Bitcoin Optech newsletter #266 is here:

- announces the responsible disclosure of a vulnerability affecting old LN implementations

- summarizes a suggestion for a mashup of proposed covenant opcodes

- summarizes popular Q&A from Stack Exchange

- Optech Newsletter #266 Recap on Twitter Spaces

https://bitcoinops.org/en/newsletters/2023/08/30/

Matt Morehouse posted to the Lighting-Dev mailing list the summary of a vulnerability he had previously responsibly disclosed and which is now addressed in the latest versions of all popular LN implementations...

https://bitcoinops.org/en/newsletters/2023/08/30/#disclosure-of-past-ln-vulnerability-related-to-fake-funding

Brandon Black posted to the Bitcoin-Dev mailing list a proposal for a version of OP_TXHASH (see Newsletter #185) combined with OP_CHECKSIGFROMSTACK that would provide most of the features of OP_CHECKTEMPLATEVERIFY (CTV) and SIGHASH_ANYPREVOUT (APO) without much additional onchain cost over those individual proposals...

https://bitcoinops.org/en/newsletters/2023/08/30/#covenant-mashup-using-txhash-and-csfs

Selected Q&A from Bitcoin Stack Exchange:

- Is there an economic incentive to switch from P2WPKH to P2TR?

- What is the BIP324 encrypted packet structure?

- What is the false positive rate for compact block filters?

- What opcodes are part of the MATT proposal?

- Is there a well defined last Bitcoin block?

- Why are miners setting the locktime in coinbase transactions?

- Why doesn’t Bitcoin Core use auxiliary randomness when performing Schnorr signatures?

https://bitcoinops.org/en/newsletters/2023/08/30/#selected-qa-from-bitcoin-stack-exchange

Bitcoin Optech will be hosting an audio recap discussion of this newsletter with special guests Matt Corallo and Brandon Black on Twitter Spaces Thursday at 15:00 UTC. Join us to discuss or ask questions!

https://twitter.com/i/spaces/1BRJjZmnLbaJw

Reply to this note

Please Login to reply.

Discussion

No replies yet.