We will start with introductions, some basic ground rules, and jump into technical discussions. We will cover aspects of the bitcoin protocol, new research developments, recent news, and software developments.
Please note the meeting location at 4801 Glenwood Ave suite 200 in Raleigh, right above Fifth Third Bank.
Hash timelocked contracts (HTLCs) are a class of smart contract that enable atomic payments between two participants. HTLCs use a hash preimage as a bit of secret knowledge that enables one party to claim the funds secured by the contract. If the preimage is not revealed to the correct party the funds can be claimed by the contract counterparty after a timeout. HTLCs are integral to the lightning network, atomic swaps, and other contract protocols.
Bitcoin core developers Suhas Daftuar and Pieter Wuille have proposed a new mempool design that aims to solve eviction and RBF problems with the current mempool. The new design introduces concepts of transaction clusters, linearizations, and chunks that may allow for a more incentive compatible mempool that maximizes miner profits when evicting transactions due to memory limits and RBF.
CLN lead developer Rusty Russell dropped a thoughtful blog post reviewing a few covenant proposals. He lays out a spectrum of simplest to most complete covenants and describes a theoretical new taproot covenant design that could start out very restrictive and be extended with more powerful capabilities in future soft forks. He concludes by shilling LN-symmetry, exactly as one would expect from a lightning developer opining on L1 soft forks.
In their latest blog post Eclair walks us through the security architecture of the ACINQ node, among the largest and most connected nodes on the network. The article is a well-written and thorough high level examination of the security issues and design space of this fascinating problem.
Security researchers have uncovered a critical vulnerability in the Libbitcoin Explorer wallet tool, bx. 3.x versions of the library use an insufficient source of entropy to generate new wallet private keys. The vulnerability was discovered following a string of mysterious wallet thefts. This tool was highlighted in Appendix A of Mastering Bitcoin. Libbitcoin developer Eric Voskuil has fired back, blaming reckless wallet development.