Transcripts

breaking bitcoin

/

2019

date icon

8 Jun 2019

Bitcoin P2P Encryption
date icon

bip324: v2 message transport protocol slides: Previous talks Introduction This will be a technical talk. I hope you're prepared for some cryptography. By the way, this now has a bip number as of this morning. This is bip324. I call it v2 message transport protocol. It's not a consensu...

breaking bitcoin

/

2019

Breaking Bitcoin Privacy
date icon

0A8B 038F 5E10 CC27 89BF CFFF EF73 4EA6 77F3 1129 Introduction Hello everybody. I invented and created joinmarket, the first really popular coinjoin implementation. A couple months ago I wrote <a href=" big literature review on privacy</a>. It has everything about anything in privacy in bitcoin...

date icon

1127 96A8 DFCA 1A96 C8B8 0094 9211 687A D298 9B12 Trigger warnings Before I begin, some have told me that sometimes I tend to be toxic or provocative. So let's start with some trigger warnings. This presentation might include bad jokes about bitcoin personalitites. It might have some multiplica...

date icon

7DC5A359D0D5B5AB6728... Introduction My talk is about extracting seeds from hardware wallets. I am chief security officer at Ledger. I joined Ledger a bit more than one year ago. I built the Ledger Donjon which is an independent red team. Our mission is to help secure Ledger's products. So what...

date icon

Introduction Today I work at Blockstream but I have a long long history working in open-source software first with the Linux operating system as an advocate then working on the operating system itself. This has led me to a few insights on the defense of bitcoin that has little to do with software b...

Eric Voskuil 3CD8 C07F 0B5C E14E Jimmy FAA6 17E3 2679 E455 Rodolfo 1C9E 033C 6C65 8606 Introduction AW: Some topics might have more agreement between the three of you, and some maybe less. It's up to you guys to say smart things. JS: Can't guarantee anything there. FUD: bitcoin too volatile ...

breaking bitcoin

/

2019

date icon

13 Jun 2019

HODL Invoices
date icon

Hodl Invoices (Breaking Bitcoin training session) Intro My name is Joost, Michael introduced me already. I’ve been working with Lightning Labs since the middle of last year and during that time I’ve worked on several subprojects within lnd. lnd is the Lightning implementation developed by Light...

breaking bitcoin

/

2019

date icon

8 Jun 2019

Mempool Analysis & Simulation
date icon

slides: Introduction Fun fact: I don't think anyone knows this fact, but antpool is a miner and antpool is not mining replace-by-fee transactions. What I mean by that is that if you do a replace-by-fee transaction, they will ignore the second high fee transaction. There are cases where transacti...

breaking bitcoin

/

2019

date icon

8 Jun 2018

Bitcoin Build System Security
date icon

Alternative video without the Q&A session: I couldn't make it to Amsterdam this year, but I hope the graphics I have prepared for this talk can make up for my absence. Let's say you want to be a good bitcoin citizen and start to run your own bitcoin node. Say you go to bitcoincore.org, you click...

date icon

Introduction I am going to talk about our recent work on selfish mining. I am going to explain the profitability model, the different mathematical models that are used to analyze selfish mining with their properties. Bibliography * On profitability of selfish mining * On profitability of stubbor...

date icon

Introduction MF: I will start by thanking Kevin and Lea and the organizers. It's been an awesome event. Thanks also to the sponsors. Without their assistance we couldn't have had the event. I'd also like to make some plugs before we start the conversation. One, I run the London Bitcoin developers g...

breaking bitcoin

/

2019

Neutrino, Good and Bad
date icon

... 228C D70C FAA6 17E3 2679 E455 Introduction I want to start this talk with a question for the audience. How many of you have a mobile wallet on your phone right now? How many know the security model that the wallets are using? Okay, how many of you trust those security assumptions? Okay, less o...

breaking bitcoin

/

2019

Opening Remarks

Opening remarks We have a nice six second intro video. There we go. Woo. Alright. I think I can display my notes here. Yay. Good morning. First thing I need to tell you is the wifi password if you want to use the venue wifi. So, outside of that, thank you all for coming. This year we have a littl...

breaking bitcoin

/

2019

date icon

6 Jun 2019

Secure protocols on BIP taproot
date icon

36C7 1A37 C9D9 88BD E825 08D9 B1A7 0E4F 8DCD 0366 slides: Introduction I am going to tlak about something that is a collaboration of many people in the bitcoin community including my colleagues at Blockstream. The bip-taproot proposal was recently posted to the bitcoin-dev mailing list whic...

date icon

Introduction Hi, I am Alexei. I am a research student at Imperial College London and I will be talking about the security of decentralized mining pools. Motivation The motivation behind this talk is straightforward. I think we can all agree that to some extent the hashrate in bitcoin has seen so...

date icon

D146 D0F6 8939 4362 68FA 9A13 0E26 BB61 B76C 4D3A Introduction Together with my colleagues I am building lnd. It's one of the implementations of lightning. In routing, there's the sender of the payment, the intermediate routing nodes that forward payments, and a receiver. I would like to scope ...

breaking bitcoin

/

2019

The Future of Hardware Wallets
date icon

D419 C410 1E24 5B09 0D2C 46BF 8C3D 2C48 560E 81AC Introduction We are making a secure hardware platform for developers so that they can build their own hardware wallets. Today I want to talk about certain challenges for hardware wallets, what we're missing, and how we can get better. Current ...

breaking bitcoin

/

2019

date icon

15 Jan 2019

Topological Analysis of the Lightning Network
date icon

paper: Introduction Knowing the topology is not necessarily a vulnerability, but it gives you a lot of information. If I know Bryan's full node is connected to some other nodes, I will have an easier time to cut Bryan out of the network or launch attacks against him. Knowing the topology is no...

Transcripts

Community-maintained archive to unlocking knowledge from technical bitcoin transcripts

Transcripts

Explore all Products

ChatBTC imageBitcoin searchBitcoin TLDRSaving SatoshiBitcoin Transcripts Review
Built with 🧡 by the Bitcoin Dev Project
View our public visitor count
We'd love to hear your feedback on this project?Give Feedback