Jan 15 - Mar 18, 2026
At the heart of this system is the challenge of notifying a receiver, referred to as Bob, about payments made by a sender, known as Alice, without necessitating constant transaction checks by Bob. A proposed solution suggests Alice should notify Bob using a structured format that includes the transaction identifier (txid), tweak data, and possibly additional information such as blockhash or height for verification purposes. This approach would significantly streamline Bob's transaction verification process.
The narrative further explores the technicalities of employing Nostr as a medium for these notifications. The potential privacy implications are considered, with particular attention to the strategies for using keys to mitigate metadata leakage risks. Moreover, the practical aspects of ensuring notification delivery through shared Nostr relays are discussed, suggesting Bob could advertise his Silent Payment address alongside a list of recommended relays for efficient communication.
Concerns regarding spam prevention and the implications of incorrect implementation, especially related to the provision of correct tweaks in notifications, are addressed. Reflecting on a broader scale, the integration of Silent Payments with stealth address concepts promises usability improvements, although it raises questions on spam management and tweak accuracy.
The conversation also examines the minimal necessary data for effective transaction verification within the blockchain framework, highlighting a balance between simplicity and DoS resistance. It suggests including a block hash and merkle proof alongside the txid for robust security against potential attacks. Diverse wallet designs pose unique challenges in verifying transactions from unverified sources, emphasizing the importance of trust dynamics in simplifying verification processes. The flexibility offered by the tweak field accommodates various client designs, underlining a nuanced approach to protocol development that considers different wallet technologies and their verification capabilities.
Lastly, the discussion acknowledges the limitations and practicality of using taproot outputs for transaction identification, stressing the importance of balancing convenience with security. It calls for a cautious approach towards developing protocols that effectively manage DoS resistance and message validation, considering the potential roles of Web of Trust systems in enhancing transaction security.
TLDR
We’ll email you summaries of the latest discussions from high signal bitcoin sources, like bitcoin-dev, lightning-dev, and Delving Bitcoin.
We'd love to hear your feedback on this project.
Give Feedback