Player FM - Internet Radio Done Right
22 subscribers
Checked 2y ago
Added five years ago
Content provided by Chaincode Labs. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Chaincode Labs or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!
Go offline with the Player FM app!
Podcasts Worth a Listen
SPONSORED
V
Via Podcast


1 The Southwest’s Wildest Outdoor Art: From Lightning Fields to Sun Tunnels 30:55
30:55
Play Later
Play Later
Lists
Like
Liked30:55
A secret field that summons lightning. A massive spiral that disappears into a salt lake. A celestial observatory carved into a volcano. Meet the wild—and sometimes explosive—world of land art, where artists craft masterpieces with dynamite and bulldozers. In our Season 2 premiere, guest Dylan Thuras, cofounder of Atlas Obscura, takes us off road and into the minds of the artists who literally reshaped parts of the Southwest. These works aren’t meant to be easy to reach—or to explain—but they just might change how you see the world. Land art you’ll visit in this episode: - Double Negative and City by Michael Heizer (Garden Valley, Nevada) - Spiral Jetty by Robert Smithson (Great Salt Lake, Utah) - Sun Tunnels by Nancy Holt (Great Basin Desert, Utah) - Lightning Field by Walter De Maria (Catron County, New Mexico) - Roden Crater by James Turrell (Painted Desert, Arizona) Via Podcast is a production of AAA Mountain West Group.…
Chaincode Decoded: Blockchain - Episode 14
Manage episode 293562274 series 2609717
Content provided by Chaincode Labs. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Chaincode Labs or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
In this Chaincode Decoded segment we talk about the fundamental role of Bitcoin's blockchain and some of its peculiarities.
We discuss:
- Purpose of the blockchain (0:40)
- Mining is a lottery, not a race (1:57)
- Why doesn't the same miner always win? (5:12)
- What happens if two blocks are found at the same height? (6:12)
- The longest reorgs (9:11)
- How does the blockchain work? (12:18)
- Headers-first synchronization and Ultraprune: Episode 1 with Pieter Wuille
- Episode 5: The UTXO set - Why does Bitcoin converge on one chain? (15:20)
- Selfish mining paper: Majority is not Enough: Bitcoin Mining is Vulnerable - Will we always find a new block? (18:04)
- Entropy sources in the block header - Mining pools have disjoint hashing spaces (19:30)
- Correction: mining pools do not have a separate pay-out address for each participant, but give out a unique coinbase transaction stub for each.
- Eschaton block
Thanks to Caralie for the sound engineering.
34 episodes
Manage episode 293562274 series 2609717
Content provided by Chaincode Labs. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Chaincode Labs or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
In this Chaincode Decoded segment we talk about the fundamental role of Bitcoin's blockchain and some of its peculiarities.
We discuss:
- Purpose of the blockchain (0:40)
- Mining is a lottery, not a race (1:57)
- Why doesn't the same miner always win? (5:12)
- What happens if two blocks are found at the same height? (6:12)
- The longest reorgs (9:11)
- How does the blockchain work? (12:18)
- Headers-first synchronization and Ultraprune: Episode 1 with Pieter Wuille
- Episode 5: The UTXO set - Why does Bitcoin converge on one chain? (15:20)
- Selfish mining paper: Majority is not Enough: Bitcoin Mining is Vulnerable - Will we always find a new block? (18:04)
- Entropy sources in the block header - Mining pools have disjoint hashing spaces (19:30)
- Correction: mining pools do not have a separate pay-out address for each participant, but give out a unique coinbase transaction stub for each.
- Eschaton block
Thanks to Caralie for the sound engineering.
34 episodes
All episodes
×T
The Chaincode Podcast

1 Rusty Russell and privacy and robustness in Lightning - episode 34 48:36
48:36
Play Later
Play Later
Lists
Like
Liked48:36
Rusty drops by to tell us about why privacy and robustness should be prioritized in Lightning. We discuss: LN symmetry (04:39) Do we want LN Symmetry to be symmetrical? (05:12) Listen to the conversation with instagibbs Peer to peer protocol (13:30) CTV (16:54) Pushing privacy and robustness to the front of the line (20:33) The dynamics of developing a spec with commercially associated implementations (22:19) Expecting new implementations (26:22) Privacy revisited (27:02) What broke when fee rate spiked? (31:21)…
T
The Chaincode Podcast

1 Elle Mouton, Oliver Gugger and Simple Taproot Channels - Episode 33 37:18
37:18
Play Later
Play Later
Lists
Like
Liked37:18
Elle Mouton and Oliver Gugger join us to talk with us about the Simple Taproot Channel proposal. We cover: Simple Taproot Channels Overview (1:29) What’s the state of the spec? (3:06) Changes to the scripts in Taproot Channels (4:31) Refresher on CPFP carve-out and Anchor Outputs (8:19) Why Anchor Outputs need to use script path spends (10:24) Other goals of Simple Taproot Channels (15:52) Why do PTLCs need Taproot funding outputs? (16:44) Potential updates for the gossip protocol: Gossip 1.5 or Gossip 2.0 (18:13) PTLCs (25:22) Iterative approach or big push (27:19) Recoverability of channel funds (33:06)…
T
The Chaincode Podcast

1 Alekos Filini, Daniela Brozzoni and the Bitcoin Development Kit (BDK) - Episode 32 31:25
31:25
Play Later
Play Later
Lists
Like
Liked31:25
Alekos Filini and Daniela Brozzoni visit the podcast to discuss the Bitcoin Development Kit (BDK) . Hang out with them on the BDK Discord . We cover: How BDK started (00:48) Why is it named BDK and not the Magical Bitcoin Library? (2:10) The first users of BDK (3:30) Rust HWI (4:20) Built around descriptors (7:15) The ideal use case of BDK (7:30) Pain points (9:05) Why do devs keep building wallets from scratch? (10:05) Greenwallet (13:03) If you have a working wallet, should you switch to BDK? (16:25) HWI complaints (see Python) (17:41) BDK 1.0 release features (22:31) Sync Planning module…
T
The Chaincode Podcast

1 Tadge Dryja and Lightning History and everything else - Episode 31 57:19
57:19
Play Later
Play Later
Lists
Like
Liked57:19
Tadge Dryja chats with us about writing the Lightning Network paper and working in the Bitcoin space. We discussed: Could blocks be bigger? (0:59) Paper: On the instability of Bitcoin without the block reward (9:49) Serving billions with Lightning (10:40) The state of the debate when writing the Lightning Network White Paper (13:35) Would Lightning be possible without Segwit? (17:20) Looking in from outside on a project you started (18:54) Trimmed HTLCs: Sending 1 sat vs 100,000 sats (22:02) Limitations of the Lightning network (25:31) Do high fees break lightning? (28:24) LN-Symmetry (Eltoo) (31:50) SIGHASH_ANYPREVOUT (33:20) Why are soft forks so hard? (34:15) What’s your wish list ( hardfork wishlist wiki , softfork wishilist wiki ) for protocol changes? (36:18) coinpools Bitcoin needs to become more usable (37:54) Tadge's thoughts on Education (44:17) MAS.S62: Cryptocurrency Engineering and Design Dynamics of working on Bitcoin (47:16)…
T
The Chaincode Podcast

1 Andrew Chow and the Bitcoin Core Wallet - Episode 30 40:36
40:36
Play Later
Play Later
Lists
Like
Liked40:36
Andrew Chow joins us to discuss Bitcoin Core wallet development, PSBT, Output Descriptors, and HWI. We cover: - Why do we need a wallet in Bitcoin Core? (0:58) - Refactoring the Wallet codebase to build Output Descriptors (5:59)Should we rewrite the wallet? (10:30) - Changes to Coin Selection (11:35) - Wallet interoperability (17:10) - Hardware Wallet Integration (HWI) (18:20) - Partially Signed Bitcoin Transactions (PSBT ) (19:01) - Becoming Maintainer (22:06) - Tracking the UTXO pool (23:43) - Main components of the Bitcoin Core Wallet (26:00) - Who uses Bitcoin Core Wallet? (27:02) - Survey Results - What’s the future of the GUI? (29:21) - Bitcoin Core GUI - Bitcoin Core GUI-QML - Switch to Descriptor -based wallets (32:52)…
T
The Chaincode Podcast

1 Greg Sanders, SIGHASH_ANYPREVOUT, ephemeral anchors and LN symmetry (ELTOO) - Episode 29 48:35
48:35
Play Later
Play Later
Lists
Like
Liked48:35
Greg Sanders joins us to discuss ANYPREVOUT, ephemeral anchors and LN symmetry (a.k.a. ELTOO). We chat about: - Package relay (2:07) - Pinning attacks (3:14) - BIP125 - T-Bast’s pinning attack summary - Mempool policy (4:56) - Stuffing the mempool - 2017 (5:20) - Rewrite mempool or make the problem simpler (07:57) - Package relay RBF A.K.A. V3 (8:38) - Reducing the standard transaction size to 65 bytes PR (14:25) - March to LN symmetry (19:07) - Daric: A Storage Efficient Payment Channel With Penalization Mechanism - Two-party eltoo w/ punishment by AJ Towns - BIP118 - SIGHASH_ANYPREVOUT (26:17) - SIGHASH_NOINPUT - Softfork and activation history (28:11) - Ephemeral anchors (32:18) - op_2 email by Luke - Is ANYPREVOUT useful outside of LN symmetry? (43:27)…
T
The Chaincode Podcast

1 Sergi Delgado and Watchtowers, Lightning Privacy - Episode 28 59:25
59:25
Play Later
Play Later
Lists
Like
Liked59:25
Sergi Delgado joins us to discuss Watchtowers, his prior work in Bitcoin and Lightning privacy, Python vs. Rust and the impact of Eltoo. We cover: - Sergi’s prior research - Mapping Network Topology Research (02:46) - TxProbe paper - Andrew Miller - Coinscope - Episode on Address Relay with Martin (04:28) - Block-only connections PR by Suhas (07:32) - An Empirical Analysis of Privacy in the Lightning Network (09:18) - Lightning white paper, 2016 (09:48) - Security and Privacy of Lightning Network Payments with Uncertain Channel Balances (13:38) - Episode with Sergei on Probing - Channel Jamming paper (13:50) - Episode with Clara and Sergei - Should we pay for failed payments? (14:19) - HTLC withholding vs. HTLC hodling (15:48) - Is Lightning flawed when it comes to privacy? (16:32) - Watchtowers (17:44) - Python PoC (21:49) - ZmnSCPxj’s writing watchtowers - Building on LDK (24:20) - Transition to rust (24:45) - Altruistic towers vs professional services (30:21) - More privacy considerations in Lightning (34:11) - Monitoring and reacting paradigm (44:04) - Storage and Eltoo (50:06) - Professional tower revenue models - subscription vs. bounties (53:00)…
T
The Chaincode Podcast

1 Pieter Wuille and Tim Ruffing - Nesting, ROAST, Half-Aggregation, Adaptor Signatures (part 2) 52:43
52:43
Play Later
Play Later
Lists
Like
Liked52:43
We continue the conversation with Pieter Wuille and Tim Ruffing and Nesting, ROAST, Half-Aggregation, Adaptor Signatures, atomic swaps and more. If you have not tuned into the first part of this conversation, we recommend listening to that one first. We cover: - Nesting (00:49) - ROAST (12:09) - Cross-input Signature Aggregation (18:49) - Half-aggregation (34:32) - Half-Aggregation of BIP 340 Signatures and BIP340 - Adaptor signatures and atomic swaps (39:32) Further resources: Stephan Livera Podcast #400 Jonas Nick and Tim Ruffing - Half Signature Aggregation…
T
The Chaincode Podcast

1 Pieter Wuille and Tim Ruffing, Schnorr, MuSig, FROST and more - Episode 26 52:32
52:32
Play Later
Play Later
Lists
Like
Liked52:32
Pieter Wuille and Tim Ruffing treat us to a conversation about Schnorr, multi-signatures, MuSig, and more. We covered a lot so this is part one of a two part conversation. We discussed: - When to roll your own cryptography (01:31) - Schnorr Signatures (09:01) - Why is Schnorr preferable to ECDSA? (10:55) - Schnorr efficiency improvements (15:52) - Multisigs (23:16) - MuSig (25:07) - Yannick Seurin - Rogue key attack or key cancellation attack (31:00) - Bellare-Neven (32:12) - Interactive versus non-interactive protocols (35:30) - FROST (42:42)…
T
The Chaincode Podcast

1 Clara Shikhelman and Sergei Tikhomirov and Channel Jamming on the Lightning Network - Episode 25 44:12
44:12
Play Later
Play Later
Lists
Like
Liked44:12
Clara and Sergei stop by to chat about their recent proposal on mitigating jamming attacks in the Lightning Network. We talk unconditional fees, local reputation, the impact on decentralization and UX, and the state of Lightning in general. We discuss: - What is jamming and why is it free? (03:43) - How our jamming project started (06:44) - Prior work on jamming (08:00) - The desired properties of a solution (09:57) - Reputation (12:47) - Centralization concerns (14:17) - Unconditional fees (19:25) - How are unconditional fees delivered? (23:31) - UX implications (24:45) - Moving research results towards implementation (27:15) - Effects on balance probing (29:21) - Lightning as a messaging network (30:46) - Effects on watchtowers (32:57) - Reviews and feedback so far (34:17) - Future research ideas (34:55) - Privacy-preserving reputation (37:33) Additional resources: - Spamming the Lightning Network - Preventing Channel Jamming - Bitcoin Optech: Channel jamming attacks - The impacts of channel jamming - Bitcoin problems: Channel balance probing…
T
The Chaincode Podcast

1 Josibake, the Bitcoin Core wallet and wrangling bitcoin data - episode 24 34:33
34:33
Play Later
Play Later
Lists
Like
Liked34:33
Josibake joins us to talk about his work on the Bitcoin Core wallet, bitcoin data and onboarding to bitcoin development. We discussed: - Analyzing historical transaction data (1:25) - Creating a publicly available dataset (4:12) - What could it be used for? (7:30) - Bitcoin Core wallet (9:00) - Why have a wallet in Bitcoin Core? (10:00) - Separation of GUI from wallet (12:35) - Only use one input type when building transaction (13:40) - PR #24584 in Bitcoin Core - How is working on the wallet? (17:15) - Cross-input signature aggregation (19:48) - Catching up on history (20:40) - Writing the BIP with Hackspec (22:05) - Thoughts on shipping cross-input signature aggregation separately (22:50) - Onboarding to Bitcoin development (28:35) - Running the seminar with friends (29:55) - Giving back to open source (31:20)…
T
The Chaincode Podcast

1 Steve Lee and Lightning updates / Stratum V2 - Episode 23 43:24
43:24
Play Later
Play Later
Lists
Like
Liked43:24
Our topics: - Lightning Dev Kit (1:04) - Zeroconf Channels (2:22) - Rapid Gossip Sync (3:46) - How does LDK pick priorities? (8:55) - LDK Lite (10:12) - Will LSPs be needed forever? (12:25) - Validated Lightning Signer (15:20) - A Lightning Node's Problem with Hats - VLS code base - FROST and ROAST (23:00) - Recovering a FROST wallet (24:00) - Taproot adoption (26:18) - Future of the Lightning Network (30:48) - Stratum V2 (34:25) - OFAC and mining (37:57) - Other benefits over Stratum (39:59) Thanks to Gurwinder Sahota for the sound engineering.…
T
The Chaincode Podcast

1 0xB10C – Tracepoints and monitoring the Bitcoin network 25:09
25:09
Play Later
Play Later
Lists
Like
Liked25:09
We catch up with 0xB10C about monitoring pools and tracing code execution in nodes. Our topics: - What he's been up to since the residency (1:05) - Monitoring the mempool (2:52) - Mempool Observer - Monitoring Mining pools (4:27) - MiningPool Observer - Mining pools not mining P2TR at Taproot activation (5:24) - Why monitor the network? (8:20) - Template discrepancies between pools and monitor (9:25) - User-space Statically Defined Tracing (USDT) (11:07) - Tracing Readme - Using tracepoints to simulate coin selection (13:36) - Why are tracepoints in production code? (14:38) - Using tracepoints for P2P monitoring (17:05) - Using tracepoints to review PRs (22:00) - Benchmarking Erlay with USDT (22:42) Other resources: - TransactionFee.info Thanks to Emily Kee for the sound engineering.…
T
The Chaincode Podcast

Gloria Zhao sits down with us to discuss her package relay proposal and what it is like as a relative newcomer to propose a big change. - What's package relay? (1:04) - Mailing List: Package Relay Proposal - Why do people care about package relay? (3:12) - What are these "contracting protocols" package relay matters for? (5:03) - Pinning attacks (6:28) - Why do you work on package relay? (6:55) - What's special about the mempool? (10:18) - How do you approach the security considerations? (12:07) - Synthesizing information for the ones coming after you (15:27) - What's next for package relay? (17:50) - Bridging protocol development with L2 (20:55) Additional resources: - Mailing List: Package Mempool Accept and Package RBF - Brink Podcast: Ep1 Mempool Policy - Censorship and DoS Attacks: An intro to Mempool Policy - Transaction Relay Policy for L2 Developers - Mempool Garden Thanks to Emily Kee for the sound engineering.…
T
The Chaincode Podcast

1 Martin Zumsande and Address Relay - Episode 20 31:50
31:50
Play Later
Play Later
Lists
Like
Liked31:50
Martin Zumsande joins us to tell us about the address spam in the summer of 2021 and his interests in AddrRelay and Bitcoin Core development. We discuss with Martin: - His background (1:38) - Getting interested in Bitcoin (2:45) - How to approach P2P (3:55) - The network is changing (7:30) - What's the purpose of the Address Manager (AddrMan)? (9:33)Peering differences to LN nodes (11:00) - Ethan Heilman's talk on Network Partitioning Attacks (12:10) - Addrman and eclipse attacks (12:27) - AddrRelay and the role of node addresses (12:55)Getting connected to the network (13:37) - Self-announcements (14:25) - Address spam in summer 2021 and peer distribution (15:05) - Correction: The peer would not get addresses-divided-by-peers addresses, but 2×addresses-divided-by-peers addresses as the addresses get forwarded to two peers each. (18:00) - Estimating the Node Degree of Public Peers and Detecting Sybil Peers Based on Address Messages in the Bitcoin P2P Network by Matthias Grundmann (19:30) - Simulating the network (20:15) - Requesting addresses from peers (21:45) - Walking through first connection of a node (25:25) Coinscope paper (27:10) - Being a Bitcoin Core contributor (27:50) Thanks to Emily Kee for the sound engineering.…
Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.