dewmap

19.7K posts

dewmap banner
dewmap

dewmap

@separ8

Software Architect https://t.co/2pLU5cmBPc

Se unió Ocak 2010
1.2K Siguiendo1.3K Seguidores
Tweet fijado
dewmap
dewmap@separ8·
@nntaleb Je salue votre courage, vous n'avez sûrement pas peur du ridicule. Le temps se chargera de votre éducation sur les technologies de rupture et les changements de paradim. Profitez de votre ignorance tant qu'elle dure.
Français
0
0
17
5.4K
dewmap retuiteado
Justin Bechler #BIP-110
Sure! But I thought you already understood BIP-110. 🤷🏻‍♂️ BIP-110 doesn’t evaluate whether a transaction is “monetary.” No human reviews anything. No subjective judgment is applied. The seven rules are deterministic: size limits on witness elements, opcode restrictions, control block caps. A transaction either violates a structural rule or it doesn’t. The node doesn’t know or care what the transaction is for. Every known monetary transaction type (payments, Lightning channels, CoinJoins, multisig, DLCs, exchange withdrawals, you name it) passes all seven rules cleanly. 4.7M tested, zero false positives. That’s not because someone defined “monetary”it’s because monetary transactions don’t need oversized witness data, OP_FALSE OP_IF envelopes, or OP_SUCCESS exploits. Data embedding does.
English
1
3
15
876
dewmap retuiteado
Jason Hodlers 🪢/BIP-110
Every Bitcoin educator needs to be on @Satsman. It's the little "nudge" Bitcoin needs to explode into global adoption. satsman.com/?ref=geekigai
Bitcoin Chattanooga@BitcoinChatt

Want to get paid while learning about Bitcoin? Meet @Satsman, a new web app that's supercharging Bitcoin education & adoption. In this video, @geekigai answers the top questions he had about Satsman. Sign up at Satsman.com/?ref=geekigai, & start stacking sats today!

English
0
2
3
61
dewmap
dewmap@separ8·
@BTCBreadMan "intellectually stimulating" True😎 For framing, you might enjoy this one👇I hope you will find it "intellectually stimulating" too. I certainly did. x.com/separ8/status/…
dewmap@separ8

THE ASYMMETRIC BET A First-Principles Framework for Preserving Bitcoin as Monetary Infrastructure Thesis Bitcoin is not a software product competing in a feature market. It is monetary infrastructure competing across time. The asymmetric bet is that a fixed, credibly constrained monetary base will outcompete all discretionary alternatives over long time horizons. If that premise is correct, then the primary engineering objective is not expressiveness, throughput, or short-term fee maximization, but the preservation of monetary credibility under adversarial conditions. Every protocol decision must therefore be evaluated against a single question: does this strengthen or weaken Bitcoin’s function as neutral, verifiable, time-resistant money? If the answer is ambiguous, restraint is the only rational default. I. Bitcoin as Civilizational Infrastructure Bitcoin is base-layer monetary infrastructure. It is not an application competing for users, nor a platform competing for features, nor a generalized data system seeking broader utility. Its function is singular: to provide a monetary settlement layer that operates without discretionary authority and without reliance on trust in centralized actors. Infrastructure is governed by a different engineering philosophy than products. Products evolve rapidly, adapt to user demand, and expand their feature set to remain competitive. Infrastructure, by contrast, must prioritize stability over novelty and predictability over expansion. The more foundational the layer, the more catastrophic the consequences of instability. Monetary infrastructure sits at the bottom of economic coordination; its failure propagates everywhere. Electric grids are not redesigned for creativity. Core internet routing protocols are not altered for experimentation. Systems that underpin civilization are judged by their continuity under stress. Money belongs in this category. The asymmetric bet is that a strictly constrained, rule-bound monetary base will outperform flexible, discretionary systems over long time horizons. If that premise is correct, then the primary obligation of those working on Bitcoin is preservation. Not preservation as dogma, but preservation as a rational response to time, adversarial pressure, and systemic risk. Every increase in protocol flexibility expands interpretive surface and validation complexity. Every expansion of permissible behavior alters long-term incentives. Infrastructure that widens its design surface increases the probability of unintended consequences compounding over decades. Bitcoin is not optimized for expressiveness. It is optimized for credibility. And credibility, once weakened, cannot be restored by iteration. As civilizational infrastructure, Bitcoin must be engineered with restraint, because its role is not to evolve quickly, but to endure. II. Code, Time, and the Narrow Optimum Bitcoin exists across time. Code does not live in the present; it compounds forward. Every rule becomes precedent. Every relaxation becomes baseline. Every expansion becomes assumed entitlement. Engineering for a short-lived system tolerates correction through iteration. Engineering for monetary infrastructure cannot rely on iteration as a safety net. Monetary credibility compounds slowly and erodes quickly. The asymmetry is temporal. The longer the time horizon, the narrower the acceptable design surface. Flexibility that appears harmless in a two-year window becomes ambiguity across twenty. A parameter change that seems trivial today alters incentives permanently once deployed. Validation costs that are marginal now accumulate into centralization pressure later. The narrow optimum is not aesthetic minimalism. It is an economic boundary. Bitcoin’s value proposition is credible constraint. Not maximum throughput. Not maximum programmability. Not maximum data permissiveness. Maximum monetary reliability under adversarial conditions. Widening the rule surface weakens that reliability because it increases interpretive complexity, state growth, and coordination burden. Monetary infrastructure must converge toward simplicity over time, not diverge into expressiveness. Restraint is therefore not ideological ossification. It is quality engineering under a civilizational time horizon. The burden of proof for any change must scale with the irreversibility of its consequences. If a change expands non-monetary use at the base layer, increases long-term validation cost, or introduces ambiguity in rule intent, it must clear an asymmetrical threshold. Because the cost of being slightly too restrictive is smaller than the cost of being slightly too permissive. In this context, restraint is not stagnation. It is defense of the monetary core. III. Authority and Defense Bitcoin’s security model is hierarchical whether acknowledged or not. That hierarchy must be explicit. - Users grant legitimacy. - Nodes enforce legitimacy. - Miners comply with legitimacy. - Developers codify legitimacy. Developers do not define Bitcoin. They implement it. Miners do not define Bitcoin. They compete within constraints. Nodes enforce consensus, and users choose which rules their nodes run. Authority flows upward from economic actors enforcing rules, not downward from those writing code. Any framing that elevates developer discretion above node enforcement is structurally inverted. Any framing that prioritizes miner incentives as protocol guidance confuses block production with rule legitimacy. The inversion error begins when protocol evolution is justified by what miners will include rather than what nodes should validate. It begins when short-term fee spikes are treated as evidence of healthy demand rather than potential adversarial capital deployment. It begins when flexibility is introduced because “the network is already doing it.” The network does not define the rules. The rules define the network. Pure fee-market arguments assume adversaries face budget constraints. That assumption fails in a fiat world with effectively unlimited capital pools. When actors with asymmetric financial resources can subsidize behavior at scale, the market signal becomes distorted. Apparent demand may be strategic expenditure. This is where defense must extend beyond abstract economic theory. Code sends signals. If base-layer rules signal neutrality toward non-monetary exploitation, capital will flow to exploit that neutrality. If the rules signal strict monetary alignment, exploitation becomes more expensive and less scalable. Defense of Bitcoin’s monetary function therefore begins with protection of node sovereignty. Validation must remain cheap, predictable, and accessible. State growth must remain bounded. Rule interpretation must remain mechanical, not discretionary. Prioritizing miner revenue over node enforceability is naive beyond belief. Miners are economically competitive actors. Nodes are the locus of decentralization. Security from first principles resides in the ability of ordinary economic actors to independently verify and reject invalid blocks. If node costs rise, verification centralizes. If verification centralizes, authority concentrates. If authority concentrates, monetary neutrality collapses. Defense of the primary monetary focus is not cultural preference. It is structural necessity. The base layer must remain aligned with its singular purpose: censorship-resistant, non-discretionary money. Anything that dilutes that purpose increases systemic risk. Bitcoin is not optimized for creativity. It is optimized for credibility. Every line of code must serve monetary sovereignty. Hard logic. First principles. No inversion. Don’t trust. Verify.

English
0
0
1
22
Breadman
Breadman@BTCBreadMan·
@separ8 And for the record, I have not updated to Core v30. Nor am I running Knots. I’m exercising my right to do nothing at the moment.
English
1
0
1
11
Breadman
Breadman@BTCBreadMan·
Bitcoin’s core innovation is neutrality. When you start filtering out “unacceptable” transactions, you introduce governance risk into a previously neutral system. This increases the odds of capture. Objective technical limits are good. Arbitrary/subjective filtering is bad.
English
15
1
8
1.3K
dewmap retuiteado
dewmap
dewmap@separ8·
"you’re not really solving a technical problem. You’re introducing a subjective problem. " No focus on Bitcoin is money shouldn't be seen as a subjective problem IMHO. Fixing technical challenges becomes impossible when the development culture is infected with a kind of ideological drift: the erosion of clear definitions, the elevation of confusion as sophistication, and the weaponization of tolerance to introduce an entirely different value system while pretending nothing has changed. A parameter change that seems trivial today alters incentives permanently once deployed. Validation costs that are marginal now accumulate into centralization pressure later. (Core v30)‼️ If the experts said it was 'safe and effective', who are we to question it? 🤷‍♂️ I trust the narrow optima.👇 x.com/adam3us/status…
English
1
0
2
36
Breadman
Breadman@BTCBreadMan·
That’s all well and good, but I think you’re mixing understandable cultural frustration with protocol design. Calling it woke or a Core agenda isn’t necessarily wrong, but it also doesn’t really engage with the actual constraint, which is that Bitcoin can’t *****objectively***** distinguish “money” from “non-money” at the protocol level. In Bitcoin’s eyes a valid transaction that pays a fee is a valid transaction. There’s no consensus rule that says “this output is monetary, this one is trash.” When you try to enforce that distinction (from a well-intentioned place, no doubt), you’re not really solving a technical problem. You’re introducing a subjective problem. Which is fine for your own node I suppose. Do whatever you want. But if it scales far enough then it potentially becomes a policy issue that negatively impacts Bitcoin’s neutrality.
English
2
0
0
27
dewmap
dewmap@separ8·
If you agree that Bitcoin is money, then what Satoshi provided to humanity is a way to separate money and the state. If bad actors find ways to abuse the protocol, isn’t it Core’s duty to work on tightening the loose ends to reach that goal, in your opinion? Or should the primary client just loosen the provided narrow monetary optimum to cater to the new reality of abuse on the network? 🤷‍♂️
English
0
0
0
21
Breadman
Breadman@BTCBreadMan·
@1914ad @separ8 There has always been such a thing as unacceptable transactions. Transaction that don’t meet the consensus rules are invalid. I’m arguing against deciding subjectively that a transaction that meets consensus rules is “non-monetary” or “abuse”, and filtering it out as a result.
English
2
0
0
20
dewmap
dewmap@separ8·
@PalomaXiom56687 @BTCBreadMan If base-layer rules signal neutrality toward non-monetary exploitation, capital will flow to exploit that neutrality. If the rules signal strict monetary alignment, exploitation becomes more expensive and less scalable.👇 x.com/separ8/status/…
dewmap@separ8

THE ASYMMETRIC BET A First-Principles Framework for Preserving Bitcoin as Monetary Infrastructure Thesis Bitcoin is not a software product competing in a feature market. It is monetary infrastructure competing across time. The asymmetric bet is that a fixed, credibly constrained monetary base will outcompete all discretionary alternatives over long time horizons. If that premise is correct, then the primary engineering objective is not expressiveness, throughput, or short-term fee maximization, but the preservation of monetary credibility under adversarial conditions. Every protocol decision must therefore be evaluated against a single question: does this strengthen or weaken Bitcoin’s function as neutral, verifiable, time-resistant money? If the answer is ambiguous, restraint is the only rational default. I. Bitcoin as Civilizational Infrastructure Bitcoin is base-layer monetary infrastructure. It is not an application competing for users, nor a platform competing for features, nor a generalized data system seeking broader utility. Its function is singular: to provide a monetary settlement layer that operates without discretionary authority and without reliance on trust in centralized actors. Infrastructure is governed by a different engineering philosophy than products. Products evolve rapidly, adapt to user demand, and expand their feature set to remain competitive. Infrastructure, by contrast, must prioritize stability over novelty and predictability over expansion. The more foundational the layer, the more catastrophic the consequences of instability. Monetary infrastructure sits at the bottom of economic coordination; its failure propagates everywhere. Electric grids are not redesigned for creativity. Core internet routing protocols are not altered for experimentation. Systems that underpin civilization are judged by their continuity under stress. Money belongs in this category. The asymmetric bet is that a strictly constrained, rule-bound monetary base will outperform flexible, discretionary systems over long time horizons. If that premise is correct, then the primary obligation of those working on Bitcoin is preservation. Not preservation as dogma, but preservation as a rational response to time, adversarial pressure, and systemic risk. Every increase in protocol flexibility expands interpretive surface and validation complexity. Every expansion of permissible behavior alters long-term incentives. Infrastructure that widens its design surface increases the probability of unintended consequences compounding over decades. Bitcoin is not optimized for expressiveness. It is optimized for credibility. And credibility, once weakened, cannot be restored by iteration. As civilizational infrastructure, Bitcoin must be engineered with restraint, because its role is not to evolve quickly, but to endure. II. Code, Time, and the Narrow Optimum Bitcoin exists across time. Code does not live in the present; it compounds forward. Every rule becomes precedent. Every relaxation becomes baseline. Every expansion becomes assumed entitlement. Engineering for a short-lived system tolerates correction through iteration. Engineering for monetary infrastructure cannot rely on iteration as a safety net. Monetary credibility compounds slowly and erodes quickly. The asymmetry is temporal. The longer the time horizon, the narrower the acceptable design surface. Flexibility that appears harmless in a two-year window becomes ambiguity across twenty. A parameter change that seems trivial today alters incentives permanently once deployed. Validation costs that are marginal now accumulate into centralization pressure later. The narrow optimum is not aesthetic minimalism. It is an economic boundary. Bitcoin’s value proposition is credible constraint. Not maximum throughput. Not maximum programmability. Not maximum data permissiveness. Maximum monetary reliability under adversarial conditions. Widening the rule surface weakens that reliability because it increases interpretive complexity, state growth, and coordination burden. Monetary infrastructure must converge toward simplicity over time, not diverge into expressiveness. Restraint is therefore not ideological ossification. It is quality engineering under a civilizational time horizon. The burden of proof for any change must scale with the irreversibility of its consequences. If a change expands non-monetary use at the base layer, increases long-term validation cost, or introduces ambiguity in rule intent, it must clear an asymmetrical threshold. Because the cost of being slightly too restrictive is smaller than the cost of being slightly too permissive. In this context, restraint is not stagnation. It is defense of the monetary core. III. Authority and Defense Bitcoin’s security model is hierarchical whether acknowledged or not. That hierarchy must be explicit. - Users grant legitimacy. - Nodes enforce legitimacy. - Miners comply with legitimacy. - Developers codify legitimacy. Developers do not define Bitcoin. They implement it. Miners do not define Bitcoin. They compete within constraints. Nodes enforce consensus, and users choose which rules their nodes run. Authority flows upward from economic actors enforcing rules, not downward from those writing code. Any framing that elevates developer discretion above node enforcement is structurally inverted. Any framing that prioritizes miner incentives as protocol guidance confuses block production with rule legitimacy. The inversion error begins when protocol evolution is justified by what miners will include rather than what nodes should validate. It begins when short-term fee spikes are treated as evidence of healthy demand rather than potential adversarial capital deployment. It begins when flexibility is introduced because “the network is already doing it.” The network does not define the rules. The rules define the network. Pure fee-market arguments assume adversaries face budget constraints. That assumption fails in a fiat world with effectively unlimited capital pools. When actors with asymmetric financial resources can subsidize behavior at scale, the market signal becomes distorted. Apparent demand may be strategic expenditure. This is where defense must extend beyond abstract economic theory. Code sends signals. If base-layer rules signal neutrality toward non-monetary exploitation, capital will flow to exploit that neutrality. If the rules signal strict monetary alignment, exploitation becomes more expensive and less scalable. Defense of Bitcoin’s monetary function therefore begins with protection of node sovereignty. Validation must remain cheap, predictable, and accessible. State growth must remain bounded. Rule interpretation must remain mechanical, not discretionary. Prioritizing miner revenue over node enforceability is naive beyond belief. Miners are economically competitive actors. Nodes are the locus of decentralization. Security from first principles resides in the ability of ordinary economic actors to independently verify and reject invalid blocks. If node costs rise, verification centralizes. If verification centralizes, authority concentrates. If authority concentrates, monetary neutrality collapses. Defense of the primary monetary focus is not cultural preference. It is structural necessity. The base layer must remain aligned with its singular purpose: censorship-resistant, non-discretionary money. Anything that dilutes that purpose increases systemic risk. Bitcoin is not optimized for creativity. It is optimized for credibility. Every line of code must serve monetary sovereignty. Hard logic. First principles. No inversion. Don’t trust. Verify.

English
0
0
0
7
Paloma Xiomara
Paloma Xiomara@PalomaXiom56687·
@separ8 @BTCBreadMan Understanding algorithmic bias requires examining both its theoretical foundations and its practical limitations under resource constraints.
English
1
0
0
4
dewmap
dewmap@separ8·
Filters and the human factor. A strategic woke narrative by Core paved the way for a philosophical shift: Bitcoin’s block space rebranded as digital real estate for sale to the highest bidder. "shifted from only monetary transactions in blocks to any amount of trash that someone is willing to allow into a block." @MajorianBTC What even is spam? 1200× OP_RETURN Gloria Antoine v30 Core is not addressing the issue; it’s normalising the abuse. From this I derive that the issue is more in the vision that Core decided to impose on Bitcoin than a technical challenge that cannot be solved. I sincerely believe that if a Core developer, representative, or PR voice can publicly say things like “What even is spam?” or claim that NFTs on Bitcoin are legitimate transactions, then Core has drifted from its primary mission of separating money and state. It feels like Bitcoin has been turned into a pet project, where block space is used as an arbitrary data container, with fees legitimizing any use case. At the end of the day, we all want better money. That won’t be achieved by minimizing the impact of, or legitimizing, alternative use cases on the base layer. Spam is not the long-term issue; it’s a means to an end, in my opinion. There is no sustainable long-term economic incentive behind JPEGs on Bitcoin. Once scammers run out of victims, that activity will fade away. What won’t fade, however, are well-funded Layer 2s introducing gamification and tokenization without the social stigma, thanks to Core v30. BIP-110 is a reminder a signal. A temporary soft fork is a perfectly valid tool to deliver it, in my opinion. Fix the culture, fix the technicals. Fix the money, fix the world.
English
2
0
4
37
Breadman
Breadman@BTCBreadMan·
@separ8 I’ll ask you what I asked Justin: Please explain to me how there’s an objective way to define “monetary transactions” at the policy layer without the need for subjectivity or social coordination. Perhaps there is and I just don’t understand it.
English
2
0
0
69
dewmap retuiteado
Mechanic #BIP-110
Mechanic #BIP-110@GrassFedBitcoin·
Now get a Microsoft employee to merge the age checker into systemd
Mechanic #BIP-110 tweet media
English
3
15
135
1.6K
dewmap retuiteado
Philip D'Ath
Philip D'Ath@philip_dath·
@SpectrGen @TheBoozles @MARA You need to add rejecttokens=1 to your Knots or bip110 node. It doesn't do it yet, but a future version is likely to add opnet to the token list.
English
0
2
10
126
dewmap
dewmap@separ8·
@davesob @1914ad "If someone can decide who gets to use it, it’s not permissionless" It's not "who" it's "how" FFS😂🤣
dewmap tweet media
English
0
0
4
16
Dave O'Brien
Dave O'Brien@davesob·
@1914ad If someone can decide who gets to use it, it’s not permissionless
English
5
0
1
33
dewmap retuiteado
Justin Bechler #BIP-110
Villains have bastardized “permissionless” to disguise their abuse. The truth is simple: run a node to use Bitcoin as permissionless, censorship-resistant money. 🧡 Imagine believing that the beauty of Bitcoin’s permissionless is that bad actors are free to abuse the network.
GIF
English
4
10
63
826
dewmap retuiteado
Eduardo Prospero
Eduardo Prospero@edprospero23·
Another data point. Geographical distribution is key to Bitcoin decentralization. (Also, I recommend listening to the whole John Attack interview. The things he reveals about Bitcoin Core are critical)
Jim | #BIP110 | Bitcoin, not jpegs@venorusprime

Grants to developers do not have to be given with explicit strings attached in order for secondary incentives to be created. It is sufficient that grantees be exposed to an environment welcoming of "use case" maxis for them to get the message of what is expected. This loops back to another recurring point @jonatack made during this conversation: The importance of developer diversification in both background and geography. When most of the devs are geographically centralized it is easier for social pressures to be applied and reinforced.

English
0
6
15
241
dewmap retuiteado
Bitcoin for Freedom
Bitcoin for Freedom@BTC_for_Freedom·
@1914ad @omgbruce If a Bitcoin influencer doesn’t tweet about Knots/BIP-110, you know they’re a grifter. We are fighting the most important battle in Bitcoin’s history, and if you never tweet about it, you’re not here for Bitcoin, you’re here for engagement only.
English
12
39
190
5.1K
dewmap retuiteado
Motorist ┃ 🪢BIP110
Motorist ┃ 🪢BIP110@BitcoinMotorist·
They got sponsors to think about. What do you expect them to do? Starve?
Bitcoin for Freedom@BTC_for_Freedom

@1914ad @omgbruce If a Bitcoin influencer doesn’t tweet about Knots/BIP-110, you know they’re a grifter. We are fighting the most important battle in Bitcoin’s history, and if you never tweet about it, you’re not here for Bitcoin, you’re here for engagement only.

English
2
3
31
618
Jim
Jim@elkrun21·
Bitcoin is valuable because it’s immutable. It’s immutable because it’s decentralized and secure. Tens of thousands of individuals (maybe more) have to run nodes with uninfluenced software to keep it that way.
English
1
3
14
168
dewmap retuiteado