CBTC.kor

8.5K posts

CBTC.kor banner
CBTC.kor

CBTC.kor

@BitcoinCreds

Central Bitcoin Timechain Creds || Junior, Advanced, and Master CAL - Core Aptitude Licenses || User-Funded Software Academy

Puerto Rico, USA Katılım Mayıs 2022
3K Takip Edilen622 Takipçiler
Sabitlenmiş Tweet
CBTC.kor
CBTC.kor@BitcoinCreds·
Outsourced workforce but it's just a revenue sharing paid membership member-run clubhouse
English
2
3
12
1.6K
CBTC.kor retweetledi
Murch
Murch@murchandamus·
BIP376: "Spending Silent Payment Outputs with PSBTs" has been published.
Murch tweet media
English
4
17
85
4.4K
CBTC.kor retweetledi
Conor Deegan
Conor Deegan@conordeegan·
Introducing THINCS 🤔 SLH-DSA is the most conservative standardised post-quantum signature scheme we have. Its security reduces entirely to hash function properties (no lattice assumptions or algebraic structure). The tradeoff is size; the smallest fast variant produces 17,088-byte signatures and the smallest compact variant still comes in at 7,856 bytes. This is because the standardised parameter sets all support up to 2^64 signatures per key, and the signatures are massive as a result. Most signing keys will never need anywhere near that many signatures. To put 2^64 in perspective, signing once per second would take 42 times the age of the universe to exhaust the key. A firmware key might sign a few thousand times, a CA root a few hundred. If you know your actual budget, the underlying construction lets you trade that unused capacity for much smaller signatures at the same security level. As ecosystems start adopting hash-based signatures, there will be applications where tuning the scheme to the actual signing requirement makes more sense than using the general-purpose defaults. This is why I built THINCS. It is a Rust CLI. You give it a total amount of signatures you need it to support and a security level, and it finds and builds the smallest possible signature scheme that meets your requirements. You can then keygen, sign, and verify with it directly.
Conor Deegan tweet media
English
14
23
137
16.5K
CBTC.kor retweetledi
Code Orange Dev School
Code Orange Dev School@CodeOrangeDevs·
Our final @BitcoinDojo1 call will take place this Monday 11:00 UTC. We will discuss next steps which are: - Joining a @rawBit_io study cohort - Start contributing to Good First Issue - Start a Code Orange workshop - Join @MITBitcoinClub hackathon
Code Orange Dev School tweet media
English
2
4
10
256
CBTC.kor retweetledi
Fundamentals 40HPW
Fundamentals 40HPW@Fundamentals21m·
The Bitcoin elliptic curve has an algabraic structure that is important to understand. Additionally, the transactions defined by the protocol have a structure that is important to understand. Magic Internet Math is going hard to create materials and resources to develop this understanding in the context of becoming a stronger human. magicinternetmath.com/index.html
Fundamentals 40HPW tweet media
English
0
1
6
172
CBTC.kor retweetledi
Bitshala
Bitshala@bitshala_org·
No internet? No problem. Bala just dropped the ultimate cypherpunk demo at the BOSS Summit: From Off-Grid to On-Chain He literally broadcasted a live Bitcoin transaction using Mesh Radio. No ISPs, no Wi-Fi, no cellular data. Just pure radio waves bypassing the traditional internet layer to hit the mempool. When we say we are building unconfiscatable money for uncertain times, this is exactly what we mean. Mind blown. Here is the repo used to connect meshtastic to bitcoin core:github.com/BTCtoolshed/Me…
Bitshala tweet mediaBitshala tweet media
English
181
968
4.5K
242K
CBTC.kor retweetledi
bitprojects
bitprojects@bitprojects_io·
All of my nodes have been completely offline for 24+ hours and will not return. If this were a true sybil attack there would/could have been actual negative impacts to the bitcoin node network, especially as there were hundreds of nodes that were -only- connecting to my nodes at any given time. A lot more people now know what sybil and eclipse attacks are, and how to detect/investigate them. I have some ideas on ways to bring in more BGP routing table data into bitcoin node decisions, including not just origin AS but full AS path. In what I stood up as a demonstration, I also was able to defeat asmap because I used multiple origin ASNs, but if there is visibility available into the AS paths to reach nodes, that would then be detectable.
bitprojects@bitprojects_io

Current inbound connection stats: 80,526 inbound connections from 35,127 unique source IPs. Current outbound TCP/8333 traffic: 5475.1 Mbps This will be the last post of these stats, as I will begin shutting down this node infrastructure at midnight UTC. The intended outcome of this 2 year project was to point out (and then prove, as requested) that there is a significant vulnerability in how bitcoin nodes communicate. That outcome has been reached, as the people who can understand the vulnerability have observed and acknowledged. There is no longer a reason to keep this running, so I'm shutting it down and will be looking for other ways to contribute. Connection stats details: === Inbound TCP/8333 (bitcoin) Connection and Network Stats === Total unique destination IPs: 3042 Total unique destination /24 subnets: 12 Total destination subnets sharing /16 boundary: 0 Total ASNs: 3 Total subnets advertised per ASN: 4 Total inbound connections: 80526 Total unique source IPs: 35127 === Source IP Connection Thresholds === Source IPs with 8+ connections: 653 Source IPs with 10+ connections: 433 Source IPs with 12+ connections: 307 Source IPs with 16+ connections: 178 Source IPs with 32+ connections: 38 Source IPs with 64+ connections: 14 Source IPs with 512+ connections: 0 Source IPs with 2048+ connections: 0 --- To seed maintainers @pwuille @TheBlueMatt @_jonasschnelli_ @peterktodd @provoost @emzy @wiz @achow101 @LukeDashjr @leo_haf Please remove all seed entries for nodes in the following IP blocks: 45.40.98.0/24 66.163.223.0/24 89.106.27.0/24 103.47.56.0/24 103.246.186.0/24 123.100.246.0/24 173.46.87.0/24 174.140.231.0/24 184.174.95.0/24 203.11.72.0/24 206.206.109.0/24 216.107.135.0/24

English
0
7
25
1.1K
Dathon Ohm / BIP-110
Dathon Ohm / BIP-110@dathon_ohm·
I wonder how much hashpower needs to be signaling before Core devs will consider BIP-110 to have "broad" support. #issuecomment-4137959250" target="_blank" rel="nofollow noopener">github.com/bitcoin/bitcoi…
Dathon Ohm / BIP-110 tweet media
English
11
29
182
4.1K
CBTC.kor
CBTC.kor@BitcoinCreds·
@bonomat Imagine monetizing sub-conf weakwork. Getting paid BEFORE finding a work-template match to satisfy difficulty. Thus, having an extra nonce by rotating these sub-conf template space bidders is just an added benefit. That's your mempool on -kapnet #MineWithKapnet @KNUPool
English
0
0
1
3
CBTC.kor retweetledi
Brink
Brink@bitcoinbrink·
Today we’re publishing Brink's 2025 Engineering Impact Report covering the work of the eight Bitcoin Core engineers we funded last year and why we think this work is important.
Brink tweet media
English
6
30
109
33.1K
CBTC.kor retweetledi
Eric Voskuil
Eric Voskuil@evoskuil·
Exponential performance decay is not caused by payload, it's a consequence of non-scalable implementation. More nodes on the same architecture will not solve this, nor will censorship.
Knotzi@_Knotzi

72.71% after 84 hours.

English
1
3
18
1.6K
CBTC.kor
CBTC.kor@BitcoinCreds·
Fewer 503(c) more DAOs on -kapnet
Filipino
0
0
3
25
CBTC.kor
CBTC.kor@BitcoinCreds·
@josebitcoiner @Excellion Absolutely cleaning house. Keep the grassroots dry by affinity grifting latent philanthropic arbitrage. GG
English
0
0
1
8
calle
calle@callebtc·
The Bitcoin builder space is at a moral low. A handful of teams are still moving things forward. You matter more than ever, and we see you. More weight, fewer shoulders. Keep going 🫡
English
22
19
239
9K
CBTC.kor retweetledi
Bitcoin Core PR Reviews
Bitcoin Core PR Reviews@BitcoinCorePRs·
We're back with a special Review Club edition! @SebastianvStaa is walking us through some of the big changes in the upcoming Bitcoin Core v31 release, and how you can test them.
English
2
10
30
1.3K
CBTC.kor retweetledi
simulx4
simulx4@simulx4·
#aggwit - reduced block size for utxo-heavy transactions - makes ordinals more expensive - makes financial transactions less expensive - adds on-chain privacy
n_Oda@_Node_Out

Blocksize v5 #Aggwit 128 kB - Unupgraded Script 256 kB - v3 Script 1 MB - SegWit 4 MB - AggWit Tie-In/Untie/MWEB v3 UTXO accrue entropy debt delta every BLOCK_OP based on its inputs. v5 Blocks and v3 UTXO are weight adjusted according to their share of the blockchain's delta.

English
1
4
6
175