L0la L33tz Profile picture
Oct 31, 2022 13 tweets 4 min read Read on X
1/13 In honor of Bitcoin White Paper day, here’s a thread on things that work differently in Bitcoin today than they were outlined 14 years ago 🧵👇🏽
2/13 “Nodes always consider the longest chain to be the correct one and will keep working on extending it.” Image
3/13 Instead of the longest chain, nodes follow the chain with the most work. This is due to the risk of timewarp attacks, in which malicious actors can generate a longer chain with less work by manipulating MedianTimePast, reducing difficulty. bitcoin.stackexchange.com/questions/7583…
4/13 “We define an electronic coin as a chain of digital signatures.” Image
5/13 A Bitcoin is not defined as a chain of digital signatures, as it is possible to spend and receive coins without any signatures at all. Rather, a Bitcoin is defined as an Unspent Transaction Output, or UTXO.
en.bitcoin.it/wiki/Script#Tr…
6/13 “Reclaiming Disk Space: Once the latest transaction in a coin is buried under enough blocks, the spent transactions before it can be discarded to save disk space.” Image
7/13 This concept of pruning was never implemented. Instead of discarding txs and keeping blocks, we keep the txs (UTXO set) and discard old blocks. lists.linuxfoundation.org/pipermail/bitc…
8/13 “The simplified method can be fooled by an attacker's fabricated transactions for as long as the attacker can continue to overpower the network. One strategy to protect against this would be to accept alerts from network nodes when they detect an invalid block.” Image
9/13 Alerts were never implemented, as you cannot verify a block by itself. To verify a block, all the blocks before it are needed. The only way to implement alerts for simplified payment verification are ZKPs.
10/13 Sidenote: SPV is rarely used. With SPV, users trust miners to tell the truth. SPV is implemented in e.g. Schildbach Wallet, the 1st btc mobile wallet. Instead of using SPV, users today rather use someone else’s node, trusting the node operator.
wallet.schildbach.de
11/13 “Normally there will be either a single input from a larger previous transaction or multiple inputs combining smaller amounts, and at most two outputs: one for the payment, and one returning the change, if any, back to the sender.” Image
12/13 Today we have txs with much more than two outputs, such as with conjoins. For example, just yesterday a tx was created with 407 outputs 🤯 mempool.space/tx/d465033214f…
13/13 Oh how far you've come. Happy #Bitcoin White Paper Day! 🧡🎉

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with L0la L33tz

L0la L33tz Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @L0laL33tz

Nov 29
I'm a journalist that runs an independent publication solely dedicated to anti-money laundering and counter-terrorist financing, which governs debanking.

Here are 10 of @pmarca 's viral debanking claims, fact checked 🧵👇 Image
1. "The CFPB is responsible for debanking".

Wrong. Image
2. "Crypto gets debanked like Kanye".

Partially correct, but misses key points to address wider systemic issues. Image
Read 13 tweets
May 14
The entire Tornado Cash verdict is completely insane and will turn the legality of building any privacy service on its head.🧵

1.Open-source devs building non-custodial tools can be held responsible for criminal activity when crim. actors cannot be stopped or deanonymized👇Image
2. TC cannot be classified as a communications service despite the fact that that's exactly what TC is: a tool to communicate transactions between users. It does not matter whether TC took custody of funds. 👇
Image
Image
3. Building an unstoppable privacy system is laid out to suggest criminal intent.👇 Image
Read 7 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(