2020 and Beyond: Bitcoin’s Potential Protocol Upgrades
The end of Bitcoin’s longest stretch without consensus forks?
The post 2020 and Beyond: Bitcoin’s Potential Protocol Upgrades appeared first on Bitcoin Magazine.
The end of Bitcoin’s longest stretch without consensus forks?
The post 2020 and Beyond: Bitcoin’s Potential Protocol Upgrades appeared first on Bitcoin Magazine.
Guix, Shamir Backups, P2EP and more
The post Bitcoin’s 2019 in Tech: What This Year Brought Us (Part 1) appeared first on Bitcoin Magazine.
Guix, Shamir Backups, P2EP and more
The post Bitcoin’s 2019 in Tech: What This Year Brought Us (Part 1) appeared first on Bitcoin Magazine.
Developer Femenías’ Easypaysy proposal for Bitcoin accounts could improve the user experience significantly, enabling non-repudiation, recurring payments and more.
The post Does Bitcoin Need Accounts? One Developer Thinks So, and He Figured Out How appeared first on Bitcoin Magazine.
The latest major release for Bitcoin, Bitcoin Core 0.19.0, includes a range of performance improvements, modernizations and bug fixes.
The post Bitcoin Core 0.19.0 Released: Here’s What’s New appeared first on Bitcoin Magazine.
SNICKER, a draft BIP, could allow for bitcoin mixing without any synchronization or interaction between users.
The post SNICKER: How Alice and Bob Can Mix Bitcoin With No Interaction appeared first on Bitcoin Magazine.
As the Living on Bitcoin experiment reaches Prague, a visit to Paralelní Polis inspires cypherpunk fantasies.
The post ‘Scam’ or Iteration — in Berlin, Bitcoin Diehards Still Believe in Lightning appeared first on Bitcoin Magazine.
ACINQ, the firm behind the eclair Lightning Network implementation, has held a successful series A funding round.
The post ACINQ, Startup Behind Eclair Lightning Implementation, Raises $8M appeared first on Bitcoin Magazine.
Shamir Backups, developed by Trezor’s SatoshiLabs, lets users split up their hardware wallet backup seeds.
The post Hardware Wallets Just Got a Bit More Secure With Trezor’s Shamir Backups appeared first on Bitcoin Magazine.
Blockchain analysis firm Chainalysis has found that only a small fraction of coins sent to bitcoin mixers were previously used for illicit purposes.
The post Chainalysis: Most Mixed Bitcoin Not Used for Illicit Purposes appeared first on Bitcoin Magazine.
Blockchain analysis firm Chainalysis has found that only a small fraction of coins sent to bitcoin mixers were previously used for illicit purposes.
The post Chainalysis: Most Mixed Bitcoin Not Used for Illicit Purposes appeared first on Bitcoin Magazine.
If it’s up to Boston-based startup Arwen, cryptocurrency exchange hacks will soon be a thing of the past.
The post Not Your Keys, Not Your Coins: How Arwen Wants to End Exchange Custodianship appeared first on Bitcoin Magazine.
It looks as if cryptocurrency service providers will have to adopt stricter know-your-customer (KYC) policies all across the world — and not everyone is happy about that.On February 22, 2019, the intergovernmenta…
Wall Street Market, the second-largest darknet in the world in recent months, has been shut down by international law enforcement agencies, including Europol as well as U.S., German, Dutch and Romanian law enforc…
Major darknet markets come and go in eras, so it seems, and the current one may be ending.Two of the biggest digital black markets seem to be disappearing, both at the same time. While it is notoriously hard to f…
The Understanding Bitcoin conference held in Malta from April 5 to April 7, 2019, was all about turning regular Bitcoin users into power users.Bitcoin hardware and software is often more configurable than people …
As if Bitmain’s year hasn’t been rough enough, having posted big losses and laying off entire departments, its flagship product now has a firmware vulnerability.
A few weeks ago, Bitcoin Core contributor James Hilliard discovered an exploit in Bitmain’s S15 firmware. The pseudonymous Twitter user 00whiterabbit, also known simply as “john,” subsequently wrote exploit code based on Hilliard’s findings. A video proving that the exploit code worked was shared on Hilliard’s Twitter account last week.
Hilliard is offering to disclose the vulnerability to Bitmain but under one condition: Bitmain would have to comply to the GNU General Public License (GNU GPL), the popular open source license that the Chinese mining giant is currently breaching, and open source its firmware.
“Bitmain firmware is very buggy in general,” Hilliard told Bitcoin Magazine, “and it’s important for the health of the Bitcoin network that users be able to fix the bugs Bitmain introduces.”
Hilliard, who is perhaps best known for proposing BIP91, discovered the vulnerability several weeks ago by auditing a firmware update file on Bitmain’s support site. While details have not yet been disclosed, the exploit was found in firmware of the S15, the company’s most powerful SHA256 miner in store. Hilliard thinks the same vulnerability almost certainly exists in all of Bitmain’s mining firmware.
“I’m also quite sure there are many other vulnerabilities in the firmware,” he added. “It is very poorly designed when it comes to security.”
When exploited, the vulnerability gives users root access to the machine — which is supposed to be impossible. In theory, this can be done remotely using just the IP address of the miner, and means the machine can be reprogrammed to do just about anything. This includes mining to a different Bitcoin address or having it stop mining entirely. The firmware could also be replaced by different firmware altogether (such as Braiins OS or Dragonmint firmware).
In practice, however, it’s unlikely the machines can be remotely exploited at all. For one, as long as the miner is properly firewalled and/or protected with a strong username and password, it cannot be broken into. And second, without access to the firmware’s source code, it’s difficult to make compatible custom firmware. As such, this specific vulnerability is perhaps not the main issue. “The bigger problem is that Bitmain firmware is generally quite buggy,” said Hilliard.
Indeed, this is not the first time a vulnerability has been found in Bitmain’s firmware. In early 2017, an anonymous security engineer found that almost all Antminer machines could be shut down remotely. Dubbed “Antbleed,” this previous vulnerability could have probably knocked about half of all hash power on the Bitcoin network offline. It was arguably not just a problem for Antminer owners, but a security risk for the entire Bitcoin network.
Hilliard and 00whiterabbit have not released the exploit code — but they are developing a version of it to be released eventually. The two are also willing to disclose the vulnerability to Bitmain, allowing the hardware producer to patch their firmware and fix the vulnerability. But only if Bitmain stops breaching the GNU GPL.
Bitmain’s firmware is built on the Linux operating system as well as cgminer: open source mining software developed by Hilliard and others. Both Linux and cgminer are licensed under the GNU GPL. This widely used open source license allows anyone the freedom to run, study, share and modify the software — under the condition that the resulting software is free, too.
“Legally, therefore, Bitmain’s firmware should be open source as well,” Hilliard explained. “But Bitmain doesn’t seem to care about following copyright law. Unfortunately, closed source firmware is not a good thing to have on the Bitcoin network, as stuff like Antbleed can be hidden in it. It’s a centralization risk.”
It is not very clear why the mining giant is breaching the GNU GPL. Hilliard suspects it is “probably to prevent users from overclocking their machines and support costs associated with that.” Others have suggested Bitmain may prefer to keep its firmware closed source because this makes it harder for attackers to find vulnerabilities.
So far, Bitmain has not commented on the exploit at all, and its firmware is still closed source. As such, there is little reason to believe the company will change its ways now — though Hilliard remains hopeful Bitmain will comply with the GPU GPL and encourages users to file a request to have the code open sourced.
“In the past they have released what appeared to be the real source, presumably because there was public pressure to do so,” Hilliard said. “So, maybe?”
Bitroin Magazine reached out to Bitmain to ask what the company knew of the vulnerability that Hilliard found and if it had plans to fix it. We also asked if they had any intention of complying with the GNU GPL. In response, a Bitmain spokesperson issued the following statement:
“We are truly grateful to the open-source community in identifying potential vulnerabilities and we are actively investigating the matter. We will continue to do what is necessary to ensure the best and safest possible mining experience for Antminer customers.”
This article originally appeared on Bitcoin Magazine.
Whilst debate raged throughout the Bitcoin community over whether the block size limit should be increased and how, Luke-jr for years stood out for arguing the exact opposite position. One megabyte blocks weren’t too small, he maintained even as SegWit’s block size increase gained broad support, they were too big. No increase, but a decrease was needed.
Now, the Bitcoin Knots and Bitcoin Core developer is spearheading an attempt to make such a decrease happen, as a temporary measure. And if social media is any indication, the initiative is attracting more interest than many might have expected it would.
“I don’t know if the proposal will be adopted or not, but support has been growing due to the block size becoming more and more apparently a problem,” Luke-jr told Bitcoin Magazine.
Of course, the arguments for decreasing the block size limit are similar to the by now oft-repeated arguments against increasing the block size limit. In short, bigger blocks add to the cost of running a node (making it more expensive for users to enforce the protocol rules), could increase mining centralization (risking censorship resistance), and reduces fee pressure (translating into less hash power security).
The most pressing problem of these, for Luke-jr, is the cost of running a full node. This is perhaps best exemplified by the time it takes to initially sync such a node. Getting up to speed with the rest of the network can take days even on modern laptops with a good internet connection.
“Users acting on that cost by simply choosing not to run a full node is a problem,” Luke-jr said. “When someone does finally attack Bitcoin, it will split the network — full node users on one chain, and light wallet users on the other.”
In case of such a broad scale attack on light wallet users, “a New York Agreement-in-secret,” Luke-jr envisions a worst-case scenario where these users would rather continue to use the invalid chain they’d been defaulting to since the attack, instead of switching back to the original chain.
“Which side prevails inevitably depends on the economic pressure of users of each chain. If most people are using light wallets, then full node users will lose out, and the invalid chain effectively becomes simply a hard fork to Bitcoin,” he argued, leaving little room for nuance. “That means all protocol rules are open to change, including the ones that forbid inflation, theft, etcetera.”
Following Luke-jr’s reasoning, Bitcoin is well into the danger zone already, as relatively few users rely on full nodes to accept payments. And it may be getting worse. Bitcoin’s blockchain grows each day, and while Moore’s Law and similar trends of computational improvements negate the associated problems with this growth to an extent, the Bitcoin Knots lead maintainer thinks technological progress is not yet keeping up. (It’s no exact science, but the drop in reachable node count over the past year could suggest that the blockchain size is indeed becoming a problem for more users — then again this node count is up over the past two years.)
On the flip side, the main argument against smaller blocks is that it would limit the number of transactions the Bitcoin network would be able process, which increases fee pressure, and could out-price certain use cases. (Instead of running full nodes, users may opt to rely on custodial services to save on fees, arguably making matters worse — not better.)
But with the development of the Lightning Network making noticeable progress, proponents of a block size limit decrease believe this downside is largely mitigated. Users would be incentivized to migrate to the overlay network for fast and cheap transactions, furthering its growth and taking the load off Bitcoin’s blockchain at the same time.
As the initiative is still in its early stages, it’s not yet set in stone what the potential block size decrease would look like, exactly. Even the desired limit isn’t settled on, though it would most likely be brought down from the current theoretical maximum of almost four megabytes to a theoretical maximum of two or less. (This would, in reality, result in even smaller blocks; closer to one megabyte.) However, if this were to be achieved, the measure would be designed not to be permanent, so that an increase back to the current limit wouldn’t be too difficult later on.
There are at least three rough ideas of how a block size decrease could be achieved.
The most notable proposal is a user-activated soft fork (UASF), similar to BIP148, the initiative to trigger SegWit activation in 2017. On the same date as two years ago, August 1, users would enforce the stricter rules for five months, incentivizing miners to comply. If a majority of miners (by hash power) go along, even non-upgraded users would remain compatible with the new rules; they’d just see smaller blocks than previously allowed. A UASF is a risky strategy, however. If less than half of all miners go along, the blockchain could “split” between upgraded and non-upgraded users.
Alternatively, miners could impose a smaller block size limit themselves as a soft cap. Soft caps are non-binding limits that miners put on the blocks they mine and were used particularly throughout the first years of Bitcoin’s existence. (Past soft caps were consecutively 250, 500 and 750 kilobytes, as recommended by Bitcoin developers.) This would be a much safer solution but would require that miners reject transactions and, thus, leave transaction fees on the table for each block they mine.
As a third option, proposed by Luke-jr, Bitcoin users could limit the size of blocks by making their transactions artificially “heavy.” Under Bitcoin’s protocol rules, these transactions would be counted as if they were larger than they actually are, which means blocks would fill up faster with less actual transaction data. This change wouldn’t require any protocol changes; wallets could offer it today. These transactions do, however, require individual users to choose to “overpay” on fees relative to regular transactions. (That’s assuming miners act economically rationally and charge extra to include these transactions.)
Some notable proponents of Luke-jr’s initiative include Bitrefill CCO John Carvalho, Block Digest cohost Shinobi and JoinMarket developer Chris Belcher. Yet all of them would only want to go through with the effort if it gains broad backing. That also goes for Luke-jr himself: “Soft forks like this need a lot of community support,” he said.
But so far, support within the Bitcoin community appears to range from lukewarm (no pun intended) to skeptical to outright dismissive. Other than Luke-jr, no regular Bitcoin Core contributors have thrown their weight behind the proposal and no Bitcoin company of note has stated support; and while the proposal is generating a bit of buzz on social media and in chat rooms, a majority of commenters still seems to reject the idea.
Even many of those who agree that a decrease would be a technical improvement in and of itself don’t believe it would make too much of a difference. If blocks are smaller for several months or even several years, Bitcoin’s blockchain size will still be large. Whether tomorrow’s new users need to sync two days or three days may not be the deciding factor in whether to use a full node or not. Besides, there are other solutions that could make running a full node more attractive, some of which may well have much more effect. (Though, as Luke-jr points out, none of these solutions exclude also decreasing the block size limit.)
What’s more, years of in-fighting has made the Bitcoin community wary of commencing another block size battle and dealing with all the controversy that comes with it. After a long-fought “civil war,” there appears to be little appetite to invest more time and energy in reviving the struggle on the same parameter — thereby, quite possibly, draining any momentum from the initiative even before it gets well underway.
Indeed, even Luke-jr himself doubts he’ll be the one carrying the initiative to the finish line this time.
“Although I may be the only one popularly pushing it — I don’t have time to champion another BIP148, I fear,” he said, noting how exhausting the previous UASF attempt was. “I think the only way it will happen is if the community takes the lead on it.”
This article originally appeared on Bitcoin Magazine.
Two “prominent professional hacking groups” are responsible for the majority of publicly reported hacks of cryptocurrency exchanges and other cryptocurrency organizations, concludes a report published by blockcha…
Darknet markets are going as strong as ever, if Chainalysis data is to be believed.In its latest Crypto Crime Report, published earlier this week, blockchain analytics firm Chainalysis reports that darknet market…
This article is a direct follow-up from our Taproot explainer. If you haven’t read that article, you should probably do so first.If Taproot is deployed on Bitcoin, many smart contract constructions will look just…
Bitcoin users may, before long, be able to benefit from a trick called “Taproot.” First proposed by Bitcoin Core contributor and former Blockstream CTO Gregory Maxwell, Taproot would expand on Bitcoin’s smart con…
Yet another tool is being added to Bitcoin’s growing number of privacy solutions.Thought up at a brainstorming event attended by Bitcoin developers and privacy researchers last summer, Pay to Endpoint (P2EP) is a…
This is the second part of our December cover story. Click here for part 1.Where 2017’s dizzying price highs embedded “hodl” into the public consciousness, 2018 was the year that “buidl” became a trend in the cry…
Where 2017’s dizzying price highs embedded “hodl” into the public consciousness, 2018 was the year in which “buidl” became a trend in the crypto-industry — and Bitcoin was no exception.Anticipated in Bitcoin Maga…
In what may well have been the most watched cryptocurrency event of 2018, Bitcoin Cash two weeks ago “hard forked” (split) into two different coins. The “big block” project that itself forked away from the Bitcoi…
Bitcoin Cash, the “big block” project that forked away from the Bitcoin blockchain in August 2017, “hard forked” (split) into two different coins last week: “Bitcoin Cash ABC” (BCHABC) and “Bitcoin Cash SV” (BCHS…
Bitcoin Cash, the “big block” project that forked away from the Bitcoin blockchain in August 2017, “hard forked” (split) into two different coins: “Bitcoin Cash ABC” (BCH ABC) and “Bitcoin Cash SV” (BCH SV).At th…
Around 16:40 UTC tomorrow, November 15, 2018, the Bitcoin Cash network is set to undergo another hard fork upgrade. But contention about this upgrade has left the Bitcoin Cash ecosystem divided, which could once …
Today marks the official release of Bitcoin Core 0.17.0, the 17th generation of Bitcoin’s original software client launched by Satoshi Nakamoto almost 10 years ago and still the dominant Bitcoin implementation on…
Today marks the official release of Bitcoin Core 0.17.0, the 17th generation of Bitcoin’s original software client launched by Satoshi Nakamoto almost 10 years ago and still the dominant Bitcoin implementation on…
Based on blockchain technology, most cryptocurrencies have an open and public ledger of transactions. While this is required for these systems to work, it comes with a significant downside: Privacy is often quite…
Based on blockchain technology, most cryptocurrencies have an open and public ledger of transactions. While this is required for these system to work, it comes with a significant downside: privacy is often quite …
For well over a year, versions of Bitcoin Core — Bitcoin’s leading software implementation — contained a severe software bug. The bug was fixed with Bitcoin Core 0.16.3 (and 0.17.0rc4), released this week, and th…
Based on blockchain technology, most cryptocurrencies have an open and public ledger. While this is required for these systems to work, it comes with a significant downside: Privacy is often quite limited. Govern…
Based on blockchain technology, most cryptocurrencies have an open and public ledger. While this is required for these systems to work, it comes with a significant downside: Privacy is often quite limited. Govern…
Based on blockchain technology, most cryptocurrencies have an open and public ledger. While this is required for these systems to work, it comes with a significant downside: Privacy is often quite limited. Govern…
As the birthplace of the Chaos Computer Club, the hometown of the mother of all hackerspaces, and what many of the world’s leading privacy activists consider to be a bit of a safe haven, Berlin may be the the str…
Ever since its inception Bitcoin has never really been private. Although Satoshi Nakamoto’s white paper suggests privacy was a design goal of the protocol, government agencies, analytics companies and other inter…
As his Hungarian parents had fled post-war Soviet regime to settle in the United States, Nick Szabo came to call the Californian Bay area of the 1990s his home. Here, he was among the first to frequent the in-per…
After years of conceptualization and development, the first Lightning implementations are now in beta. As a result, more nodes are appearing online every day, a growing number of users are opening channels with o…
[ANNOUNCE] hash cash postage implementationThe date is March 28, 1997, when the 2,000-or-so subscribers of the Cypherpunks mailing list receive an email with the above header in their inbox. The sender is a 26-ye…
The Breaking Bitcoin conference, first organized last summer in Paris, is returning for its second edition under the name “Building on Bitcoin,” this time in Lisbon, July 3–4, 2018. While the event in the French …
The Breaking Bitcoin conference, first organized last summer in Paris, is returning for its second edition under the name “Building on Bitcoin,” this time in Lisbon, July 3–4, 2018. While the event in the French …
This article originally appeared on Bitcoin Magazine.
“You can pay for access to a database, buy software or a newsletter by email, play a computer game over the net, receive $5 owed you by a friend, or just order a pizza. The possibilities are truly unlimited.”This…
One hard fork later, there are four new Monero projects.Monero hard forked to version 12 of its protocol yesterday. But not everyone is on board. Following the example once set by Ethereum Classic, some users are…
This article originally appeared on Bitcoin Magazine.
This is the second in a series by Aaron van Wirdum focusing on real people who use cryptocurrencies. Read about his earlier experiences in Italy here: “Real Users”: In This Mountain Town, Everyone Knows About Bit…
He’s scribbling a series of 12 words on the blue paper handed to him by one of the two women at the other side of the desk. Marco is his name. Graying hair, blue jeans, and still wearing the fat, black winter coa…
Today, March 15,Lightning Labs announced lnd 0.4-beta, the first beta release of the Lightning software implementation spearheaded by the development company. This makes lnd the first ever Lightning implementation to be marked as beta, meaning that …
Halong Mining announced today, March 7, 2018, that it is embedding AsicBoost in its DragonMint mining hardware. Halong Mining is able to do so because it joined the Blockchain Defensive Patent License (BDPL), giving them access to the patent-pending…
Halong Mining announced today, March 7, 2018, that it is embedding AsicBoost in its DragonMint mining hardware. Halong Mining is able to do so because it joined the Blockchain Defensive Patent License (BDPL), giving them access to the patent-pending…
Slush Pool, Bitcoin’s first and oldest mining pool, announced support for AsicBoost today, March 6, 2018. Slush Pool users that have the technology embedded in the application-specific integrated circuit (ASIC) chips in their mining hardware can con…