Home
Categories
EXPLORE
True Crime
Comedy
Business
Society & Culture
Health & Fitness
Sports
Technology
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Podjoint Logo
US
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts125/v4/ac/74/b5/ac74b5cd-b3fe-8fa2-3386-30ee105c8ad5/mza_12993657172932011999.jpg/600x600bb.jpg
The Chaincode Podcast
Chaincode Labs
34 episodes
6 days ago
A podcast about Bitcoin protocol development
Show more...
Technology
RSS
All content for The Chaincode Podcast is the property of Chaincode Labs and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
A podcast about Bitcoin protocol development
Show more...
Technology
Episodes (20/34)
The Chaincode Podcast
Rusty Russell and privacy and robustness in Lightning - episode 34

Rusty drops by to tell us about why privacy and robustness should be prioritized in Lightning.


We discuss:

  • LN symmetry (04:39)

    • Do we want LN Symmetry to be symmetrical? (05:12)
    • Listen to the conversation with instagibbs
  • Peer to peer protocol (13:30)

  • CTV (16:54)

  • Pushing privacy and robustness to the front of the line (20:33)

  • The dynamics of developing a spec with commercially associated implementations (22:19)

  • Expecting new implementations (26:22)

  • Privacy revisited (27:02)

  • What broke when fee rate spiked? (31:21)

Show more...
2 years ago
48 minutes 36 seconds

The Chaincode Podcast
Elle Mouton⁠, Oliver Gugger⁠ and Simple Taproot Channels - Episode 33

Elle Mouton and Oliver Gugger join us to talk with us about the Simple Taproot Channel proposal.

We cover:

  • Simple Taproot Channels Overview (1:29)
  • What’s the state of the spec? (3:06)
  • Changes to the scripts in Taproot Channels (4:31)
  • Refresher on CPFP carve-out and Anchor Outputs (8:19)
  • Why Anchor Outputs need to use script path spends (10:24)
  • Other goals of Simple Taproot Channels (15:52)
  • Why do PTLCs need Taproot funding outputs? (16:44)
  • Potential updates for the gossip protocol: Gossip 1.5 or Gossip 2.0 (18:13)
  • PTLCs (25:22)
  • Iterative approach or big push (27:19)
  • Recoverability of channel funds (33:06)
Show more...
2 years ago
37 minutes 18 seconds

The Chaincode Podcast
Alekos Filini, Daniela Brozzoni and the Bitcoin Development Kit (BDK) - Episode 32

Alekos Filini and Daniela Brozzoni visit the podcast to discuss the Bitcoin Development Kit (BDK). Hang out with them on the BDK Discord.


We cover:


  • How BDK started (00:48)


  • Why is it named BDK and not the Magical Bitcoin Library? (2:10)


  • The first users of BDK (3:30)


  • Rust HWI (4:20)


  • Built around descriptors (7:15)


  • The ideal use case of BDK (7:30)


  • Pain points (9:05)


  • Why do devs keep building wallets from scratch? (10:05)


  • Greenwallet (13:03)


  • If you have a working wallet, should you switch to BDK? (16:25)


  • HWI complaints (see Python) (17:41)


  • BDK 1.0 release features (22:31)

    • Sync
    • Planning module
Show more...
2 years ago
31 minutes 25 seconds

The Chaincode Podcast
Tadge Dryja and Lightning History and everything else - Episode 31

Tadge Dryja chats with us about writing the Lightning Network paper and working in the Bitcoin space.


We discussed:

  • Could blocks be bigger? (0:59)
    • Paper: On the instability of Bitcoin without the block reward (9:49)
    • Serving billions with Lightning (10:40)
  • The state of the debate when writing the Lightning Network White Paper (13:35)
    • Would Lightning be possible without Segwit? (17:20)
  • Looking in from outside on a project you started (18:54)
  • Trimmed HTLCs: Sending 1 sat vs 100,000 sats (22:02)
  • Limitations of the Lightning network (25:31)
    • Do high fees break lightning? (28:24)
  • LN-Symmetry (Eltoo) (31:50)
    • SIGHASH_ANYPREVOUT (33:20)
  • Why are soft forks so hard? (34:15)
  • What’s your wish list (hardfork wishlist wiki, softfork wishilist wiki) for protocol changes? (36:18)
    • coinpools
  • Bitcoin needs to become more usable (37:54)
  • Tadge's thoughts on Education (44:17)
    • MAS.S62: Cryptocurrency Engineering and Design
    • Dynamics of working on Bitcoin (47:16)
Show more...
2 years ago
57 minutes 19 seconds

The Chaincode Podcast
Andrew Chow and the Bitcoin Core Wallet - Episode 30

Andrew Chow joins us to discuss Bitcoin Core wallet development, PSBT, Output Descriptors, and HWI.


We cover:

- Why do we need a wallet in Bitcoin Core? (0:58)

- Refactoring the Wallet codebase to build Output Descriptors (5:59)Should we rewrite the wallet? (10:30)

- Changes to Coin Selection (11:35)

- Wallet interoperability (17:10)

- Hardware Wallet Integration (HWI) (18:20)

- Partially Signed Bitcoin Transactions (PSBT) (19:01)

- Becoming Maintainer (22:06)

- Tracking the UTXO pool (23:43)

- Main components of the Bitcoin Core Wallet (26:00)

- Who uses Bitcoin Core Wallet? (27:02)

  - Survey Results

- What’s the future of the GUI? (29:21)

  - Bitcoin Core GUI
 - Bitcoin Core GUI-QML

- Switch to Descriptor-based wallets (32:52)

Show more...
2 years ago
40 minutes 36 seconds

The Chaincode Podcast
Greg Sanders, SIGHASH_ANYPREVOUT, ephemeral anchors and LN symmetry (ELTOO) - Episode 29

Greg Sanders joins us to discuss ANYPREVOUT, ephemeral anchors and LN symmetry (a.k.a. ELTOO).


We chat about:


- Package relay (2:07)

- Pinning attacks (3:14)

  - BIP125

  - T-Bast’s pinning attack summary

- Mempool policy (4:56)

- Stuffing the mempool - 2017 (5:20)

- Rewrite mempool or make the problem simpler (07:57)

- Package relay RBF A.K.A. V3 (8:38)

- Reducing the standard transaction size to 65 bytes PR (14:25)

- March to LN symmetry (19:07)

- Daric: A Storage Efficient Payment Channel With Penalization Mechanism

- Two-party eltoo w/ punishment by AJ Towns

- BIP118 - SIGHASH_ANYPREVOUT (26:17)

  - SIGHASH_NOINPUT

- Softfork and activation history (28:11)

- Ephemeral anchors (32:18)

  - op_2 email by Luke

- Is ANYPREVOUT useful outside of LN symmetry? (43:27)

Show more...
2 years ago
48 minutes 35 seconds

The Chaincode Podcast
Sergi Delgado and Watchtowers, Lightning Privacy - Episode 28

Sergi Delgado joins us to discuss Watchtowers, his prior work in Bitcoin and Lightning privacy, Python vs. Rust and the impact of Eltoo.


We cover:

- Sergi’s prior research

- Mapping Network Topology Research (02:46)

  - TxProbe paper
 - Andrew Miller
 - Coinscope
 - Episode on Address Relay with Martin (04:28)
 - Block-only connections PR by Suhas (07:32)

- An Empirical Analysis of Privacy in the Lightning Network (09:18)

  - Lightning white paper, 2016 (09:48)

  - Security and Privacy of Lightning Network Payments with Uncertain Channel Balances (13:38)

  - Episode with Sergei on Probing

  - Channel Jamming paper (13:50)

  - Episode with Clara and Sergei


- Should we pay for failed payments? (14:19)

  - HTLC withholding vs. HTLC hodling (15:48)

  - Is Lightning flawed when it comes to privacy? (16:32)


- Watchtowers (17:44)

  - Python PoC (21:49)

  - ZmnSCPxj’s writing watchtowers

  - Building on LDK (24:20)

  - Transition to rust (24:45)

- Altruistic towers vs professional services (30:21)

- More privacy considerations in Lightning (34:11)

- Monitoring and reacting paradigm (44:04)

- Storage and Eltoo (50:06)

- Professional tower revenue models - subscription vs. bounties (53:00)

Show more...
2 years ago
59 minutes 25 seconds

The Chaincode Podcast
Pieter Wuille and Tim Ruffing - Nesting, ROAST, Half-Aggregation, Adaptor Signatures (part 2)

We continue the conversation with Pieter Wuille and Tim Ruffing and Nesting, ROAST, Half-Aggregation, Adaptor Signatures, atomic swaps and more.

If you have not tuned into the first part of this conversation, we recommend listening to that one first.


We cover:

- Nesting (00:49)

- ROAST (12:09)

- Cross-input Signature Aggregation (18:49)

- Half-aggregation (34:32)

  - Half-Aggregation of BIP 340 Signatures and BIP340

- Adaptor signatures and atomic swaps (39:32)


Further resources:

  • Stephan Livera Podcast #400 Jonas Nick and Tim Ruffing - Half Signature Aggregation
Show more...
2 years ago
52 minutes 43 seconds

The Chaincode Podcast
Pieter Wuille and Tim Ruffing, Schnorr, MuSig, FROST and more - Episode 26

Pieter Wuille and Tim Ruffing treat us to a conversation about Schnorr, multi-signatures, MuSig, and more. We covered a lot so this is part one of a two part conversation.


We discussed:

- When to roll your own cryptography (01:31)

- Schnorr Signatures (09:01)

  - Why is Schnorr preferable to ECDSA? (10:55)

- Schnorr efficiency improvements (15:52)

- Multisigs (23:16)

- MuSig (25:07)

  - Yannick Seurin

  - Rogue key attack or key cancellation attack (31:00)

  - Bellare-Neven (32:12)

- Interactive versus non-interactive protocols (35:30)

- FROST (42:42)

Show more...
2 years ago
52 minutes 32 seconds

The Chaincode Podcast
Clara Shikhelman and Sergei Tikhomirov and Channel Jamming on the Lightning Network - Episode 25

Clara and Sergei stop by to chat about their recent proposal on mitigating jamming attacks in the Lightning Network. We talk unconditional fees, local reputation, the impact on decentralization and UX, and the state of Lightning in general.


We discuss:

- What is jamming and why is it free? (03:43)

- How our jamming project started (06:44)

- Prior work on jamming (08:00)

- The desired properties of a solution (09:57)

- Reputation (12:47)

- Centralization concerns (14:17)

- Unconditional fees (19:25)

- How are unconditional fees delivered? (23:31)

- UX implications (24:45)

- Moving research results towards implementation (27:15)

- Effects on balance probing (29:21)

- Lightning as a messaging network (30:46)

- Effects on watchtowers (32:57)

- Reviews and feedback so far (34:17)

- Future research ideas (34:55)

- Privacy-preserving reputation (37:33)


Additional resources:

- Spamming the Lightning Network

- Preventing Channel Jamming

- Bitcoin Optech: Channel jamming attacks

- The impacts of channel jamming

- Bitcoin problems: Channel balance probing

Show more...
2 years ago
44 minutes 12 seconds

The Chaincode Podcast
Josibake, the Bitcoin Core wallet and wrangling bitcoin data - episode 24

Josibake joins us to talk about his work on the Bitcoin Core wallet, bitcoin data and onboarding to bitcoin development.


We discussed:

- Analyzing historical transaction data (1:25)

  - Creating a publicly available dataset (4:12)

  - What could it be used for? (7:30)


- Bitcoin Core wallet (9:00)

  - Why have a wallet in Bitcoin Core? (10:00)

  - Separation of GUI from wallet (12:35)

  - Only use one input type when building transaction (13:40)

    - PR #24584 in Bitcoin Core

  - How is working on the wallet? (17:15)


- Cross-input signature aggregation (19:48)

  - Catching up on history (20:40)

  - Writing the BIP with Hackspec (22:05)

  - Thoughts on shipping cross-input signature aggregation separately (22:50)


- Onboarding to Bitcoin development (28:35)

  - Running the seminar with friends (29:55)

  - Giving back to open source (31:20)

Show more...
3 years ago
34 minutes 33 seconds

The Chaincode Podcast
Steve Lee and Lightning updates / Stratum V2 - Episode 23

Our topics:

- Lightning Dev Kit (1:04)

  - Zeroconf Channels (2:22)

  - Rapid Gossip Sync (3:46)

  - How does LDK pick priorities? (8:55)

  - LDK Lite (10:12)

  - Will LSPs be needed forever? (12:25)

- Validated Lightning Signer (15:20)

  - A Lightning Node's Problem with Hats

 - VLS code base

- FROST and ROAST (23:00)

  - Recovering a FROST wallet (24:00)

- Taproot adoption (26:18)

- Future of the Lightning Network (30:48)

- Stratum V2 (34:25)

  - OFAC and mining (37:57)

  - Other benefits over Stratum (39:59)

Thanks to Gurwinder Sahota for the sound engineering.

Show more...
3 years ago
43 minutes 24 seconds

The Chaincode Podcast
0xB10C – Tracepoints and monitoring the Bitcoin network

We catch up with 0xB10C about monitoring pools and tracing code execution in nodes.


Our topics:

- What he's been up to since the residency (1:05)

- Monitoring the mempool (2:52)

  - Mempool Observer

- Monitoring Mining pools (4:27)

  - MiningPool Observer

  - Mining pools not mining P2TR at Taproot activation (5:24)

  - Why monitor the network? (8:20)

  - Template discrepancies between pools and monitor (9:25)

- User-space Statically Defined Tracing (USDT) (11:07)

  - Tracing Readme

  - Using tracepoints to simulate coin selection (13:36)

  - Why are tracepoints in production code? (14:38)

  - Using tracepoints for P2P monitoring (17:05)

  - Using tracepoints to review PRs (22:00)

  - Benchmarking Erlay with USDT (22:42)

Other resources:

  - TransactionFee.info


Thanks to Emily Kee for the sound engineering.

Show more...
3 years ago
25 minutes 9 seconds

The Chaincode Podcast
Gloria Zhao and Package Relay - Episode 21

Gloria Zhao sits down with us to discuss her package relay proposal and what it is like as a relative newcomer to propose a big change.


- What's package relay? (1:04)

  - Mailing List: Package Relay Proposal

- Why do people care about package relay? (3:12)

- What are these "contracting protocols" package relay matters for? (5:03)

  - Pinning attacks (6:28)

- Why do you work on package relay? (6:55)

- What's special about the mempool? (10:18)

- How do you approach the security considerations? (12:07)

- Synthesizing information for the ones coming after you (15:27)

- What's next for package relay? (17:50)

- Bridging protocol development with L2 (20:55)


Additional resources:

- Mailing List: Package Mempool Accept and Package RBF

- Brink Podcast: Ep1 Mempool Policy

- Censorship and DoS Attacks: An intro to Mempool Policy

- Transaction Relay Policy for L2 Developers

- Mempool Garden


Thanks to Emily Kee for the sound engineering.

Show more...
3 years ago
26 minutes 11 seconds

The Chaincode Podcast
Martin Zumsande and Address Relay - Episode 20

Martin Zumsande joins us to tell us about the address spam in the summer of 2021 and his interests in AddrRelay and Bitcoin Core development.

We discuss with Martin:

- His background (1:38)

- Getting interested in Bitcoin (2:45)

- How to approach P2P (3:55)

- The network is changing (7:30)

- What's the purpose of the Address Manager (AddrMan)? (9:33)Peering differences to LN nodes (11:00)

  - Ethan Heilman's talk on Network Partitioning Attacks (12:10)

  - Addrman and eclipse attacks (12:27)

- AddrRelay and the role of node addresses (12:55)Getting connected to the network (13:37)

- Self-announcements (14:25)

- Address spam in summer 2021 and peer distribution (15:05)

- Correction: The peer would not get addresses-divided-by-peers addresses, but 2×addresses-divided-by-peers addresses as the addresses get forwarded to two peers each. (18:00)

- Estimating the Node Degree of Public Peers and Detecting Sybil Peers Based on Address Messages in the Bitcoin P2P Network by Matthias Grundmann (19:30)

- Simulating the network (20:15)

- Requesting addresses from peers (21:45)

- Walking through first connection of a node (25:25)Coinscope paper (27:10)

- Being a Bitcoin Core contributor (27:50)


Thanks to Emily Kee for the sound engineering.

Show more...
3 years ago
31 minutes 50 seconds

The Chaincode Podcast
Sergei Tikhomirov and Lightning privacy - Episode 19

Postdoc Researcher Sergei joins Murch and Jonas to talk about channel balance probing in Lightning, privacy concerns in general, and the importance of researcher-developer collaboration.

We discuss:

- Sergei's background (1:50)

   - Sergei's homepage with links to all prior research

- Lightning basics (2:50)

- Why LN payments fail (3:40)

- Why privacy is important (5:30)

- Privacy potential of Lightning vs L1 Bitcoin (6:40)

- How probing works (8:40)

- Why is balance discovery bad? (11:30)

- Persistent identities in Lightning (13:00)

- Multi-vector security model and trade-offs (17:45)

- "Twitter for your bank account" meme (20:20)

- The danger of overestimating Bitcoin's privacy (21:00)

- Lightning integrations and walled gardens (22:00)

- Lightning Service Providers and LN's centralized topology (23:05)

- LNBIG booth in El Salvador (25:30)

- Potential oligopoly of large nodes (27:15)

- Probing parallel channels (28:30)

  - Analysis and Probing of Parallel Channels paper

- Combining probing with jamming (33:00)

- The limit on in-flight payments (36:00)

  - StackExchange answer about transaction size limit

- Bad and good probing (41:20)

- Countermeasures and reputation (44:00)Overview of anti-jamming measures

- Hub-and-spoke terminology and aviation analogy (49:00)

- Doing research in Bitcoin and Lightning (53:10)

- Why Bitcoin is unique (55:10)

- Researcher-developer collaboration (58:00)

Related research:

- On the Difficulty... -- the first paper about LN balance probing

- An Empirical Analysis paper about three LN attack vectors including probing

- Counting Down Thunder paper about timing attacks

- Congestion Attacks paper about jamming

- Cross-layer Deanonymization paper about linking L1 and L2

- Flood & Loot paper about malicious fee negotiation strategies

- Hijacking Routes paper about adversarial fee undercutting


Thanks to Justin for the sound engineering.

Show more...
3 years ago
1 hour 30 seconds

The Chaincode Podcast
Block Building with Clara and Murch - Episode 18

Postdoc Researcher Clara joins Murch to discuss their block building research. They cover their proposal, which outlines suggested improvements to the current Bitcoin Core block building algorithm using candidate sets.

Murch and Clara discuss:

- Building a valid block 101 (5:45)

- The current getblocktemplate algorithm (11:35)

- Child pays for parent (13:40)

- Is there something better? (15:45)

- How easy would it be to guess the next block? (27:25)

- Do we have a better idea than initially mining an empty block? (29:25)

- Empty blocks and SegWit (33:45)

- How to improve on the candidate set algorithm e.g., linear programming (35:00)

- Why should Bitcoin Core have better block building? (37:00)

- How to compare different block building techniques (38:55)

Thanks to Caralie for the sound engineering.

Show more...
3 years ago
48 minutes 47 seconds

The Chaincode Podcast
Sanket Kanjalkar and Miniscript - Episode 17

Sanket describes to Murch his work on Miniscript. We explore uses for Miniscript, learn about intersections with PSBTs, Output Descriptors, and Taproot, and suss out the difference between Miniscript and Miniscript Policy.

Note: This episode was recorded in the context of travel for Bitcoin 2021. We apologize for the less polished than usual audio quality due to the different equipment and recording environment.


We discuss:

- What's Miniscript? (1:54)

- Partially Signed Bitcoin Transactions (PSBTs) (5:13)

  - Analyzing PSBTs with Miniscript (7:22)

- How do Output Descriptors relate to Miniscript (10:16)

- Implementations of Miniscript (13:36)

- Semantic analysis of Scripts (14:54)

  - Non-malleability of miniscript (22:47)

- Miniscript Policy (25:15)

  - Rediscovering HTLCs (29:41)

- Miniscript uses (33:11)

  - Removing script limitations with Taproot (34:42)

  - Generic signing (35:53)

  - Future work (37:34)

  - The role of policy (40:24)

Related links:

- Miniscript website

- Rust Miniscript

- Miniscript C++ implementation

- Gramtropy

- ##miniscript on Libera Chat

Thanks to Caralie for the sound engineering, and thanks to Matthew Zipkin for assistance with squashing reverb artifacts.

Show more...
3 years ago
45 minutes 6 seconds

The Chaincode Podcast
Pieter Wuille & Amiti Uttarwar and the P2P network - Episode 16

P2P experts Pieter and Amiti chat about the P2P network.


In this episode they cover:

- AddrRelay high-level goals and constraints (1:15)

  - Very different than the goals of blocks and transactions

  - Marginal fee rate (4:35)

- Should we consider different transport layers? (5:40)

- FIBRE Episode with Matt Corallo (7:40)

- The introduction of Addrman in 2012, PR #787 (8:55)

- What existed before AddrMan and the evolution of DoS resistance.

- Eclipse Attack paper (14:55)
  - Sybil attack
  - Addrman and eclipse attacks wiki page
  - Anchors connections - PR #17428

- Connection exhaustion issue (19:50)

- Erlay (paper, BIP) (20:55)

- AddrRelay (23:15)

  - Limiting addr black holes - PR #21528

  - Rate limiting on address gossip in 22.0

- Leaky bucket rate limiter (27:00)

- Address Spam (29:20)

  - Estimating the Node Degree of Public Peers and Detecting Sybil Peers Based on Address Messages in the Bitcoin P2P Network by Matthias Grundmann (31:35)
 - Coinscope paper (31:45)
 - TxProbe (32:00)

- Separate network stack (37:20)

- Fingerprint attacks (37:15)

- ASMAP (39:00)

Thanks to Caralie for the sound engineering.

Show more...
4 years ago
41 minutes 24 seconds

The Chaincode Podcast
Amiti Uttarwar and the P2P network - Episode 15

Amiti returns to the Chaincode office to discuss all things p2p.

We discuss:

  • Why Amiti works on P2P (1:50)
  • A framework for p2p design (4:25)
  • How do we systemize Bitcoin Core knowledge? (6:20)
  • Searchable #bitcoin-core IRC logs (8:35)
  • Forward compatibility and upgradability (15:00)
  • Partition resisitence (16:10)
  • Eclipse Attacks (17:00)
  • Altnet (20:40)
  • Messages sent across the wire (20:55)
  • AddrRelay and AddrMan (24:35)
  • Bootstrapping, DNS seeds and address announcements (25:25)
    • DoS issues (27:35)
    • Address Manager (29:00)
    • New table and tried table (30:00)
  • The Bitcoin network “dance” (31:25)
  • Transaction download on Bitcoin’s p2p network comic (32:25)
  • Addresses and proof of work (32:45)
  • Inbound and outbound connections (34:00)
  • Block relay only connections and full connections (35:35)

Thanks to Caralie for the sound engineering.

Show more...
4 years ago
41 minutes 8 seconds

The Chaincode Podcast
A podcast about Bitcoin protocol development