Active Discussions

Check out posts actively getting replies and inspiring conversations.

Addressing remaining points on BIP 54

11 replies

By Antoine Riard

Involving Antoine Poinsot, Matt Corallo+3 others

calendar icon

Original post on December 30, 2025 15:59 UTC

cyclic icon

Last reply on January 14, 2026 18:58 UTC

bitcoin-dev

  • Antoine discusses enhancing Bitcoin's transaction uniqueness post-BIP34 and BIP54's proposal.

  • BIP30 addressed duplicate coinbase IDs, while BIP34 enforced unique scriptSig commitments.

  • BIP54 suggests further improvements, questioning the necessity of a final nSequence field.

Falcon Post-Quantum Signature Scheme Proposal

10 replies

By conduition

Involving Giulio Golinelli, waxwing/ AdamISZ+2 others

calendar icon

Original post on January 22, 2026 07:01 UTC

cyclic icon

Last reply on January 27, 2026 16:07 UTC

bitcoin-dev

  • Concerns were raised about Falcon's complexity in Bitcoin's post-quantum cryptography discussions.

  • The debate includes Falcon's signature size and the exploration of stateful XMSS for efficiency.

  • References offered insights into implementing cryptographic solutions in real-world applications.

BLISK: Boolean circuit Logic Integrated into the Single Key

3 replies

By nkohen

Involving olkurbatov, evd0kim

calendar icon

Original post on January 26, 2026 23:23 UTC

cyclic icon

Last reply on January 30, 2026 20:39 UTC

delvingbitcoin

  • The email questions the necessity of ECDH and ZKPs for security in CNF policy frameworks.

  • It proposes using Replicated Secret Sharing for simpler, secure communication without stateful storage.

  • The discussion invites further examination of cryptographic techniques for efficient, secure protocols.

OP_CAT and Bitcoin’s Path to Quantum Resistance

2 replies

By jsarenik

Involving sCrypt-ts

calendar icon

Original post on January 20, 2026 09:14 UTC

cyclic icon

Last reply on January 30, 2026 11:21 UTC

delvingbitcoin

  • This summary explains a "short-range" cybersecurity threat necessitating attacker proximity.

  • Short-range attacks target victims' digital devices or networks by physically nearing them.

  • Acknowledging these attacks is vital for enhancing targeted cybersecurity defenses.

Major BIP 360 Update

9 replies

By ajtowns

Involving cryptoquick, sipa+3 others

calendar icon

Original post on December 19, 2025 20:46 UTC

cyclic icon

Last reply on January 31, 2026 03:56 UTC

delvingbitcoin

  • A suggestion to use "pay to script tree hash" or p2sth for new address class naming was made.

  • The term p2sth accurately describes the functionality, highlighting the scriptPubKey's role.

  • Despite its formal abbreviation, "pay-to-something" is an accepted colloquial pronunciation.

Bitcoin Logo

TLDR

Join Our Newsletter

We’ll email you summaries of the latest discussions from high signal bitcoin sources, like bitcoin-dev, lightning-dev, and Delving Bitcoin.

Explore all Products

ChatBTC imageBitcoin searchBitcoin TranscriptsSaving SatoshiDecoding BitcoinWarnet
Built with 🧡 by the Bitcoin Dev Project
View our public visitor count

We'd love to hear your feedback on this project.

Give Feedback