, Greg Tonoski+34 others

The recent discourse within the Bitcoin Development Mailing List has shed light on the pressing issue of managing and advancing Bitcoin Improvement Proposals (BIPs), which are crucial for the evolution of Bitcoin's protocol. The acknowledgment of a bottleneck in the BIP process, primarily due to limited oversight capacity, has catalyzed discussions on enhancing the procedural framework for BIP evaluations and integrations.

A pivotal suggestion that emerged from these talks is the proposal to augment the team of BIP editors.


39 replies

Posted September 19, 2024 14:55 UTC

Authored by

Fi

Involving

plebhash , marathongary +4 others

The recent advancements and discussions within the cryptocurrency mining community highlight several key developments aimed at enhancing the transparency, efficiency, and fairness of mining operations. A notable update has been made to the share accounting system, as detailed in a GitHub repository, which introduces significant changes intended to improve share verification and management.


1 reply

Posted September 19, 2024 08:12 UTC

Authored by

Antoine Poinsot

Involving

Antoine Riard

Antoine Poinsot has highlighted a pivotal update concerning Bitcoin Core, specifically addressing the misconception that checkpoints are no longer utilized as a defense mechanism against known attacks. This clarification comes in the wake of discussions sparked by the report produced by Darosior, which led to the reevaluation of the role of checkpoints within the Bitcoin Core infrastructure.


2 replies

Posted September 13, 2024 14:58 UTC

Authored by

Jassu

Involving

mcelrath, Jassu7082

Proof of Partial Work (PoPW) is a concept significant within the realm of cryptocurrency mining, particularly in the context of mining pools. It represents the effort miners contribute by submitting shares that demonstrate the work they've performed, even if it hasn't led to the discovery of a new block.


12 replies

Posted September 11, 2024 15:14 UTC

Authored by

remyers

Involving

murch , remyers

The recent developments in optimizing transaction fees through innovative coin selection strategies have garnered significant attention within the cryptocurrency community, particularly among Bitcoin developers and Lightning Service Providers (LSPs). A focal point of these discussions has been the draft pull request PR 30080 on Bitcoin's GitHub repository.


Posted September 9, 2024 12:40 UTC

Authored by

Ethan Heilman

The Bitcoin Improvement Proposal (BIP) discussed introduces a new opcode, FOLDFUNCTIONSTREAM, which is a modification of the existing NOP4 opcode within the Bitcoin scripting system. This opcode aims to efficiently perform functional folds across data, addressing issues related to computational expense and safety in script execution.


Posted September 9, 2024 10:54 UTC

Authored by

dgpv

The recent update to B'SST, a project hosted on GitHub, marks a significant transition from a proprietary license to AGPLv3 with its version update from 0.1.3 to 0.1.4. This change primarily aims to address the concerns and limitations imposed by the previous licensing model.


6 replies

Posted September 6, 2024 11:35 UTC

Authored by

tbast

Involving

David Harding , Vincenzo Palazzo +1 other

The discourse on enhancing the C-Lightning framework's payment transactions delves into several key areas concerning user privacy, security, and functionality. A proposal is made for an optional text field to indicate the sender's identity in a payment transaction, drawing parallels with Ocean's Bolt12 methods which use descriptive tags to verify payer identity without complex processes.


44 replies

Posted September 5, 2024 23:18 UTC

Authored by

AntoineP

Involving

bytes , sjors +9 others

The discussion encapsulates various proposals and considerations aimed at addressing vulnerabilities and inefficiencies within the Bitcoin protocol. A primary focus is on mitigating the timewarp attack, which threatens the network's stability by artificially lowering mining difficulty.


16 replies

Posted September 5, 2024 09:04 UTC

Authored by

reardencode

Involving

sipa , moonsettler +3 others

In the exploration of cryptographic security, a novel approach known as "Dark Smoothie" has been brought to light, revealing a significant vulnerability within digital transactions. This method allows an attacker to extract sensitive information, specifically a 256-bit seed, from just two signatures generated by the same device.


4 replies

Posted September 3, 2024 00:35 UTC

Authored by

Victor Kolobov

Involving

Matt Corallo, /dev /fd+1 other

The discussion encompasses a variety of topics related to Bitcoin development, particularly focusing on the post-Taproot activation landscape and the exploration of covenants or contracting primitives extending Bitcoin script. It reflects on the historical stalemate in consensus discussions since Taproot's activation in 2021, suggesting that a lack of trial-and-error design and development processes akin to those used for Schnorr/Taproot changes has hindered progress.


Posted September 3, 2024 00:13 UTC

Authored by

shehzanmaredia

The recent release of the Lava Loans paper introduces a new DLC-based loans protocol aimed at facilitating more trust-minimized bitcoin-secured loans. This development is shared within the Delving Bitcoin community, where it has garnered attention and feedback from its active members.


Posted September 2, 2024 23:18 UTC

Authored by

Tobin Harding

The ReadCompactSize function, as defined in serialize.h, includes an optional range_check parameter that is set to true by default. This setting ensures that the value read by the function does not exceed 0x02000000, effectively enforcing a limit that keeps the compact size value within the bounds of a 32-bit unsigned integer.


6 replies

Posted August 31, 2024 13:28 UTC

Authored by

valuedmammal

Involving

xBC , murch +1 other

The recent discussions and research into blockchain transaction dynamics have uncovered several intriguing insights, particularly regarding block reconstruction and the nuances of transaction replacements under full-RBF (Replace-By-Fee) policies. A notable point from these discussions is the potential for increased noise due to a five-minute snapshot interval in analyzing transaction replacements.


Posted August 29, 2024 11:21 UTC

Authored by

victorkstarkware

Achieving general computation on Bitcoin has long been a challenging goal due to inherent limitations in Bitcoin's script system, notably its script length and opcode expressibility constraints. However, the landscape began changing with the Taproot upgrade in 2021, which significantly eased the script length limitation and introduced the potential for more complex applications on Bitcoin.


2 replies

Posted August 27, 2024 19:39 UTC

Authored by

Peter Todd

Involving

Keagan McClelland, Antoine Riard

The discovery of a novel vulnerability within the Bitcoin transaction process, notably affecting transactions where fees are paid using a method known as Child Pays for Parent (CPFP) through the use of keyless ephemeral anchors, has raised concerns about the security and reliability of cryptocurrency transactions. This vulnerability facilitates what is termed a replacement cycling attack, which enables attackers to disrupt the standard processing of transactions at minimal cost, assuming they intend to transact with a higher total fee and fee-rate than their target.


7 replies

Posted August 27, 2024 13:52 UTC

Authored by

Anthony Towns

Involving

Luke Dashjr, Matt Corallo

The conversation delves into the nuanced challenges and potential strategies within cryptocurrency mining, particularly focusing on block withholding attacks and the implications for mining pools. It highlights the dilemma faced by pools in distinguishing between honest miners and attackers, especially given the feasibility of such attacks even with a minor portion of the pool’s total hash rate being maliciously used.


Posted August 26, 2024 13:33 UTC

Authored by

Antoine Poinsot

This message serves as an update regarding the security status of Bitcoin Core. The sender informs recipients that there are no new vulnerabilities to report for the current month, adhering to a previously established schedule for such disclosures.


Posted August 25, 2024 14:36 UTC

Authored by

Antoine Riard

The discussion raises a crucial point about the necessity for an upgrade in pool software to address the timewarp attack, highlighting a new consensus rule. This rule stipulates that the timestamp (nTime) for each block, at heights divisible by 2016, must not be less than 600 seconds earlier than the preceding block's nTime.


15 replies

Posted August 23, 2024 13:48 UTC

Authored by

ajtowns

Involving

RubenSomsen , stevenroose +2 others

The critique of deflationary currencies, particularly Bitcoin, highlights their potential to disrupt economic stability. Deflationary spirals, where falling prices lead to reduced spending and investment, culminating in economic depression, are a significant concern.


Posted August 22, 2024 23:23 UTC

Authored by

40000bytes

I'm sorry, but without the specific content or context provided for the task, I can't generate a summary. Could you please share more details or provide the text you'd like summarized?.


27 replies

Posted August 22, 2024 20:55 UTC

Authored by

murch

Involving

zawy , AntoineP +5 others

The email discussion illuminates various facets of blockchain security, particularly focusing on the challenges and proposed solutions regarding block timestamps and difficulty adjustments. It begins with an analysis of the need for a balance between hash power and difficulty levels to maintain an optimal block production rate.


10 replies

Posted August 22, 2024 20:42 UTC

Authored by

bytes

Involving

ajtowns , aspargus +4 others

The Lightning Network (LN) is recognized for its potential in facilitating proper escrows, particularly through the mechanism where a payment hash preimage is generated and released once verification of goods delivery is confirmed by the escrow operator. However, the implementation of such services on LN faces challenges, notably due to the time-sensitive nature of HTLCs which contrasts with the longer durations often required by escrow agreements.


1 reply

Posted August 22, 2024 13:42 UTC

Authored by

dr-orlovsky

Involving

ajtowns

In the realm of software development and updates, particularly those related to Bitcoin protocols such as RGB smart contracts, new Rust Lightning implementations (LNP), and bitcoin-based self-sovereign identities (SSI), there is a nuanced approach to sharing information and announcements within a community or forum. The method of disseminating this type of content should be carefully considered to ensure it reaches the appropriate audience effectively.

When introducing new releases of libraries and tools associated with these technologies, it's recommended to go beyond mere announcement posts.


6 replies

Posted August 22, 2024 11:43 UTC

Authored by

/dev /fd

Involving

Fabian, David Harding+2 others

The recent discussions around a new method for activating soft forks in the Bitcoin network have brought several concerns and ideas to the forefront. The mechanism proposed introduces a cost for signaling, aiming to ensure that only users with genuine economic activity participate in the decision-making process.


4 replies

Posted August 22, 2024 00:35 UTC

Authored by

sjors

Involving

bytes , 40000bytes

The discussion brings to light concerns regarding the potential for increased censorship in Bitcoin transactions, specifically focusing on the use of nLockTime values. It highlights a key issue that current protocols automatically mine and relay transactions set with nLockTime values either in the past or to a lower height, without considering the implications.


1 reply

Posted August 22, 2024 00:02 UTC

Authored by

ajtowns

Involving

40000bytes

In an effort to refine the moderation tools and improve the community experience, a recent update has been made to the flagging system used within the forum. The "inappropriate" flag, previously denoted for content deemed offensive, abusive, or in violation of community guidelines, has been redefined as the "not constructive" flag.


6 replies

Posted August 20, 2024 20:22 UTC

Authored by

bytes

Involving

ursuscamp , ProofOfKeags +3 others

A soft fork within blockchain technology necessitates not only the technical consensus among nodes but also an economic agreement, underscoring the vital role of communal acceptance for any changes to be effectively integrated and recognized. The discussion around User-Activated Soft Forks (UASF) presents them as a cleaner, more direct method of initiating soft forks by engaging network users rather than relying on miner approval first.


1 reply

Posted August 20, 2024 01:12 UTC

Authored by

1440000bytes

Involving

40000bytes

The document proposes a novel method for the activation of soft forks within the Bitcoin network, leveraging nLockTime as a signaling mechanism. This approach is introduced as an alternative to the existing BIP 8 and BIP 9 methods, which have sparked controversy due to their respective activation mechanisms.


41 replies

Posted August 16, 2024 04:45 UTC

Authored by

Peter Todd

Involving

Antoine Riard, /dev /fd+6 others

The discourse among Bitcoin developers, notably between Antoine Riard and Peter Todd, sheds light on a critical security vulnerability within the Bitcoin network related to transaction relays and double-spending. The vulnerability hinges on exploiting nodes with full Replace-By-Fee (RBF) disabled, allowing for an attack where low fee-rate transactions are initially broadcast across the majority of the network and subsequently double-spent with higher fees to a single miner.


24 replies

Posted August 15, 2024 09:09 UTC

Authored by

myles

Involving

CubicEarth , MattCorallo +7 others

The multifaceted debate around Bitcoin’s block size encompasses technical, economic, and philosophical dimensions, focusing on the balance between maximizing fee revenue for miners and maintaining network efficiency and decentralization. The optimal block size is neither too large nor too small but dynamically adjusts to fluctuating demand for on-chain volume.


11 replies

Posted August 12, 2024 04:18 UTC

Authored by

tony

Involving

bytes , cryptorevue +4 others

The discussion revolves around the intricacies of Lightning Network (LN) channels, specifically distinguishing between classical LN channels and hosted channels. Classical LN channels are integrated with a dispute resolution mechanism that leverages blockchain technology, allowing for on-chain settlement of disputes.


1 reply

Posted August 9, 2024 15:23 UTC

Authored by

gijswijs

Involving

MattCorallo

The discussion around the potential Denial-of-Service (DoS) threats posed by Onion Messages (OM) in the Lightning Network has been a topic of considerable interest, particularly highlighted in the recent paper "Short Paper: Onion Messages on Leash" by Amin Bashiri and Majid Khabbazian from the University of Alberta. This paper, presented at the Financial Cryptography and Data Security 2024 conference, offers an analytical approach to mitigating possible DoS risks associated with OM. Available for review at https://fc24.ifca.ai/preproceedings/104.pdf, it addresses the technical nuances and proposes several countermeasures to enhance network resilience.

An interesting point raised in the paper is the recalibration of the maximum number of hops an OM can make, which was previously set based on outdated payload size assumptions.


3 replies

Posted August 8, 2024 10:17 UTC

Authored by

xBC

Involving

CryptiQ , 0xB10C

The discussion on the impact of extra pool sizes on block reconstruction within blockchain technology delves into two primary areas: the additional transactions held for compact block reconstruction and the variations in mempool sizes among peers. The role of a peer's feefilter in estimating their pool size is examined, albeit with limitations due to privacy concerns and calculation methods.


Posted August 7, 2024 21:47 UTC

Authored by

Cory Fields

Hennadii Stepanov (hebasto) has undertaken the significant task of transitioning Bitcoin Core's build system from Autotools to CMake, a project that has spanned several years and involved extensive review and collaboration. This effort is notable for its ambition, given the complexities associated with migrating build systems in large software projects, and has led to numerous bug fixes and modernizations not only for Bitcoin Core but also for its dependencies, benefiting the wider open-source community.

The new CMake build system, after thorough review and testing by developers, is poised for integration into the master branch following the v28 feature-freeze and prior to the commencement of work on v29.


27 replies

Posted August 5, 2024 21:35 UTC

Authored by

josibake

Involving

Sosthene , andrewtoth +2 others

The conversation opens with a discussion on the integration of the Anti-exfil protocol into the secp256k1 library, highlighting its relevance due to demands for Discrete Logarithm Equality (DLEQ) proofs in future updates and the necessity posed by vulnerabilities such as those exposed by the darkskippy.com attack. This suggestion is motivated by the need for broader hardware wallet support and the aim to enhance security measures within core cryptographic libraries, presenting an opportunity to address multiple concerns simultaneously.

A shift in strategy for handling DLEQ proofs within Bitcoin Improvement Proposals (BIPs) is observed, leading to the separation of these proofs into their own BIP to maintain clarity and focus in the PSBT draft.


2 replies

Posted August 4, 2024 06:41 UTC

Authored by

Niklas Goegge

Involving

Peter Todd, hashnoncemessage

Recent discussions have brought to light two critical security vulnerabilities that have raised concerns within the digital security community. These vulnerabilities, revealed in reverse chronological order on the advisories page, highlight the ongoing challenges faced in cybersecurity regarding the dissemination and management of sensitive information.


Posted August 2, 2024 08:45 UTC

Authored by

Garlo Nicon

Implementing changes in test networks, specifically testnet3, is advised as a starting point for any updates due to its close resemblance to the mainnet in terms of history and the occurrence of multiple halvings. This approach could mitigate potential issues arising from insufficient block rewards and vulnerability to attacks, such as miners mining empty blocks for profit through demurrage fees or censoring transactions by refusing to include them in blocks.


8 replies

Posted August 2, 2024 05:08 UTC

Authored by

Richard Greaser

Involving

Christian Riley, José Edil Guimarães de Medeiros+4 others

The discourse within the Bitcoin development community has recently delved into the feasibility and implications of introducing a demurrage fee system within the Bitcoin network. This concept, aimed at incentivizing the movement of coins to support miners post-halving events by imposing fees on inactive coins, has sparked spirited debate.


1 reply

Posted August 1, 2024 00:45 UTC

Authored by

Sivaram Dhakshinamoorthy

Involving

Sivaram D

Sivaram has introduced a draft for a Bitcoin Improvement Proposal (BIP) focused on the FROST threshold signing protocol. The proposal is comprehensive, detailing design aspects, guidelines for usage, considerations regarding security, and includes a Python implementation along with test vectors for practical reference.