All Activity

Read the most recent individual posts in chronological order.

Reimagining Onion Messages as an Overlay Layer

9 replies

By roasbeef

Involving shocknet_justin , MattCorallo +3 others

calendar icon

Original post on June 28, 2025 01:56 UTC

cyclic icon

Last reply on July 3, 2025 01:13 UTC

delvingbitcoin

The discussions delve into the integration and optimization of onion messaging within the Lightning Network (LN), highlighting several critical aspects and proposals aimed at enhancing the network's efficiency and security. At the core, there is a focus on how nodes manage node_announcement messages and the criteria for accepting onion_link_proof, which is contingent upon nodes having active channels.

Where does the 33.33% threshold for selfish mining come from?

3 replies

By AntoineP

Involving zawy , ajtowns+1 other

calendar icon

Original post on June 5, 2025 20:26 UTC

cyclic icon

Last reply on July 2, 2025 17:18 UTC

delvingbitcoin

Secure consensus in distributed systems, especially within the realm of blockchain technology, is a critical concern that extends beyond the conventional wisdom of requiring a simple majority for security. The concept explores the necessity for a more substantial majority, suggesting that a 66.67% hashrate is needed to ensure the integrity and reliability of consensus mechanisms.

CTV+CSFS: Can we reach consensus on a first step towards covenants?

79 replies

By bytes

Involving moonsettler , stevenroose +17 others

calendar icon

Original post on March 10, 2025 22:58 UTC

cyclic icon

Last reply on July 2, 2025 16:59 UTC

delvingbitcoin

In the realm of Bitcoin and blockchain technology, the discussions and explorations surrounding CheckTemplateVerify (CTV) and related cryptographic advancements represent a critical juncture in the development and enhancement of cryptocurrency functionalities. The dialogue among developers and enthusiasts reflects a concerted effort to navigate the complexities of integrating new features into Bitcoin's protocol, ensuring that such enhancements not only bolster security but also expand the network's capabilities in meaningful ways.

The integration of CTV into projects like Liquid and its potential application within various segments of the Bitcoin ecosystem underscores a growing consensus about the utility of covenants.

Fee-Based Spam Prevention For Lightning

14 replies

By JohnLaw

Involving harding , ClaraShk +1 other

calendar icon

Original post on March 14, 2025 23:58 UTC

cyclic icon

Last reply on July 2, 2025 13:03 UTC

delvingbitcoin

The economics of routing payments within cryptocurrency networks, particularly through routers in the context of transactions, entails a complex array of costs and risks beyond the superficial layer of router fees often perceived as clear profit. These fees are pivotal in covering expenses such as on-chain fees necessary for payment resolution, risks of losses from system failures, computational expenses, and communication network maintenance costs.

DahLIAS: Discrete Logarithm-Based Interactive Aggregate Signatures

10 replies

By Jonas Nick

Involving waxwing/ AdamISZ, Tim Ruffing

calendar icon

Original post on April 17, 2025 16:27 UTC

cyclic icon

Last reply on July 2, 2025 11:36 UTC

bitcoin-dev

The conversation delves into various aspects of cryptographic protocols and their applications, particularly focusing on the efficiency and security of digital signature schemes. A significant part of the discussion revolves around the optimization of the signing protocol to enhance efficiency without compromising security.

Make pathological transactions with more than 2500 legacy signature operations non-standard

By Antoine Poinsot

calendar icon

Original post on July 2, 2025 08:47 UTC

cyclic icon

Last reply on July 2, 2025 08:47 UTC

bitcoin-dev

The discussion centers around the inherent risks posed by the activation of BIP54 in the presence of 2500 legacy signature operations that are deemed invalid according to consensus. The selection of this specific figure, 2500, was meticulously chosen to ensure that no currently standard transaction, which would not be considered pathological, is invalidated under today's Bitcoin Core policy standards.

A rust library to encode descriptors with a 30-40% size reduction

By josh

calendar icon

Original post on July 1, 2025 19:59 UTC

cyclic icon

Last reply on July 1, 2025 19:59 UTC

delvingbitcoin

The library discussed is inspired by a suggestion to reduce the size of QR codes used for wallets, as mentioned in a comment by @sjors on a Bitcoin pull request. It builds upon an encoder developed for the descriptor-encrypt project, enhancing it with the capability to handle descriptors that include private keys, and aims to compactly encode these descriptors.

Correcting the error in getnetwork - hashrateps

13 replies

By zawy

Involving sipa , zawy

calendar icon

Original post on June 2, 2025 10:53 UTC

cyclic icon

Last reply on July 1, 2025 19:53 UTC

delvingbitcoin

The email delves into the complexities of calculating work and hashrate within blockchain technology, emphasizing the need for precision in understanding these concepts to assess network security and efficiency accurately. The correspondence begins by correcting a common misconception in the calculation of work over a given timespan in blockchain networks, specifically within Proof of Work protocols.

Fingerprinting nodes via addr requests

8 replies

By 0xB10C

Involving Crypt-iQ, mzumsande+2 others

calendar icon

Original post on June 23, 2025 13:31 UTC

cyclic icon

Last reply on June 30, 2025 10:13 UTC

delvingbitcoin

The exploration of a security vulnerability within network protocols, specifically focusing on the identification of nodes operating across multiple networks through their ADDR responses, has revealed significant concerns regarding network privacy and the potential for more severe attacks. This vulnerability could enable adversaries to expose network bridges, making them targets for partitioning attacks or facilitating the collection of sensitive metadata.

What's a good stopping point? Making the case for the capabilities enabled by CTV+CSFS

8 replies

By Antoine Poinsot

Involving Harsha Goli, Matt Corallo+5 others

calendar icon

Original post on June 23, 2025 13:14 UTC

cyclic icon

Last reply on June 29, 2025 22:50 UTC

bitcoin-dev

The conversation among Bitcoin developers and experts has been robust, covering a wide array of topics related to the future development of Bitcoin's scripting capabilities and its impact on the network's security, efficiency, and scalability. The discussions delve into the exploration of commitment hashes like TXHASH and their potential beyond current applications.

CTV + CSFS: a letter

63 replies

By James OBeirne

Involving Michael Folkson, Matt Corallo+21 others

calendar icon

Original post on June 9, 2025 11:40 UTC

cyclic icon

Last reply on June 28, 2025 16:13 UTC

bitcoin-dev

The letter published advocates for the activation of OP_CHECKTEMPLATEVERIFY (BIP-119) and OP_CHECKSIGFROMSTACK (BIP-348), highlighting their potential to enhance Bitcoin's value as a scarce, censorship-resistant asset. These opcodes, which have been extensively reviewed and are considered safe and in demand, could unlock a wide array of functionalities including scaling solutions, vaults, congestion control, non-custodial mining, discreet log contracts, and more.

Bitcoin Core 28.2 Released

By Ava Chow

calendar icon

Original post on June 27, 2025 21:56 UTC

cyclic icon

Last reply on June 27, 2025 21:56 UTC

bitcoin-dev

The latest version of Bitcoin Core, 28.2, is now available for download from the official Bitcoin Core website. This release introduces new features alongside various bug fixes and performance enhancements.

How CTV+CSFS improves BitVM bridges

21 replies

By Cyimon

Involving ekrembal , RobinLinus +7 others

calendar icon

Original post on April 10, 2025 14:28 UTC

cyclic icon

Last reply on June 25, 2025 19:39 UTC

delvingbitcoin

In an innovative exploration of Bitcoin's scripting capabilities, a novel method has been proposed to enhance transaction security and specificity through the use of CheckTemplateVerify (CTV). This technique facilitates a unique transaction condition where one input (inputA) is designated to be spendable only in conjunction with another specific input (inputB).

Sybil resistance in different coinjoin implementations

3 replies

By /dev /fd

Involving waxwing/ AdamISZ, /dev /fd0

calendar icon

Original post on May 27, 2025 14:29 UTC

cyclic icon

Last reply on June 25, 2025 12:53 UTC

bitcoin-dev

The discussion revolves around the intricacies of hedging strategies as a means to mitigate the costs associated with timelocking bitcoins, a method employed to enhance security measures within cryptocurrency systems. It is argued that while hedging can offset some volatility-related costs by leveraging futures with minimal leverage, it does not eliminate the opportunity cost incurred during the lock period.

Why CTV+CSFS and not TXHASH

1 reply

By arshbot

Involving ProofOfKeags

calendar icon

Original post on June 18, 2025 18:11 UTC

cyclic icon

Last reply on June 24, 2025 19:12 UTC

delvingbitcoin

In the realm of cryptocurrency transactions and smart contracts, the discussion on the most effective method for commitment to specific transaction inputs and outputs is ongoing. The current proposal under consideration by the community involves the combined implementation of CTV (CheckTemplateVerify) and CSFS (Commitment to Script-Free Signatures), which aims to standardize transaction commitments.

Who will run the CoinJoin coordinators?

22 replies

By kravens

Involving bytes , conduition +5 others

calendar icon

Original post on June 2, 2024 10:01 UTC

cyclic icon

Last reply on June 24, 2025 00:46 UTC

delvingbitcoin

The discussions and developments in the realm of Bitcoin privacy and transaction security are multifaceted, encompassing a variety of technical challenges and innovative solutions. The utilization of ALL|ANYONECANPAY signatures within Bitcoin transactions has sparked interest, particularly for its potential application in crowdfunding scenarios, as well as its limitations in achieving privacy through coinjoin transactions.

Descriptors using H as a hardened indicator

By Ava Chow

calendar icon

Original post on June 23, 2025 18:37 UTC

cyclic icon

Last reply on June 23, 2025 18:37 UTC

bitcoin-dev

Recently, there has been a clarification regarding BIP 380, which indicates that alongside ' and h, H can also be utilized as a hardened indicator in derivation paths. This update came to light following the identification of a test that incorrectly classified H as an invalid hardened indicator.

A simple backup scheme for wallet accounts

20 replies

By reardencode

Involving josh , bytes +7 others

calendar icon

Original post on April 16, 2025 13:52 UTC

cyclic icon

Last reply on June 22, 2025 10:33 UTC

delvingbitcoin

The conversation begins with an exploration of how XOR operations on individual secrets, Ci, relate to the shared secret, S, in the context of decrypting a ciphertext payload within a cryptographic backup scheme. The discussion clarifies that for a descriptor with an even number of xpubs, the XOR result of all Ci values reveals the shared secret.

CTV vault output descriptor

8 replies

By sjors

Involving bytes , sanket +3 others

calendar icon

Original post on June 10, 2025 12:12 UTC

cyclic icon

Last reply on June 20, 2025 01:50 UTC

delvingbitcoin

The revised approach to constructing CheckTemplateVerify (CTV) vaults introduces a significant modification aimed at enhancing the security and efficiency of fund deposits. This method involves an initial deposit into a regular BIP380 in_desc before transferring the funds to a CTV address through a separate transaction, which is designed to mitigate risks associated with direct deposits into CTV addresses.

Full-Disclosure: CVE-2025-27586 "No Santa Claus under the Lightning Sun"

2 replies

By Antoine Riard

Involving David A. Harding

calendar icon

Original post on June 12, 2025 19:03 UTC

cyclic icon

Last reply on June 19, 2025 04:56 UTC

bitcoin-dev

The discourse presents a comprehensive overview of a newly disclosed vulnerability affecting Bitcoin's time-sensitive contract protocols, specifically targeting the Lightning Network (LN) through what is referred to as fee-bumping reserves exhaustion attacks. This vector of attack leverages the absence of a well-defined mechanism for provisioning fee reserves necessary for the timely inclusion of transactions, particularly under the option_anchor channels upgrade.

Emulating OP_RAND

11 replies

By olkurbatov

Involving harding , ajtowns +4 others

calendar icon

Original post on January 29, 2025 11:17 UTC

cyclic icon

Last reply on June 18, 2025 09:21 UTC

delvingbitcoin

The email discussion encompasses a range of topics related to advancements and theoretical considerations in the field of blockchain technology and cryptographic techniques. One significant focus is on a novel method for generating random bits between two parties, Alice and Bob, through a cryptographic process that involves hashing preimages with hash functions such as SHA2 and HASH160.

jpeg resistance of various post-quantum signature schemes

4 replies

By Bas Westerbaan

Involving Hunter Beast, Q C

calendar icon

Original post on May 21, 2025 10:32 UTC

cyclic icon

Last reply on June 17, 2025 17:42 UTC

bitcoin-dev

The discussions and analyses provided in the emails revolve around the intricate aspects of post-quantum cryptography (PQC), focusing on the evaluation of various cryptographic schemes in light of their security, efficiency, and practicality for implementation. A notable topic is the consideration of SLH-DSA within the development of BIP-360, which brings to the forefront the challenges associated with lattice-based cryptography.

The case for privatizing Bitcoin Core

11 replies

By Bryan Bishop

Involving Dave Scotese, Michael Folkson+5 others

calendar icon

Original post on June 10, 2025 20:31 UTC

cyclic icon

Last reply on June 17, 2025 08:30 UTC

bitcoin-dev

Recent discussions within the Bitcoin Core development community have highlighted a recurring issue: non-contributors, sometimes even non-developers, intruding into forums intended for collaboration on Bitcoin Core, leading to wasted time, controversy, and misinformation. The essence of open-source development is voluntary collaboration among developers who choose to work together on projects they are passionate about, without any obligations beyond those specified by the license.

Proposal: Self-Verifiable Transaction Broadcast Log for Enhanced User Transparency

By wang wang

calendar icon

Original post on June 16, 2025 09:57 UTC

cyclic icon

Last reply on June 16, 2025 09:57 UTC

bitcoin-dev

The email from Liang to the Bitcoin developers introduces a proposal aimed at improving user experience and auditability within the Bitcoin node software, focusing on the issue of orphaned or dropped transactions. Liang suggests the creation of a Self-Verifiable Transaction Broadcast Log, an opt-in feature that would record all transactions a node accepts for broadcast, complete with timestamps and source information.

Garbled circuits and BitVM3

By RobinLinus

calendar icon

Original post on June 15, 2025 14:04 UTC

cyclic icon

Last reply on June 15, 2025 14:04 UTC

delvingbitcoin

The BitVM Alliance has recently shifted its focus towards implementing garbled circuits, marking a significant advancement over the previous BitVM2 framework. This new direction is primarily motivated by the substantial increase in efficiency it brings to SNARK verification processes on the Bitcoin network.

The unsuitability of presigned transactions for vaults

7 replies

By jamesob

Involving David Harding , AntoineP +2 others

calendar icon

Original post on September 30, 2023 11:54 UTC

cyclic icon

Last reply on June 14, 2025 19:15 UTC

delvingbitcoin

The discourse on cryptocurrency security and transaction management has seen a significant focus on enhancing the robustness of transactions against theft and loss. A notable discussion revolves around the implementation of vault-like constructions, such as Revault, Liana, and Bryan Bishop's prototype, which aim to mitigate these risks.

Scaling Noncustodial Mining Payouts with CTV

16 replies

By vnprc

Involving ErikDeSmedt, AntoineP+4 others

calendar icon

Original post on June 4, 2025 20:12 UTC

cyclic icon

Last reply on June 13, 2025 20:17 UTC

delvingbitcoin

The discussion revolves around the challenges and innovations in mining pool payouts, particularly focusing on the issue of non-custodial payouts and the technical constraints that limit these operations. Central to the conversation is the use of Consensus-enforced Transaction Order (CTV) as a potential solution to existing limitations imposed by hardware manufacturers and the structure of blockchain transactions.

One significant problem highlighted is the restriction placed by Antminer firmware on the size of the coinbase transaction, which severely limits the number of outputs a coinbase transaction can have.

OP_CHECKCO - NTRACTVERIFYand its amount semantic

12 replies

By salvatoshi

Involving instagibbs , Chris_Stewart_ +3 others

calendar icon

Original post on March 17, 2025 12:29 UTC

cyclic icon

Last reply on June 13, 2025 13:12 UTC

delvingbitcoin

The conversation delves into the technical considerations of enhancing Bitcoin's scripting capabilities, focusing on parallel input validation and its implications for transaction processing efficiency. The proposed simplification of cross-input logic through the introduction of a new opcode, potentially named OP_CHECKAMOUNT, aims to streamline the assertion of annexed data without complicating the script engine.

Research Update: A Geometric Approach for Optimal Channel Rebalancing

By renepickhardt

calendar icon

Original post on June 11, 2025 07:34 UTC

cyclic icon

Last reply on June 11, 2025 07:34 UTC

delvingbitcoin

The research notebook titled A Geometric Approach for Optimal Channel Rebalancing presents a significant advancement in the field of liquidity management within payment channel networks. This investigation is grounded on the foundational work presented in earlier discussions and documented resources concerning channel depletion, topology cycles, and the mathematical theory underpinning payment channel networks.

Pre-emptive commit/reveal for quantum-safe migration (poison-pill)

16 replies

By Leo Wandersleb

Involving Nagaev Boris, conduition+2 others

calendar icon

Original post on June 2, 2025 21:06 UTC

cyclic icon

Last reply on June 9, 2025 16:29 UTC

bitcoin-dev

The discussion across various emails among Bitcoin developers focuses on the development and refinement of quantum-resistant strategies for Bitcoin transactions. The conversation delves into several key proposals and technical clarifications aimed at ensuring the security of Bitcoin in a post-quantum computing era.

OP_CAT Enables Winternitz Signatures

1 reply

By conduition

calendar icon

Original post on June 8, 2025 03:20 UTC

cyclic icon

Last reply on June 9, 2025 15:31 UTC

bitcoin-dev

In the pursuit of enhancing Bitcoin's resilience against quantum computing threats, developers are innovating on post-quantum cryptography solutions to ensure network security without compromising operational efficiency. The conversation revolves around the necessity for smaller signature schemes within a post-quantum Bitcoin network, highlighting the potential of lattice-based cryptography over larger hash-based alternatives like Lamport, WOTS, or SPHINCS signatures.

JIT fees with TXHASH: comparing options for sponsorring and stacking

By stevenroose

calendar icon

Original post on June 9, 2025 10:29 UTC

cyclic icon

Last reply on June 9, 2025 10:29 UTC

delvingbitcoin

In the realm of Bitcoin transactions, particularly with the advent of second layer solutions, the issue of fee payment has become increasingly complex. Traditional methods like CPFP (Child Pays for Parent) allow for just-in-time fee payments by creating a new transaction that spends from the original one, thus covering the fees for both transactions as a package.

Latency and Privacy in Lightning

39 replies

By carla

Involving brh , tbast +12 others

calendar icon

Original post on May 23, 2025 17:44 UTC

cyclic icon

Last reply on June 9, 2025 08:21 UTC

delvingbitcoin

The discussion during the last LN spec meeting shed light on several pivotal aspects regarding privacy, performance, and protocol behavior in the Lightning Network, particularly in the context of handling HTLCs. A notable point of debate was the potential privacy implications tied to disclosing precise HTLC hold times through attributable failures.

Against Allowing Quantum Recovery of Bitcoin

18 replies

By Jameson Lopp

Involving IdeA, Matt Corallo+7 others

calendar icon

Original post on March 16, 2025 14:15 UTC

cyclic icon

Last reply on June 8, 2025 14:04 UTC

bitcoin-dev

The discourse surrounding the potential impact of quantum computing on Bitcoin security has prompted a vibrant exchange amongst developers and stakeholders in the cryptocurrency community. At the heart of this discussion is the concern over how quantum technologies might compromise cryptographic standards that underpin Bitcoin's security model.

Bitcoin OP_CAT Use Cases Series #5: Drivechain

2 replies

By sCryptts

Involving bytes , light

calendar icon

Original post on December 6, 2024 08:09 UTC

cyclic icon

Last reply on June 7, 2025 21:46 UTC

delvingbitcoin

The necessity for an m-of-n group of operators, rather than permitting any user to initiate a withdrawal, is rooted in the aim to maintain security and order within blockchain operations. This arrangement ensures that state transitions are managed by a controlled group, enhancing the system's integrity by preventing unauthorized or fraudulent withdrawals.

Non-confiscatory Transaction Weight Limit

8 replies

By vostrnad

Involving instagibbs, sipa+4 others

calendar icon

Original post on May 28, 2025 19:01 UTC

cyclic icon

Last reply on June 6, 2025 17:50 UTC

delvingbitcoin

The discussion on the impact of large transactions on Bitcoin's block construction and network efficiency encapsulates a range of technical concerns and proposals aimed at preserving the blockchain's decentralized nature while accommodating evolving needs. The potential for infrequent yet significant large transactions, such as those related to BitVM, to necessitate a publicly accessible direct submission mechanism for miners has raised concerns about the ability to cap transaction sizes through consensus.

Censorship Resistant Transaction Relay - Taking out the garbage(man)

15 replies

By Peter Todd

Involving John Carvalho, Chris Guida+2 others

calendar icon

Original post on May 27, 2025 11:16 UTC

cyclic icon

Last reply on June 6, 2025 17:38 UTC

bitcoin-dev

In the realm of digital communication, censorship resistance and security are paramount. The introduction of PKDNS leverages the Mainline DHT to provide a robust framework for public-key domains, ensuring that control remains with the keyholder.

Post-Quantum commit / reveal Fawkescoin variant as a soft fork

11 replies

By Tadge Dryja

Involving Sergio Demian Lerner, Nagaev Boris+5 others

calendar icon

Original post on May 28, 2025 17:14 UTC

cyclic icon

Last reply on June 5, 2025 14:33 UTC

bitcoin-dev

In recent discussions among Bitcoin developers, there's been a significant focus on enhancing the cryptocurrency's security in anticipation of advances in quantum computing. A proposed method to address this concern involves a commit/reveal scheme designed to secure Bitcoin transactions against potential quantum computer attacks.

[Rust] descriptor-encrypt: Encrypt any descriptor such that only authorized spenders can decrypt

1 reply

By josh

Involving alex

calendar icon

Original post on June 4, 2025 01:43 UTC

cyclic icon

Last reply on June 4, 2025 19:46 UTC

delvingbitcoin

In the recent B25 hackathon, an innovative rust library named descriptor-encrypt was developed, which introduces a novel approach to encrypting Bitcoin wallet descriptors. This library allows for deterministic encryption of any wallet descriptor so that only a predefined set of keys, which are authorized to spend the funds, can decrypt it.

BIP39 Extension for Manual Seed Phrase Creation

6 replies

By Eric Kvam

Involving Kyle Honeycutt, Russell OConnor+2 others

calendar icon

Original post on May 23, 2025 11:25 UTC

cyclic icon

Last reply on June 4, 2025 17:45 UTC

bitcoin-dev

The discussion explores the nuances and potential improvements to the BIP39 checksum mechanism, focusing on alternative methods for generating and verifying mnemonic phrases. The conversation begins with an acknowledgment of the possible advantages in manually generating randomness over relying on computer chips' hidden processes.

Path Queries: Addressing Payment Reliability and Routing limitations

3 replies

By brh

Involving renepickhardt , brh28

calendar icon

Original post on May 9, 2025 17:39 UTC

cyclic icon

Last reply on June 4, 2025 15:25 UTC

delvingbitcoin

The draft PR created in the BOLTs introduces a significant proposal aimed at optimizing payment routes within networks without requiring prior knowledge of their liquidity state. This proposal suggests a mechanism whereby nodes can discover reliable payment paths through a single round-trip of path_query and path_reply, which is a stark contrast to the three round-trips required by traditional HTLC setups.

V3/TRUC miner adoption

By Peter Todd

calendar icon

Original post on June 4, 2025 11:35 UTC

cyclic icon

Last reply on June 4, 2025 11:35 UTC

bitcoin-dev

In a recent experiment conducted to understand the mining behavior regarding nVersion=3 (TRUC) transactions on the Bitcoin network, several interesting findings were observed. The experiment was initiated alongside an upgrade to Bitcoin node v29.0 on the Alice OpenTimestamps calendar.

Allowing Duplicate Keys in BIP 390 musig() Expressions

2 replies

By Ava Chow

Involving Nagaev Boris

calendar icon

Original post on June 3, 2025 21:07 UTC

cyclic icon

Last reply on June 3, 2025 21:38 UTC

bitcoin-dev

In discussing the technical nuances of Bitcoin Improvement Proposal (BIP) 327, several key points emerge regarding the handling of public keys within the cryptographic processes of Bitcoin transactions. The allowance of duplicate participant public keys under BIP 327 is highlighted as a noteworthy feature, despite the potential complexities it introduces into the signing procedures.

Draft BIP: Well-Known Bitcoin Identity Endpoint

3 replies

By Aviv Barel

Involving hodlinator, Murch

calendar icon

Original post on May 26, 2025 12:50 UTC

cyclic icon

Last reply on June 2, 2025 19:32 UTC

bitcoin-dev

The recent discussions within the Bitcoin Development Mailing List have brought to light AvivB's draft for a Bitcoin Improvement Proposal (BIP) aimed at refining the transaction processes within the Bitcoin ecosystem. The proposal, known as the "Well-Known Bitcoin Identity Endpoint," proposes an innovative approach to enhance on-chain payment transactions by adopting a simple, HTTPS-based protocol.

Hashed keys are actually fully quantum secure

13 replies

By Martin Habovštiak

Involving Agustin Cruz, Lloyd Fournier+4 others

calendar icon

Original post on March 16, 2025 18:25 UTC

cyclic icon

Last reply on June 2, 2025 18:29 UTC

bitcoin-dev

The series of discussions within the Bitcoin Development Mailing List covers a wide range of technical proposals and security concerns aimed at enhancing the resilience of Bitcoin in the face of evolving threats, particularly those posed by quantum computing. One focal point is the exploration of innovative mechanisms to safeguard transactions through cryptographic adjustments, such as employing Quantum Resistant (QR) signatures and committing to these within the blockchain infrastructure.

Bitcoin and Quantum Computing

5 replies

By ClaraShk

Involving AdamISZ, ClaraShk+1 other

calendar icon

Original post on May 28, 2025 14:25 UTC

cyclic icon

Last reply on June 2, 2025 15:03 UTC

delvingbitcoin

The exploration of quantum computing's impact on Bitcoin reveals a nuanced understanding of the potential threats and the various strategies that could be employed to mitigate these risks. The focus is on how quantum computing could undermine the cryptographic security integral to Bitcoin transactions and wallet protection.

Proposal to solve the spam war: configurable data blob relay policy

7 replies

By Jonathan Voss

Involving Pieter Wuille, Russell OConnor+3 others

calendar icon

Original post on May 24, 2025 21:07 UTC

cyclic icon

Last reply on June 2, 2025 10:25 UTC

bitcoin-dev

The discourse on the integration of non-monetary data within the Bitcoin blockchain has elicited varied perspectives, particularly focusing on proof-of-publication mechanisms and their implications for the technology's future. The utilization of Bitcoin as a publication layer for high-value use cases like Citrea, alongside its traditional financial utility, underscores the network's robustness in ensuring data permanence.

Sybil resistance in coinjoin implementations

1 reply

By bytes

Involving securitybrahh

calendar icon

Original post on May 27, 2025 22:05 UTC

cyclic icon

Last reply on May 28, 2025 10:28 UTC

delvingbitcoin

Cryptocurrency transactions are increasingly targeted by sybil attacks, where attackers control multiple nodes in a network to interfere with or manipulate transactions. These security breaches are particularly concerning for coinjoin implementations, which aim to enhance user privacy by mixing multiple transactions together, making it harder to trace individual coins.

Addressing community concerns and objections regarding my recent proposal to relax Bitcoin Core's standardness limits on OP_RETURN outputs

4 replies

By AntoineP

Involving cguida , AntoineP+2 others

calendar icon

Original post on May 14, 2025 19:34 UTC

cyclic icon

Last reply on May 27, 2025 01:18 UTC

delvingbitcoin

The discussion focuses on the debate surrounding the proposal to increase the OP_RETURN output limit in Bitcoin Core, addressing concerns about UTXO set bloat and network efficiency. The sender argues against this increase, highlighting the potential for misuse and the importance of preserving Bitcoin's primary function as a medium of exchange.

Perpetually KYC'd Coins Using Evil Covenants

17 replies

By light

Involving RobinLinus , recent +7 others

calendar icon

Original post on February 13, 2024 17:04 UTC

cyclic icon

Last reply on May 26, 2025 05:12 UTC

delvingbitcoin

The discussion on the effectiveness of Know Your Customer (KYC) protocols in digital currency systems reveals various challenges and considerations in preventing account misuse and the movement of illicit funds. Despite KYC processes, without additional measures like rate limiting or rapid blacklisting of compromised accounts, large unauthorized transactions can still occur.

Relax OP_RETURN standardness restrictions

69 replies

By Antoine Poinsot

Involving Sjors Provoost, Greg Sanders+22 others

calendar icon

Original post on April 17, 2025 18:52 UTC

cyclic icon

Last reply on May 25, 2025 15:53 UTC

bitcoin-dev

The ongoing discussions within the Bitcoin Development Mailing List have brought to light several key points regarding the use and regulation of OP_RETURN outputs in Bitcoin transactions. Initially, the standardness rules were established with the intention of discouraging the blockchain from being used as a data storage system, aiming to make data embedding slightly inconvenient while still allowing for an alternative that was less harmful than other methods.

Re: BIP39 Extension for Manual Seed Phrase Creation

1 reply

By pithosian

Involving nerdyrugbyguy

calendar icon

Original post on May 24, 2025 20:56 UTC

cyclic icon

Last reply on May 25, 2025 14:26 UTC

bitcoin-dev

The dialogue opens with Eric discussing the complexities and challenges associated with Bitcoin self-custody, highlighting the difficulties even technically adept individuals face with concepts like binary math and checksums. He notes that the reliance on what he terms "black box" solutions—tools whose internal workings are opaque to the user—poses a dilemma in ensuring trustless operation.

Dust Expiry: Clean the UTXO set from spam

32 replies

By RobinLinus

Involving orangesurf , anons +10 others

calendar icon

Original post on May 20, 2025 01:53 UTC

cyclic icon

Last reply on May 24, 2025 16:48 UTC

delvingbitcoin

The discourse encompasses a range of innovative strategies and considerations aimed at enhancing the efficiency and scalability of blockchain technology, with a particular focus on the management of Unspent Transaction Outputs (UTXOs). The discussions delve into the implications of UTXO set growth on network performance, exploring various methodologies and proposals designed to mitigate challenges associated with UTXO management without compromising the foundational principles of blockchain systems.

One of the primary topics discussed is the concept of utilizing Utreexo-style accumulators for initial block download (IBD) and sync processes.

Behind the OP_RETURN Drama

7 replies

By pandacute

Involving vostrnad , bytes +3 others

calendar icon

Original post on May 2, 2025 08:33 UTC

cyclic icon

Last reply on May 24, 2025 13:52 UTC

delvingbitcoin

The discourse on the relationship between Bitcoin developers and the wider community sheds light on several critical issues, including the misrepresentation of developers' intentions and the complexity of communication within a decentralized ecosystem. The narrative suggests that accusations against Bitcoin developers often stem from manipulation tactics designed to control public opinion.

Spanning-forest cluster linearization

8 replies

By sipa

Involving gmaxwell , sipa

calendar icon

Original post on February 5, 2025 01:08 UTC

cyclic icon

Last reply on May 24, 2025 00:56 UTC

delvingbitcoin

The exploration of algorithms for optimizing data processing and transaction handling within networks, particularly in the context of Bitcoin, reveals several innovative approaches aimed at enhancing performance, security, and fairness. A notable advancement is the introduction of a method to split equal-feerate chunks efficiently by slightly altering the feerates of transactions within a chunk.

On the possibility of evil covenants and implications for soft fork proposals

5 replies

By light

Involving gmaxwell , jamesob+2 others

calendar icon

Original post on May 17, 2025 21:36 UTC

cyclic icon

Last reply on May 23, 2025 17:25 UTC

delvingbitcoin

The dialogue on the productive use of covenants in Bitcoin highlights a nuanced debate within the programming and cryptocurrency community. It starts with an acknowledgment of the potential for compromise through multisig setups, which can emulate some of the functionalities proposed by covenants but not without certain trade-offs.

The Spam problem of Bitcoin and Unpermissioned Broadcast Networks in general

4 replies

By moonsettler

Involving gmaxwell , garlonicon +2 others

calendar icon

Original post on May 13, 2025 13:24 UTC

cyclic icon

Last reply on May 22, 2025 11:40 UTC

delvingbitcoin

The exploration of Layer Zero within the blockchain technology framework presents a novel perspective on transaction processing and network structuring. This foundational layer, positioned beneath the commonly discussed layers like sidechains (Layer Two) and enhancements such as the Lightning Network (Layer One and a Half), proposes a hierarchical inversion that could potentially streamline data handling across the network.

Stats on compact block reconstructions

29 replies

By xBC

Involving CryptiQ , sipa +9 others

calendar icon

Original post on August 2, 2024 12:08 UTC

cyclic icon

Last reply on May 22, 2025 02:56 UTC

delvingbitcoin

The conversation begins with an analysis of the efficiency and challenges associated with prefilling in compact block transactions within Bitcoin's network. Prefilling, although initially designed to streamline transactions by reducing the necessity for additional round-trip messaging, has encountered issues that could potentially exacerbate bandwidth wastage, especially when transactions are prefilled unnecessarily due to their availability from multiple sources.

vExtraTxnForCompact Considered Useful

5 replies

By szarka

Involving gmaxwell , gmaxwell

calendar icon

Original post on May 21, 2025 22:21 UTC

cyclic icon

Last reply on May 22, 2025 02:49 UTC

delvingbitcoin

The utility and implications of vExtra in the realm of Bitcoin node operation and mining have garnered attention for their potential benefits, despite some misconceptions within the blockchain community. vExtra is an essential component that goes beyond the more commonly discussed mempool, playing a crucial role in handling transactions that are rejected by policy, contrary to the belief that such transactions are simply discarded.

Best-(Worst-)Case MEVil Response

9 replies

By MattCorallo

Involving ajtowns , ariard +4 others

calendar icon

Original post on February 20, 2025 16:08 UTC

cyclic icon

Last reply on May 21, 2025 13:55 UTC

delvingbitcoin

The discourse surrounding Miner Extractable Value (MEV) and its implications within the cryptocurrency ecosystem, particularly in Bitcoin and Ethereum, presents a multifaceted analysis of how this concept affects transaction processing, blockchain security, and market dynamics. The discussion begins by addressing the absence of a universally accepted definition of MEV, highlighting the challenges in quantifying and comprehensively understanding its impacts.

Evolving the Ark protocol using CTV and CSFS

5 replies

By stevenroose

Involving instagibbs , roasbeef +2 others

calendar icon

Original post on April 15, 2025 11:54 UTC

cyclic icon

Last reply on May 21, 2025 06:26 UTC

delvingbitcoin

The recent advancements in blockchain technology, particularly through the Ark protocol and its variants, Erk and hArk, offer significant improvements in transaction efficiency and security. The Ark protocol, highlighted on Neha Narula's personal website, showcases a novel approach by integrating CheckTemplateVerify (CTV) and Covenants Secure Financial Systems (CSFS), positioning it as a strong contender against existing technologies like Lightning and rollups.

Verification of RISC-V execution using OP_CCV

2 replies

By halseth

Involving sjors , halseth

calendar icon

Original post on December 21, 2023 13:59 UTC

cyclic icon

Last reply on May 19, 2025 16:41 UTC

delvingbitcoin

The significant advancement in programming projects, specifically those involving emulation of a 32-bit system, is hindered by the limitation of Bitcoin Script, which only supports 31-bit arithmetic. This restriction necessitates the complete reimplementation of bit-by-bit arithmetic within the script, resulting in considerably larger scripts.

Avoiding xpub+derivation reuse across wallets, in a UX-friendly manner

6 replies

By kloaec

Involving salvatoshi , benk +1 other

calendar icon

Original post on April 29, 2025 17:54 UTC

cyclic icon

Last reply on May 19, 2025 16:02 UTC

delvingbitcoin

The ongoing discussions among cryptocurrency experts highlight a focused pursuit of balancing privacy with user-friendliness in wallet backup and key management strategies. A notable proposal involves integrating randomness into the derivation path of wallet keys, suggesting a method that combines a standard export path with random values to enhance user privacy without sacrificing usability across different software solutions.

OP_RETURN limits: Pros and Cons

5 replies

By bytes

Involving 40000bytes

calendar icon

Original post on May 1, 2025 09:21 UTC

cyclic icon

Last reply on May 19, 2025 15:05 UTC

delvingbitcoin

In a comprehensive review session led by Ava Chow, accessible via Twitch, key programming concepts and practices were thoroughly examined. Throughout this session, Chow emphasized the critical importance of adhering to fundamental programming principles such as clean code and efficient algorithm design.

How to linearize your cluster

78 replies

By sipa

Involving hebasto , lorbax +8 others

calendar icon

Original post on December 20, 2023 03:59 UTC

cyclic icon

Last reply on May 18, 2025 17:06 UTC

delvingbitcoin

The discussion delves into optimizing transaction processing within cryptocurrency networks, focusing on the efficiency of linearization algorithms which sort transactions according to their fee rates while ensuring topological order. These algorithms are crucial for managing large clusters of transactions, with post-processing techniques further refining the outcomes for better efficiency.

Unbreaking testnet4

31 replies

By Antoine Poinsot

Involving Melvin Carvalho, Sjors Provoost+9 others

calendar icon

Original post on March 18, 2025 14:29 UTC

cyclic icon

Last reply on May 17, 2025 05:11 UTC

bitcoin-dev

The ongoing discussions within the Bitcoin Development community have highlighted several key issues and proposals concerning the evolution and functionality of Bitcoin's testnets, with a particular focus on Testnet4 and the prospective Testnet5. These conversations reveal a concerted effort to address shortcomings in the current testing environment, aiming to enhance its utility for developers while maintaining the integrity and objectives of the Bitcoin network.

A significant point of contention has been the difficulty reset mechanism inherited by Testnet4 from its predecessor, Testnet3.

Public disclosure of one vulnerability affecting Bitcoin Core <29.0

1 reply

By Antoine Poinsot

calendar icon

Original post on April 28, 2025 19:00 UTC

cyclic icon

Last reply on May 16, 2025 14:41 UTC

bitcoin-dev

A recent security advisory has been issued for Bitcoin Core, pinpointing a low-severity issue that impacts versions of the software prior to 29.0. This version was released two weeks ago, marking an important update for users and developers concerned with maintaining the security and integrity of their operations within the Bitcoin ecosystem.

Bitcointap: an strace-like tool for bitcoin ebpf USDT tracepoints

2 replies

By jb

Involving willcl-ark, jb55

calendar icon

Original post on May 13, 2025 17:43 UTC

cyclic icon

Last reply on May 15, 2025 20:23 UTC

delvingbitcoin

The development of bitcointap marks a significant leap forward for Bitcoin developers, offering a new tool that enables enhanced insights into Bitcoin Core's runtime behavior through the use of Rust programming language. Bitcointap is both a library and a command-line interface (CLI) tool designed to tap into bitcoin-core's Berkeley Packet Filter (eBPF) User Space, Statically Defined Tracing (USDT) tracepoints without affecting its operational performance.

Withdrawing OP_VAULT (BIP-345)

3 replies

By jamesob

Involving sjors , instagibbs +1 other

calendar icon

Original post on May 6, 2025 15:51 UTC

cyclic icon

Last reply on May 15, 2025 09:14 UTC

delvingbitcoin

The latest discussions in the blockchain development community have centered on the potential malevolent uses, or MEvil, of OP_VAULT and its comparison with other application-specific opcodes. The absence of such MEvil potential in OP_VAULT is seen as a positive attribute that could make it more attractive to developers seeking to implement secure, application-specific opcodes in blockchain technology.

[Proposal] 64-bit arithmetic in Script

5 replies

By Chris Stewart

Involving Martin Habovštiak, Christian Decker

calendar icon

Original post on May 12, 2025 16:15 UTC

cyclic icon

Last reply on May 14, 2025 08:27 UTC

bitcoin-dev

The email exchanges delve into the development and proposed enhancements within Bitcoin's scripting capabilities, emphasizing the integration and potential deployment of new opcodes as part of Tapscript improvements. The discussion broadly covers the initiative to introduce 64-bit arithmetic capabilities through specific proposals, aiming to significantly impact scripting functionalities within the Bitcoin network.

A Comprehensive OP_RETURN Limits Q&A Resource to Combat Misinformation

By tidwell

calendar icon

Original post on May 12, 2025 17:31 UTC

cyclic icon

Last reply on May 12, 2025 17:31 UTC

delvingbitcoin

The compilation of questions gathered from Stacker News about OP_RETURN limits in Bitcoin presents a comprehensive overview of the community's concerns and discussions. These inquiries delve into various aspects of Bitcoin's functionality, potential changes to its core code, and the broader implications of these modifications on the network's health and user experience.

One of the primary areas of focus revolves around the management and configuration of mempools, with users expressing concerns over the removal of configurable options that previously allowed for more granular control over what transactions are accepted into a node's mempool.

Anecdotal kode (code) for humans

1 reply

By jsarenik

Involving jsarenik

calendar icon

Original post on February 12, 2025 14:55 UTC

cyclic icon

Last reply on May 12, 2025 16:22 UTC

delvingbitcoin

The innovative approach to block hash shortening is demonstrated through the introduction of two key concepts: the "shortened kode" (sk) and the "anecdotal kode" (ak). These concepts are critical for efficiently managing block hashes, with a focus on the anecdotal kode moving forward.

An overview of the cluster mempool proposal

23 replies

By sdaftuar

Involving harding , instagibbs +4 others

calendar icon

Original post on January 9, 2024 22:52 UTC

cyclic icon

Last reply on May 12, 2025 14:31 UTC

delvingbitcoin

The discussion begins by addressing a common question among newcomers regarding the potential for conflict between two transactions, referred to as C and C', in Bitcoin's mempool. The confusion arises when both transactions, despite having different parents (A and D, respectively), attempt to spend the same confirmed UTXO, thus leading to a conflict without an apparent direct dependency.

The conversation then shifts to the intricacies of Replace-By-Fee (RBF) transactions, emphasizing the need for setting limits to manage validation costs effectively.

The Tragic Tale of BIP30

12 replies

By Ruben Somsen

Involving Luke Dashjr, eric+2 others

calendar icon

Original post on April 27, 2025 16:45 UTC

cyclic icon

Last reply on May 10, 2025 16:55 UTC

bitcoin-dev

The recent discussions within the Bitcoin Development Mailing List have illuminated several critical aspects and proposed changes to the Bitcoin protocol, focusing on the integrity and future direction of the blockchain. A significant point of contention revolves around the handling of consensus bugs and the role of checkpoints in mitigating potential chain splits.

A simple approach to allowing recursive covenants by enabling quines

4 replies

By bramcohen

Involving ajtowns , bramcohen

calendar icon

Original post on May 2, 2025 23:23 UTC

cyclic icon

Last reply on May 9, 2025 06:29 UTC

delvingbitcoin

The email conversation explores the introduction of OP_ASSERT_OUTPUT as a simplified alternative to OP_CTV, focusing on enhancing Bitcoin's scripting capabilities for more dynamic uses, such as state channel gaming. This new opcode allows specifying outcomes within Bitcoin transactions more flexibly by making claims about individual outputs rather than the entire transaction.

Op_inout_amount

7 replies

By Chris_Stewart_

Involving halseth , salvatoshi+1 other

calendar icon

Original post on February 12, 2024 15:05 UTC

cyclic icon

Last reply on May 8, 2025 19:41 UTC

delvingbitcoin

The conversation revolves around the development and testing of new Script opcodes designed to enhance Bitcoin's scripting capabilities, specifically concerning the implementation of amount locks in transactions. This discourse is rooted in the exploration of OP_CHECKCONTRACTVERIFY (CCV) and a proposed new opcode, OP_INOUT_AMOUNT, which aims to directly manage transaction input and output values within the Script.

Path Queries: Overcoming liquidity uncertainty and other routing limitations

By brh28

calendar icon

Original post on May 6, 2025 20:31 UTC

cyclic icon

Last reply on May 6, 2025 20:31 UTC

delvingbitcoin

The discourse explores the challenges and proposed solutions concerning routing in payment networks, focusing on liquidity uncertainty, slow path discovery processes, and the limitations of existing routing mechanisms. It suggests an innovative approach through cooperative path queries which could significantly enhance payment routing efficiency and reduce associated costs.

Liquidity uncertainty emerges as a primary concern when routing payments, particularly with larger transactions through channels of lower capacity.

Re: [Opt-in full-RBF] Zero-conf apps in immediate danger

1 reply

By Anthony Towns

calendar icon

Original post on May 2, 2025 10:06 UTC

cyclic icon

Last reply on May 6, 2025 05:39 UTC

bitcoin-dev

The discussion from a thread on X last year provides valuable insights into the dynamics of Bitcoin and Lightning network transactions, particularly in relation to volume changes, user activity, and transaction sizes. A notable shift in the "relative volume" metric was observed, with bitcoin/lightning volume decreasing from 30%-40% in 2022 to 25%-30% by late 2024.

Introducing Hourglass

7 replies

By Hunter Beast

Involving Michael Tidwell, Jameson Lopp+4 others

calendar icon

Original post on April 29, 2025 22:38 UTC

cyclic icon

Last reply on May 4, 2025 06:00 UTC

bitcoin-dev

The emails from the Bitcoin Development Mailing List delve into various concerns and proposals regarding the security and stability of Bitcoin in the face of quantum computing threats and the management of trading volumes. Michael Tidwell critiques a strategy to manage Bitcoin's price through spending restrictions, highlighting that the market can absorb significant amounts of Bitcoin without such measures due to its capacity to handle one week to two months of global trading volumes.

SwiftSync - smarter synchronization with hints

15 replies

By Ruben Somsen

Involving Greg Maxwell, Saint Wenhao+3 others

calendar icon

Original post on April 9, 2025 10:10 UTC

cyclic icon

Last reply on May 4, 2025 01:06 UTC

bitcoin-dev

In a series of exchanges on the Bitcoin Development Mailing List, participants delved into various aspects of blockchain technology's security and efficiency. The discussions covered topics from the potential vulnerabilities in transaction ID (TXID) handling to innovative approaches for optimizing synchronization mechanisms among nodes within the network.

SwiftSync -- Speeding up IBD with pre-generated hints (PoC)

5 replies

By RubenSomsen

Involving sjors , lrinc +2 others

calendar icon

Original post on April 9, 2025 10:30 UTC

cyclic icon

Last reply on May 3, 2025 14:06 UTC

delvingbitcoin

The discussion on optimizing Bitcoin functionalities emphasizes the use of XOR as an aggregator for enhancing security and efficiency in blockchain operations. Concerns were raised about the suitability of using a block hash as a salt for comparing sets, leading to the suggestion of incorporating a per-node random number to improve seed generation.

Removing checkpoints in Bitcoin Core v30

2 replies

By Sjors Provoost

Involving eric

calendar icon

Original post on April 28, 2025 11:34 UTC

cyclic icon

Last reply on May 2, 2025 21:16 UTC

bitcoin-dev

In a comprehensive discussion on the Bitcoin Development Mailing List, the subject of checkpoints in the Bitcoin protocol was thoroughly examined. Checkpoints, initially implemented to safeguard against Denial of Service (DoS) attacks, have become a focal point due to their perceived potential to enhance performance.

BIP Proposal: Define Bitcoin Subunits as Satoshis/Sats

2 replies

By OceanSlim

Involving Lucas André, Jakub Szwedo

calendar icon

Original post on April 29, 2025 12:18 UTC

cyclic icon

Last reply on May 2, 2025 20:54 UTC

bitcoin-dev

The email highlights a proposal to integrate accessibility and voice/UI guidance into a Bitcoin Improvement Proposal (BIP) aimed at standardizing the terminology around Bitcoin's smallest unit. This suggested addition aims to make digital communication more inclusive, particularly for users of assistive technologies.

Bitcoin Logo

TLDR

Join Our Newsletter

We’ll email you summaries of the latest discussions from authoritative bitcoin sources, like bitcoin-dev, lightning-dev, and Delving Bitcoin.

Explore all Products

ChatBTC imageBitcoin searchBitcoin TranscriptsSaving SatoshiBitcoin Transcripts Review
Built with 🧡 by the Bitcoin Dev Project
View our public visitor count

We'd love to hear your feedback on this project?

Give Feedback