Your daily summary

Antoine Riard's work over the summer on enhancing the bitcoind build system and developing the libbitcoinkernel project aims to run the bitcoin consensus engine in a secure enclave, minimizing security threats. The project, still in its early stages and seeking broader recognition, has made its standalone repository available on GitHub, offering developers a foundation for creating or integrating full-node implementations without starting from scratch.

Andrew Toth introduces enhancements to the Partially Signed Bitcoin Transaction (PSBT) format to support silent payments for enhanced privacy, as outlined in BIP 370 and BIP352. This requires additional data fields and alters the roles within the PSBT framework to accommodate the new silent payment outputs, aiming to integrate more private transactions into the Bitcoin network while maintaining compatibility with existing standards. The technical intricacies of this proposal are detailed, emphasizing the role of cryptographic proofs in obscuring transaction details.

The discussion on quantum resistance in Bitcoin, led by conduition, highlights a proactive approach to safeguarding against future quantum computing threats. It suggests a transitional strategy using a hash-based signature algorithm (HBS) for a post-quantum secure key, advocating for a pragmatic and flexible method to prepare for quantum computing advancements without immediate consensus changes. The proposal, including the adoption of Winternitz OTS as an emergency fallback mechanism, is seen as a forward-thinking strategy to ensure the long-term security of Bitcoin transactions against quantum threats, detailed further in the discussions at DelvingBitcoin.org.

Lastly, discussions around "Bundled Payments" in the BOLT12 specification, introduced by accumulator, propose an innovative invoice format supporting multiple preimages and amounts. This development targets enhancements in non-custodian exchanges and submarine swaps, providing detailed specifications and discussions on its implementation and utility in the blockchain ecosystem, accessible through the Linux Foundation's mailing list.

Subscribe to our weekly newsletter

Get the latest updates on the community, upcoming topics, and new discussions in your inbox every week.

Filter by List

Active Discussions 🔥

1 reply

Authored by

Agustin Cruz

Involving

Jon Atack

  • The BIP proposes quantum-resistant cryptography for Bitcoin, including SPHINCS+ and Dilithium.
  • It suggests a new address format and updates to transactions and scripts for quantum resistance.
  • AgustĂ­n Cruz seeks community feedback on the proposal, available for review online.

1 reply

Authored by

/dev /fd0

Involving

Abubakar Ismail

  • Address re-use in Bitcoin transactions risks privacy, spurring a call for change.
  • Proposed solutions include modifying mempool policies and redefining package transactions for privacy.
  • Challenges like increased scanning time and the need for developer consensus complicate implementation.

Authored by

scott beeker

  • Transitioning Bitcoin to SLH-DSA aims to protect against quantum computing threats.
  • SLH-DSA implementation implies substantial changes to Bitcoin’s protocol and increased transaction costs.
  • Despite challenges, SLH-DSA enhances security, but demands extensive community consensus and testing.

31 replies

Authored by

ZmnSCPxj

Involving

ariard, t-bast+2 others

  • The SuperScalar mechanism enhances Bitcoin Lightning Network's liquidity without blockchain changes.
  • It combines Decker-Wattenhofer mechanisms, timeout trees, and laddering for security and efficiency.
  • Practical deployment includes incentives for user activity and strategic tree structuring for liquidity.

7 replies

Authored by

t-bast

Involving

David Harding, Vincenzo Palazzo

  • Bolt 12 enhances lightning wallets by enabling payment via metadata-linked offers and a contacts list.
  • It proposes a method for selective identity sharing using a `contact_key` for trusted transactions.
  • Feedback is sought to refine selective identity revelation in payments, aiming for privacy and security.

3 replies

Authored by

roasbeef

Involving

benthecarman, everythingSats

  • Over thirty Lightning developers met in Tokyo to discuss Lightning and Bitcoin protocol developments.
  • They explored Package Relay, V3 Commitments, and innovative fee management and transaction reliability solutions.
  • Focus areas included enhancing Lightning privacy, scalability, and introducing BOLT 12 for improved payment features.

Today in Bitcoin/LN History

8 replies

Posted November 6, 2018 16:16 UTC

Authored by

Weiji Guo

Involving

Jon, Neill Miller+3 others

  • Weiji Guo highlighted BIP-0039's language dependency in mnemonic sentence generation.
  • Guo suggests mnemonic codes represent entropy directly, with translation tools for assistance.
  • He proposes numerical representation for seed/secret to aid non-English speakers' understanding.

11 replies

Posted November 1, 2018 01:03 UTC

Authored by

Rusty Russell

Involving

Gert-Jaap Glasbergen, Anthony Towns+4 others

  • Gert-Jaap Glasbergen argues against removing htlc_minimum_msat for preventing trimmed HTLCs.
  • He suggests adjustments like transaction_min_msat_multiple and chain-specific minimum_depth.
  • Rusty Russell partially agrees, but finds the sub-1000 msat opt-out impractical due to low fees.

5 replies

Posted August 16, 2023 15:22 UTC

Authored by

jamesob

Involving

Ajian, CubicEarth+3 others

  • Bitcoin's scalability aims for 50,000 off-chain "bitcoin banks" to support 1 billion users.
  • Concepts like federated sidechains and coinpools are explored to address high main chain transaction costs.
  • Effective large-scale Bitcoin custody and transaction solutions require balancing scalability with proactive security and regulatory compliance.

All Activity

1 reply

Posted October 22, 2024 20:21 UTC

Authored by

ellemouton

Involving

harding

The recent summit discussions have revealed a consensus on the necessity for considerable updates to the current protocol proposal, emphasizing the introduction of new message structures and their announcement methodologies. A pivotal change involves transitioning to a Pure Type-Length-Value (TLV) format for all new messages.


2 replies

Posted October 22, 2024 19:51 UTC

Authored by

cryptoquick

Involving

conduition

The conversation around introducing quantum resistance into the Bitcoin protocol is gaining momentum, driven by the escalating concerns over the potential threats quantum computing may pose to the cryptocurrency's security infrastructure. The proposed Bitcoin Improvement Proposal (BIP) seeks to preemptively address these threats by incorporating a suitable signature algorithm that would prepare Bitcoin for the advanced capabilities of quantum computing.


1 reply

Posted October 22, 2024 13:52 UTC

Authored by

MishaKomarov

Involving

GaloisField2718

The discussion centers around the innovative implementation of covenants in Bitcoin through the use of Polynomial Inner Product Encryption (PIPE), which does not necessitate a soft fork, enhancing the blockchain's capabilities by allowing for advanced spending rules. These rules can specify conditions under which coins can be spent, such as restricting transactions to certain addresses or after particular conditions are met.


3 replies

Posted October 21, 2024 21:38 UTC

Authored by

roasbeef

Involving

everythingSats , benthecarman +1 other

The discussion highlights a pivotal moment in the development of Payment Through Lightning Channels (PTLC), focusing on the debate between adopting single signature or MuSig2 based adapter signatures. The recent merge of the musig module for libsecp, which does not yet implement MuSig2 adapter signatures, suggests that further developments, including drafting a new Bitcoin Improvement Proposal (BIP), are anticipated.


1 reply

Posted October 20, 2024 07:33 UTC

Authored by

/dev /fd

Involving

Abubakar Ismail

The discussion revolves around the concerns and potential solutions regarding address re-use in Bitcoin transactions, highlighting its significant privacy risks for all transaction parties. A suggestion has been made to alter the mempool policy to reject transactions that involve address re-use.


Posted October 20, 2024 06:56 UTC

Authored by

Antoine Riard

During the summer, a significant effort was made to enhance the bitcoind build system and further develop the libbitcoinkernel projects. The motivation behind these efforts was to explore the feasibility of running the historical bitcoin consensus engine independently within a secure enclave.


7 replies

Posted October 18, 2024 04:01 UTC

Authored by

tbast

Involving

David Harding , Vincenzo Palazzo +1 other

The recent discussion focuses on the development of a new protocol aiming to enhance privacy and security within the CLN (C-Lightning) framework, as detailed in an updated proposal available at bLIP 42. This protocol introduces the use of a distinct invreq_payer_id for each contact, a method that significantly improves domain separation.


31 replies

Posted October 17, 2024 22:42 UTC

Authored by

ZmnSCPxj

Involving

cryptoquick , ariard +3 others

The discussion delves into the intricate details and concerns surrounding the SuperScalar mechanism and its integration and impact on the Bitcoin Lightning Network, particularly focusing on scalability, security, and operational efficiency. The mechanism, influenced by the Decker-Wattenhofer decrementing-nSequence mechanisms and timeout trees, is engineered to enhance offchain liquidity allocation to new users without necessitating any changes to blockchain consensus.


Posted October 17, 2024 13:40 UTC

Authored by

Andrew Toth

This proposal introduces enhancements to the Partially Signed Bitcoin Transaction (PSBT) format, specifically Version 2 as outlined in BIP 370, to support silent payments as described in BIP352. Silent payments aim to enhance privacy by altering how transaction outputs are computed and verified, necessitating additional data fields and revised responsibilities for entities involved in the transaction process.

Silent payment transactions differ from standard PSBTs in that output scripts cannot be finalized until all inputs have been added to the transaction.


Posted October 17, 2024 00:45 UTC

Authored by

scott beeker

The consideration of transitioning Bitcoin to a post-quantum cryptographic algorithm such as SLH-DSA (Stateless Hash-Based Digital Signature Algorithm) stems from the growing concern over potential threats posed by quantum computing. This transition is seen as crucial for safeguarding Bitcoin against the capabilities of quantum computers, which could eventually break the cryptocurrency's current elliptic curve cryptography.


3 replies

Posted October 16, 2024 09:00 UTC

Authored by

andyschroder

Involving

accumulator

The recent discussions and developments around the BOLT12 specification have brought to light several key proposals aimed at enhancing its functionality and addressing current limitations. One such idea involves the implementation of bundled payments within the spec, allowing invoices to include multiple preimages and amounts.


9 replies

Posted October 15, 2024 22:32 UTC

Authored by

AntoineP

Involving

David Harding , ariard +2 others

The conversation delves into the technical nuances of Bitcoin's scripting and signature verification mechanisms, particularly focusing on the FindAndDelete function and its implications for script execution and consensus. The FindAndDelete function is crucial as it modifies a copy of the script for the purpose of committing to it in the sighash without affecting the script being executed.


30 replies

Posted October 15, 2024 21:03 UTC

Authored by

EthnTuttle

Involving

davidcaseria , bytes +5 others

The conversation on the Stratum Mining protocol's GitHub page delves into the pivotal advancements represented by the Stratum V2 mining protocol. This protocol is seen as a significant leap forward for the mining sector, promising enhanced efficiency and security.


Posted October 15, 2024 09:50 UTC

Authored by

40000bytes

Recent discussions at the bitcoin++ conference highlighted innovative applications of the ecash protocol beyond its traditional use in monetary transactions. Specifically, the utilization of blind signatures, as implemented in coinjoin by Wabisabi, demonstrates potential for applications such as discount coupons.


15 replies

Posted October 14, 2024 13:03 UTC

Authored by

halseth

Involving

bytes , ajtowns +4 others

The recent updates to a specific repository have introduced significant enhancements in the verification of schnorr signatures within a Zero-Knowledge (ZK) environment for blockchain transactions. This development eliminates the need to blind public keys during the verification process, focusing on proving the validity of a signature associated with a public key in the Unspent Transaction Output (UTXO) set without revealing the key itself.


4 replies

Posted October 14, 2024 09:00 UTC

Authored by

Weiji Guo

Involving

Weikeng Chen

The recent updates in cryptographic solutions within the domain of open application circuits emphasize a shift towards recursive verification to streamline the process. This approach negates the requirement to publish each application circuit's verification key on-chain, opting instead for a singular circuit verified through recursion.


5 replies

Posted October 12, 2024 04:46 UTC

Authored by

Antoine Riard

Involving

Peter Todd, waxwing/ AdamISZ

The conversation starts with the recognition of a need for clear, step-by-step instructions for volunteers interested in setting up new nodes, focusing on the use of current and default installations of Core/btcd along with lnd/cln/ldk. It delves into specifics such as the amount required in channels, the necessary number of channels, the relevance of channel types, volunteer interconnectivity, desired network topology, and the significance of network connectivity and Tor usage.


3 replies

Posted October 11, 2024 20:17 UTC

Authored by

ZmnSCPxj

Involving

ariard , bytes +1 other

The discussion around Bitcoin's development and the challenges in implementing consensus changes delves into the complexities beyond the technical aspects, such as halving cycles and market speculation. It suggests that the evolution and stabilization of Bitcoin are significantly influenced by broader factors, including real-world power dynamics and the roles of influential figures and financial stakeholders.


26 replies

Posted October 10, 2024 22:36 UTC

Authored by

salvatoshi

Involving

sipa , josibake +6 others

In the realm of cryptocurrency security, especially within Bitcoin's framework, the conversation about enhancing the functionality and security of Extended Public Keys (XPUBs) through various hashing methods is gaining attention. The goal is to devise a system that can derive chain code from XPUBs in a manner immune to the order in which they are applied, addressing issues related to wallet policies or descriptors' sequence and their behaviors in multi-signature setups.


Posted October 10, 2024 12:56 UTC

Authored by

ajtowns

The latest release, Bitcoin Inquisition 28.0, is now publicly accessible at the provided GitHub link, building upon the foundations of Bitcoin Core 28.0. This version introduces several significant enhancements including support for TRUC and anchor relay mechanisms while implementing a default full replace by fee behavior to optimize transaction handling.


6 replies

Posted October 10, 2024 09:03 UTC

Authored by

AntoineP

Involving

roasbeef , ariard +3 others

The recent publication detailing a vulnerability in the btcd framework has sparked a comprehensive discussion regarding the ethics and practices surrounding the disclosure of security vulnerabilities within software, especially those critical to the infrastructure of digital currencies like Bitcoin. A notable aspect of this discourse is the contrasting approaches to vulnerability disclosure timelines between various projects, with Google's Project Zero providing a structured timeline that differs significantly from the more conservative approach adopted by Bitcoin Core.


Posted October 9, 2024 19:30 UTC

Authored by

Niklas Goegge

The recent communication highlights significant security vulnerabilities identified in Bitcoin Core versions preceding 25.0, marking an important development for users and contributors alike. These vulnerabilities are meticulously documented and can be found through the provided links, which include detailed discussions on issues like mutated blocks hindering propagation, challenges with sending large inventories, and a specific vulnerability that could lead to a crash when processing block transactions.


Posted October 9, 2024 16:32 UTC

Authored by

waxwing/ AdamISZ

The blog post authored by AdamISZ/waxwing, available at Reyify, delves into the concept of adaptor signatures and their potential expansion beyond traditional limitations. The initial inquiry revolves around the utility of on-chain verification for statements not confined to the secp256k1 generator G. This question branches into two directions: the recognition of its usefulness for Zero-Knowledge Proof (ZKP) constructions and the acknowledgment of its current impracticality due to limitations in verification capabilities.

The core of the investigation examines if adaptor signatures could enable a form of verification that is not directly possible.


Posted October 7, 2024 20:25 UTC

Authored by

MishaKomarov

This post introduces Bitcoin PIPEs (Polynomial Inner Product Encryption), a groundbreaking approach to implementing covenants on Bitcoin without necessitating a soft fork. Covenants are mechanisms that enable users to set specific conditions on how their coins can be spent in the future, thereby unlocking advanced spending rules and new use cases such as the native verification of Zero-Knowledge Proofs, the creation of native tokens with complex behaviors, and restaking mechanisms to pool Bitcoin for securing other networks.


Posted October 7, 2024 12:16 UTC

Authored by

Dr. Craig S. Wrong

The project Swift Bitcoin, accessible through GitHub and its website, represents a significant effort by the creator to delve deeply into the inner workings of Bitcoin. Initially, it was conceived as a platform for the developer to enhance their understanding of Bitcoin's mechanics, focusing on the implementation of various Bitcoin Improvement Proposals (BIPs) using Swift, a favorite programming language of the developer.


Posted October 4, 2024 23:31 UTC

Authored by

Ava Chow

Bitcoin Core version 28.0 is now available for download from bitcoincore.org, introducing new features, several bug fixes, performance improvements, and updated translations. Users encountering bugs are encouraged to report them on the project's GitHub issue tracker at GitHub.


Posted October 4, 2024 06:45 UTC

Authored by

ajtowns

The integration of Plotly.js for graphing capabilities within a Discourse theme component represents a significant advancement in data visualization directly within forums or discussion platforms. This development enables users to create and interact with traditional XY plots using simple text markup, eliminating the need for external image generation.


3 replies

Posted September 28, 2024 02:28 UTC

Authored by

James Ferguson

Involving

Pieter Wuille, Keagan McClelland

In the realm of cryptocurrency, particularly Bitcoin, managing small, unspendable residual amounts known as dust is a challenge that impacts network efficiency, transaction fees, and privacy. The proposal titled "Keep the Change," which introduces the concept of "OP_KEEPCHANGE," aims to address these issues by crediting small residual Unspent Transaction Outputs (UTXOs) to the primary recipient’s address instead of generating new change outputs.


4 replies

Posted September 27, 2024 18:42 UTC

Authored by

ajtowns

Involving

garlonicon , levantah +1 other

The discussion introduces a novel approach to Pay to Proof of Work (P2W) transactions on the Bitcoin testnet4, utilizing a specific address and script that leverages a less than 60-byte signature requirement. This method allows for a gradual increase in difficulty without necessitating any consensus changes, making it applicable across various networks including the mainnet.


4 replies

Posted September 26, 2024 23:03 UTC

Authored by

carla

Involving

ProofOfKeags , morehouse

The discussion surrounding the reputation system for managing Hashed Timelock Contracts (HTLCs) within a network highlights several critical points related to the decision-making process of forwarding and receiving HTLCs. It emphasizes the dual focus of nodes on both incoming and outgoing directions, ensuring that transactions are endorsed by nodes with reputable histories.


7 replies

Posted September 26, 2024 18:02 UTC

Authored by

renepickhardt

Involving

AntonioPerez , harding +2 others

The discussion centers on the nuances of network state weighting, liquidity distribution in channels, and their implications for node balance uniformity within the context of minimum cost flow (MCF) computations and wealth distribution. The sender initially corrects a miscount in states to ten, which alters the basis of their argument regarding the probability models used to compare wealth distributions and payment feasibility.


3 replies

Posted September 26, 2024 15:02 UTC

Authored by

Jonas Nick

Involving

Antoine Riard, Weikeng Chen

The discussion revolves around several key challenges and innovations in the realm of blockchain technology, with a particular focus on privacy, scalability, and efficiency. One significant challenge highlighted is the process of bridging within blockchain protocols, which is crucial for enhancing Bitcoin's capabilities, including the introduction of strong privacy measures.


2 replies

Posted September 26, 2024 12:59 UTC

Authored by

sCryptts

Involving

benthecarman, ajtowns

The exploration of enhancing Bitcoin's covenant mechanism through the use of OP_CAT combined with the Schnorr signature scheme represents a significant stride in streamlining the signature computation process. By adopting a specialized technique for key selection, this method addresses the inherent limitations of Bitcoin Script's OP_ADD operation, which struggles with directly incrementing a 256-bit integer.


9 replies

Posted September 25, 2024 12:04 UTC

Authored by

Hunter Beast

Involving

PierreLuc DallaireDemers, Antoine Riard+1 other

The recent discussions and updates surrounding the development of a Bitcoin Improvement Proposal (BIP) to introduce quantum resistance into Bitcoin's cryptographic framework underscore the community's proactive approach towards safeguarding the cryptocurrency against potential quantum computing threats. Central to these discussions is the acknowledgment of IBM's advancements in quantum computing, particularly with its Quantum System Two, which potentially supports up to 16,000 qubits.


3 replies

Posted September 25, 2024 02:22 UTC

Authored by

ZmnSCPxj

Involving

renepickhardt , ZmnSCPxj

The discussion on the incorporation of multiparty channel constructs within payment channel networks highlights both potential benefits and challenges. The primary advantage of these constructs is their ability to enhance payment reliability and offer service level guarantees.


delvingbitcoin

Lightning Cheques

Posted September 24, 2024 21:23 UTC

Authored by

andyschroder

The concept of Lightning Cheques is introduced as an innovative paper-based payment method within the cryptocurrency domain, specifically tailored for offline transactions using the Lightning Network. These instruments combine a BOLT12 invoice_request on the front side with an offer on the back, facilitating a new way to conduct transactions without direct internet access.


1 reply

Posted September 24, 2024 15:36 UTC

Authored by

rustaceanrob

Involving

valuedmammal

The discussion focuses on improving the wallet recovery process for cryptocurrency users and their heirs, highlighting the necessity for an intuitive and standardized approach. The current recovery methods, which often require manual insertion of descriptors from various file formats like txt or json, are deemed inadequate and cumbersome.


20 replies

Posted September 23, 2024 18:48 UTC

Authored by

kravens

Involving

bytes , conduition +5 others

The conversation largely focuses on the intricacies and challenges associated with implementing privacy-centric protocols in cryptocurrency transactions, particularly those that enhance anonymity without relying on centralized coordination. A key point of discussion is the SINGLE|ACP protocol, which, despite its potential for maintaining transaction privacy, faces scrutiny over its requirement for matching input/output indices.


10 replies

Posted September 23, 2024 14:33 UTC

Authored by

virtu

Involving

sipa , bytes +1 other

The discussion begins by addressing a novel encoding mechanism devised to maintain the integrity of response entries' order. This is crucial given that recursive resolvers may alter the sequence, potentially leading to data misinterpretation.


4 replies

Posted September 23, 2024 03:34 UTC

Authored by

andyschroder

Involving

ZmnSCPxj , tbast +1 other

The proposal presented in the GitHub pull request aims to enhance security within the Bitcoin Lightning Network by establishing a standard for secure communication between remote nodes and high-uptime home nodes through BOLT8. It emphasizes the pairing of remote nodes with hardware wallets, such as Ledger and Coldcard, to improve both ease of use and security for users managing their nodes remotely.


98 replies

Posted September 19, 2024 18:48 UTC

Authored by

Ava Chow

Involving

LĂ©o Haf, Greg Tonoski+34 others

The recent discourse within the Bitcoin Development Mailing List has shed light on the pressing issue of managing and advancing Bitcoin Improvement Proposals (BIPs), which are crucial for the evolution of Bitcoin's protocol. The acknowledgment of a bottleneck in the BIP process, primarily due to limited oversight capacity, has catalyzed discussions on enhancing the procedural framework for BIP evaluations and integrations.

A pivotal suggestion that emerged from these talks is the proposal to augment the team of BIP editors.


39 replies

Posted September 19, 2024 14:55 UTC

Authored by

Fi

Involving

plebhash , marathongary +4 others

The recent advancements and discussions within the cryptocurrency mining community highlight several key developments aimed at enhancing the transparency, efficiency, and fairness of mining operations. A notable update has been made to the share accounting system, as detailed in a GitHub repository, which introduces significant changes intended to improve share verification and management.


1 reply

Posted September 19, 2024 08:12 UTC

Authored by

Antoine Poinsot

Involving

Antoine Riard

Antoine Poinsot has highlighted a pivotal update concerning Bitcoin Core, specifically addressing the misconception that checkpoints are no longer utilized as a defense mechanism against known attacks. This clarification comes in the wake of discussions sparked by the report produced by Darosior, which led to the reevaluation of the role of checkpoints within the Bitcoin Core infrastructure.


2 replies

Posted September 13, 2024 14:58 UTC

Authored by

Jassu

Involving

mcelrath, Jassu7082

Proof of Partial Work (PoPW) is a concept significant within the realm of cryptocurrency mining, particularly in the context of mining pools. It represents the effort miners contribute by submitting shares that demonstrate the work they've performed, even if it hasn't led to the discovery of a new block.


12 replies

Posted September 11, 2024 15:14 UTC

Authored by

remyers

Involving

murch , remyers

The recent developments in optimizing transaction fees through innovative coin selection strategies have garnered significant attention within the cryptocurrency community, particularly among Bitcoin developers and Lightning Service Providers (LSPs). A focal point of these discussions has been the draft pull request PR 30080 on Bitcoin's GitHub repository.


Posted September 9, 2024 12:40 UTC

Authored by

Ethan Heilman

The Bitcoin Improvement Proposal (BIP) discussed introduces a new opcode, FOLDFUNCTIONSTREAM, which is a modification of the existing NOP4 opcode within the Bitcoin scripting system. This opcode aims to efficiently perform functional folds across data, addressing issues related to computational expense and safety in script execution.


Posted September 9, 2024 10:54 UTC

Authored by

dgpv

The recent update to B'SST, a project hosted on GitHub, marks a significant transition from a proprietary license to AGPLv3 with its version update from 0.1.3 to 0.1.4. This change primarily aims to address the concerns and limitations imposed by the previous licensing model.


44 replies

Posted September 5, 2024 23:18 UTC

Authored by

AntoineP

Involving

bytes , sjors +9 others

The discussion encapsulates various proposals and considerations aimed at addressing vulnerabilities and inefficiencies within the Bitcoin protocol. A primary focus is on mitigating the timewarp attack, which threatens the network's stability by artificially lowering mining difficulty.


16 replies

Posted September 5, 2024 09:04 UTC

Authored by

reardencode

Involving

sipa , moonsettler +3 others

In the exploration of cryptographic security, a novel approach known as "Dark Smoothie" has been brought to light, revealing a significant vulnerability within digital transactions. This method allows an attacker to extract sensitive information, specifically a 256-bit seed, from just two signatures generated by the same device.


4 replies

Posted September 3, 2024 00:35 UTC

Authored by

Victor Kolobov

Involving

Matt Corallo, /dev /fd+1 other

The discussion encompasses a variety of topics related to Bitcoin development, particularly focusing on the post-Taproot activation landscape and the exploration of covenants or contracting primitives extending Bitcoin script. It reflects on the historical stalemate in consensus discussions since Taproot's activation in 2021, suggesting that a lack of trial-and-error design and development processes akin to those used for Schnorr/Taproot changes has hindered progress.


Posted September 3, 2024 00:13 UTC

Authored by

shehzanmaredia

The recent release of the Lava Loans paper introduces a new DLC-based loans protocol aimed at facilitating more trust-minimized bitcoin-secured loans. This development is shared within the Delving Bitcoin community, where it has garnered attention and feedback from its active members.


Posted September 2, 2024 23:18 UTC

Authored by

Tobin Harding

The ReadCompactSize function, as defined in serialize.h, includes an optional range_check parameter that is set to true by default. This setting ensures that the value read by the function does not exceed 0x02000000, effectively enforcing a limit that keeps the compact size value within the bounds of a 32-bit unsigned integer.


6 replies

Posted August 31, 2024 13:28 UTC

Authored by

valuedmammal

Involving

xBC , murch +1 other

The recent discussions and research into blockchain transaction dynamics have uncovered several intriguing insights, particularly regarding block reconstruction and the nuances of transaction replacements under full-RBF (Replace-By-Fee) policies. A notable point from these discussions is the potential for increased noise due to a five-minute snapshot interval in analyzing transaction replacements.


Posted August 29, 2024 11:21 UTC

Authored by

victorkstarkware

Achieving general computation on Bitcoin has long been a challenging goal due to inherent limitations in Bitcoin's script system, notably its script length and opcode expressibility constraints. However, the landscape began changing with the Taproot upgrade in 2021, which significantly eased the script length limitation and introduced the potential for more complex applications on Bitcoin.


2 replies

Posted August 27, 2024 19:39 UTC

Authored by

Peter Todd

Involving

Keagan McClelland, Antoine Riard

The discovery of a novel vulnerability within the Bitcoin transaction process, notably affecting transactions where fees are paid using a method known as Child Pays for Parent (CPFP) through the use of keyless ephemeral anchors, has raised concerns about the security and reliability of cryptocurrency transactions. This vulnerability facilitates what is termed a replacement cycling attack, which enables attackers to disrupt the standard processing of transactions at minimal cost, assuming they intend to transact with a higher total fee and fee-rate than their target.


7 replies

Posted August 27, 2024 13:52 UTC

Authored by

Anthony Towns

Involving

Luke Dashjr, Matt Corallo

The conversation delves into the nuanced challenges and potential strategies within cryptocurrency mining, particularly focusing on block withholding attacks and the implications for mining pools. It highlights the dilemma faced by pools in distinguishing between honest miners and attackers, especially given the feasibility of such attacks even with a minor portion of the pool’s total hash rate being maliciously used.


Posted August 26, 2024 13:33 UTC

Authored by

Antoine Poinsot

This message serves as an update regarding the security status of Bitcoin Core. The sender informs recipients that there are no new vulnerabilities to report for the current month, adhering to a previously established schedule for such disclosures.


Posted August 25, 2024 14:36 UTC

Authored by

Antoine Riard

The discussion raises a crucial point about the necessity for an upgrade in pool software to address the timewarp attack, highlighting a new consensus rule. This rule stipulates that the timestamp (nTime) for each block, at heights divisible by 2016, must not be less than 600 seconds earlier than the preceding block's nTime.


15 replies

Posted August 23, 2024 13:48 UTC

Authored by

ajtowns

Involving

RubenSomsen , stevenroose +2 others

The critique of deflationary currencies, particularly Bitcoin, highlights their potential to disrupt economic stability. Deflationary spirals, where falling prices lead to reduced spending and investment, culminating in economic depression, are a significant concern.


Posted August 22, 2024 23:23 UTC

Authored by

40000bytes

I'm sorry, but without the specific content or context provided for the task, I can't generate a summary. Could you please share more details or provide the text you'd like summarized?.


27 replies

Posted August 22, 2024 20:55 UTC

Authored by

murch

Involving

zawy , AntoineP +5 others

The email discussion illuminates various facets of blockchain security, particularly focusing on the challenges and proposed solutions regarding block timestamps and difficulty adjustments. It begins with an analysis of the need for a balance between hash power and difficulty levels to maintain an optimal block production rate.


10 replies

Posted August 22, 2024 20:42 UTC

Authored by

bytes

Involving

ajtowns , aspargus +4 others

The Lightning Network (LN) is recognized for its potential in facilitating proper escrows, particularly through the mechanism where a payment hash preimage is generated and released once verification of goods delivery is confirmed by the escrow operator. However, the implementation of such services on LN faces challenges, notably due to the time-sensitive nature of HTLCs which contrasts with the longer durations often required by escrow agreements.


1 reply

Posted August 22, 2024 13:42 UTC

Authored by

dr-orlovsky

Involving

ajtowns

In the realm of software development and updates, particularly those related to Bitcoin protocols such as RGB smart contracts, new Rust Lightning implementations (LNP), and bitcoin-based self-sovereign identities (SSI), there is a nuanced approach to sharing information and announcements within a community or forum. The method of disseminating this type of content should be carefully considered to ensure it reaches the appropriate audience effectively.

When introducing new releases of libraries and tools associated with these technologies, it's recommended to go beyond mere announcement posts.


6 replies

Posted August 22, 2024 11:43 UTC

Authored by

/dev /fd

Involving

Fabian, David Harding+2 others

The recent discussions around a new method for activating soft forks in the Bitcoin network have brought several concerns and ideas to the forefront. The mechanism proposed introduces a cost for signaling, aiming to ensure that only users with genuine economic activity participate in the decision-making process.


4 replies

Posted August 22, 2024 00:35 UTC

Authored by

sjors

Involving

bytes , 40000bytes

The discussion brings to light concerns regarding the potential for increased censorship in Bitcoin transactions, specifically focusing on the use of nLockTime values. It highlights a key issue that current protocols automatically mine and relay transactions set with nLockTime values either in the past or to a lower height, without considering the implications.


1 reply

Posted August 22, 2024 00:02 UTC

Authored by

ajtowns

Involving

40000bytes

In an effort to refine the moderation tools and improve the community experience, a recent update has been made to the flagging system used within the forum. The "inappropriate" flag, previously denoted for content deemed offensive, abusive, or in violation of community guidelines, has been redefined as the "not constructive" flag.


6 replies

Posted August 20, 2024 20:22 UTC

Authored by

bytes

Involving

ursuscamp , ProofOfKeags +3 others

A soft fork within blockchain technology necessitates not only the technical consensus among nodes but also an economic agreement, underscoring the vital role of communal acceptance for any changes to be effectively integrated and recognized. The discussion around User-Activated Soft Forks (UASF) presents them as a cleaner, more direct method of initiating soft forks by engaging network users rather than relying on miner approval first.


1 reply

Posted August 20, 2024 01:12 UTC

Authored by

1440000bytes

Involving

40000bytes

The document proposes a novel method for the activation of soft forks within the Bitcoin network, leveraging nLockTime as a signaling mechanism. This approach is introduced as an alternative to the existing BIP 8 and BIP 9 methods, which have sparked controversy due to their respective activation mechanisms.


41 replies

Posted August 16, 2024 04:45 UTC

Authored by

Peter Todd

Involving

Antoine Riard, /dev /fd+6 others

The discourse among Bitcoin developers, notably between Antoine Riard and Peter Todd, sheds light on a critical security vulnerability within the Bitcoin network related to transaction relays and double-spending. The vulnerability hinges on exploiting nodes with full Replace-By-Fee (RBF) disabled, allowing for an attack where low fee-rate transactions are initially broadcast across the majority of the network and subsequently double-spent with higher fees to a single miner.


24 replies

Posted August 15, 2024 09:09 UTC

Authored by

myles

Involving

CubicEarth , MattCorallo +7 others

The multifaceted debate around Bitcoin’s block size encompasses technical, economic, and philosophical dimensions, focusing on the balance between maximizing fee revenue for miners and maintaining network efficiency and decentralization. The optimal block size is neither too large nor too small but dynamically adjusts to fluctuating demand for on-chain volume.


11 replies

Posted August 12, 2024 04:18 UTC

Authored by

tony

Involving

bytes , cryptorevue +4 others

The discussion revolves around the intricacies of Lightning Network (LN) channels, specifically distinguishing between classical LN channels and hosted channels. Classical LN channels are integrated with a dispute resolution mechanism that leverages blockchain technology, allowing for on-chain settlement of disputes.


1 reply

Posted August 9, 2024 15:23 UTC

Authored by

gijswijs

Involving

MattCorallo

The discussion around the potential Denial-of-Service (DoS) threats posed by Onion Messages (OM) in the Lightning Network has been a topic of considerable interest, particularly highlighted in the recent paper "Short Paper: Onion Messages on Leash" by Amin Bashiri and Majid Khabbazian from the University of Alberta. This paper, presented at the Financial Cryptography and Data Security 2024 conference, offers an analytical approach to mitigating possible DoS risks associated with OM. Available for review at https://fc24.ifca.ai/preproceedings/104.pdf, it addresses the technical nuances and proposes several countermeasures to enhance network resilience.

An interesting point raised in the paper is the recalibration of the maximum number of hops an OM can make, which was previously set based on outdated payload size assumptions.


3 replies

Posted August 8, 2024 10:17 UTC

Authored by

xBC

Involving

CryptiQ , 0xB10C

The discussion on the impact of extra pool sizes on block reconstruction within blockchain technology delves into two primary areas: the additional transactions held for compact block reconstruction and the variations in mempool sizes among peers. The role of a peer's feefilter in estimating their pool size is examined, albeit with limitations due to privacy concerns and calculation methods.


Posted August 7, 2024 21:47 UTC

Authored by

Cory Fields

Hennadii Stepanov (hebasto) has undertaken the significant task of transitioning Bitcoin Core's build system from Autotools to CMake, a project that has spanned several years and involved extensive review and collaboration. This effort is notable for its ambition, given the complexities associated with migrating build systems in large software projects, and has led to numerous bug fixes and modernizations not only for Bitcoin Core but also for its dependencies, benefiting the wider open-source community.

The new CMake build system, after thorough review and testing by developers, is poised for integration into the master branch following the v28 feature-freeze and prior to the commencement of work on v29.


27 replies

Posted August 5, 2024 21:35 UTC

Authored by

josibake

Involving

Sosthene , andrewtoth +2 others

The conversation opens with a discussion on the integration of the Anti-exfil protocol into the secp256k1 library, highlighting its relevance due to demands for Discrete Logarithm Equality (DLEQ) proofs in future updates and the necessity posed by vulnerabilities such as those exposed by the darkskippy.com attack. This suggestion is motivated by the need for broader hardware wallet support and the aim to enhance security measures within core cryptographic libraries, presenting an opportunity to address multiple concerns simultaneously.

A shift in strategy for handling DLEQ proofs within Bitcoin Improvement Proposals (BIPs) is observed, leading to the separation of these proofs into their own BIP to maintain clarity and focus in the PSBT draft.


2 replies

Posted August 4, 2024 06:41 UTC

Authored by

Niklas Goegge

Involving

Peter Todd, hashnoncemessage

Recent discussions have brought to light two critical security vulnerabilities that have raised concerns within the digital security community. These vulnerabilities, revealed in reverse chronological order on the advisories page, highlight the ongoing challenges faced in cybersecurity regarding the dissemination and management of sensitive information.


Posted August 2, 2024 08:45 UTC

Authored by

Garlo Nicon

Implementing changes in test networks, specifically testnet3, is advised as a starting point for any updates due to its close resemblance to the mainnet in terms of history and the occurrence of multiple halvings. This approach could mitigate potential issues arising from insufficient block rewards and vulnerability to attacks, such as miners mining empty blocks for profit through demurrage fees or censoring transactions by refusing to include them in blocks.


8 replies

Posted August 2, 2024 05:08 UTC

Authored by

Richard Greaser

Involving

Christian Riley, José Edil Guimarães de Medeiros+4 others

The discourse within the Bitcoin development community has recently delved into the feasibility and implications of introducing a demurrage fee system within the Bitcoin network. This concept, aimed at incentivizing the movement of coins to support miners post-halving events by imposing fees on inactive coins, has sparked spirited debate.


1 reply

Posted August 1, 2024 00:45 UTC

Authored by

Sivaram Dhakshinamoorthy

Involving

Sivaram D

Sivaram has introduced a draft for a Bitcoin Improvement Proposal (BIP) focused on the FROST threshold signing protocol. The proposal is comprehensive, detailing design aspects, guidelines for usage, considerations regarding security, and includes a Python implementation along with test vectors for practical reference.