1/13 In honor of Bitcoin White Paper day, here’s a thread on things that work differently in Bitcoin today than they were outlined 14 years ago 🧵👇🏽
2/13 “Nodes always consider the longest chain to be the correct one and will keep working on extending it.”
3/13 Instead of the longest chain, nodes follow the chain with the most work. This is due to the risk of timewarp attacks, in which malicious actors can generate a longer chain with less work by manipulating MedianTimePast, reducing difficulty. bitcoin.stackexchange.com/questions/7583…
4/13 “We define an electronic coin as a chain of digital signatures.”
5/13 A Bitcoin is not defined as a chain of digital signatures, as it is possible to spend and receive coins without any signatures at all. Rather, a Bitcoin is defined as an Unspent Transaction Output, or UTXO. en.bitcoin.it/wiki/Script#Tr…
6/13 “Reclaiming Disk Space: Once the latest transaction in a coin is buried under enough blocks, the spent transactions before it can be discarded to save disk space.”
7/13 This concept of pruning was never implemented. Instead of discarding txs and keeping blocks, we keep the txs (UTXO set) and discard old blocks. lists.linuxfoundation.org/pipermail/bitc…
8/13 “The simplified method can be fooled by an attacker's fabricated transactions for as long as the attacker can continue to overpower the network. One strategy to protect against this would be to accept alerts from network nodes when they detect an invalid block.”
9/13 Alerts were never implemented, as you cannot verify a block by itself. To verify a block, all the blocks before it are needed. The only way to implement alerts for simplified payment verification are ZKPs.
10/13 Sidenote: SPV is rarely used. With SPV, users trust miners to tell the truth. SPV is implemented in e.g. Schildbach Wallet, the 1st btc mobile wallet. Instead of using SPV, users today rather use someone else’s node, trusting the node operator. wallet.schildbach.de
11/13 “Normally there will be either a single input from a larger previous transaction or multiple inputs combining smaller amounts, and at most two outputs: one for the payment, and one returning the change, if any, back to the sender.”
12/13 Today we have txs with much more than two outputs, such as with conjoins. For example, just yesterday a tx was created with 407 outputs 🤯 mempool.space/tx/d465033214f…
13/13 Oh how far you've come. Happy #Bitcoin White Paper Day! 🧡🎉
• • •
Missing some Tweet in this thread? You can try to
force a refresh
While everybody’s worried about what bitcoin companies took $ from Epstein, there seem to be only two regular Bitcoin Core contributors who actively worked with Epstein.
One of them is Bryan Bishop, and his work with Epstein seems to have been mostly unrelated to btc. Instead, it appears the two worked on a designer baby company/partnership.
It seems that Blockstream co-founder Austin Hill introduced Bishop to Epstein. In an email titled “just the three of us,” Austin wrote to Epstein with Bishop in cc:
“On idea stuck in Bryan's head - and if your serious […] Then we should setup some secure communications and I'll let Bryan pitch you on a way to have total deniability,” linking to a video of a Austin Powers 2 clip of Dr. Evil and Mini Me, titled “just the two of us.”
Shortly after, Bishop and Epstein began discussing funding, pitch decks, R&D on medical tourism, embryo implants, selling additive DNA, deniability, requirements for secrecy, and the legalities of gene modifications, noting that “in the US, self experimentation is not explicitly banned”.
In addition to the emails, below are excerpts of what appear to be transcripts of a girl’s diary that seems to have been forced to carry out Epstein’s babies, calling herself an incubator, saying she was chosen for her superior genetics, describing how her daughter was stolen from her just 15 minutes after giving birth, how they gave her just weeks until it started again, and how she was being held with others girls.
“I can’t go to school like this… why won’t anyone make it stop… please release me from this torture and hell…”
According to Bishop, a Tokyo based investor involved in a financial services company that operates various exchanges and acquired a bitcoin exchange had made Bishop an offer for his “designer babies” company, noting that Japan now allows for human embryo gene editing.
Taking money from Epstein is one thing.
Working on a psychopathic human baby eugenics project with a *registered sex offender* who had plead guilty to *soliciting minors* for *prostitution* is a lot more than an unfortunate lapse in moral judgement.
As for @kanzure and @austinhill, I hope you will be shedding some light on what in the actual *fuck* you two were up to here.
Any suggestions on who that Toyko based investor might be are appreciated.
PSA: please use TOR Browser to access these files. Akamai, the content delivery system hosting the documents, is suspected to be a bulk surveillance tool that was tied up in the NSA's foreign spying scandal.
Did @kanzure plan to genetically modify Jeffrey Epstein's testicles? *blinks*
@kanzure MIT Technology Review notes that “making a genetically modified baby would be illegal in the US,” potentially explaining the deniability Hill was worried about.
Apparently Bishop began experiments on mice in a Ukrainian lab in 2018/2019.
I'm a journalist that runs an independent publication solely dedicated to anti-money laundering and counter-terrorist financing, which governs debanking.
Here are 10 of @pmarca 's viral debanking claims, fact checked 🧵👇
1. "The CFPB is responsible for debanking".
Wrong.
2. "Crypto gets debanked like Kanye".
Partially correct, but misses key points to address wider systemic issues.
The entire Tornado Cash verdict is completely insane and will turn the legality of building any privacy service on its head.🧵
1.Open-source devs building non-custodial tools can be held responsible for criminal activity when crim. actors cannot be stopped or deanonymized👇
2. TC cannot be classified as a communications service despite the fact that that's exactly what TC is: a tool to communicate transactions between users. It does not matter whether TC took custody of funds. 👇
3. Building an unstoppable privacy system is laid out to suggest criminal intent.👇