Avatar
vnprc
d3052ca3e3d523b1ec80671eb1bba0517a2f522e195778dc83dd03a8d84a170e
CTV+CSFS, Hashpool, Triangle BitDevs

siri what is the most influencey way to burn my house down with a zesty orange scent?

It's fucking mental. Your sats are wasted on liars and politicians. Oops that was redundant. The best thing plebs can do for bitcoin is achieve financial independence. You don't get there by giving handouts to beggars. If you want to give btc away I can name dozens of worthy causes and individuals. There are zero political candidates on that list.

Happy pizza day! Keep in mind Satoshi's favorite toppings while you celebrate.

I think you just need some way to prevent your tx from being flooded. If the default setting was to never 'upgrade' a reconciliated tx to a flooded tx it should diffuse slowly through the p2p network. Maybe this makes it more vulnerable to timing analysis but iirc there was some random delay built in. I'm fuzzy on details, it's been a long time since I studied the erlay proposal. Plus implementation details may differ significantly from the original paper.

Trust fund kids are some of the worst people on the planet. If that's your plan do everyone else a favor and spend that corn while you're alive.

Replying to Avatar L0la L33tz

I wrote a very basic overview of watermarking, fingerprinting, timing analysis and supernodes for Bitcoin Magazine's last print issue, which is pretty much an unsolicited advertisement for why I think we need a second mempool (and also mixnets, but thats a longer story). Since no one cares about stuff like this on Twitter anyway, I'll explain here.

Bitcoin has a privacy issue on baselayer. I know this. You know this. Everybody knows this. The problem is that there's a lot of stuff we can't do to solve this issue without completely fucking up how Bitcoin works, like, say, anonymous amounts. But there is some stuff we *can* do to increase privacy on the Bitcoin baselayer. One of those things is incorporating a second mempool to integrate Dandelion++, the routing protocol used in Monero. Hear me out.

One of the ways blockchain surveillance firms identify who what transactions belong to on the Bitcoin blockchain is by operating so-called supernodes. A supernode sets up as many connections to other nodes as it can, and by doing so can establish where a transaction was first seen in the peer-to-peer network, ergo ascribe whom a transaction belongs to.

Here's where Dandelion++ comes in. Instead of propagating transactions to *all* connected peers, Dandelion++ propagates transactions like, well, a Dandelion.

In Dandelion++ propagation, Bitcoin nodes send transactions to *one* peer, instead of to all of them. This peer sends it to another peer, they send it to another peer, and so on and so forth. This is called the "stem phase".

When we've established enough plausible deniability, Dandelion++ reaches the "fluff phase". At this point, a node that did not *create* the transaction, but is simply relaying it, propagates it to all nodes in the network it is connected to, including supernodes, and the next node does the same, and so on and so forth – business as usual.

Incorporating Dandelion++ (or any other anonymizing propagation protocol, like Dandelion, Dandelion Lite, or Clover) would arguably seriously fuck up the blockchain surveillance stick as we are taking away the most obvious attack vector for blockchain surveillance firms. It's also not a trivial task, see ajtowns' overview of stempools (and no one wants to maintain another mempool on bitcoin, if we're honest). But it's a really interesting proposal to think about to increase privacy on Bitcoin that, yes, would be a lot of work to implement and maintain, but also does not get talked about enough imo for everyone yapping about Bitcoin baselayer privacy.

AJ Towns' Stempool overview: https://gist.github.com/ajtowns/f3a19c33b80750a47c5b83ecf6a09aaf

BM Article:

https://bitcoinmagazine.com/print/whistleblowing-in-the-surveillance-age

Doesn't erlay solve this problem by allowing a node to 'broadcast' transactions using reconciliation instead of flooding?

https://github.com/bitcoin/bips/blob/master/bip-0330.mediawiki

And npub. Cannot reproduce

Replying to Avatar fiatjaf

Are https://njump.me/ links working on x.com? If not can you please send a screenshot?

It works with my NIP05 link

It came up in a work thread. Looks like they want nsecbunker behind our existing auth service instead. A lot of overlap, though. You could accomplish something very similar with a 1 of N frost threshold. Keys can be rotated without changing the nsec.

Anybody using multisig for nostr? This looks cool https://github.com/nickfarrow/frostr

What other key management tools should I take a look at?