CBTC.kor

8.5K posts

CBTC.kor banner
CBTC.kor

CBTC.kor

@BitcoinCreds

Central Bitcoin Timechain Creds || Junior, Advanced, and Master CAL - Core Aptitude Licenses || User-Funded Software Academy

Puerto Rico, USA เข้าร่วม Mayıs 2022
3K กำลังติดตาม622 ผู้ติดตาม
ทวีตที่ปักหมุด
CBTC.kor
CBTC.kor@BitcoinCreds·
Outsourced workforce but it's just a revenue sharing paid membership member-run clubhouse
English
2
3
12
1.6K
CBTC.kor รีทวีตแล้ว
rawBit
rawBit@rawBit_io·
Bitcoin Under the Hood ⚡ An Intro to raw Transactions with Anika & rawBit
English
0
2
5
137
CBTC.kor รีทวีตแล้ว
Murch
Murch@murchandamus·
BIP376: "Spending Silent Payment Outputs with PSBTs" has been published.
Murch tweet media
English
4
17
85
4.5K
CBTC.kor รีทวีตแล้ว
Conor Deegan
Conor Deegan@conordeegan·
Introducing THINCS 🤔 SLH-DSA is the most conservative standardised post-quantum signature scheme we have. Its security reduces entirely to hash function properties (no lattice assumptions or algebraic structure). The tradeoff is size; the smallest fast variant produces 17,088-byte signatures and the smallest compact variant still comes in at 7,856 bytes. This is because the standardised parameter sets all support up to 2^64 signatures per key, and the signatures are massive as a result. Most signing keys will never need anywhere near that many signatures. To put 2^64 in perspective, signing once per second would take 42 times the age of the universe to exhaust the key. A firmware key might sign a few thousand times, a CA root a few hundred. If you know your actual budget, the underlying construction lets you trade that unused capacity for much smaller signatures at the same security level. As ecosystems start adopting hash-based signatures, there will be applications where tuning the scheme to the actual signing requirement makes more sense than using the general-purpose defaults. This is why I built THINCS. It is a Rust CLI. You give it a total amount of signatures you need it to support and a security level, and it finds and builds the smallest possible signature scheme that meets your requirements. You can then keygen, sign, and verify with it directly.
Conor Deegan tweet media
English
14
23
137
16.6K
CBTC.kor รีทวีตแล้ว
Code Orange Dev School
Code Orange Dev School@CodeOrangeDevs·
Our final @BitcoinDojo1 call will take place this Monday 11:00 UTC. We will discuss next steps which are: - Joining a @rawBit_io study cohort - Start contributing to Good First Issue - Start a Code Orange workshop - Join @MITBitcoinClub hackathon
Code Orange Dev School tweet media
English
2
4
10
257
CBTC.kor รีทวีตแล้ว
Fundamentals 40HPW
Fundamentals 40HPW@Fundamentals21m·
The Bitcoin elliptic curve has an algabraic structure that is important to understand. Additionally, the transactions defined by the protocol have a structure that is important to understand. Magic Internet Math is going hard to create materials and resources to develop this understanding in the context of becoming a stronger human. magicinternetmath.com/index.html
Fundamentals 40HPW tweet media
English
0
1
6
173
CBTC.kor รีทวีตแล้ว
Bitshala
Bitshala@bitshala_org·
No internet? No problem. Bala just dropped the ultimate cypherpunk demo at the BOSS Summit: From Off-Grid to On-Chain He literally broadcasted a live Bitcoin transaction using Mesh Radio. No ISPs, no Wi-Fi, no cellular data. Just pure radio waves bypassing the traditional internet layer to hit the mempool. When we say we are building unconfiscatable money for uncertain times, this is exactly what we mean. Mind blown. Here is the repo used to connect meshtastic to bitcoin core:github.com/BTCtoolshed/Me…
Bitshala tweet mediaBitshala tweet media
English
181
968
4.5K
242K
CBTC.kor รีทวีตแล้ว
bitprojects
bitprojects@bitprojects_io·
All of my nodes have been completely offline for 24+ hours and will not return. If this were a true sybil attack there would/could have been actual negative impacts to the bitcoin node network, especially as there were hundreds of nodes that were -only- connecting to my nodes at any given time. A lot more people now know what sybil and eclipse attacks are, and how to detect/investigate them. I have some ideas on ways to bring in more BGP routing table data into bitcoin node decisions, including not just origin AS but full AS path. In what I stood up as a demonstration, I also was able to defeat asmap because I used multiple origin ASNs, but if there is visibility available into the AS paths to reach nodes, that would then be detectable.
bitprojects@bitprojects_io

Current inbound connection stats: 80,526 inbound connections from 35,127 unique source IPs. Current outbound TCP/8333 traffic: 5475.1 Mbps This will be the last post of these stats, as I will begin shutting down this node infrastructure at midnight UTC. The intended outcome of this 2 year project was to point out (and then prove, as requested) that there is a significant vulnerability in how bitcoin nodes communicate. That outcome has been reached, as the people who can understand the vulnerability have observed and acknowledged. There is no longer a reason to keep this running, so I'm shutting it down and will be looking for other ways to contribute. Connection stats details: === Inbound TCP/8333 (bitcoin) Connection and Network Stats === Total unique destination IPs: 3042 Total unique destination /24 subnets: 12 Total destination subnets sharing /16 boundary: 0 Total ASNs: 3 Total subnets advertised per ASN: 4 Total inbound connections: 80526 Total unique source IPs: 35127 === Source IP Connection Thresholds === Source IPs with 8+ connections: 653 Source IPs with 10+ connections: 433 Source IPs with 12+ connections: 307 Source IPs with 16+ connections: 178 Source IPs with 32+ connections: 38 Source IPs with 64+ connections: 14 Source IPs with 512+ connections: 0 Source IPs with 2048+ connections: 0 --- To seed maintainers @pwuille @TheBlueMatt @_jonasschnelli_ @peterktodd @provoost @emzy @wiz @achow101 @LukeDashjr @leo_haf Please remove all seed entries for nodes in the following IP blocks: 45.40.98.0/24 66.163.223.0/24 89.106.27.0/24 103.47.56.0/24 103.246.186.0/24 123.100.246.0/24 173.46.87.0/24 174.140.231.0/24 184.174.95.0/24 203.11.72.0/24 206.206.109.0/24 216.107.135.0/24

English
0
7
25
1.1K
Dathon Ohm / BIP-110
Dathon Ohm / BIP-110@dathon_ohm·
I wonder how much hashpower needs to be signaling before Core devs will consider BIP-110 to have "broad" support. #issuecomment-4137959250" target="_blank" rel="nofollow noopener">github.com/bitcoin/bitcoi…
Dathon Ohm / BIP-110 tweet media
English
11
29
182
4.1K
CBTC.kor
CBTC.kor@BitcoinCreds·
@bonomat Imagine monetizing sub-conf weakwork. Getting paid BEFORE finding a work-template match to satisfy difficulty. Thus, having an extra nonce by rotating these sub-conf template space bidders is just an added benefit. That's your mempool on -kapnet #MineWithKapnet @KNUPool
English
0
0
1
3
CBTC.kor รีทวีตแล้ว
Brink
Brink@bitcoinbrink·
Today we’re publishing Brink's 2025 Engineering Impact Report covering the work of the eight Bitcoin Core engineers we funded last year and why we think this work is important.
Brink tweet media
English
6
30
109
33.1K
CBTC.kor รีทวีตแล้ว
Eric Voskuil
Eric Voskuil@evoskuil·
Exponential performance decay is not caused by payload, it's a consequence of non-scalable implementation. More nodes on the same architecture will not solve this, nor will censorship.
Knotzi@_Knotzi

72.71% after 84 hours.

English
1
3
18
1.6K
CBTC.kor
CBTC.kor@BitcoinCreds·
Fewer 503(c) more DAOs on -kapnet
Filipino
0
0
3
25
CBTC.kor
CBTC.kor@BitcoinCreds·
@josebitcoiner @Excellion Absolutely cleaning house. Keep the grassroots dry by affinity grifting latent philanthropic arbitrage. GG
English
0
0
1
8
calle
calle@callebtc·
The Bitcoin builder space is at a moral low. A handful of teams are still moving things forward. You matter more than ever, and we see you. More weight, fewer shoulders. Keep going 🫡
English
22
19
239
9K