Podchaser Logo
Home
The Power of Bitcoin with Gloria Zhao

The Power of Bitcoin with Gloria Zhao

Released Wednesday, 8th May 2024
Good episode? Give it some love!
The Power of Bitcoin with Gloria Zhao

The Power of Bitcoin with Gloria Zhao

The Power of Bitcoin with Gloria Zhao

The Power of Bitcoin with Gloria Zhao

Wednesday, 8th May 2024
Good episode? Give it some love!
Rate Episode

Episode Transcript

Transcripts are displayed as originally observed. Some content, including advertisements may have changed.

Use Ctrl + F to search

0:03

There's just so much to do

0:05

just in terms of understanding the

0:07

code better and and fortifying it.

0:10

Sometimes you need to. Invasively

0:12

change something in order to

0:14

make it more skeptical. So

0:16

it's not. Don't ever change the code you

0:19

know be be. Conservative and not

0:21

try to move fast and break

0:23

things. A

0:26

D and Happy Wednesday Welcome to the

0:28

walk Because the podcast people to buy

0:30

the massive Legends of Hair and formerly

0:32

known as Paris Energy Our energies and

0:34

then next generation data centers are the

0:36

future of Bitcoin mining and Ai using

0:38

one hundred percent renewable energy are in

0:40

remains the same business with the same

0:43

goals. Now we're just a different name

0:45

I'm his People will go much the

0:47

day we have the amazing Glorious out

0:49

on the. Show. And I'm

0:51

at the end of last year. I

0:53

was lucky enough to spend some time

0:55

to galore out in Africa, and since

0:57

then we've been trying to get on

0:59

the show. Gloria is a Bitcoin core

1:02

maintain and developer and this in t

1:04

we get into the importance of continually

1:06

upgrading the protocol as opposed ossification, ditching

1:08

Googled wasn't Bitcoin. Order news and then

1:10

post Man and The Power of Bitcoin

1:12

Core Maintain as. Really enjoys in double

1:14

Cross. She's amazing. Do we get into this? How

1:16

do we like to? Well. As ever

1:19

can any questions or feedback hit me

1:21

up his hello what Bitcoin did.com. One

1:27

two, three, What? Dissect

1:30

three, four, five, six, Assists

1:37

the show though as county as. I

1:41

know numbers. Lotta

1:43

numbers. You should do. A.

1:47

New one of the most important because. I

1:50

have my argument as I'm not actually. That

1:52

I'm pouring. Really? A

1:55

thing that I always push back on as the idea that I have.

1:57

some kind of power Like

2:02

I have some ability to influence Bitcoin.

2:06

Wow, we've gotten started already, haven't we? Yeah,

2:09

we went right off the

2:11

deep end. Okay, you

2:14

don't have the individual

2:16

power because of the checks and balances. Well,

2:19

because there's nothing that I can't do, there's

2:21

nothing I can do that isn't fully

2:23

public that everybody can see.

2:26

And there's nothing I can do like, other

2:29

than create code that

2:31

may or may not be run by somebody

2:34

after some amount of time after

2:37

which we make a release. Anyway, we'll get into

2:39

this. So let's set it up.

2:42

Explain to people listening what you do or

2:45

what you are. Okay, should

2:47

I just intro? I haven't started. We started

2:49

five minutes ago. Okay, so

2:53

hi, I'm Gloria. I work on Bitcoin Core.

2:55

I've been doing that for a bit more

2:57

than four years. And

3:00

I've been what's called a maintainer for almost

3:02

two now. And

3:04

that just, it means nothing other

3:06

than I'm able to

3:09

push code to the

3:11

repository in

3:14

which Bitcoin Core is hosted.

3:16

A live repository. Yes, yes.

3:18

We have a GitHub where we have

3:20

a repository of all the source code

3:22

in Bitcoin Core. And

3:25

it's developed much like many

3:27

other open source projects. And

3:31

typically open source projects

3:33

have a small number of

3:36

people who are able to have right access so

3:38

they can push code to it. And

3:41

we have, in addition

3:43

to kind of the GitHub permissions, we

3:45

have a script that checks that there's

3:48

a PGP signature on all the

3:50

commits that are pushed, all the

3:52

diff that is pushed. And

3:54

so this is all, I remember when I said this

3:56

to you, you were like, oh, how do I find

3:58

out? There is a public file. He

4:00

is a minute less. Pgp. Case

4:03

of the five people who who's signatures

4:05

are up dead for these comments that

4:07

are pushed to the supreme start see

4:09

one of the five Yes I am.

4:12

However, another thing that I say. Is.

4:16

That we have all these dependencies,

4:18

right? So people, On

4:20

the Austin focus on like. The Bitcoin

4:22

core repository but they don't talk about

4:25

like the Lid at P Maintain or

4:27

as to the people who can plus

4:29

Code Suda Cryptography Library which is very

4:32

very important parts of how signatures are

4:34

treated and verified within the quality a

4:36

sense or naturals. But I did.

4:38

All this is moot because my

4:41

a man's is yes I I

4:43

recognize that there is. Like. announcers

4:45

I guess privileges with being able

4:47

to push coat of course. On,

4:50

but there is nothing we

4:52

can do that isn't fully

4:55

publicly verifiable and. Like.

4:57

There's so many steps. Between us

4:59

pushing code and it's being

5:01

eventually run on the network

5:03

by a note operator and

5:05

may be late in coming.

5:08

A widely used. On the

5:10

thing on the network. so slates. That's

5:12

my arguments. Citizens. Of

5:16

use it you know the new Star Wars

5:18

with the council to generalize usa months now

5:20

in several her and sit as well as

5:22

I can assure you photo was i think

5:25

of you the maintain as as like the

5:27

council said eyes the. Boarding.

5:29

Overall, Bitcoin network has some.

5:31

Ice Okay, sorry, I think we

5:34

understand the code very well. And

5:36

we are may be we spent a

5:38

lot. Of time thinking about the security,

5:40

his shoes and maybe we know things.

5:42

That about what has put bugs

5:45

have been found and how they

5:47

than parts ah but like all

5:49

this is public's. Okay,

5:52

But can you push something? live on

5:54

your own or or the he sighs

5:56

if you have to agree some so

5:59

we it's. You don't do it as

6:01

like a committee. Style is so

6:03

yes, I can push without.

6:06

Like. Asking the other ones for premise

6:08

and however I'm like we can play

6:10

out the scenario in which I pushed

6:12

something that everybody agrees with. What

6:15

would happen is it would be reverted

6:18

pretty much immediately. and I mean depending

6:20

on how crazy it was. Like they

6:22

can also remove my key and spits.

6:24

It all happens. usually a. Very long

6:27

time before the software's actually released and

6:29

put out in the public for people

6:31

to download. Of course of their and

6:33

someone wants to download that they can.

6:36

But like. What? Has happened in

6:38

the past As you we've had

6:40

situations where maintain our has done

6:42

something very crazy and. If

6:45

they they were as Gavin oh my long

6:47

time ago, various Islam as and so like.

6:50

Is a be were worried about

6:52

like all what happens if maintain

6:55

her unilaterally look merges like a

6:57

consensus change or something. That

6:59

doesn't mean that the software. Cast on

7:01

Lied on the network Immediately

7:03

right. There's many steps between

7:05

code being, post code being

7:07

released, code. Being. Downloaded by individual

7:09

the network then be coming after

7:11

you know and. He. Asked his

7:14

answer your question yes I can but.

7:16

Like there are, like he said,

7:18

checks and balances are many reasons

7:21

why. That doesn't mean that I have

7:23

any time does unilateral power or anything.

7:25

So she says, you. If

7:28

he were being sneaky, And. The

7:30

rest of a counselor July's all asleep and

7:32

you push something crazy. Live from. Is.

7:34

Funny, rather be law, they will

7:36

be checking the code. yeah after foreign

7:39

airlines. Typically. This.

7:41

Would just be. This. The become

7:43

since on a drama on social media

7:45

has gone crazy shit on this crazy

7:48

shit yeah and I'm people would download

7:50

that I went to Philadelphia and this

7:52

is hop as has happened in the

7:54

past straight so it like I'm not

7:56

doesn't like theorizing like this, fantasy worlds

7:58

like. Meal we have this. The

8:00

robot open source can has

8:02

community and thought that verifies

8:04

everything. So as that that's

8:06

my point. Did

8:09

you study computer science? I did. Yeah,

8:11

I went to school for computer Science

8:13

and Berkeley. And it

8:15

was is great at it. I loved

8:17

it there and I think those agree

8:19

on a sense I'm and. At

8:22

the.where I found decline so. At

8:25

a nose already told me about this when we

8:27

ring. And. Malawi

8:29

Easier You told me about a conversation

8:31

with your parents. Oh

8:33

yeah, I'm. Yeah.

8:36

I think. So.

8:39

I've been doing this. That was this.

8:41

This was in like twenty twenty. Or

8:43

so I'm where I think

8:45

kind of the grant programs.

8:48

Word Times new bring didn't exist.

8:50

Yeah, I saw the first. Grantee

8:53

a prank on which is a non

8:55

profit that. To at

8:57

that collect donations from the Bitcoin

8:59

community and give them to Bitcoin

9:01

core developers on.in A was founded

9:04

basically. Out year and I think you

9:06

interviewed on an for the Us. But

9:08

basically when I first. Got started, it

9:10

was it. It was kind of more

9:12

status quo what tends to happen with

9:15

open source and so a lot of

9:17

the internet and a lot of the

9:19

things that we use id say basis

9:21

or else on open source software which

9:24

like someone wrote for free and then

9:26

put on the internet under some open

9:28

source license. Or like our you're free

9:30

to use a whatever on. Allen's.

9:33

You. Know Austin. There's like use these

9:35

bills on open source. Software as

9:37

let the person who wrote like a prisoner

9:39

of the code is not is not paid

9:41

for and they may or may not so

9:44

be maintaining at I'm a lot of times.

9:46

They are still maintaining and are doing all this work

9:48

to kind of support the features that users. Ask

9:50

for us to push an like

9:53

security fixes to like updates for

9:55

their dependencies that you know operating

9:57

system changes or compiler changes. Or

10:00

library in a updates You also have

10:02

to. Like. Up with us

10:04

updates and as downstream. Projects

10:07

and often times that

10:09

just. Like nobody pays

10:11

for because. You. Know,

10:13

I guess our culture is not really

10:15

a by it's. You we usually it's

10:17

and. I guess this is like a

10:19

social commentary thing like we usually wait

10:22

for an intermediary to stop and and

10:24

like exploit the producer and and extract

10:26

rent from the that the consumer ends.

10:29

Sorry. To. Say

10:31

that, that's on. You

10:34

know, typically the donation model hasn't sent

10:36

very sustainable in the past but that's

10:38

kind of the only the only way

10:41

to do it with like Bitcoin core

10:43

ah like Bitcoin open source protocol Stars

10:45

to this on the to do a

10:47

half million dollar salary assists Had a

10:50

brand new Tesla yeah so I'm around

10:52

the same time I found that claim

10:54

eyes ah I was applying to intern

10:57

said say I ended up sign of

10:59

doing an internship google and I was

11:01

gonna do on with. With facebook but

11:04

I or night on that's. So

11:06

cool by at the I had a

11:08

fantastic time and google to be to

11:10

be clear I'm and learned a lot

11:13

and learn about like. Cloud.

11:15

Micro Services architecture, Cooper Net

11:17

Ease, terraform, whatever and it

11:19

was great time. ah but

11:21

I decline. Was like this

11:23

per se. It's. Like.

11:26

Balance between. Like something that

11:28

was trying to solve a problem

11:30

in the world that I cared about

11:32

and also very very technologically interesting

11:34

on so I think like within the

11:36

first few weeks I was looking

11:38

I like the Glencore on his enema

11:41

we're it was It was like

11:43

oh there's like this you know either

11:45

for thing about thread safety because is

11:48

a multi threaded saying and all

11:50

that. I learn about that and class.

11:52

Arm or. A I

11:54

think around that. Time Peer Peer will. I

11:56

had written that like many sketch library

11:58

which is like this. Fancy mass

12:00

and all that all my abstract algebra

12:03

class like text books like comes in

12:05

handy of like a first. Timer

12:07

often or since excited the

12:09

class and illness. Really cool.

12:12

A Cryptography Distributed Systems like

12:14

all. These. Things and and plate. To.

12:17

Will is a great example and a lot of other people.

12:19

That I work with who have been coding for.

12:21

As long as I've been alive or in of these.

12:24

Amazing. Like a computer Scientists and

12:26

Engineers kind of about the at

12:28

least the highest level of this

12:31

cross that I've seen I'm working

12:33

on. This cool open source like.

12:35

Censorship resistant money. thanks. That

12:38

is solving a real problem for the world's. I

12:41

I personally think that it is.

12:43

A super underrated project for software engineers

12:45

that that more like more people said

12:47

consider it something more attractive to work

12:50

on then like Google I'm I mean

12:52

I was a personal decision of mine

12:54

and my part of it yeah out

12:56

or else I usually wear. My parents

12:58

were like. Why?

13:01

Why would you? so? Do you

13:03

mean you gotta work on this?

13:05

You're getting a grant from

13:07

Human Rights on Display. What

13:09

does that? Have to do

13:11

it for you know, regeneration

13:13

senses and six. Yeah, yeah,

13:16

but you know, My.

13:19

Time In. I. At

13:21

us another angle to it is like and

13:23

so I'm so privileged by I got the

13:25

spacing. Computer science has a case and I

13:27

have parents that were supportive of this to

13:29

says and. And now I get to work on. This.

13:32

Really cool piece of software and

13:34

I feel really, really lucky. To the

13:37

else to do that, to the understand and now.

13:39

I'm I've I've done likes of. Flip

13:42

Chart Sometimes when I go home and I

13:44

feel like the flip chart said I was.

13:47

In the garage or his legs and

13:49

for a bitcoin was oh yeah they

13:52

do. They get a bit more now.

13:55

My mom. Who

13:58

like. Trades. There. A

14:00

retirement account is like buying a

14:02

quantity of stuff addresses. So since

14:04

his yeah about mom to know

14:07

how the nance Alaska could be

14:09

wrote yeah I mean so ah.

14:12

I have some. Opinions

14:15

about this. Where

14:17

I saints. Yeah,

14:20

I think state. Ideologically

14:22

why we're getting into this Rs:

14:24

us ideologues yourself. Custody Is it

14:27

like that's the point rates? I

14:29

think the average person though, is

14:31

probably less good. south coast cities

14:34

in the humor, my dad, my

14:36

desk, or so much interest in

14:38

Bitcoin because of me. But.

14:40

Only does this took. The president is

14:42

like the season be zone the as

14:45

he tried to bonds of costly pretend

14:47

his looser. Seattle. Chance?

14:49

Yeah. So I'm really I'm really

14:51

hesitant to like. Make

14:53

recommendations to people that

14:55

require quite a bit

14:58

as technological literacy and

15:00

like paranoid assists in

15:03

our so. At.

15:05

This is Not a say that I'm. Indoors saying like

15:07

you know using these exchanges that are

15:10

that may or may not be reliable

15:12

a lake or these their i'm like

15:14

dude a lot It's yeah, I'm not

15:17

at like a this. I'm not trying

15:19

to advise people to do things that

15:21

are risky is this is Suzie My

15:24

mom's. How

15:26

unique is Bitcoin is? Uncertain Terms

15:28

of Computer Engineering. Oh

15:31

yeah, I mean so. To

15:34

explain this the other day a

15:36

to a lot of software engineers

15:38

I guess outward it differently and

15:40

but there's There's this crazy security

15:43

model so bitcoin is kind of

15:45

designed to work and the presence

15:47

of adversaries, right? This is like

15:49

Twitter has their own lingo to

15:52

describe this season. You know it's

15:54

a hard. You know, and

15:56

and it's supposed to be able

15:58

to light Continued. To produce. The off

16:00

continue to process payments, etc. even

16:03

if people are. Am.

16:06

I talking at and the software

16:08

that we re is supposed to.

16:10

Be like we're trying to

16:12

go for decentralization. Re starts

16:14

like a ideological like. That's

16:16

how the network brings the

16:18

valley that that it has.

16:20

Is that as a decentralized network

16:23

that is run by lots of

16:25

different and cities and organizations rates,

16:27

but what that looks like? Practice

16:29

from a code reading sound

16:31

points means that like. I

16:35

write code. That. It

16:37

is. Hopefully. Usable by

16:39

anybody, right? So ugly. Support

16:41

like so many performs Windows

16:43

Mac Linux whenever we. And.

16:46

Terms of Quantity Small complexity Like

16:48

we don't want to only write

16:50

code. That can be run on like a

16:52

to be us servers or like huge bc think

16:54

like it should be run a bull as like

16:57

a baton task on your laptop lot. Of people

16:59

run their full nodes that way. it

17:01

should work on a raspberry Pi. I

17:03

think that's a very good benchmarks where

17:05

you can run a full node that

17:07

really transactions can do Vietnamese and can

17:09

you know and you all these like

17:11

things for you on this tiny little

17:13

raspberry Pi box which a lot of

17:15

people who are bitcoin users do. Arm

17:17

Button Those two things. Are. Really

17:20

difficult to balance on and

17:22

so like. We're in this very

17:24

narrow space of operation where and

17:26

yeah, anyone should be able to

17:28

run this. but then when you

17:30

turn on. The queen t on your

17:32

laptop or whatever. What it's doing is

17:34

is connecting to randoms on the networks. Ah,

17:36

we don't know what their identity is by

17:38

design right? We want? we want it to

17:41

be an anonymous or sit on that works

17:43

at it like tries to download data, tries

17:45

to find the main. Chain It tries

17:47

to download blocks or like sit find

17:49

out about new transactions or addresses of

17:51

nodes to connect to, etc. And

17:54

that's. That's what that

17:57

means is. We have to plan

17:59

for like a. I'm attacker at.

18:01

Connecting to nodes and sending

18:03

you like garbage data.like for

18:05

example can crusher. Node or cause you

18:07

know to stall or cause you know to run

18:10

out of memory. And these are

18:12

all. Attacks that

18:14

we would consider like the higher than

18:16

one of the highest severity I'm ends.

18:19

As I bring this up because. Basically

18:22

people always ask me like still to

18:24

do or like where you work on

18:26

my isn't took the code financing also

18:29

says he I and I tried to

18:31

get this message is like there's a

18:33

lot of like he knows things that

18:36

can go wrong right? The zebra like

18:38

but sixty one percent of talks are

18:40

not economically viable and it's impossible to

18:42

guy a private key from a public

18:45

keys like glory. Don't watch this Andrea

18:47

Sons Nautilus video where he explain why

18:49

Bitcoins is the cure Alls I guess.

18:52

I agree. I preach Lights I'm

18:54

talking about like there are a

18:56

lot of there's like a million

18:58

ways that. And we

19:00

all envision like the future. For Big

19:02

Claim where we wanted to be used. Millions

19:05

of people, and I'm only

19:07

saying sir are a lot

19:09

of things I can undermine

19:11

that, including. For example the networking

19:13

attacks that I was talking about on

19:15

so if somebody is able to cross

19:17

nodes or like for to a minor

19:19

for example is able to cross the

19:21

other miners and they get had star

19:23

on like the next few blocks or.

19:25

Let's say it will tear a lot

19:28

about block censorship attacks. So like you

19:30

produce a block if somebody can prevent

19:32

everybody else from hearing about that blocker

19:34

downloading up that block from you know

19:36

that is or that is a really

19:38

serious problems. Or if you've heard of

19:41

Eclipse attacks were you know that Again,

19:43

like the whole point is we had

19:45

the spirit of her structure where everyone

19:47

can talk to whoever and lights hopefully

19:49

find a good set of tears that

19:51

is able to tell them about the

19:54

main chains is that is. Compromised and

19:56

Like Somebody is able to eclipse you as

19:58

and like be every that you're connected to.

20:00

and you don't hear about the main chains

20:02

are you don't. Hear about the

20:05

competing miners like blogs. These

20:07

are all really. I.

20:09

Mean it's are not the same thing

20:11

as. For I mean if a miner's

20:13

able to do this that's like your needs

20:15

of the one percent house race in order

20:18

to attack these people. Rates are you just

20:20

block of from hearing about all the other

20:22

has rates but as a theoretical attorneys are

20:24

theoretical as hawks just just city clear sir.

20:26

and so if if is a theoretical attempt

20:28

to try an. Attempt to do the

20:30

attacks are you know how to defend against that. ah

20:33

much at was and practice what

20:35

were awesome doing as were like

20:37

analyzing the code and were writing

20:39

tests. Were us like we're

20:41

trying to isolate the block

20:44

download logic to just throw

20:46

random stuff like just like.

20:49

Tests at much as possible. Like all

20:51

the scenarios that we can possibly happen

20:53

and you know we have lots of

20:56

monitoring, knows where where seems like you

20:58

know if we observe. Oh wow, there

21:00

is actually someone trying to send us

21:02

mutated block further. Someone's trying to stall.

21:05

Block download by like I'm being

21:07

the first guy and then like

21:09

sending a star beds and then

21:11

like when we ask them. For.

21:14

You know the correct information. They just like

21:16

you know, stall at it as. Of

21:18

the lights on. There

21:21

are like theoretical attacks. And then there's also

21:23

like will observe people doing bird stars

21:25

on and not will sometimes lead us

21:27

to go and tweak those parameters are

21:29

be like oh yeah maybe we should.

21:33

You know we we should redesign this

21:35

a little bit so that's where making

21:37

a better trade off for like far

21:40

as I'm rambling by the way to

21:42

assess assess so. With, I think

21:44

a lot about transaction really.

21:46

there was one a couple

21:48

years ago that was a

21:51

transaction. Stalling were. Ah,

21:54

Let's say. You. Know

21:56

there's a transaction being broadcast most evil know

21:58

about as I don't want. Donald a

22:00

transaction multiple times only. Stuff on at

22:02

once by. The. We have these kind of

22:04

and with saving same again Madison is important

22:07

because not everybody has extremely high wife I

22:09

see is really wanted to be accessible to

22:11

ah notes on so we're trying to save

22:13

bound with by only downloading was so we're

22:16

only gonna ask. One pure at

22:18

a time to send us a transaction. However

22:20

if we try the first percent of the

22:23

first pure I mean and they don't send

22:25

it to us we should try death rate

22:27

or we should like and and we shouldn't

22:30

only try to times for example because we

22:32

don't want there to be a that a

22:34

a censorship doctor were ill appear as i

22:36

okay i'll be the three the first three

22:39

people that you ask for the transaction from

22:41

and then all of on your knock when

22:43

hear about the transactions on that would be.

22:46

Transaction Really censorship problems and so

22:49

yeah, there was said. Basically.

22:51

They're of trend is a tiered surplus

22:53

tennis reconsideration and of might there was

22:56

like modular is a sin plus fixing

22:58

up some of those things to make

23:00

it more robust and make it really

23:02

easy to reason about and then added

23:05

a bunch of tests to kind of

23:07

check our understanding of like oh all

23:09

these in all these scenarios yes we

23:12

would and of downloading that transactions and

23:14

then we has what are. You

23:16

been using something a lot. I don't know if you've

23:19

heard of fussing, so I ramble. More and

23:21

more about success. So

23:23

okay. So typically the waves are a

23:25

software engineer might write tests is for

23:27

example, you're right. The tests scenario that

23:29

you that I just described right where

23:32

you're like okay, let's spin up another

23:34

like a fake nodes and then we'll.

23:36

Stand up a few extra said

23:38

nodes to connect to it and

23:40

then will simulate the attack and

23:42

will assert that like the correct

23:44

behavior is happening on and so

23:46

you have to provide exactly what

23:48

the testers for saying are automatically.

23:51

Generates tests. Am so

23:53

what you'll do as you're right. Kind of

23:55

more of a skeleton arm. And leg,

23:57

yeah, It'll second variance like it.

24:00

After each. State track. like after

24:02

each period of time you check that

24:04

all the invariance are still true on

24:06

it. Whatever those may be and then

24:08

or something and and will kind of

24:11

intelligently. it's just like it'll It'll start

24:13

by treat it like sending random stuff

24:15

rights and then it'll figure out based

24:17

on for example, coverage of the code.

24:19

like it'll look at what lines of

24:22

code his head and as they're like

24:24

oh these imparts. Like. Hit

24:27

like a further of line of

24:29

code deeper into the modules. okay

24:32

like work in a create more

24:34

and puts that look like that

24:36

and so it basically. it's similar

24:38

to like creating random and puts

24:40

but it is somewhat intelligence and

24:42

it'll. Like over time to

24:45

like signed. The pads that you

24:47

may be wouldn't have thought of if

24:49

you were just manually writing the tests

24:51

to use as all the time I'm

24:53

now like were like size everything as

24:55

episodes as and like the amount of.

24:57

It's full coverage over the source

24:59

of the source code has increased

25:01

like dramatically over the past few

25:04

years and it sounds like pretty

25:06

severe bugs. Some it's helped

25:08

design a certain certain things as

25:10

well when when you're like trying

25:12

to test the computational complexity and

25:15

you're. Like okay let's let's slight.

25:17

Pause. It and seat and of what the

25:19

average runtime of it is or of the

25:21

more fuzzy and we'll see if the father

25:23

can come up with an implant that causes

25:25

it to spin. Like for a really really

25:27

long time and we're. Like okay, it's

25:30

like instead of just theoretically

25:32

analyzing what's the worst case

25:34

runtime of this algorithm site.

25:36

Maybe. They have we missed something or

25:39

like what does that actually look like

25:41

or like? can we odds you know

25:43

as a extra piece of logic in

25:45

there that like catches these really like

25:47

worst case behaviors or skill like it's

25:49

it's helped design. Things Health tests

25:51

exists Buzzing scrapes I think most

25:53

people with some species on me

25:56

when we think about bitcoin. Development.

25:59

We didn't exist. Oh,

26:01

and scale was a new order for

26:03

the new features com in rinsing. many

26:05

of us tend to think about how

26:08

much was Dawn. Planning.

26:10

For adversarial attacks or efficiency.

26:14

And. And how how is that? kind

26:16

of was Philip amongst core developers? Is

26:18

it someone specifically as was more attacks

26:21

someone's on efficiencies to do tend to

26:23

have like specialists in the terrorists. I'm

26:25

so there's no can is. Court. A

26:27

nice and are not as yes of course but.

26:29

There are people who

26:32

specialize and so. I'm

26:35

just going to sell my colleague Nicholas

26:37

who works with me up. Frank. He

26:39

He's the fussing guy and he's kind

26:41

of become our security engineer. As well

26:43

because naturally he becomes. The guy that

26:45

finds all the bugs assess as

26:47

and he he's grades am I

26:49

it it? Is. My

26:53

other colleagues at Michael. Ford who

26:55

I think you've met or thank

26:57

weights that he. Especially as

26:59

and build system sauce and not also naturally

27:01

leads him to do a lot of the

27:03

release process saw us and we can talk

27:05

about the releases or at least process as

27:07

walk that kind of very interesting and then

27:09

people will call me like the Memphis person.

27:11

I'm not the only person our from them

27:13

pool definitely. But like

27:15

in I spent a lot of time

27:17

this area and typically as somebody in

27:19

opens and I'm full pr and you

27:22

ask me to review I will. I

27:24

it's an easy chows. she

27:26

works on wallets. But.

27:29

I mean everyone does a bit of everything I

27:31

think am and it would be very boring to

27:33

spend all your time doing one thing but I

27:35

think there are a in always We leave naturally

27:37

than like okay this person's really good at this

27:39

as an. Awesome as expertise and

27:42

and I think part of our

27:44

job is to just know how

27:46

stuff works. I'm asking us really

27:49

important because everything is so complex

27:51

and it's so lax. Security oriented

27:54

pretty some interesting that without coordination

27:56

everything just come against. Don't. I

28:02

mean I guess this is a big

28:04

what I'm saying is Bitcoin works. There

28:07

are people on these upgrades and six

28:09

and things patent things move on new

28:11

ideas sector the happens because. In

28:13

a decentralized uncoordinated way because of you

28:15

think of as of about voting software

28:18

business bump british who googled when have

28:20

are thus I used to pick what

28:22

you want to work on and when

28:24

you ready just uploaded and will check

28:27

in say would be entirely coordinated. Yeah,

28:29

yeah, I think. I'd

28:32

I would just say saw a lot

28:34

of the people. That work on

28:36

the concourse so like ultra

28:39

set and want to bees

28:41

fall on and. Like.

28:45

I. Agree, there is a little bit of

28:47

like oh, you do whatever you want

28:49

and therefore. Like nobody wants to review back.

28:51

Put like nobody wants to do the boring

28:53

stuff says the bomb as. Legs

28:56

release process they are so

28:58

I guess one As I

29:00

said backwards I'm as organ

29:02

to it and so as

29:05

part as maintenance. Right will

29:07

release something and then bath

29:09

has like two years of

29:11

for be stopped maintaining s

29:13

so every sorry every six

29:15

months. More. More or less

29:17

or release a new major version of

29:19

the software. I'm and not have new

29:21

features like the to transport or it

29:24

relay or whatever. And

29:27

then six months later will release a new one.

29:29

Right? But the one that we released before

29:31

we're still pushing security updates to the will

29:33

will push out minor minor. Really says

29:35

I'm and so basically anything that

29:37

place is usually about six. Will

29:39

get merged into Master with our

29:41

development branch and then we'll back

29:44

port that to the the branch

29:46

that contains a release that's currently

29:48

out and then we'll cut another

29:50

minor released a way. This this

29:52

thing where if you're just revealing

29:54

the same shit or on a

29:56

different branch. Is incredibly boring and

29:58

most people don't do it. The

30:00

end of the process of cooking, that

30:02

of the process of choosing which bugs.

30:04

Sexist. Back for it as as

30:06

well is. Like. Something that's

30:08

ah, takes a lot of work

30:10

because you basically have to have

30:12

a birds eye view of every

30:14

single thing that's happening. Like.

30:17

In. His as being were

30:19

smart lights like this. hundreds of prc

30:21

have to decide oh see I start

30:23

something that with a sex like a

30:26

previous release and then. You. Know

30:28

all you do is like you

30:30

do cherry picker answer on said

30:32

the the older branch and like

30:34

nobody wants to do assists. And

30:36

and the end of factors like yeah, that thing that. We

30:39

released before it still was. Answer

30:41

is. Yes

30:43

yeah and so if you if you

30:45

know of treating your know software isn't

30:48

you eventually have things on sports as

30:50

yes yeah because one is that remains

30:52

is crazy remaining due to refuse to

30:54

go anything beyond the original version one

30:57

of the gone. So. I

30:59

I think I heard something like

31:01

die and I think they're Siegel

31:03

who ran like zeroed i was

31:05

sixteen or whatever and slight people.

31:07

It's people who say like law,

31:09

let's say theoretically riot like it's

31:11

a soft forks. So I don't need

31:13

to update to the new rules and

31:16

I should still be able to use

31:18

that Be no, that's a very as

31:20

is ideologically a very important thing to

31:22

us. And on for I would say. Unfortunately,

31:26

And the consensus on jan is

31:28

intertwined. with all the other pieces of

31:31

of the coin core but it does.

31:33

And so you aren't really able to

31:35

be like I want the modern version

31:37

with ah you know, the modern wallet

31:40

you I and all those things. but

31:42

I don't want to upgrade. my consensus

31:44

and gents is a I think it

31:46

is not good that these are kind

31:48

of intertwined and we have. A projects

31:51

that we've been working on for years

31:53

and years. I'm at to kind of

31:55

modularized the will be called a Colonel

31:57

or the Consensus and and so that.

32:00

Or you could get the new to each

32:03

other. New wallet features are the new kind

32:05

of more on. The front say

32:07

saying like not consensus you

32:09

know, not protocol. Changes.

32:14

Without. In A Changing. Colonel

32:18

Am. So.

32:20

My point is. Don't run

32:22

on Maintain. Software It contains bugs that

32:24

we do know about and has may

32:27

or may not have been disclosed. Already.

32:29

It's so you know that there

32:31

are like it's public knowledge that.

32:34

Been. Like someone can send. You x

32:37

and then you might lot of memory

32:39

or someone might pressure note or sundance.

32:42

I very much do not recommend running

32:44

on maintain software as a citizen Scientists

32:47

to the entire as if Bitcoin what

32:49

from in cool or if you were

32:51

Bricklin usury download or is it reference

32:53

and other software things that exist else

32:56

article. Yeah, so we

32:58

have. This came up a lot with

33:00

the recent might have see you tools

33:02

like sour sauce a bug. So

33:05

yeah, we do have a

33:08

season dependencies and we have

33:10

were very. Very very conservative as

33:12

about ads and one of the things

33:14

again like an like that Michael does

33:16

at as part of built the Some

33:19

as he. He's also very about like

33:21

reducing the amount of. Dependencies and

33:23

so like what? For.

33:26

Example: Michael has a sound over over the

33:28

time as the he's. Like oh, we

33:30

have a dependency and nobody's maintaining

33:32

its or alive and. It

33:35

is they. They're just like gathered on

33:38

maintaining it. Basically, or like is not

33:40

reviewed to the same standard that we

33:42

would expect a Bitcoin core code to

33:44

be reviewed to Arm. and now that

33:46

code is. Like. You should treat

33:48

it as it equivalent of of your

33:50

your. Code. Where with a

33:53

dependency sits on it wouldn't it

33:55

would be another open source library

33:57

Onda hub and would that be

33:59

nice? Analyzing force.

34:02

On that. So like when I say

34:04

it's an open slates civilian force as

34:06

an essay, delete it is. So

34:09

we just have. A. Copy of it right? and

34:11

we would just use our own. and I

34:13

am a lot. Would you want everything to

34:15

sing? Cool said his node. External dependencies or

34:18

sudden? not possible. Ah,

34:20

I'm sorry, I just. I. Got

34:22

it? So dependencies wise. First of all that

34:24

I was talking about like other code that

34:27

gets pulled in when you build that claim

34:29

no one of our stay home when is

34:31

operating. It like operating systems like the like

34:33

you have any to not brings. A suitable

34:35

for did not notify me once Home Decor

34:38

does it for the world has ever have

34:40

to refer lived all the system sources of

34:42

work completely on the phone. Oh

34:44

I'm ah as like. You

34:47

load! Lakers see library

34:50

when when you run a split

34:52

I'm I guess it's hard certs.

34:55

What? Are we talking about here? Like is sick

34:57

when he mean by refer to others as

34:59

I got on. There are the. Software.

35:02

Particles are a relies on for

35:04

is everything within cool cool. It

35:07

needs to it needs internet yeah

35:09

like that's another that I know

35:11

how like myself last I'm on

35:13

about to have to maintain like

35:16

another protocol and that's a sold

35:18

on a server a W s

35:20

somewhere that has to refer to

35:22

be. oh. I

35:25

I'd say there is an example of

35:27

thought in the Dns seeds. Answer: when

35:29

you start up there node and how

35:31

do you know who to connect to?

35:33

Honey know addresses? We can't put that

35:35

directly or we have a little bit

35:37

of thought directly and source code but

35:39

usually that changes day to day rights

35:41

so you. Will talk to

35:43

answer some Dns Cedars. Say

35:46

between five. And in aid of I'm

35:49

Five Defense Of. Them I'm that run

35:51

by various people and they'll be

35:53

like oh yeah. I've been scraping

35:55

the bitcoin network for for addresses

35:57

and here's a list of addresses.

36:00

That are very diverse.

36:02

Their the represents. Various

36:04

network side in the world or whatever.

36:06

And and then you know her ears

36:08

City of a Murderer and you'll talk

36:10

to a the Bees and then you

36:13

know York City of starts acting. So

36:15

that is an example of Alive saying

36:17

that you're connecting to. I would say

36:19

there's very little of that compared to.

36:22

Most. Most. Things that you

36:24

might think those. Are it's the

36:26

took, the Are and who are next

36:29

generation, the data's and business power. In

36:31

the future? Bitcoin mining, an Ai using

36:33

one hundred percent renewable energies of these

36:35

guys? Not done in. I've been working

36:37

with the Sound Down and Will for

36:40

quite some time over a year now

36:42

with a super impressed with a Valleys

36:44

especially their commitment to local communities and

36:46

sustainable computing power and we collaborated with

36:49

them on everything we made. seals are

36:51

dumb podcasts, the even sponsor my. So.

36:53

Between Robin Hood and leveling sponsor

36:56

for a conference Chico's now. Iran

36:58

is the response. Always power bitcoin

37:00

mining. A I am beyond and

37:02

we will find out more about

37:04

them. Please do head over to

37:06

Iran which is irpn.com. The

37:08

some about the casinos, pioneers and bitcoin

37:10

game in Sao they were established in

37:13

two thousand and Thirteen and because he

37:15

knew at that point. Became.

37:17

The beacon of innovation and game and

37:19

and have been ever since. They have

37:21

trusted by tens of thousands worldwide and

37:23

better seen a office cotton as security.

37:25

Of course they support the best money

37:27

in the world. They support Bitcoin. Now.

37:30

With the casino you get. Lightning. Fast

37:33

withdrawals. Vip experience and they have

37:35

over four thousand came. but they

37:37

also believe in a fair game

37:39

and of arm and offer no

37:41

transaction fees. They promote responsible gambling.

37:44

and their power players with their live on

37:46

t p feature to and and five bonus

37:48

and bears games for i to come to

37:50

find it more join be to see no

37:52

please head over to because in a to

37:54

iowa where top most game a mess on

37:57

a core service at is be you know

37:59

the i would be i t G-A-S-I-N-O dot

38:02

I-O. And also please remember to

38:04

gamble responsibly. When

38:07

you split up your node for your first time and it's

38:09

trying to find other nodes to talk to, is

38:11

there a limit? It's like you only need to be connected

38:14

to five or six and once you've, is

38:16

that like the, that's enough to create the

38:18

network effect or can it connect to all of them?

38:20

How does that kind of stuff work? I

38:22

don't know any of this. So

38:25

there's a couple of design goals

38:28

here, right? One is bandwidth,

38:30

right? You can't connect to every

38:32

single person. First of

38:34

all, you'll probably, like your computer probably can't

38:36

handle it. And also this,

38:38

yeah, it's just not feasible. Because it

38:41

means it's taking a constant communication. There's

38:43

like tens of thousands, right? I'm

38:46

pretty sure you just like, you have a

38:48

limited number of slots essentially that you could,

38:50

connections that your computer could be making. Or,

38:54

sorry, I'm trying to like make

38:56

it easy to understand. It's

38:59

just not, like it's not gonna be feasible

39:01

to connect to like, let's say 30,000 like nodes,

39:03

right? But

39:06

the other design goal is like, you definitely

39:08

really, really want to find, first

39:10

of all, honest peers, as in peers that

39:12

are gonna tell you about the main chain

39:14

as soon as they know about it. So

39:16

that you can find the most proof of

39:18

work chain, right? So like we understand proof

39:21

of work consensus, right? Like you find the

39:23

chain that has the most proof of work

39:25

on it and that's your idea of what

39:27

the chain is. But you have

39:29

to hear about it. So

39:32

yeah, what

39:34

nodes will typically try to do is maintain

39:37

like eight to 10, yeah, let's

39:40

just say, eight

39:43

to 10 like outbound

39:45

peers that you connected to

39:49

and are hopefully diverse and hopefully

39:51

very responsive and telling you about

39:53

main chain. So We'll collect statistics about everyone

39:55

that we're connected to. We Have When's the last

39:57

time they sent me a block? When's the last

39:59

time? The family a transaction that was solid

40:02

ones like how fast do they pong

40:04

when I send them a paints Like all

40:06

these metrics we used to assess like how

40:08

good our peers are and then when you

40:10

know when we're managing all of the the

40:13

addresses of the notes that we know about

40:15

will also try. To go for diversity

40:17

right? So it it is very

40:19

easy for examples for someone to

40:21

spin have a bunch of Ip

40:23

addresses from like one. I.

40:26

Speak or never on, but it's much harder to

40:28

do that across like a lot of different Isis

40:30

answer that so I dare you not like we

40:32

have all these ways of managing. Ah, I'm. Managing

40:35

ways for us to make sure that

40:37

we are. Connected

40:39

to a healthy set of peers

40:42

and so yeah will like regularly

40:44

monitor like all regularly trial at

40:46

Oculus. like pick a random one

40:48

from address book and like see

40:50

a stop here is gonna respond

40:52

to us and. And

40:55

like gifts. If we have liked that one of our

40:57

peers has not sent us anything for. You know

40:59

days of lean on nada points by

41:01

that you know is is the city

41:03

fears like was x them and war

41:05

and will try any once on. And

41:08

so yeah, there's there's so much

41:11

that goes into the software. That

41:13

is Not just. You. Know sort

41:15

of fun modes group of work, chain

41:17

or legs as the signature Valid. And

41:20

a very complex as very interesting very

41:23

very interesting I think like I didn't

41:25

I didn't know about this when i

41:27

was taking a that working class and

41:29

I'm in college and uni. Ends.

41:33

Sorry it's a cool i'm I'm would

41:35

have to motivate share with each other.

41:38

Is it is the primary information

41:40

be said to me than there

41:42

were words, transactions and blocks. Soon.

41:44

Or I'm at. While I would

41:46

say it's I primarily. Transactions, blocks

41:49

and addresses of nodes

41:51

suggest on. All. There's.

41:54

A death. Because. Once again, sort of

41:56

humans with this. Most people. Probably

41:58

have no idea how bitcoin one. Her.

42:01

To the little people don't even download in the

42:04

hood for a small censored people who are very

42:06

nice if I run. A know you'll learn

42:08

so much about their client itself. Fine And

42:10

it's so easy. It is so so easy.

42:12

To run a known make a brain blaze

42:14

yeah we you don't need like eat. Only

42:17

money like six hundred gigabytes. Everybody like this

42:19

is a myth and like a very common

42:21

method. people think you need six hundred gigabytes

42:23

to to store the block chain a meal

42:25

in his. Thirties are set by

42:27

Guidoni outlets. It can on

42:29

it on a laptop. But.

42:32

The primary thing is addresses. Transactions.

42:35

And blocks Yeah. And so when to try exemptions

42:37

created that is relays across the whole networks? Yes

42:39

is didn't ever be a time when. When.

42:42

My know just doesn't pick up that

42:44

trans Hudson will eventually get that reads

42:46

as so we're talking about transactions I

42:48

haven't and mind and yet aka cracked.

42:51

The Ah so I'm yeah, this is

42:53

like. When I love talking about the most.

42:56

Simple Air

42:58

Ssssss. So the

43:00

question was it or you're guaranteed to

43:03

hear about hands are awfully eyes as

43:05

a as some some things that I.

43:08

Basically. The process that I work on

43:10

a lot of them and of censor around

43:12

transactions. Answer sets. I'm on various different levels.

43:15

I kind of described a peer to peer

43:17

example, but there's also an employer. Examples: And

43:19

there's also lights. Don't design your things in

43:21

a way. That

43:24

I'm You know it. It

43:26

can get sniped or whatever and it at the

43:29

sorry their it can happen animals as well. I'm.

43:32

But. The the goal is like

43:35

we're trying to build a

43:37

censorship resistant payment. Network where

43:39

anyone can pay each other. And

43:41

nobody can block that. I think this is

43:44

like. Top Three. Best.

43:46

Things about Bitcoin of things that we

43:48

should strive for and but clients on

43:50

ends and three i you aren't guaranteed

43:52

so so I talk about like mumble

43:54

stars yeah all again and say look

43:56

if if if I phone and pick

43:58

it up some some. Won't be supernova.

44:01

See every minute constructing block soon

44:03

as he's every transaction Butts. It's.

44:06

All their chances that a mine have

44:08

seen transactions. it's the bus or should

44:10

the meant to be the same? Should

44:12

everybody have the same month since? Thank

44:14

you for for asking that question. This

44:17

has been our topic that a lot

44:19

of people talk about. I'm. Obviously.

44:21

A bit quain. Could.

44:24

Sunk sense as a

44:26

okay so. There was

44:28

a lot that was sad to kind

44:31

of teach everyone that not everybody has

44:33

might have the same them for there's

44:35

no such thing as the Man for

44:37

riots. There's. Each note on the network. Risk

44:40

that has their own i'm fool and they may or may

44:42

not be the same. I think

44:44

when things are working really well,

44:46

hopefully everyone. Like. Does and

44:49

I'll explain why I'm so.

44:52

Like. We have this

44:54

decentralized transaction really network each

44:56

node has. An I'm Reason with

44:58

them and bullet okay subject is it

45:01

The music loses his own interests. And.

45:03

Occupant of the for me as if they got

45:05

this all load on how you to talk about

45:08

was glorious over the bus. I guess the

45:10

as sorry as okay. So let's

45:12

start from the beginning. We want

45:14

censorship resistant payments. The way that

45:16

we achieve that is through the

45:18

decentralized. Structure of the network right? We

45:20

don't just has you know the minor

45:22

has like a website that he said

45:24

nets payments to that would not be

45:27

sense or it's the government's website works.

45:29

or a bank right? That's that. That's

45:31

obvious it isn't Hopefully or bandstand that

45:33

the saw that works. I'm so what

45:35

we have is decentralized network. Instead you

45:37

can add to one of the tens

45:40

of thousands or hundreds of thousands of

45:42

nodes you send your peers, your transact

45:44

sense and they cost a bit and

45:46

eventually it gets to everybody. That's how

45:48

it's supposed to work. On how we

45:50

implement thought and process is each. Node

45:52

first of all as down to hear about

45:54

transactions and. Validate them and will put

45:57

them into their memory pool or man

45:59

pool and that's. The cache of

46:01

unconfirmed transactions is just a cast.

46:03

And you spam access and therefore

46:06

the echo Good good question. Says

46:10

it's an okay. Yeah

46:12

so you as a note operator why

46:14

do why do you do this one

46:16

is so that you can toss everything

46:18

for one block like the one of

46:21

the reasons is so that block relay

46:23

works so when you receive a block

46:25

on what you what might happen if

46:27

season. See any transaction before. His

46:29

you have this huge networks are

46:31

like bound with Spike where you're

46:33

downloading the whole block and then

46:35

you're like spinning, spending, spending your

46:37

like loading Cgx those front desk

46:39

and you're like by doing the

46:41

computationally heavy saying of verifying all

46:43

the signature the center. it's very

46:45

com additional expenses and like it

46:48

might take you a while to

46:50

do this. so that's one. Possible.

46:53

Reality and the or possibly ah yes,

46:55

I just already downloaded all these transactions

46:58

already verify them. I have the cash

47:00

where I like Castile, The signature is

47:02

that a child's I'm already loaded. All

47:04

these he excels in some memories and

47:06

I'm done and I store it on

47:09

the next block. Bread and not is

47:11

a much much healthier for small situation

47:13

for you as the node operator but

47:15

also for the network because every single

47:17

hop is so much faster. Sorry so

47:20

block latency goes from like this to

47:22

this because each hot. Like. Multiplies that

47:24

he is hop rates on. And.

47:26

So the healthiest network the ones with

47:29

the most the least three org swear

47:31

it like reorder bad because the for

47:33

example he won't block latency to be

47:35

very very fast because it's to people

47:38

find the next block at around the

47:40

same time hopefully everybody. Hears about one.

47:43

Like. Quickly. Otherwise

47:45

you might end up with you know half the

47:47

network knows about the Spock and for the other

47:50

half know about this blocks and then at some.

47:52

Point: You have to resolve That rewards.

47:54

The fewer of those you have, the

47:56

better. When I was into the album. I

47:58

think like once a week. Compared to

48:01

regular. That

48:03

we have every thousand box or something?

48:05

Yeah, yeah. I'm but it used to

48:07

be. More frequent and every time

48:10

that happens. Like every time there's a

48:12

real hard like it's it's messy. It

48:14

means you are confirmed. Payment may

48:16

or may not still be confirmed.

48:19

Legacy you I issue. it's like as

48:21

it is it's a usability as yeah

48:23

right us. So as a security issue

48:25

it can be at least And so

48:28

we. Really, we really want to minimize

48:30

that as much as possible. So anyway,

48:32

we're talking about life. Mumbled introduction

48:34

really are useful for block relax.

48:38

And. And the

48:40

other uses obviously so that we

48:42

can have a nice censorship resistant

48:45

payment systems. And.

48:49

When. We are participating in

48:51

transaction relay. This is that.

48:54

We. Don't just like validate whether

48:56

the transactions consensus valid. Jokinen

48:59

Mum for. And and continue

49:01

to answer your question will. Shoot

49:03

Us would translate can use down the match

49:05

your mom for. On yeah, there

49:08

are consensus valid transactions. I can

49:10

take you several minutes to validate

49:12

spray and they may or may.

49:14

Not be. A

49:16

valid transaction. Red lights. There's

49:19

this really great post I think by Rusty

49:21

Russell on which. Is from a long time

49:23

ago a non sequitur on fox and with

49:25

like a bunch of them putts do so

49:27

like quadratics that tossing. It took like

49:29

several minutes to validate. You can imagine

49:32

that being like a state transaction right.human?

49:34

a block which had proof of work

49:36

on at and for who worked as

49:38

a psych. Really easy way to avoid

49:40

spam because it's so much harder to

49:42

produce of proof of work solid blocks,

49:44

that it is to like download and

49:47

validate at i'm whereas transactions you don't

49:49

have a group of work requirements so

49:51

it's much more like people and just

49:53

send you this transactions maybe spend minutes

49:55

validating it and then it through those

49:57

be invalid completely useless not even going

50:00

be confirmed, right? Thanks. Thanks,

50:02

right. And

50:04

so we have rules where we're like,

50:07

okay, we don't take really large transactions.

50:10

Like, that's a very simple rule. So

50:12

consensus rule, you could have like a 400, 400,000

50:14

like way in it, transaction, but we make

50:21

that 100,000 in in

50:23

transaction relay. Another

50:26

really good example is we

50:29

use, like we want our mempool,

50:31

it's a cache, right? We want it to be useful.

50:34

And so we use a lot of

50:36

incentive compatibility metrics to assess whether or

50:39

not this transaction is useful. So the

50:41

best example is if you get two

50:43

transactions that conflict with each other, they

50:45

spend the same UTXO, they're double spends,

50:48

you should probably pick the one that's

50:50

higher fee rate, because

50:52

that is more incentive compatible for a minor

50:54

to mine. Even if you're not a minor,

50:56

you like you're expecting

50:59

to use this for when you're validating

51:01

blocks, you're like, okay, this is more likely to be

51:03

mined. And therefore, I'm going to take it.

51:07

So that's like, that's

51:10

another example of like, what

51:12

we do in transaction validation. And that's what leads

51:14

to being able to RBF to replace by fee,

51:16

right to fee bump. Sorry,

51:21

I'm getting to your question about

51:23

should everybody have the same mempool? Like

51:26

hopefully, in an ideal world,

51:28

things work best if everybody has the same

51:30

mempool. Of course, like all these rules

51:32

that I described, they're not consensus. So

51:34

you can have whatever you want, right? Like

51:36

let's say you're like,

51:39

I mean, the example is like, I

51:42

hate inscriptions, or like,

51:44

my mempool, like doesn't

51:46

allow spending on confirmed

51:48

UTXOs or my mempool, like you can do whatever you

51:50

want. And that, yes, like, that's

51:53

allowed. But it's

51:56

not, but like people are like, therefore, everybody

51:58

should have different mempools. It's like, well, no.

52:00

no. No. That's

52:02

not where we were going. On but

52:04

I think it was like kind of this over

52:06

correction of like people used to think there was

52:08

the men pool that you would submit. Transactions

52:11

to. And then now everybody's and

52:13

all. Actually everybody has their own man pool,

52:15

all the members of a different look. I

52:17

used think this isn't his face of

52:19

things there was just like one member

52:22

of the soil the question other our

52:24

side dependencies because I imagine there was

52:26

a dismal of transactions when he realized

52:28

the transactions are self again relayed as

52:31

towards know when we go to the

52:33

member website is able to they see

52:35

as that just their own. May.

52:37

I that's awesome are a number. Faith

52:40

and man for different. Yeah, there's like

52:42

ma'am form the memory. Pool that each

52:44

node has yeah and then numbers. That

52:46

is an answer that to theoretical that's

52:48

just. One,

52:51

What. It should be. Ah,

52:53

I'm. Not necessarily they

52:56

think this from so

52:58

the I'm. My. Aunt. I

53:01

mean, they run. Their own oakland know yet

53:03

what? My senses? yes. But therefore, this

53:05

could theoretically be different from us. Yes,

53:07

Yes, absolutely so. anyway run a few

53:10

different nodes first of all and so

53:12

they They have like of. A

53:14

huge know that has like all

53:16

the transactions. And then they have like

53:18

the default node or it was a three

53:20

hundred megabytes and so like when see rates

53:23

are really Hitler's that a ton of term

53:25

fox sense like the huge man pool will

53:27

have all of them. But for example, your

53:29

three hundred megabytes sample is gonna start per

53:32

Jane the. Lower see raised us that.

53:34

Is less likely to get mine.

53:36

Were using incentive compatibility to assess.

53:38

Once and when they get worse, where did they go

53:40

to? He's a strong when. They're gone from

53:42

mine, node for you or node or just from

53:44

away, but a minor would never throw any way

53:46

to the some point they might my mom's. Ice

53:49

I would imagine that they do something very similar

53:51

to what mental space as much as they have

53:53

a huge know that just keeps track of all

53:55

of them. but they have like a default. Know

53:57

because the larger your mom for the more

53:59

hobbies. Like value of everything gets. I like

54:01

building a new block template. for example, he

54:03

wanted it out on a smaller mom for

54:05

of a huge one is just the store

54:08

and all the stuff later. It's like okay

54:10

if we go through a very intensive period

54:12

whether that's a low value transactions a problem

54:14

for later and then see rates dropped them

54:16

them bring wasn't yeah exactly so much to

54:18

the. Still yeah, yeah

54:20

exactly. And so I think some part

54:22

of like Them Full Face as a

54:24

school audit. seats are right where they

54:26

print, like they build their own the

54:28

Park tumbler and they compared to what

54:31

got mind and you can see like

54:33

or this enough stonily censorship like there's

54:35

There's many reasons. Why the transactions

54:37

might be different but it like

54:39

you can kind of see what.

54:42

What? it would be are like what

54:45

the difference was but. Of course liked your

54:47

node might be different from ample space is known

54:49

him you know and that may be different from

54:51

the minute node or whatever. I'm. And.

54:53

So it's like very difficult. Third,

54:56

It's very difficult prescriber reason why turn

54:59

box and might be different because i

55:01

have opposed to transaction where the fees

55:03

too low and it never get mind

55:05

and just sits there and. Forever

55:08

for is like everybody's bidding

55:11

higher than here for box

55:13

space than sorry that he

55:15

saw them and amusement centers

55:17

and eventually just. To. Cancel

55:19

cause who must have do as

55:21

to somehow case the myself to

55:23

I bring by myself as I

55:25

would say I'll need encapsulates. I

55:28

think once you find that term

55:30

fox and the for example minor

55:32

could just be logging. Every single

55:34

transaction that they see and then like

55:36

six months later you thought it was

55:39

council and and maybe are like paying.

55:41

Your friend or a merchant or something and

55:43

you're like oh, Kansas and any transaction ounce.

55:45

Cans Old Lady my

55:47

your mind sets of.

55:49

Lives are as if you bring your back

55:51

is really where you three with no no

55:53

as a this and sorry sir event will

55:56

you could. double spend at gray

55:58

this is still not guaranteed

56:00

that someone might not mine it.

56:03

It's a consensus valid transaction. You've

56:05

already broadcasted it. Can I increase the

56:07

fee? Yeah, yeah.

56:10

So yeah, so you could like, I described

56:12

before, you could create an RBF where you

56:15

double spend it in a higher fee rate

56:17

transaction. And theoretically a miner

56:19

should mine the higher fee rate one. But

56:21

again, they could decide if they

56:24

wanted to, if they're being weird, like they

56:26

didn't hear about, like for some reason they

56:28

didn't hear about the fee bump or

56:31

by the time you fee bumped it, they had already

56:33

started working on a block with that

56:35

transaction in it, for example. These

56:37

are all potential reasons why like

56:40

your RBF may or may not get in,

56:43

may or may not happen. There's a

56:45

lot of reasons why they're replaced by

56:47

fee, transaction may or may not work.

56:50

One of those, like some of those reasons, because

56:52

I've spent a lot of time looking at kind of

56:55

the limitations of RBF, is

56:58

just like our policy rules are not very smart.

57:01

So we make a trade off again

57:04

between like being resistant

57:06

to denial of service, like trying

57:08

to be computationally not

57:10

complex, as well as

57:13

incentive compatibility, right? So sometimes

57:15

we make a trade off where

57:17

we take a shortcut or we

57:19

have an imperfect heuristic for assessing

57:21

incentive compatibility, because the actual thing

57:23

would be too computationally complex to

57:25

do. And so

57:27

we might look at two transactions and we'll be

57:29

like, oh, this one's better to mine, but actually

57:32

this one is. And

57:34

so we might reject a replacement, that's

57:36

actually better, or we might accept

57:38

a replacement, that's not better. And

57:41

like, this is, I

57:43

consider a bug. It's a

57:45

very complicated bug because it's

57:48

the result of kind of a lot of engineering

57:51

and these are very like kind of

57:53

edgy edge cases. But

57:56

yeah, there are, I've spent a lot of

57:58

time essentially working on

58:00

these kinds of replace by fee policy

58:02

limitations. And we have a few proposals.

58:05

I have some proposals as well as other people.

58:08

I don't speak on behalf of anyone other than myself.

58:12

There are a lot of really exciting projects

58:14

that people are working on to try to fix

58:17

these things in mempool. So how

58:19

has inscriptions changed

58:21

the mempool game? Because

58:24

clearly it has. So

58:28

I remember we had like a

58:30

three round trip debate

58:34

where I think

58:36

it was around like people

58:38

were really upset that the fees were

58:40

so high because of all the I think they are C20

58:42

stuff. And

58:45

they were like, can you fix this? And

58:48

I was like, you're kind of like

58:51

somebody who's driving down the highway and

58:53

there's traffic and you're like, road workers.

58:55

Why did you allow all these people?

58:58

Like it's like, yeah, other people are

59:00

allowed to are allowed

59:02

to send Bitcoin transactions. And

59:05

the way that they're chosen

59:07

for confirmation is based on

59:09

fee rate because miners are

59:11

economically incentivized to include those

59:13

transactions. The block. Yeah.

59:16

Yeah. I mean, they use the scarce

59:18

block space to a demand

59:21

that's very high and choosing economic.

59:23

Right. And the price goes up

59:25

for a unit of block space, which is the

59:27

resource that you're trying to consume. But

59:29

this is political. Yeah. And

59:34

do you feel like as a developer or

59:36

maintainer either or do you feel

59:38

like you have a duty to not be

59:41

political, not have an opinion

59:43

as long as your job

59:45

is just to make sure the software works? Yeah.

59:49

So the

59:54

issue that I had when we were talking

59:56

about this was that people

59:58

are like, can you stop the spam.

1:00:02

And spam has a very specific,

1:00:04

like we've just been talking about

1:00:06

the definition of spam when

1:00:08

we're talking about mempool code and

1:00:10

transaction relay code, where

1:00:12

it's using a

1:00:15

resource, for example, your

1:00:17

computer's computation

1:00:19

or memory, that it

1:00:21

shouldn't be. And we

1:00:23

have all kinds

1:00:25

of ways of preventing that.

1:00:31

And so we have a, I'll have a definition of spam that

1:00:34

I use when I'm working, when I'm thinking

1:00:36

about this kind of code. And

1:00:38

people are asking me to apply

1:00:40

that definition based on use case.

1:00:44

And I don't think it's the

1:00:46

protocol developer, the transaction relay

1:00:48

code's place to decide what

1:00:52

use case is legitimate or not. Like

1:00:55

it, like, you know what I'm saying? Can happen

1:00:57

at a node or

1:00:59

even minor level like Ocean of Dunt, you can, that's

1:01:03

where you can make that decision.

1:01:05

Because in the decentralized network, you

1:01:07

get to decide yourself. Yeah, like

1:01:09

you, like if you don't

1:01:12

like cat photos, you don't like

1:01:14

wizards or whatever, that's like your

1:01:16

choice, right? But I don't think

1:01:18

this is not a legitimate transaction

1:01:21

or, you know, this is a

1:01:23

waste of blocks, you know, because NFTs

1:01:26

are bad or whatever. I don't think

1:01:28

that language has a place.

1:01:30

Well, I don't think that should be

1:01:32

considered when you are talking

1:01:35

about writing policy code. Yeah.

1:01:37

As a

1:01:40

developer. Yeah, as a developer, as

1:01:42

a protocol maintainer, like, it's been such a

1:01:44

tricky subject to navigate. And honestly, I've gone

1:01:46

back and forth on this. I've ultimately come

1:01:48

to the point that my

1:01:51

preference would be Bitcoin was just

1:01:53

used for financial transactions. Sure.

1:01:56

Of Bitcoin being money. And

1:01:58

I know someone said, well, the these still are. But

1:02:00

I've also I don't

1:02:03

like the idea of censorship. But

1:02:05

in a very long conversation with Bitcoin

1:02:07

mechanic, obviously he's very much involved in

1:02:09

ocean. I agree

1:02:12

with him. Like the thing I care about, the thing

1:02:14

I'm here for is the improvement of money, especially

1:02:17

with the kind of things we saw out in

1:02:19

Malawi and Kenya and Ghana. Yeah,

1:02:21

I have zero interest in in

1:02:24

quantum cats. I feel

1:02:26

like some of that some of

1:02:28

this doesn't attack on Bitcoin. But

1:02:31

I I've come

1:02:33

to really appreciate that it puts you in

1:02:35

a difficult position because people want you to

1:02:37

have a political view. Do you feel

1:02:40

that as a pressure? Yes.

1:02:44

Well, I don't know if people are

1:02:46

asking me to have a view so

1:02:48

much as they're demanding that we change

1:02:50

the software and write. And

1:02:54

I think let's to be kind of

1:02:56

fair to argument. We've identified

1:02:59

a couple of reasons why you would

1:03:01

have policy. But policy is in the

1:03:03

validation rules in mempool that aren't consensus.

1:03:06

And historically, there have been

1:03:09

kind of things put

1:03:11

in place to discourage

1:03:14

things that are bad

1:03:19

for network resources. So for example,

1:03:21

we have standard output types and

1:03:23

we have a dust limit and

1:03:25

not to try to protect or

1:03:28

try to discourage creating

1:03:30

a lot of and even the witness

1:03:32

discount as well as kind of to

1:03:35

try to discourage bloating of the UTXO

1:03:37

set. What is a witness discount? Oh,

1:03:41

no, we're getting into it. OK,

1:03:43

so let me just

1:03:45

finish that idea first. So I

1:03:48

talked about how you can run

1:03:50

a fully validating Bitcoin

1:03:52

node and you don't need to

1:03:54

store the entire block chain. You just need

1:03:57

to store the UTXO set all

1:03:59

of the UTXO. and that is enough

1:04:01

for you to validate whether each

1:04:03

transaction and each block is valid. Well,

1:04:06

you also need the header's chain. You

1:04:08

don't need all, you can prune most of it. And

1:04:12

so the size of UTXO set is

1:04:14

kind of very important to scaling and

1:04:17

to the accessibility of running a node and all those

1:04:19

things. And

1:04:22

so, what were

1:04:25

we saying? Oh, witness discount. So when we

1:04:27

are looking at the size

1:04:29

of a transaction, certain

1:04:31

parts of the transaction are weighted

1:04:34

differently from others. And

1:04:36

so the witness data, which is like

1:04:39

the signatures or the scripts that make

1:04:41

this transaction valid, which

1:04:44

can be discarded, like

1:04:47

that is

1:04:50

weighted less. That's

1:04:53

all the witness discount is. And

1:04:57

so that means that if

1:04:59

you make a large witness,

1:05:01

that does not cost, that won't

1:05:04

cost you as much in fees, for example, as

1:05:07

if you made a lot of outputs

1:05:09

and outputs are what go into the UTXO

1:05:11

set. And

1:05:13

similarly, we have a list of standard

1:05:17

output types. So

1:05:19

that's pay2witnesspubkeyhash or

1:05:22

pay2taproot or pay2witnessscriptash

1:05:24

or those like

1:05:26

standard types. And they're very

1:05:29

small and they have a standard

1:05:31

format. And say, okay,

1:05:33

we don't have to get into the death

1:05:35

limit. But these are, they're like very

1:05:37

important. What is the death limit? What's the actual

1:05:39

value? Sure. Oh, it depends

1:05:41

on the output type. So I just described

1:05:43

the different types. So I don't

1:05:45

know if I should explain what they are. But

1:05:48

if you create an output that has like one

1:05:50

Satoshi in it, well,

1:05:54

you're not like, if you are to spend that,

1:05:57

it's going to cost you more in fees to

1:05:59

spend that. UTXO then it's

1:06:01

worth. You know what I'm

1:06:03

saying? Unless you've got a special

1:06:05

Satoshi, the first Satoshi on the block.

1:06:07

Oh sure, sure, sure. That's

1:06:11

bullshit right, you can't identify the individual Satoshi's.

1:06:16

Well that's what Ordinals is right,

1:06:18

like you have an external... But

1:06:20

they're like, they've just basically made

1:06:22

up their own number and system

1:06:24

but these Satoshi's don't exist individually.

1:06:27

Because a UTXO is

1:06:29

essentially a... Like if I put a 20

1:06:32

pound note on the table, there aren't individual pennies

1:06:34

in there, it's just a 20 pound note. You

1:06:36

can't identify the individual pennies in that note. Sure,

1:06:39

sure. I guess we can kind

1:06:41

of... No, you don't need to do that. I

1:06:44

think, yeah, like you can like

1:06:46

do anything to derive meaning that

1:06:48

isn't kind of baked into the

1:06:50

protocol. So the Ordinal Theory is

1:06:52

something that is an external protocol

1:06:54

outside of Bitcoin. Yeah, that has nothing to do

1:06:56

with it. Like when people tell me to stop doing Ordinals, we

1:06:58

don't have the Ordinals. Fuck

1:07:01

it. Yeah. So

1:07:04

the dust limit, does that have

1:07:06

to be a kind of a moving beast as Bitcoin

1:07:09

value changes? Or is

1:07:11

it irrelevant? Because it's priced in Satoshi's? It's

1:07:14

priced, it's determined based on

1:07:16

like Satoshi units, right? So

1:07:18

if you assume that use,

1:07:21

let's say, you're always

1:07:23

going to have to have at least one sat per V

1:07:25

by H, the dust limit is like a three, but

1:07:27

like once that per V by H on

1:07:30

any transaction order to spend it, then you

1:07:32

can't be making like... If you make a

1:07:34

five sat output, then it's uneconomical

1:07:40

to create that output because it's

1:07:42

worth less than what it would

1:07:44

cost to use it. All

1:07:47

right, let's talk about Ledger, my

1:07:49

favorite hardware wallet in the world, the people I've been

1:07:51

using since 2017. Now

1:07:53

Ledger is a world leader in Bitcoin security, and

1:07:55

is one of the best ways for you to

1:07:58

own and secure your private keys. Now listen. If

1:08:00

you are still holding your Bitcoin on an exchange with

1:08:02

a custodian, what are you doing? I've been telling you

1:08:05

for years to stop doing this. It

1:08:07

is time to take your security more seriously

1:08:10

Remember if it's not your keys Ain't

1:08:13

your Bitcoin now with ledger hardware wallets

1:08:15

paired with the ledger live app You have

1:08:17

the easiest way to start managing your own

1:08:19

private keys and taking control of your Bitcoin

1:08:22

With the price booming, you don't want to be

1:08:24

leaving that on exchange. We've seen what happens with exchanges, right?

1:08:27

Now you can send and sign Bitcoin transactions

1:08:30

with full transparency in the ledger live app

1:08:33

And we'll see it can be easier. I've told you

1:08:35

a million times. I'm still using the same wallet. I

1:08:37

bought back in 2017 I've still

1:08:39

got that same ledger and

1:08:42

nano s also ledger has recently

1:08:44

released their Bitcoin orange nano They've

1:08:47

got a very cool initiative going with

1:08:49

it They are given $5 from every

1:08:51

purchase to the Bitcoin developer community and

1:08:53

the start now with brink Which

1:08:55

I love to see so if you want to find

1:08:57

out more if you want to get yourself a hardware

1:08:59

wallet Please head over to ledger and it's shop dot

1:09:02

ledger comm which is sh

1:09:04

op dot LED gr.com

1:09:08

Alright, let's talk about swan and their mission

1:09:10

to help millions of people get into

1:09:12

Bitcoin and they've built the fastest

1:09:14

and easiest way to get That started it

1:09:17

takes just a matter of minutes to sign up and

1:09:19

start buying Bitcoin with the swan app For

1:09:22

introducing friends and family to Bitcoin has never

1:09:24

been easier and swan now has

1:09:26

zero fees on the first $10,000

1:09:28

of Bitcoin buys so it is

1:09:30

free to get started Don't worry If

1:09:32

you are already a swan client your

1:09:35

next $10,000 of buys are also free

1:09:37

if you love to recommend Bitcoin And

1:09:40

I know you do swan is an absolute no-brainer You

1:09:43

can take a friend from zero to Bitcoin in

1:09:45

just one quick conversation Just

1:09:47

tell them to search for swan Bitcoin in the App

1:09:49

Store It really takes no

1:09:51

time and it's completely free for them

1:09:53

to get started again search for swan

1:09:56

Bitcoin, which is SWAN

1:09:58

BIT. I am

1:10:00

to download the app. Okay,

1:10:03

Let's talk about costs us. Less.

1:10:05

Talk about cold storage. Now listen that

1:10:07

the bitcoin price has been booming this

1:10:09

last year and I know some of

1:10:11

you will see you net wealth and

1:10:13

Bitcoin flying up. You may not considered

1:10:15

forty six store and see my not

1:10:17

considered Tolstoy venus. Get onto this. I

1:10:19

have been using costs for about four

1:10:21

years now. Absolutely love it so a

1:10:23

lot more comfortable. Know what Bitcoin is

1:10:25

locked up in a multi sig solution

1:10:27

because he's a very Best Buy or

1:10:29

Thorns a bustling else They have brought

1:10:31

a product of the markets that changes

1:10:33

everything. Something I. Needed something I'll be

1:10:36

bored by for long time which is

1:10:38

inheritance and as some of you plan

1:10:40

your inheritance would you be coined by

1:10:42

pretty some kind of puzzle or sharing

1:10:44

of other people but cause of now

1:10:46

that they have build this natively into

1:10:48

their app so you can handle custody

1:10:50

and you can handle inheritance directly in

1:10:52

the app is for and is no

1:10:54

mistakes as run the people you love.

1:10:57

Will. Inherit your bitcoins to Something happened to you.

1:10:59

We. Have to do is to the recipient

1:11:01

and when he's not say when you go

1:11:03

on the person you put in charge wait

1:11:06

six months and they take control of your

1:11:08

bitcoin. Also also provides you with a helping

1:11:10

hand to make sure your bitcoin stay safe

1:11:12

to this transition so you'll find out more.

1:11:15

If. You realize it is time to

1:11:17

give yourself a good cold storage solution.

1:11:20

Please do gun check out Casa at

1:11:22

Casa de I have which is see

1:11:24

a essay.iowa. Something.

1:11:26

Like having Canada they didn't They don't make

1:11:28

the the penny anymore because more than have

1:11:30

any to make him any. Yeah.

1:11:32

The ice on and so ah

1:11:35

that leads are time at a

1:11:37

certain amount. This because this has

1:11:39

been like a very very long

1:11:42

standing rule as we had like

1:11:44

standard ness tax and policies were

1:11:46

you can't. he can't do

1:11:48

that or like if i am running that

1:11:51

number i have my them pool and i'm

1:11:53

wearing my node and i receive a transaction

1:11:55

that creates a dust output i mean angle

1:11:57

hadn't rejected even as it's consensus valid That

1:12:00

was there as, I guess, the

1:12:05

idea is to protect network resources,

1:12:07

to encourage people not to do

1:12:09

things that are going to hurt

1:12:11

the scalability and whatnot. People are

1:12:13

like, why can't you do that

1:12:15

for inscriptions? Because

1:12:17

policy can ban or

1:12:19

can prevent things.

1:12:24

So people are like, why don't we have

1:12:27

a policy rule where if we see an

1:12:29

inscription and a transaction, like the NFT thing,

1:12:33

then we also ban that in

1:12:35

policy. And this idea

1:12:37

has been dressed up in many

1:12:40

different trench coats, has

1:12:42

different pull requests to the Bitcoin

1:12:44

Core repository. Oh, do you know about this?

1:12:48

And they've become like flame

1:12:50

wars on GitHub, which

1:12:53

is not Twitter. It's a

1:12:55

place where you discuss code. As

1:12:59

maintainers, has

1:13:01

this been something that's been debated, or is it

1:13:04

very obvious that you just don't get involved in this censorship?

1:13:08

We've talked about this because

1:13:10

I think people take pull

1:13:13

requests seriously. Anyone can

1:13:15

contribute. It's not like we're like,

1:13:18

we'll take every pull request seriously. When

1:13:21

I say we, I speak

1:13:23

on behalf of myself and not anyone else, of course.

1:13:26

But yeah, you think about it. And

1:13:28

actually, I published a really

1:13:31

long document summarizing one of

1:13:33

the iterations of

1:13:36

this proposal because

1:13:40

it had hundreds of

1:13:42

comments from various people

1:13:44

to various

1:13:47

degrees of professionalism. So

1:13:50

I tried very, very seriously to

1:13:52

index every single comment I could find

1:13:55

on it, summarize the arguments and weigh

1:13:57

the merits of the technical arguments against

1:13:59

each other. So yes, I

1:14:01

did very seriously review that PR, and

1:14:05

I can send you the doc if you want. So

1:14:11

the idea was like, why can't you do this for

1:14:13

inscriptions? I

1:14:17

think there's two things. One is

1:14:20

you can do this on your node, but

1:14:22

when you're asking, there's

1:14:26

a difference between I want to do this on

1:14:28

my node, and I want Bitcoin Core to ship

1:14:30

this as the default. And

1:14:34

so there's two things that I really

1:14:36

just want to put out there. One

1:14:38

is Bitcoin Core doesn't have the

1:14:41

ability to just censor things. We

1:14:43

can only, like I said, we

1:14:46

try to publish software that is

1:14:48

accessible to run, but also incentive

1:14:50

compatible to run. If I publish,

1:14:52

sorry, not I, but if we

1:14:54

create a piece of software

1:14:56

and we're like, hey, miners, can you please

1:14:58

run this? You'll lose like 30

1:15:01

Bitcoins in fees, but like please run

1:15:03

this. They'd be like, no. By

1:15:05

the way, did you see those fees in the

1:15:07

first few months? Yeah, that's what I mean. Like

1:15:10

35 Bitcoins? Yeah. Again, we

1:15:12

just publish code. We

1:15:16

don't force people to run it. We

1:15:19

can't ask people to run it. People voluntarily

1:15:21

download the software and then decide whether or

1:15:23

not they want to do that. So if

1:15:25

you publish software and you're like, well, if

1:15:27

you run this, you lose 30 Bitcoins in

1:15:29

fees, but like please, that's not how that

1:15:32

works. We just finished talking

1:15:34

about how everyone has optionality and what kind

1:15:36

of mempool rules that they're going to use,

1:15:38

because it's not consensus again. We

1:15:41

have so many clear examples of

1:15:44

like Marathon or F2 pool mining

1:15:46

things that would

1:15:48

have been rejected by the Bitcoin

1:15:50

Core default Zionist rule. This the out

1:15:53

of band stuff? Yeah. Yeah. What is

1:15:55

that all about? Are they constructing

1:15:57

transactions but that don't go into the...

1:16:00

They're not broadcasting them. They're just putting them as

1:16:02

part of a block. So

1:16:04

it would be in their mempool and then

1:16:06

they just don't send that to anybody else.

1:16:09

Or like a lot of times they

1:16:11

do it because they're running some

1:16:14

patch that is different from the

1:16:16

Bitcoin core like rules. Is

1:16:20

there any danger to out of band

1:16:22

transactions? So let's

1:16:25

go back to the block relay latency

1:16:27

thing that we were talking about where

1:16:30

anytime you create

1:16:33

a... Okay so this I think when

1:16:36

things are working right best

1:16:39

I mean like everybody already knows all

1:16:41

the transactions by the time you broadcast that

1:16:43

block and then like it propagates

1:16:45

like immediately right. And

1:16:47

if they construct it so if they a single

1:16:51

out of band transaction is fine if they did a

1:16:53

whole block of them and then

1:16:55

broadcast that we have a potential latency

1:16:58

issue. So actually a single one

1:17:00

makes a difference as well. So

1:17:03

kind of the way that block relay

1:17:05

usually happens nowadays is with compact blocks

1:17:08

and we have like kind

1:17:12

of direct high bandwidth

1:17:14

like first round like

1:17:16

no round trip ones as well where

1:17:18

basically I just send you like a

1:17:20

skeleton of the transactions and I

1:17:23

have like short IDs talking about all the transactions

1:17:25

in the block. And

1:17:27

if you already have it in your mempool you're like cool I've got it.

1:17:30

But if you're missing something you have to be like

1:17:32

hey Gloria can I get one of those transactions and

1:17:34

I'll be like yeah sure here you go. And that's

1:17:37

an extra round trip. And

1:17:40

so yeah like a single transaction can make a

1:17:42

difference and of course a whole block of transactions

1:17:44

then it's like oh I have to download all

1:17:46

these and I'm going to validate all of them

1:17:48

and then you know. And

1:17:51

so yeah it does make a difference.

1:17:53

Is that a point of debate that should

1:17:55

the network allow out of band transactions and

1:17:58

could they be stopped? No,

1:18:00

no, no because Like

1:18:03

it's like I mean we can like we know

1:18:05

about marathon because they offer like a service. Yeah

1:18:07

do this, right? But

1:18:10

there's no way for you to enforce like

1:18:14

You can only give me transactions that I

1:18:16

already heard about it's like

1:18:19

that's why we have blocks it's

1:18:22

you know, it's it doesn't work that way and

1:18:26

So, yeah, there wouldn't be a way to

1:18:28

like and like cuz that's why we have

1:18:30

consensus in blocks is we have rules

1:18:32

and blocks and then we're like, okay, these are

1:18:34

the orders of the transactions if we had

1:18:37

a way to do that without if

1:18:39

we had a way to be like, you know, this is

1:18:41

this is the order in which transactions are

1:18:44

received and created and whatnot then

1:18:48

This wouldn't like we wouldn't have we wouldn't be

1:18:50

doing all this, right? so

1:18:52

have inscriptions Presented

1:18:57

Will agree that you shouldn't censor them will agree

1:18:59

that you know, that's not your job at a

1:19:01

policy that you want to say something Yeah, we

1:19:04

can't like sense I don't like the word censor because we

1:19:06

don't have the ability to do that Like I just like

1:19:08

I like I just said we like you know what I

1:19:10

mean Like we can we can create

1:19:12

no we don't you have to look at why I

1:19:14

started this episode Like I thought I started like right

1:19:16

off the like I don't have the power to decide

1:19:18

what other people's mental policy We

1:19:23

can't do that and and and like

1:19:26

my other point was that like It

1:19:29

doesn't make sense. Like you can't we can't

1:19:31

write software. That's just like yeah, like just

1:19:33

throw away That's not incentive compatible. But

1:19:36

have inscriptions change

1:19:39

Change the what you do in that if it presented

1:19:41

newer tech vitals, you have to think about Like

1:19:46

the inscription transactions Just

1:19:48

the fact that they existed these BRC 20 like

1:19:52

Has that changed the way you have to work

1:19:54

or do you just see transactions and therefore it

1:19:56

doesn't matter? Mmm,

1:19:59

I would say I

1:20:03

think there's two things we can talk about. One

1:20:05

is a bug related

1:20:07

to just what happened with really

1:20:10

high transaction volume. The

1:20:12

other one is more attention to, I

1:20:15

think Mononaut calls it mempool sniping.

1:20:19

So I'll talk about the first one. This

1:20:21

is not the structure of inscriptions.

1:20:24

This has nothing to do with ordinals. It's just

1:20:27

the high volume of

1:20:29

transactions. This is just an anecdote.

1:20:35

We discovered that there were a couple

1:20:37

transaction relay, data structures that were not

1:20:39

as efficient as they could have

1:20:41

been. It probably would

1:20:43

have worked for hundreds per minute,

1:20:45

but it doesn't work for tens

1:20:48

of thousands per minute. Very good

1:20:50

thing to find that out. Yeah, exactly. I'm

1:20:52

not saying like, but

1:20:55

a lot of people are like,

1:20:57

has anything happened? I think this is a

1:20:59

positive thing that came out of that.

1:21:04

Then the other one, what

1:21:07

was I going to talk? It was the

1:21:09

mempool sniping stuff. I

1:21:13

really wanted to talk about this on a podcast. It

1:21:16

is what I have been talking

1:21:18

about for ages. I

1:21:21

was always like, okay, pinning

1:21:24

is the thing that we're going to talk about. I

1:21:27

was always like, this is really

1:21:29

bad. This is

1:21:31

especially bad for L2s and

1:21:34

Lightning Network stuff, where I'll

1:21:37

just do a shorthand one. Basically,

1:21:40

you have the same security model because you

1:21:42

can always settle on chain. You have all

1:21:45

these off-chain transactions that you're not going to

1:21:47

broadcast. Through that, you

1:21:49

get the scalability and the privacy and

1:21:51

the cool features. But the security is

1:21:53

the same because you can always settle

1:21:55

on chain. You've already enumerated all the

1:21:57

spending paths, and they include like,

1:21:59

hey, if you're going to do this, I have

1:22:01

two days to respond. And

1:22:04

I respond by broadcasting this

1:22:06

transaction that spends from it.

1:22:09

And I have two days to do that until

1:22:11

the other spending pass opens where you get

1:22:13

to redeem the money. That's usually how those

1:22:15

L2s are kind of set up, is

1:22:18

you have this critical period

1:22:20

within which you need to broadcast

1:22:22

your transactions. And

1:22:24

so my argument was always like, okay, but

1:22:26

what if, like what about the games you

1:22:29

can play in mempool where like

1:22:31

I can try to censor your transaction through

1:22:35

various means. So one of the things I was talking about was with

1:22:37

like replaced by CRBS.

1:22:39

Sometimes you might broadcast a replacement

1:22:41

or you might broadcast a transaction

1:22:43

that makes perfect sense, but because

1:22:46

of the limitations in

1:22:48

how the validation like code works,

1:22:50

like it'll just be like dumb

1:22:52

and like not realize this. Anyway,

1:22:57

oh, so with kind of all this like NFT

1:22:59

stuff, like

1:23:03

basically I would say this and people like, but does this ever

1:23:05

happen? I'd be like, well, no, but like

1:23:07

theoretically it could and you could lose money.

1:23:10

But we actually like saw what

1:23:12

people call like pinning. What

1:23:15

happened in the wild? Yeah, yeah, it happened in

1:23:17

the wild because what was it like here's

1:23:19

the 20 houses, like anyone

1:23:22

can mint, the

1:23:24

coin or whatever. And then so it was like

1:23:26

basically a race to like who can get,

1:23:28

who can do it first, right? Or

1:23:31

like, I think there was one where

1:23:34

they exploited like the

1:23:36

descendant limit thing where, actually

1:23:40

it probably doesn't make sense for me to talk about the technical

1:23:43

details, but like they basically exploited this limitation

1:23:45

where we're like, oh, we're only gonna

1:23:47

consider the first this

1:23:49

many. And then after that,

1:23:51

like it'll just like we'll limit the

1:23:53

topology of the transactions that you're broadcasting

1:23:55

because we can't handle more than this much.

1:23:59

And then so they're like, okay. I'm like you

1:24:01

know I I it's about the slots

1:24:03

and now you can each other out

1:24:05

a transaction to this on. And

1:24:08

then. That. There is another oh

1:24:10

does this is the other thing is like.

1:24:13

Ah, these like swapping things. That

1:24:15

Are you saying anyone can pay?

1:24:18

Have you heard of six? Has

1:24:20

anyone can pay? Yes. Yes,

1:24:23

So you can find your time box and.

1:24:26

So that other people can change it. As

1:24:28

they can odd inputs and. Outputs to

1:24:30

ads. On. And

1:24:32

so. What's that mean? What

1:24:35

that meant was like and man, poor

1:24:37

people could replace it with. Their own

1:24:39

version of the trans oxen were like

1:24:41

they got to buy. Be honest, he

1:24:43

instead of the original person who broadcast

1:24:46

the John Fox and. And

1:24:48

us that one is not a

1:24:50

limitation in mumble policies. that one

1:24:52

was eased. Anyone can pay and

1:24:54

that's how anyone can pay. It

1:24:56

works. And so there's a kind

1:24:58

of all these like people are

1:25:00

kind of discovering the slate. I

1:25:03

think censorship is so is the wrong. Word. But

1:25:05

like things that can go wrong between

1:25:08

the time when you broadcaster transaction and

1:25:10

it. May or may not getting

1:25:12

confirmed. I'm and I mean that's great

1:25:14

that that people Alec I think it's

1:25:16

I'm so annoyed when people are like

1:25:19

all mental should sixes and I'm like

1:25:21

you know what's happening here is people

1:25:23

are buying stupid sports car that don't

1:25:25

have locked finance and people are still

1:25:28

getting their car soul and and they're

1:25:30

like what's wrong with these roads. Are

1:25:34

these roads the ones who. Was moved

1:25:36

to Slake. Start designing your thing

1:25:38

in a way that it can

1:25:40

be stolen. So.

1:25:44

Yeah, I'm. To.

1:25:46

The answer questions. About

1:25:48

me and. a

1:25:51

do one of us vacation for the

1:25:53

come to me ah my very simple

1:25:55

typical mind always sounds dumb for town

1:25:58

can you possibly or suffice I

1:26:00

don't even know what it means to also buy one.

1:26:02

We just lock the

1:26:04

code and it can't be touched.

1:26:07

That sounds psycho because what if there's

1:26:09

a critical bug? Like my basic logic

1:26:11

says, that doesn't make any fucking sense. Why are

1:26:13

we talking about it? I

1:26:16

think probably ossification means something different to

1:26:18

many people. I agree that the one

1:26:20

where it's like, just stop touching the

1:26:23

code that doesn't make any sense. Yeah.

1:26:25

The only ossification that makes sense to me is like

1:26:27

a stalemate of things

1:26:29

just don't get done because we can't get agreement

1:26:31

to get things done. That's also

1:26:35

scary. I'm

1:26:38

talking about big significant.

1:26:40

Consensus changes. Well,

1:26:42

so there are a couple consensus

1:26:45

changes that are needed.

1:26:50

Somebody said, was it John? John

1:26:53

Carvalho said, there

1:26:55

are no hard forks. He said

1:26:58

there won't ever be a hard fork. It is

1:27:00

just a copy. Did he say it's just like a

1:27:02

copy of Bitcoin? Someone

1:27:04

will always run the original Bitcoin. Right.

1:27:06

Yeah. Yeah.

1:27:08

What is we need? What consensus changes? You're

1:27:11

talking about the one that we need for like when we're

1:27:13

all dead in like 21, 40 or whatever.

1:27:17

Like running out of time for the timestamp.

1:27:22

Yeah. And there's I think there's

1:27:25

a couple bug fixes. That would be nice

1:27:27

if you've heard of the consensus cleanup. Oh,

1:27:29

we probably shouldn't talk about that. Oh, why?

1:27:31

Because why shouldn't we? I

1:27:33

just I don't. People are

1:27:35

aware of it. I'm very. I

1:27:39

try not to say things on podcasts that

1:27:41

can be taken out of context. Like

1:27:43

if I say like we need ex software,

1:27:45

right. And then. Yeah. Yeah. And

1:27:48

sometimes things that I've said have like landed really

1:27:50

poorly on Twitter and that, you know, like I'm

1:27:52

like people will think like I'm trying to say

1:27:54

Bitcoin's broke and it's like, well, no, I wouldn't

1:27:56

be working on Bitcoin if I didn't believe in

1:27:58

it. No, you can

1:28:00

just fix it. I

1:28:03

don't have that power. How

1:28:05

is Big Boy broken? OK,

1:28:09

that's never what I'm trying to say. What

1:28:11

I'm always trying to say is there are, like

1:28:14

I said, all

1:28:17

these network level attacks, all these

1:28:19

like scalability, like all these like

1:28:22

ideas we have of scalability of

1:28:24

censorship, resistance, privacy, et cetera. These

1:28:27

are not like single lines of code that

1:28:30

Satoshi wrote in the original client. And then

1:28:32

like Bitcoin has that right there are design

1:28:34

goals and like we have to fortify them

1:28:36

over time. And like I said, with the

1:28:39

example with the transaction traffic

1:28:41

being really high, the requirements change

1:28:43

each time you go from like

1:28:45

one level to the next. And

1:28:48

nobody ever designs their software for a million

1:28:50

people in the first iteration. You can

1:28:52

build a POC. I'm

1:28:55

never trying to dig. I

1:28:57

got people thought I was hating on Satoshi

1:28:59

once, too. So

1:29:02

she's great. I'm not saying that

1:29:04

like the POC is bad. I'm

1:29:06

just saying like over time, like

1:29:09

the requirements get more stringent. And

1:29:11

literally come on my show and say Bitcoin is broken

1:29:13

and Satoshi is a dick. First

1:29:16

of all, I named my dog Satoshi

1:29:18

because he loves Satoshi. Charlie

1:29:21

Shredmegan named his boat Satoshi. Yeah,

1:29:23

well, I think I

1:29:25

have to be on that one. You

1:29:28

got the dog. OK, but there are some things

1:29:30

at some point that need doing. Ultimately,

1:29:33

though. That

1:29:35

hundreds and definitely require hard fork. I

1:29:39

wouldn't I'm not convinced.

1:29:41

Yeah, I think it's like

1:29:43

there are things where it's like, oh, we

1:29:45

probably need a hard fork, but we can

1:29:47

probably figure out a way to do it using

1:29:49

the software. Yeah, so

1:29:51

because we haven't really ever had a hard

1:29:54

fork. We

1:29:56

had no way to be in one. like

1:30:00

that was a bug fix the inflation bug or something.

1:30:04

I feel like I heard it was but like we're

1:30:06

not like Ethereum that has one every like couple of

1:30:08

weeks or... No I don't think we've had

1:30:10

like a well

1:30:12

I think maybe in the

1:30:15

very very early like prehistoric you

1:30:17

know Bitcoin days but no not

1:30:20

we hadn't had like a purposeful... And people have

1:30:22

fought away but... Yeah yeah yeah yeah and people

1:30:24

have worked away. But

1:30:28

ossification is just it is just

1:30:31

can't really happen right? I think

1:30:33

it's again it's

1:30:35

like what's the definition of

1:30:37

that. I

1:30:39

can speak to kind of my personal

1:30:42

thing that has some

1:30:44

things in common with what people say when

1:30:46

they ask for ossification which

1:30:49

is like I think we're

1:30:51

at the point where it's best to

1:30:53

seek to like understand

1:30:56

and formalize and test and

1:30:58

document and like isolate

1:31:00

and test the

1:31:03

code that we have as much

1:31:05

as possible and I'm not really

1:31:07

saying like we

1:31:09

should add a bunch of features and whatnot at least to

1:31:11

Bitcoin core. I think there's sorry

1:31:14

to Bitcoin core to like all

1:31:16

the people who are experimenting with

1:31:18

wallet UI and like trying out

1:31:20

new like no like I'm

1:31:23

not talking about that like there's there's there's

1:31:25

so many things that need to be built

1:31:27

so many you know more layers to scale

1:31:30

but in terms of like the

1:31:32

protocol I would say

1:31:35

that I'm I lean

1:31:37

towards the conservative side because

1:31:39

there's just so much to do that just

1:31:43

in terms of like understanding the code

1:31:45

better and fortifying it as I would

1:31:47

say and sometimes

1:31:50

that involves a protocol change

1:31:52

right like sometimes you need

1:31:55

to kind of like

1:31:58

invasively change something

1:32:00

in order to make it more scalable or

1:32:03

better or for whatever reason. So

1:32:08

don't ever change the code.

1:32:10

It's like be conservative and

1:32:14

not try to move fast and break

1:32:16

things. I'd say that

1:32:18

that's something I have in common with the people

1:32:20

who are like ossify. But don't touch the

1:32:22

code, I think, is quite absurd.

1:32:25

What do you think of this privacy stuff that's

1:32:27

happened this week with Samurai and Zabi?

1:32:30

I mean, it's obviously depressing. Has

1:32:33

that spiked any interest or discussion about

1:32:36

bringing in privacy to Bitcoin at the

1:32:38

protocol level? I know that comes with

1:32:40

all different complications, but is it a

1:32:42

discussion point now? There's

1:32:46

a lot of privacy built into the

1:32:48

protocol level. Do

1:32:51

you mean? I mean,

1:32:53

like, Monero level privacy

1:32:55

on transactions. So

1:32:58

I haven't personally had a conversation

1:33:00

about this with the other people who work

1:33:05

on the Quinn Core. We did talk about

1:33:07

it and how terrifying it is. There was

1:33:09

a tweet. Let me find this one for

1:33:11

you. Because this is where I actually think

1:33:13

it's particularly depressing. I didn't

1:33:16

think it was depressing at a

1:33:18

personal level because I'm a bit lazy

1:33:20

with a lot of my privacy. But

1:33:22

this one, Peter van

1:33:24

Vortenberg, she

1:33:26

retweeted Anna Chekhovich. I

1:33:30

can't pronounce her name, but

1:33:32

she said at the ACF,

1:33:34

which is Anti-Corruption, here you

1:33:36

go, the Anti-Corruption Foundation, we

1:33:39

relied on with Zabi when protecting our

1:33:41

donors from Russian government surveillance and risk

1:33:43

of imprisonment. That was not

1:33:45

taken into consideration by the US authorities

1:33:47

when they began attacking privacy talks. I

1:33:50

mean, that's particularly depressing. I

1:33:53

think that kind of goes. I'm

1:33:56

not an expert in regulation.

1:34:00

the history of what money

1:34:02

transmitters, how they're classified

1:34:04

or whatever. Yeah, I

1:34:07

think that it is really serious

1:34:09

that, like I said, there

1:34:11

are so many roadblocks that are

1:34:13

on the technical level, on the

1:34:16

regulatory level, on the marketing level. It's

1:34:20

like whenever I think about a

1:34:22

network crash bug, I feel like

1:34:24

a lot of it is like it'll be

1:34:26

a PR disaster, it'll be really

1:34:29

difficult to convince people

1:34:31

that they're quite safe. It's

1:34:33

like nodes crash and

1:34:35

also that it would be pretty bad. So

1:34:42

the question on how we

1:34:44

think about privacy, I

1:34:46

think there's

1:34:48

a lot of that. So

1:34:51

with the release that just

1:34:53

came out, like V2 transport, which

1:34:56

is encrypted connections between peers, that's

1:34:58

default now. Yeah,

1:35:04

we support running nodes on core

1:35:06

and stuff. So privacy is often

1:35:08

a consideration when adding new

1:35:11

features. Oh, and Basel is

1:35:13

working on broadcasting your

1:35:16

own transactions on tour connections to

1:35:19

try to improve transaction relay privacy

1:35:21

that way. There's

1:35:23

so much to Bitcoin. Yeah, so much.

1:35:27

Yeah. Do you feel

1:35:29

like there's large parts of Bitcoin you

1:35:31

don't even know or understand yourself? Oh,

1:35:33

yeah, yeah, definitely. Like even

1:35:35

within Bitcoin core, there's

1:35:38

all this cryptography stuff that

1:35:40

is like magic. And all the

1:35:42

time I'm like, oh, I

1:35:44

want to go explore this because this is really

1:35:47

interesting. But

1:35:50

so much of Bitcoin is so

1:35:53

cool. And that's kind of, I

1:35:55

think how a bunch of people end up

1:35:57

working on core. It's like, don't trust

1:35:59

very much. verify. How many people

1:36:01

who like scream that have actually

1:36:03

like verify the code works the way

1:36:05

that they think it does. But

1:36:08

that was like what I was doing where like now when

1:36:10

I'm around like how does this work in Bitcoin I'll be

1:36:12

like trying to look at the code to like see how

1:36:14

it works like that's a great feeling. But

1:36:17

like obviously like nobody knows everything.

1:36:20

Yeah there's

1:36:23

so much to Bitcoin and it's

1:36:25

so interesting so many interesting problems.

1:36:27

Is there enough developers. No. And

1:36:31

is that a funding problem

1:36:33

or is that a whatever number you

1:36:36

had you still say no. Oh

1:36:39

no I think I think I can imagine it

1:36:42

like a scenario in which I'll be

1:36:44

like I'm feeling good about this. But

1:36:47

the reason why

1:36:49

a reason why I come on

1:36:52

on on podcasts is

1:36:55

like ultimately Bitcoin is

1:36:57

like we're trying this experiment

1:36:59

of like completely decentralized organization or

1:37:01

governance or whatever. And at the

1:37:04

end of the day like you

1:37:06

or me or any other Bitcoiner

1:37:08

has like the same level

1:37:10

of responsibility to you know like if

1:37:12

there was a really big bug or

1:37:15

if you know Bitcoin didn't succeed the

1:37:17

way that we want it to it

1:37:19

wouldn't be because like the CTO like

1:37:22

didn't do his job or whatever it would be

1:37:24

because it would be because all of

1:37:27

us who have this responsibility didn't you

1:37:29

know do it properly. And if

1:37:32

Bitcoin fails because everybody thinks it just

1:37:34

you know boils the oceans and has

1:37:36

no interest and has no value and

1:37:38

you know helps criminals or whatever like

1:37:44

that would be like everybody's fault. And you

1:37:46

know you do amazing work

1:37:48

in evangelizing Bitcoin but that's not

1:37:51

your job or it like that's

1:37:53

not like it's not inherently like

1:37:55

Bitcoin said you know Peters are

1:37:57

CMO. It was

1:37:59

like you went. and did that. And just like

1:38:01

all the people who worked on core, it's like,

1:38:03

you know, maybe they held Bitcoin or maybe they

1:38:05

got nurse sniped in college and they're like, well,

1:38:07

I'm going to work on Bitcoin core. It's not

1:38:09

because like the Bitcoin

1:38:12

core company hired you to be the

1:38:14

CMO and, you know, this got

1:38:16

to be the CTO and like Michael

1:38:18

Taylor's the CEO or whatever. It's

1:38:21

like we're all equal

1:38:23

peers in this decentralized

1:38:26

community of Bitcoin. And

1:38:28

so, of course, naturally, like we don't have any HR

1:38:31

department. We don't have like, you

1:38:34

know, a thing that is

1:38:36

responsible for making sure there's

1:38:38

people working on the infrastructure.

1:38:40

Right. Like,

1:38:43

and so basically what

1:38:45

we have to do is we have to try to like find

1:38:48

people. And so,

1:38:50

you know, like Jonas at Chanko does

1:38:52

a lot of educational programs. There's Beatrust,

1:38:54

there's Summer Bitcoin, there's Kala, like Brink

1:38:57

has a fellowship program where we try to train

1:38:59

people and, you know, I'll go to

1:39:01

like, this is why I go to conferences

1:39:04

so that I can meet people who I've

1:39:06

only seen pop up a couple of times

1:39:08

on GitHub or on IRC. And I'm like,

1:39:10

hey, like, let's review PR together. Right. Because

1:39:12

if I don't like, there's no HR department,

1:39:14

right? We're all trying to figure this out

1:39:16

together. We all have an equal responsibility. You

1:39:19

listening to this podcast, don't

1:39:23

make a break. Are all. Yeah.

1:39:25

Yeah. You can also just

1:39:27

contribute by, you know,

1:39:29

if you hold a certain amount of thought, like

1:39:32

nobody's charging you to do

1:39:34

that, but there is a cost for it.

1:39:36

Pay your voluntary tax. Yeah.

1:39:40

Like, don't wait for somebody to charge

1:39:42

rent. Don't wait for, you know, like

1:39:44

we all have like

1:39:46

an equal part to play in this.

1:39:48

And like I said, I started this

1:39:50

part, I don't have any extra power.

1:39:53

Like you can come to GitHub and

1:39:55

open a pull request and contribute to

1:39:57

Bitcoin core. It's free for anybody to

1:39:59

do so. And

1:40:01

I would encourage you to do that. I'm

1:40:04

going to call this episode, Gloria

1:40:06

says Bitcoin is broken. Satoshi is

1:40:08

a dick. Yeah, it was brilliant.

1:40:11

Okay. I

1:40:14

learned so much today. I always do, but

1:40:16

I'll forget it. Man, I feel

1:40:18

like I meandered so much. Don't worry about it. Do

1:40:20

you want to pimp, Brink? Oh,

1:40:22

absolutely. Come on. So Brink's

1:40:25

a nonprofit. You can make a tax deductible

1:40:27

donation to it, at least as a U.S.

1:40:31

And Brink uses that money

1:40:33

to fund Bitcoin Core development. We

1:40:35

have a special focus on security. So

1:40:37

we have maintainers like Michael Ford and

1:40:40

me. We have

1:40:42

Nicholas who works on the fuzzing, if

1:40:44

you found that very interesting. We also pay

1:40:46

for the infrastructure costs to run the machines

1:40:48

that do the fuzzing and the testing. And

1:40:52

we have this wonderful office where people

1:40:54

come and work together. And we

1:40:56

also produce the Optech newsletter and the Optech recap.

1:40:58

A lot of people don't know that that's part

1:41:00

of Brink. That money

1:41:03

goes there, too. And

1:41:06

yeah, it's a great way to

1:41:08

contribute. If you do not write

1:41:10

code, you can donate to

1:41:12

Brink instead. Amazing. Rich Bitcoiners. Peehan

1:41:15

in your pocket. Support Brink. Gloria, this is

1:41:17

this amazing. I know it will be. Thank

1:41:19

you for having me. Anytime. We will definitely

1:41:21

do this again. Yeah,

1:41:24

keep going. Thank you. Amazing. Yeah. All

1:41:29

right. Come on. How effing cool is

1:41:32

Gloria? Absolutely love this. Loved hanging

1:41:34

out with her in Africa. I knew she was

1:41:36

smashing on the podcast. So very glad

1:41:38

to have her in our corner rather

1:41:41

than over in San Fran. Working at Google.

1:41:44

It was great digging into the weeds of mempools

1:41:46

of Bitcoin Core with her. Now

1:41:48

we will finally be dropping the date for cheat

1:41:50

code Australia this week. So keep your eyes out

1:41:52

for that. I have to see

1:41:55

a bunch of you down in Sydney later this year. All

1:41:57

right. Thanks for listening. You got any questions about this or

1:41:59

anything else, please do hit me up. W old b if

1:42:01

Shliquid has popped its Hello or wopoked.com Wpeopleamen.com you

Rate

Join Podchaser to...

  • Rate podcasts and episodes
  • Follow podcasts and creators
  • Create podcast and episode lists
  • & much more

Episode Tags

Do you host or manage this podcast?
Claim and edit this page to your liking.
,

Unlock more with Podchaser Pro

  • Audience Insights
  • Contact Information
  • Demographics
  • Charts
  • Sponsor History
  • and More!
Pro Features