Revisiting secp256r1 signatures (i.e. P256, mobile HSM support)

Posted by Greg Tonoski

Jul 23, 2025/08:49 UTC

The recent discussion on the Bitcoin Development Mailing List highlights an attempt to reintroduce the previously resolved OP_CAT vulnerability within the Bitcoin protocol. This issue is being presented under the guise of the secp256r1, which, according to the discourse, has no direct correlation with the OP_CAT vulnerability. The mention of Hardware Security Modules (HSM) and other complex technical jargon has been deemed irrelevant to the core issue at hand. It's pointed out that mobile users, for example, already have access to a form of HSM through features like the Samsung Blockchain Keystore, suggesting that the arguments brought forward to justify this change may not hold substantial relevance to the proposed reintroduction of OP_CAT.

Link to Raw Post
Bitcoin Logo

TLDR

Join Our Newsletter

We’ll email you summaries of the latest discussions from authoritative bitcoin sources, like bitcoin-dev, lightning-dev, and Delving Bitcoin.

Explore all Products

ChatBTC imageBitcoin searchBitcoin TranscriptsSaving SatoshiBitcoin Transcripts Review
Built with 🧡 by the Bitcoin Dev Project
View our public visitor count

We'd love to hear your feedback on this project?

Give Feedback