Translate

Shadow Boxing: Comments On Proof-Of-Work Centralization Hysteria

Shadow Boxing: Comments On Proof-Of-Work Centralization Hysteria

The always-relevant Marty Bent had Spiral developer Matt Corallo on his podcast this week to address the freaks about urgent Bitcoin mining matters.

To bring everyone up to speed, the concerns stem from recent sleuthing of the blockchain which revealed that some pools have been getting perhaps a little too cozy.

How do we know this? Well, everyone’s favorite snoop mononaut recently pointed out that an unusual percentage of Bitcoin’s mining reward was being consolidated under the control of a single custodian.

How bad is it? Well about 47% of the hashrate, on a good day. Yeah, pretty bad.

Now why in Satoshi’s name would they do such a thing, you ask?

C.R.E.A.M.

To begin with, have you looked at the hashrate chart lately anon? You practically can’t tell it apart from the US debt hockey stick. Backed by hardware advancement, public balance sheets, and increasing forays into cheap energy sources, Bitcoin mining has become an arms race. Since the Chinese mining ban of 2021, the network’s hashrate has more than quintupled.

The effects this has had on miners’ margins are self-explanatory. Everyone is squeezing each other out. The recent bear market saw a bunch of consolidation, particularly on the Western front. At the pool level, Foundry has been the biggest benefactor with nearly 25% of the current hashrate, down from 35% last year.

The reason they attained such dominance so quickly is something Bitcoiners are well acquainted with: volatility. In this case, it’s more often referred to as variance. Others simply call it luck.

Luck, under the conditions described above, can make or break your business. It’s the reason pools exist in the first place. Proof-of-work is a random process and randomness is the bane of cash flow. By combining your hashrate with others, you improve your odds and, perhaps, manage a more reliable revenue stream.

This is important because when your bills come due every month, your utility provider doesn’t care about your misfortunes. The tighter the margins, the more vulnerable you are. In today’s competitive environment, it’s a matter of survival.

What does any of this have to do with Foundry?

Well, it turns out another way to smooth over miners’ income is to adjust your pool’s payout scheme and completely remove variance from the equation. How? Simply pay them for their work regardless of how often you might mine a block. A process referred to as FPPS (Full Pay Per Share).

If that sounds expensive to you that’s because it is. The pool effectively has to front every payment out of pocket and hope they can pay themselves back with the blocks they eventually mine. If you hit a bad streak and your balance sheet isn’t strong enough to absorb the lack of revenue, you’re Sam Bankman Fried.

Enter Foundry. Through a combination of uncanny timing, business savvy, and a DCG-sized war chest, they’ve created a financial moat around their pool operations that makes it very hard for smaller players to come in and compete.

Of course, it’s slightly more complex in practice, but that’s pretty much the gist of it.

Back to our little posse of pools and the mysterious custodian. Have you figured it out yet?

The same game is playing out on the other side of the pond. It’s very likely that the emergence of Foundry as a major player exacerbated the dynamics laid out above and forced smaller pools to capitulate.

The execution appears to be slightly different but it’s essentially the same model. We can validate that several pools now share the exact same block templates. This matches with reports that Antpool is offering white-labeling services.

That’s right — proxy mining is, apparently, a business model.

On top of this, the aggregation of coinbase outputs suggests that an even larger percentage of the hashrate seems to be financing their operations through the same provider.

To put it another way: a single entity writes the checks for almost half of the network’s hashrate.

Dollar dollar bill, y'all.

If what you say is true. The Shaolin and the Wu-Tang could be dangerous

As you would expect, this situation led some talking heads to raise some alarming questions about mining centralization. For context, this is not the first time mining gets awkwardly consolidated.

As I wrote in this week’s Weekly Re-Org, time is a flat circle. The Proof-Of-Work centralization Manbearpig comes out of his cave every cycle. It’s a seasonal happening.

What’s rather unusual is for one of the most senior developers in this space to go full DEFCON 1.

I will leave it to more serious journalistic outlets like the Bitcoin Bugle to speculate on the strange coincidences between this outburst and the fact that Matt’s employer has mining ambitions.

Look, it’s not pretty. I think we can all agree that such a significant portion of the hashrate being at the mercy of a handful of bankers is gross. Bitcoin’s security relies on miners aligning with their financial incentives. If that is the outcome, something’s wrong and censorship resistance is at risk.

The reaction, though, is unwarranted. Bitcoin mining has followed noticeable growth patterns throughout its history and this particular one is not different. It is a market driven by economics and not by code. Inefficiencies arise at every stage and are subsequently dampened as the industry progresses.

I understand every man who owns a keyboard looks at everything like a bug but the current reality does not fit this framing.

Everyone applauds the work that has gone into StratumV2 to optimize the mining interface but it’s not an answer to the current predicament. Even if they can be custom, transaction templates are still permissioned. The pools can always reject any transaction they deem haram. Patronizing operators for showing little interest in the solution and miners for not demanding it is verging on hubris.

Custom transaction selection cannot be relied upon for censorship resistance. Only the market can realistically address this problem and it just so happens that Bitcoin is explicitly designed to be robust to mining majorities. Using fees, users create a financial incentive for competing miners to drive enough hashrate behind a transaction for it to be mined. Curiously, this implies that, in a perfect world, every miner is mining off of the same template: the most profitable one.

In practice, things are a little more shall we say… spooky. As uncomfortable as this may be, censorship is inevitable. Following this week’s events, the writing is on the wall and while a lot of grief is given to Chinese miners, it seems most likely to come from our side.

By far the most disappointing aspect of this agitation is the endorsement of a change to the Proof-Of-Work algorithm. The threat being levied against us by the State as we currently speak makes the rhetoric around firing miners especially aggravating. It’s tone-deaf and shows a complete lack of discernment about the challenges before us. Divide and conquer, anyone?

To make matters worse, we know that throwing the baby out with the bath water is a recipe for disaster. Changing the algorithm. “Firing the miners.” It achieves nothing.

Again, the technocratic mind is blind to any issue not resolved by a pull request.

By going scorched earth, you ensure that only the most well-capitalized participants will ever participate in your game. Hashrate can be wiped away at the stroke of a key but technical prowess and large enough bags can endure nuclear winter. The ASIC manufacturer market likely resets to a single player, one who already specializes in custom algorithms. Monopolies relish nothing more than good old interventionism to help shed the competition.

From a consensus perspective, the idea is so absurd it flies in the face of the entire premise of the system.

If Bitcoin requires social coordination to throttle the whims of the market and fiddle with its incentives, it is a failed project. Proof-of-work is an economic design, not a technical contraption you can fix with code.

Wu-Tang Financial

Well, I can only humbly propose we begin to consider addressing market dynamics with market solutions.

To the best of my understanding, the underlying issue is related to Bitcoin’s capital markets. Resourceful actors who quickly caught on to the issue faced by smaller mining operations have filled a hole in the market and left no room for anyone else. Economies of scale and the perceived risk associated with mining have kept competitors at bay.

There is an opportunity here for a handful of ambitious players to bring balance to this market and allow pools to source capital without bending the knee to larger competitors. This won’t happen overnight. Relationships must be built and the general information asymmetry that has plagued this market must be addressed.

This is why we must stop burning bridges.

Of course, technical improvements can also be made to mitigate the underlying variance problems but they cannot remedy the growing pains of an immature market.

Bitcoin, in every respect, is going through its teenage years. No one wants to be told what to do and pushing one way will inevitably lead to resistance. Sure, there might be no rhyme or reason to what some participants decide to do but it’s not anyone’s place to decide for them.

This too shall pass. Until then…

Wu‐Tang Clan Ain’t Nuthing ta F’ Wit


via bitcoinmagazine.com
Top 10 Tips for Every Bitcoin Multisig Beginner

Top 10 Tips for Every Bitcoin Multisig Beginner

Originally published on Unchained.com.

Unchained is the official US Collaborative Custody partner of Bitcoin Magazine and an integral sponsor of related content published through Bitcoin Magazine. For more information on services offered, custody products, and the relationship between Unchained and Bitcoin Magazine, please visit our website

As technical director on the Concierge team at Unchained, I’ve fielded countless client questions about bitcoin multisig. If you’re just beginning to understand the benefits of multisig and how it works in a collaborative custody context, I hope these ten tips will address some of your questions.

Bitcoin doesn’t live on your device

The phrase hardware wallet might make it seem like your bitcoin live inside the wallet itself, but that’s not the case—bitcoin is never in your device at all. In actuality, your wallet generates and stores your keys only. Your wallet also makes accessing the keys user-friendly by either plugging your device into a general-purpose computer or sharing information with your computer via a microSD card.

So where does bitcoin live, then? The bitcoin blockchain is a ledger that keeps track of every transaction that has ever occurred and the balances of every address on the network. Instead of storing your bitcoin, your hardware wallet protects and stores the keys used to unlock—or spend—bitcoin from those addresses.

Visit Unchained.com for $100 off any Unchained financial services product with code "BTCMAG100"

You can restore your seed phrase to another hardware wallet

When you set up a bitcoin hardware wallet that respects best current practices, you should be prompted to back up your wallet using 12 or 24 words, typically on a slip of paper that the manufacturer suggests you protect in case something happens to your wallet. These 12 or 24 words are your seed phrase, as established in Bitcoin Improvement Proposal 39, or BIP39.

Your seed phrase is like the “key to the castle,” it contains everything you need to recover and use a key to all of the addresses protected by the seed phrase.

The nice thing about BIP39 seed phrases is that they are interoperable among hardware wallets that support the standard, which means you can recover your bitcoin wallet backup (seed phrase) to another brand of hardware wallet. If you initially set up your bitcoin wallet on a Trezor and want to move to a Coldcard, it’s as simple as importing those 12 or 24 words.

Read more: How to replace or upgrade a bitcoin hardware wallet

You don’t need your hardware wallet with you to receive

With physical cash, you have to be physically present to trustlessly and securely transact with another party. Bitcoin fixes this for the digital world. If you want to receive bitcoin but don’t have your hardware wallet at hand, you can still have a payment sent to the appropriate address.

As mentioned above, bitcoin does not live on your hardware wallet; it lives on the bitcoin blockchain. For that reason, as long as you or someone else sends bitcoin to an address that you hold the private keys to control, you’ll always be able to move those funds regardless of whether you have physical access to your device. If bitcoin is sent to an address you know you control, it will arrive perfectly fine in the background without your involvement.

What this means for you: If you create a multisig wallet and store your hardware wallets or seed phrases in secure locations, you don’t need to have physical access to them to deposit funds.

A device used as a key in multisig can still be used as a singlesig wallet

Multisig involves constructing a multisig wallet using the public keys of multiple devices, each of which could also serve as a standalone singlesig wallet without any issues. When you create a multisig wallet following the emerging standard processes, the preexisting singlesig counterparts have no idea the multisig wallet exists.

You could think of it as a group email address that forwards to multiple individual email addresses.

This means that, if you wanted, you could store smaller amounts of bitcoin on a singlesig wallet—all while keeping your primary wealth in a multisig wallet constructed using that device as one of the keys.

Confirm your multisig deposit address

Bitcoin transactions are completely irreversible, which means if you send your bitcoin to the wrong address, it can be lost permanently. Thankfully, you can use hardware wallets to check your multisig bitcoin address on the device before sending funds.

Checking your address on your device confirms three things:

  1. that the address was built correctly (i.e. that it’s 2-of-3 multisig, for example, and not 2-of-5 where an attacker has added two keys and actually controls the funds)
  2. that the computer you’re working on isn’t compromised with malware that finds and replaces bitcoin addresses with an attacker’s address, and
  3. that your device holds a key to the address.

Checking the address on your device should be done before sending meaningful amounts of funds to any address, whether singlesig or multisig. As of this writing, Trezor and Coldcard support checking multisig deposit addresses in the Unchained platform.

Read more: How do I verify the receiving/deposit address on my hardware wallet?

You don’t need your devices physically together to sign

With multisig, you don’t need to have all your keys in the same place at the same time to spend bitcoin. That means you can sign a transaction in Austin with one key and sign a day later in Dallas with the other. The transaction can only be broadcast after all the necessary signatures have been collected (two in a 2-of-3 multisig scheme, for example).

This is a significant advantage over other bitcoin custody models like Shamir’s Secret Sharing Scheme, which allows you to distribute control over your bitcoin private key by splitting it into multiple parts (secrets), but requires all parts to be present at the same time to recompile a single key and author a transaction.

You can make a mistake in multisig and still recover your funds

In all bitcoin multisig setups where m (the number of keys required to sign) is less than n (the total number of keys in the quorum), you are protected from single points of failure and can still recover your funds in the case that one or more critical items are lost, stolen or otherwise compromised.

There are scenarios in 2-of-3 multisig (with a collaborative custody partner like Unchained holding the third key), where as many as three items could be compromised before it becomes impossible to recover your funds.

Some ideal places to store bitcoin wallets and seed phrase backups

Even though fault-tolerance in multisig provides peace of mind, all of these scenarios should still be protected against at all costs by following seed phrase and hardware wallet storage best practices, and you should always regain full control as soon as possible in the event that any of your critical items are lost or compromised. And that leads us to number eight…

Read more: The ultimate guide to storing your bitcoin seed phrase backups

You can replace a key in your multisig setup if needed

When using bitcoin multisig, if you ever lose a wallet or misplace a seed phrase, it’s important to replace this key in your multisig m-of-n scheme. You can do this with any of the popular multisig wallets.

Even if a single compromised key does not alone jeopardize your funds in most common multisig m-of-n schemes, replacing a compromised key will ensure that you regain complete control over your funds and eliminate the possibility that the key could ever be used against you in the future.

In a collaborative custody model like the one we use here at Unchained, replacing a key is straightforward. You can simply log in to our platform, choose the key that has been compromised, and quickly replace it with a new one. You can read the full process for replacing or upgrading a hardware wallet at the link below, and if you’re already an Unchained client, check out our Knowledge Base article.

Visit Unchained.com for $100 off a Bitcoin IRA + 1 year free of Bitcoin Magazine Pro market research with code "btcmag"

Read more: How to replace or upgrade a bitcoin hardware wallet

You can construct multiple multisig wallets using the same devices

As we mentioned in number four on this list, using your hardware wallets/seed phrases for both a singlesig wallet and to construct a multisig wallet doesn’t cause any issues. Similarly, using your hardware wallets/seed phrases for more than one multisig wallet doesn’t cause a conflict among those wallets as long as you aren’t using the same extended public keys (xpubs). This is typically represented as a multiple accounts feature in most bitcoin wallets.

Hardware wallets allow you to use different xpubs from different derivation paths, which is a technical way of saying a different set of bitcoin keys on your hardware wallet generated by the same 12- or 24-word seed phrase. This means you can create multiple multisig wallets that stem from the same set of seed phrases/devices, like using the same devices for a personal vault and an IRA vault. Maybe even a loan vault as well!

Collaborative custody doesn’t introduce a single point of failure

When getting started with multisig collaborative custody at Unchained, one concern I hear a lot relates to dependence on our platform. If Unchained were to cease to exist or have significant downtime, how would you recover your funds if your wallets were constructed using our tools?

Our multisig platform is designed to eliminate all single points of failure, and that includes ourselves. As our platform is fully interoperable with established bitcoin standards, you can always recover access to your vault outside the Unchained platform with compatible software like our open-source multisig coordinator, Caravan, or bitcoin wallets like Sparrow or Electrum. Just make sure to safely back up your wallet configuration file!

Read more: How can I recover my vault funds using Caravan?

Originally published on Unchained.com.

Unchained is the official US Collaborative Custody partner of Bitcoin Magazine and an integral sponsor of related content published through Bitcoin Magazine. For more information on services offered, custody products, and the relationship between Unchained and Bitcoin Magazine, please visit our website


via bitcoinmagazine.com
EU Parliament Adopts AML Laws Regulating Bitcoin Based On Questionable Assumptions

EU Parliament Adopts AML Laws Regulating Bitcoin Based On Questionable Assumptions

The European Parliament adopted a new AML law package which increases the reporting requirements of crypto asset service providers (CASPs) when sending and receiving ‘anonymous’ payments between self-hosted wallets and custodial service providers, in addition to limits on cash transactions and the establishment of a ‘central watchdog’ agency, which will develop regulatory technical standards.

Under the new laws, EU CASPs will need to perform customer due diligence on transactions originating from self-custodial wallets for transactions below 1000 EUR, and implement additional KYC measures for transactions above 1000 EUR. The laws further regulate the operation of no-KYC custodial software service providers and the use of privacy coins, effectively banning CASPs from offering privacy assets. Self-custodial software and hardware providers are exempt from the regulations.

The resolution, adopted by the European Parliament on wednesday, assumes that “[t]he anonymity associated with certain electronic money products exposes them to money laundering and terrorist financing risks,” and “[t]he anonymity of crypto-assets exposes them to risks of misuse for criminal purposes.”

While lawmakers seemed to have no issues putting numbers to overall money laundering activity in the original proposal – ranging between 2-5% of global GDP – as well as to their own inefficiencies – almost 99% of criminal profits escape confiscation – those looking for numbers corroborating “the increasing use of crypto-assets (such as Bitcoin) for money-laundering purposes” are left with a link to Investopedia, explaining what Bitcoin is.

Everybody knows: Crypto is for money launderers. But can anybody prove it?

With the new law package, EU AML/CFT frameworks are updated to align with updated recommendations issued by the Financial Action Task Force – an intergovernmental body established by the G7 in 1989 to tackle money laundering and terrorist financing.

According to FATF procedures, FATF recommendations are informed by AML and CFT assessments performed by FATF regional bodies (FSRBs), the IMF, and the World Bank to “produce objective and accurate reports of a high standard in a timely way,” “[e]nsure that there is a level playing field, whereby mutual evaluation reports (MERs), including the executive summaries, are consistent, especially with respect to the findings, the recommendations and ratings,” and “[e]nsure that there is transparency and equality of treatment, in terms of the assessment process, for all countries assessed.”

The latest EU FSRB 2021 annual report, released in April 2023 performed by the EU Commission's MONEYVAL, opens with a introduction by the chair, who highlights that “It is well known that money launderers have been abusing cryptocurrencies from their inception a decade ago, initially to transfer and conceal proceeds from drug trafficking. Nowadays, their methods are becoming ever more sophisticated, and larger in scale.”

But MONEYVAL’s report appears to fail to back its claims with sufficient data points, merely making note of the progress of implementation of virtual asset regulations. The report highlights that “a 2022 typologies study will be dedicated solely to cryptocurrency money laundering trends,” suggesting that no such study existed at the time of writing.

The MONEYVAL typologies report on money laundering and terrorist financing risks in the world of virtual assets seems to give no conclusive answers on the significance of cryptocurrencies in AML/CFT efforts either; Instead, it analyzes the application and effectiveness of existing AML regulations via working groups.

Notably, the typologies report states that “at the national level, the sector risk analysis heavily relies on the answers received by the authorities from the private sector itself, with very little action taken towards the verification of the facts by the supervisor.” It further notes that risk assessments “lack in depth.”

The latest IMF report on policies for crypto assets makes similar statements hinting towards a lack of verifiable data on the risks of cryptocurrencies in terror financing, anti-money and financial abuse, stating that “such impacts have not been studied specifically in relation to crypto-assets“. A new IMF report released this week, which attempts to analyze cross border-flows in Bitcoin, states that “measuring Bitcoin cross-border flows is challenging, and currently only possible with a series of non-trivial assumptions.”

The IMF’s 2024 global financial stability report in contrast does cite specific data, but places the overall amount of cryptoassets received by ransomware hackers at approximately $1100 Million – a mere 0.061% of crypto’s $1.8 Trillion market capitalization.

The World Bank’s 2023 report on lessons learned from the first generation of money laundering and terrorist financing risk assessments found that “some new issues were not covered in the last NRA, such as VA [virtual asset] [...]”, and that it should be ensured that “authorities and private entities provide more data for input” and “assess more risks such as VASPs.”

A World Bank 2022 publication on national assessments of money laundering risks makes no mention of cryptocurrencies at all, beyond finding that virtual currencies should be “studied further”. The paper “Illicit Transaction Flows: Concepts, Measurement and Evidence” published in the World Bank Research Observer in 2020, makes no mention of virtual assets, bitcoin or cryptocurrencies either.

Papers published by the World Bank on crypto asset adoption do not provide much more insight into the impacts of cryptocurrencies on AML/CFT efforts either – The papers “Crypto-Asset Activity around the World” and “What Does Digital Money Mean for Emerging Markets and Developing Economies?” simply re-refer readers to existing FATF recommendations.

The World Bank paper “Decrypting New Age International Capital Flows” cites a single academic paper on the effects of cryptocurrencies on money laundering, claiming to have found that “approximately one-quarter of bitcoin users are involved in illegal activity.” While there are many scientific papers attempting to assess the significance of cryptocurrencies in illicit transaction flows, academics broadly question the accuracy of applied methodologies, claiming to have found error rates of over 92% in commonly applied heuristics. Particularly methods based on user behavior are argued to be “the most unreliable”, concluding that their application should not be used to warrant intense investigative measures.

Assessing Proportionality: National Security vs. Human Rights

Estimates of illicit transaction volumes range between 0.34% in all on-chain transaction volume in 2023 and 46% of all bitcoin transaction volume in 2019, highlighting the apparent lack of a conclusive understanding of the significance of cryptocurrencies in enabling the facilitation of illicit transactions.

In a 2024 National Risk Assessment, the Swiss federal police classifies such “tremendous lack of data” as an “inherent risk”, citing “insufficient figures and statistics”. The assessment highlights that the lack of data on cryptocurrency financial flows is “not unique to Switzerland”.

The assessment highlights statements made by the ECB, which “pointed to a lack of reliable statistics” on financial flows associated with cryptocurrencies. It further highlights statements made by the IMF, finding that “significant data gaps continue to make it difficult to assess the true extent of VA [virtual assets] use in the financial system, which also hampers risk analysis by financial authorities”. It notes that the IMF has recommended to initiate an international exchange of statistical data on cryptocurrency transactions to “address the lack of data” as early as 2019.

Seemingly echoing MONEYVAL’s concerns on the evaluation of suspicious transaction reports, the assessment finds a survey conducted among national police and prosecutors to gather quantitative information on criminal proceedings in cryptocurrency transactions and qualitative assessments of the challenges of cryptocurrency for the work of law enforcement to be “fragmentary” and “of limited relevance”.

Cybersecurity experts warn of the risks of cryptocurrency deanonymization tactics in relation to established fundamental rights, finding that future regulatory concepts may collide with fundamental rights such as the right to freedom of association, the right to privacy and the right to informational self-determination, the right to freedom of expression, and the right to freedom of information as established in the Charter of Fundamental Rights of the European Union as well as the European Convention on Human Rights.

As governed by article 5 of the Maastricht Treaty, actions applied by the European Union “shall not exceed what is necessary to achieve the objective of the Treaties.” It is questionable how MEPs have issued an informed vote on the proportionality of the EU’s new AML laws when no conclusive data on the significance of cryptocurrency in anti-money laundering and counter terrorist financing efforts appears to exist.

 This is a guest post by L0la L33tz. Opinions expressed are entirely their own and do not necessarily reflect those of BTC Inc or Bitcoin Magazine.


via bitcoinmagazine.com
FBI Warns Americans Against Using Non-KYC Crypto Money Transmitting Services

FBI Warns Americans Against Using Non-KYC Crypto Money Transmitting Services

The FBI has issued a public service announcement today, warning Americans against using unregistered and non-Know Your Customer (KYC) cryptocurrency money transmitting services.

This announcement, identified as Alert Number I-042524-PSA, urged Americans to only engage with registered Money Services Businesses (MSBs) that comply with anti-money laundering (AML) regulations.

According to United States federal law, cryptocurrency money transmitting services must be registered as MSBs and adhere to AML requirements (31 U.S.C. § 5330; 31 CFR §§ 1010; 1022). The FBI says failure to comply may result in financial disruptions during law enforcement actions, particularly if funds are mixed with illegally obtained money.

The warning clarified that services that knowingly facilitate illegal transactions or violate federal laws are subject to investigation by law enforcement agencies, and that individuals using such services may lose access to their funds during enforcement operations.

Just yesterday, the US Department of Justice (DOJ) arrested the founders and CEO of popular privacy focused Bitcoin wallet and mixer, Samourai Wallet, and charged them with laundering “more than $100 million in criminal proceeds.” The DOJ then worked with law enforcement in Portugal and Iceland to arrest one of the founders, and seized Samourai's web servers and domain, in addition to serving a seizure warrant on the Google Play Store for its mobile app.


via bitcoinmagazine.com
One of Only Four Bitcoin "Epic Sats" Just Auctioned Off For Over $2.1 Million

One of Only Four Bitcoin "Epic Sats" Just Auctioned Off For Over $2.1 Million

Today, Bitcoin mining pool ViaBTC auctioned off its “epic sat” for a sum of 33.3 BTC, equivalent to over $2.1 million. The auction, conducted on the CoinEx exchange platform, witnessed fervent bidding as collectors and enthusiasts competed for this satoshi.

The term "epic sat" refers to the first satoshi (the smallest unit of Bitcoin) of each halving epoch. A halving epoch occurs approximately every four years, coinciding with a reduction in the block reward for Bitcoin miners. These "epic sats" are part of the Ordinals numbering system, which categorizes satoshis based on rarity and significance within Bitcoin's historical milestones.

ViaBTC recently mined block 840,000, initiating the fourth Bitcoin halving and receiving this "epic sat" in the process. With the auction starting at a bid of 1 BTC, currently worth $64,000, bidders battled and drove up the price to the winning bid of 33.3 BTC worth $2,134,452 at the time of writing.

The Ordinals numbering scheme has sparked both controversy and excitement since its inception, creating an emerging market for satoshi collectors and investors. The rarity levels within Ordinals range from “common” to “mythic”, with "epic sats" standing out as among the rarest and most sought-after satoshis due to their occurrence only at each halving epoch.

Marketplaces specializing in Ordinals have seen increased activity, with rare satoshis fetching prices well above their nominal value. This trend has garnered widespread attention from miners, developers, investors, and collectors alike, due to their rarity and the growing interest in collectible satoshis. The winning bid of 33.3 BTC reflects the high demand for these sats and the willingness of collectors to pay a premium for them.

The auction of this “epic sat” for over $2.1 million signifies the cultural and historical significance these rare sat" hold within the Bitcoin community. As Bitcoin's ecosystem continues to evolve, the market for rare satoshis and related assets is expected to grow, offering new opportunities and strategies for participants in the Bitcoin market.


via bitcoinmagazine.com
Bitcoin Mixing Service Samourai Wallet Founders Arrested, Charged With Money Laundering

Bitcoin Mixing Service Samourai Wallet Founders Arrested, Charged With Money Laundering

In a significant development, Keonne Rodriguez and William Lonergan Hill, founders and CEO of the privacy-focused Bitcoin wallet and mixer, Samourai Wallet, have been arrested and charged with money laundering and operating an unlicensed money transmitting business. The U.S. Department of Justice (DOJ), Southern District of New York, announced these charges today following an extensive investigation into their activities.

The charges stem from allegations that Rodriguez and Hill, through their company Samourai Wallet, facilitated over $2 billion in unlawful transactions and allegedly laundered more than $100 million in criminal proceeds. This activity primarily involved transactions from illegal dark web markets, as well as schemes to defraud decentralized finance protocols, the DOJ stated. The defendants are accused by the DOJ of developing, marketing, and operating a bitcoin and cryptocurrency mixer that provided a platform for criminals to engage in large-scale money laundering.

“$2 billion in transactions with an unlicensed money transmitter means $2 billion flowed without any oversight, from whomever to wherever. Because of the company’s disregard for regulation, it’s alleged that Samourai Wallet laundered more than $100 million in criminal proceeds,” stated IRS-CI Special Agent in Charge Thomas Fattorusso. “Special Agents with IRS:CI New York and IRS:CI LA’s Cyber units worked with our federal and international law enforcement partners to not only arrest the founders and CEO, but to also seize their domain. Samourai Wallet is now closed for business.”

The coordinated effort by law enforcement agencies led to the arrests of Rodriguez and Hill. Rodriguez was apprehended in the Western District of Pennsylvania, while Hill was arrested in Portugal based on the U.S. criminal charges. The United States plans to seek Hill's extradition to stand trial in the country.

"As alleged, Keonne Rodriguez and William Lonergan Hill are responsible for developing, marketing, and operating Samourai, a cryptocurrency mixing service that executed over $2 billion in unlawful transactions and served as a haven for criminals to engage in large-scale money laundering," said U.S. Attorney Damian Williams. "Rodriguez and Hill allegedly knowingly facilitated the laundering of over $100 million of criminal proceeds from the Silk Road, Hydra Market, and a host of other computer hacking and fraud campaigns. Together with our law enforcement partners, we will continue to relentlessly pursue and dismantle criminal organizations that use cryptocurrency to hide illicit conduct.”

Furthermore, in collaboration with authorities in Iceland, Samourai's web servers and domain were seized, along with a seizure warrant served on the Google Play Store for the Samourai Wallet mobile application. This action ensures that the application is no longer available for download in the United States.

FBI Assistant Director in Charge James Smith concluded: “Threat actors utilize technology to evade law enforcement detection and create environments conducive to criminal activity. For almost 10 years, Keonne Rodriguez and William Hill allegedly operated a mobile cryptocurrency mixing platform which provided other criminals a virtual haven for the clandestine exchange of illicit funds, the facilitation of more than $2 billion in illegal transactions, and $100 million in dark web money laundering. The FBI is committed to exposing covert financial schemes and ensuring no one can hide behind a screen to perpetuate financial wrongdoing.”


via bitcoinmagazine.com
The Ultimate Guide to Bitcoin Self-custody for Miners

The Ultimate Guide to Bitcoin Self-custody for Miners

Originally published on Unchained.com.

Unchained is the official US Collaborative Custody partner of Bitcoin Magazine and an integral sponsor of related content published through Bitcoin Magazine. For more information on services offered, custody products, and the relationship between Unchained and Bitcoin Magazine, please visit our website

As a bitcoin miner, you have a lot to manage, from seeking out inexpensive electricity, to constructing facilities, to acquiring rigs and building a knowledgeable team that can keep them hashing. In speaking with mining companies over the years, we know that bitcoin custody is often an afterthought.

Here we’ll describe the process of securing your mined bitcoin in self-custody while managing a bitcoin treasury, CapEx, OpEx, OpSec, LP distributions, taxes, and more. Given the ever-present risks of hacks and suspended withdrawals, our goal is to explain the benefits and trade-offs of various approaches to bitcoin self-custody—regardless of the size of your operation.

Bitcoin self-custody considerations for miners

There are unique challenges miners face with self-custody in comparison to other types of bitcoin holders:

  • Miners receive a high frequency of incoming deposits from mining pool payouts, which can increase transaction costs due to UTXO bloat (more on this below).
  • Some portion of mined bitcoin must be sold to cover overhead.

Other challenges are similar to that of other businesses that hold bitcoin:

  • Businesses may not have the in-house expertise needed to set up self-custody securely while minimizing complexity.
  • Businesses generally have multiple operators and desire distributed control over bitcoin funds.
  • Businesses want to minimize counterparty risk while eliminating the risks of malware, user error, storage media decay, phishing, physical attacks, and other security risks.

In all cases, holding the private keys to your organization’s bitcoin should be prioritized. As we’ll explain next, multisig can enhance the security of your bitcoin regardless of your organization’s size. While the details of your setup may vary, multisig helps to address many of the above concerns while allowing your bitcoin to touch exchanges only when necessary (e.g., for OpEx/CapEx).

Upgrade your Bitcoin security and get access to exclusive discounts on Unchained financial services. Visit our website to learn more.

Why miners need multisig

Better security than singlesig

Singlesignature (singlesig) wallets—controlled by a single key secured by a Trezor or Ledger hardware wallet, for instance—improve security, reduce counterparty risk, and remove exchanges as a single point of failure. With singlesig, however, your bitcoin is put at risk if a hardware wallet or seed phrase is lost or compromised. Just one or the other, in the wrong hands, could lead to permanent loss of funds.

Multisignature wallets, on the other hand, enable you to store bitcoin in a wallet controlled by multiple keys. They increase your security by ensuring more than one of those keys, held in different locations, are required to sign a transaction. If set up correctly, multisig can eliminate all single points of failure. For a miner, this means removing the risk of a single rogue employee moving funds, and creating redundancy so that the loss of a single hardware wallet or seed phrase cannot lead to a critical loss of funds.

Eliminates exchange custody risk

Exchanges can be a convenient place to send newly-mined bitcoin. They allow you to easily exchange bitcoin for your local fiat currency before sending funds to a linked bank account, and they even take care of things like UTXO management. In bitcoin, however, there is always a price to pay for convenience. The risks and potential downsides of using an exchange for key storage are numerous—the fact that they can cut you off at any time and the possibility of hacks and insolvency are only the beginning.

Flexibility to achieve an ideal balance of security and complexity

A 2-of-3 multisig quorum has three total keys where two are required to spend, which keeps your bitcoin secure even if one key is compromised. Many mining firms find that 2-of-3 multisig is the perfect setup for their corporate treasury because no single individual can compromise the entire treasury, while sending out LP payouts and monthly expenses is still kept straightforward (only two signatures required).

Higher-quorum multisig (e.g., 3-of-5, with five total keys and three required to spend) adds more keys and typically more individuals to the equation. This can technically improve the security of your bitcoin wallet in some cases—but also dramatically increases complexity. We wrote a comprehensive article explaining why this is the case, but for the purposes of this article, you just need to know the sweet spot for most individuals, organizations, and mining operations tends to be 2-of-3.

Fault-tolerance of a typical 2-of-3 multisig collaborative custody setup compared to a seedless 3-of-5 setup

The benefits of collaborative custody

When using multisig for your mining company’s treasury, you might also benefit by including an institution (like Unchained) to hold one of three keys for your multisig setup.

In addition to the enhanced security that multisig provides, collaborative custody can also help with:

  • Reduces the number of physical items (hardware wallets and seed phrases) you need to secure.
  • Active monitoring over suspicious activity like unauthorized transaction signatures or account logins
  • A partner that can help your team recover the wallet in the event where one of your keys has been lost or compromised.

Wallet management

Managing mining pool payouts

Every miner needs to make decisions on security, transaction cost, and counterparty risk when deciding which type of wallets to use for their newly mined bitcoin.

Below are four example workflows that may help you determine which model is the best for your mining operation.

Workflow #1: Mining pool payouts sent to a singlesig wallet

In this popular workflow for smaller mining operations, you receive mining pool payouts directly to a singlesig wallet controlled by a single operator. Funds that need to be sold can then be sent to an exchange, while funds to be stored long-term are sent to a multisig wallet.

Workflow #2: Mining pool payouts sent to a multisig wallet

This workflow is the same as the workflow described above, except that mining pool payouts are sent to a multisig wallet instead of singlesig. A second multisig wallet is required for the corporate treasury.

Sending bitcoin payouts direct to multisig maximizes security throughout the workflow, but requires two people to approve each transaction to the exchange and treasury. As such, it is better suited for larger mining operations.

“With multisig you’re paying higher fees to remove counterparty risk.” – Griffin Haby, Mountain Lion Mining

Workflow #3: Split payouts from the mining pool

Some mining pools allow miners to split payouts between two or more accounts. In this workflow, we show automating the payout process to send a fixed percentage directly to cold storage, and the rest to an exchange to sell to cover overhead.

Workflow #4: Mining pool payouts sent to an exchange

In this workflow, bitcoin is mined directly to an exchange. This is far more convenient for the purposes of UTXO and fee management purposes, and allows immediate liquidation of funds, but leaves bitcoin in the most vulnerable state for the longest amount of time, with high counterparty risk.

Maintaining multiple fund buckets

Even within the above high-level approaches to bitcoin security, you may want to further separate wallets for separate purposes, like distributions, operating expenses, or corporate treasury. Keeping these buckets of bitcoin cryptographically separated from each other will make it far easier to keep track of your operation from a tax and accounting standpoint—and much easier to ensure those long-term satoshis aren’t being used for overhead!

Managing transaction fees

Miners are typically more concerned with collecting transaction fees from other users. However, when managing your bitcoin mining wallets, the fees you pay when sending bitcoin—whether to an exchange, cold storage, or investors/partners—should also be considered.

As we described in a previous article, bitcoin transaction fees depend on how congested the bitcoin network is at any given time and how much data is being processed in a transaction. One of the key factors behind the data size of a transaction is the number of UTXOs involved. Our article on the problem of too many UTXOs is a good primer on UTXO consolidations, payout thresholds, and how bitcoin transaction fees are calculated.

As a miner, there are four main ways you can reduce your transaction costs:

1. Increase payout thresholds from mining pools

If you use a mining pool, and take a high frequency of payouts, it’s going to result in a lot of small UTXOs in your destination wallet, which could be expensive to spend when the time comes.

To mitigate this, you can increase your pool payout threshold to reduce the number of deposits being made to your wallet (and therefore reduce the wallet’s UTXO count). This method is especially useful for future fee mitigation if you are pointing your payouts directly to a multisig wallet (which requires more data to make a transaction than a singlesig wallet).

2. Manually consolidate your UTXOs

You can further reduce the number of UTXOs in your wallet by periodically consolidating. This is a relatively simple process; you just need to author a transaction containing the UTXOs you wish to consolidate, and send them back to yourself. You can learn more in our article covering strategies to manage too many UTXOs.

3. Set a low fee…and wait

Block space is limited by design—the higher the demand for space (increased quantity of transactions), the higher fees will be. If you don’t need a transaction to be processed immediately, consider setting a lower fee rate than recommended at the time of sending. This makes the transaction take longer to process, but can help you avoid paying excessive fees during periods of high demand.

At any given time, there is a minimum fee rate the mempool is willing to accept. Typically, this stays between one to three sats/vbyte. Current fees can easily be viewed on most block explorers, such as mempool.space.

4. Batched spending

Miners who need to send multiple payments at the same time can reduce transaction fees by sending them all at once using a transaction method called batching. This method of consolidating multiple payments can be performed with many popular bitcoin wallets (such as Bitcoin Core, Electrum, or BlueWallet) and can be helpful for LP distributions or any other time you need to make multiple transactions at once.

Key management

Identify your keyholders

When your company decides to hold the keys to its bitcoin you will need to determine who at the company will physically hold the keys.

The goal is to distribute control over keys and seeds evenly. This gives no one person the ability to sign a transaction or move bitcoin on their own. What this looks like for your organization will depend on your specific circumstances, such as the number of principals, the number of keys, and whether the wallet is for long-term storage or simply distributing control over spends.

In the above example where you’ve decided to use 2-of-3 multisig for your mining operation’s bitcoin treasury (we’d typically recommend this), you might select the company’s CEO and CFO to hold a key each, and a collaborative custody partner to hold the third key.

Properly secure your hardware wallets and seed phrases

There are typically two separate physical items to protect for each of your company’s bitcoin keys: a hardware wallet and a seed phrase. A critical element of implementing a secure multisig model is the geographical distribution of hardware wallets and seed phrases so that no single physical location is a point of failure for your bitcoin.

Seed phrases are worth particular attention because they are a physical and unencrypted copy of your bitcoin private keys. You should always retain seed phrase backups of your keys to reduce the reliance on sometimes finicky hardware wallets.

The location of the hardware wallets and seed phrases should only be known to individuals who will be expected to provide transaction signatures to move bitcoin. Keep in mind: When storing and securing these items, you may want to ensure that no single person at your organization has seen or knows the location of the necessary hardware wallets or seed phrases to spend—so that no single person can compromise your bitcoin treasury.

Ongoing key maintenance

Key hygiene

After you’ve properly stored your hardware wallets and seed phrases, there are a few best practices you should observe to keep the device and data on the device in proper working order:

  • Keep the firmware up to date: This should be done roughly two to three times a year to ensure your hardware wallets have the best security, newest functionality, and will work to sign transactions when you need to.
  • Perform key checks: At regular intervals, check that your hardware wallets are functional and check the physical security of your seed phrases. We recommend this should be done roughly four times a year.

Changing key holders

When a key holder leaves your mining operation, you should always replace their key as soon as possible. Don’t simply hand over the old key to a new key holder—that would be a a potential security hole. Even if the original key holder can be trusted and left in good standing, replacing the key reduces the risk that unauthorized signatures will be performed or attempted in the future.

Key replacements

To replace a key, you will need the new key holder to generate a new key, (if using multisig) create a new multisig wallet with the new quorum, and then (carefully) send all the company’s bitcoin to the new wallet.

If you’re using collaborative custody with Unchained Capital, our platform can safely guide you through the key replacement process. If you’re not using a collaborative partner, we’d recommend having someone technical on hand to help with the process.

  • For Unchained Capital clients needing help with key replacements, reach out to your dedicated account manager or client services.
  • If you are unsure whether or not you need to perform a key replacement, or if you would like to learn how key replacements for multisig work technically, you can refer to this article.

Other considerations

Bitcoin mining and taxes

Bitcoin miners are responsible for understanding and abiding by local and federal tax regulations. Taxes and accounting as they pertain to bitcoin mining are beyond the scope of this guide, but they are relevant considerations and you should consult with an accountant or tax professional to learn more.

For US-based miners, Unchained’s Head of Legal Jeff Vandrew briefly touched on the topic of mining and taxes in his piece covering what you need to know about bitcoin mining, IRAs, and taxes:

If a taxpayer obtains bitcoin through mining, they must recognize income in the amount of the fair market value in U.S. dollar terms of the bitcoin received on the date of receipt. That recognized income is subject to income tax at ordinary income tax rates. On top of income tax, the taxpayer may also be subject to self-employment tax.

Get $100 off Unchained IRA and receive 1-year free of Bitcoin Magazine Pro market research ($250 value). Visit unchained.com and enter code “btcmag” at checkout.

Selling bitcoin

If you do need to convert bitcoin to your local currency to pay bills, taxes, or cover overhead, you may want to expedite the process by setting up an exchange account and linking an active bank account. Some exchanges can take days or weeks to approve new accounts, so plan accordingly, especially if you are up against a deadline like paying an invoice, payroll, or taxes.

Unchained Capital can help facilitate the purchase or sale of bitcoin straight to or from a multisig vault, within certain limits, for companies and individuals in the U.S. that reside in a state where our trading desk is active.

Collateralizing your bitcoin

Securing your bitcoin with a collaborative custody partner like Unchained Capital means you can easily use that bitcoin to access liquidity to reinvest in your mining operations—without ever selling your bitcoin. For more detailed information on bitcoin collateralized lending, visit unchained.com/loans.

Let Unchained Capital be your guide

Whether it be the daunting task of managing fees, advice on how to structure your bitcoin custody workflow, or access to a trading desk to buy and sell bitcoin, we’re here to help. Our multisig vaults for business give your organization complete control over your bitcoin while providing a trusted partner to guide you and your team through setup and to help with key replacements and wallet recovery if and when necessary.

Originally published on Unchained.com.

Unchained is the official US Collaborative Custody partner of Bitcoin Magazine and an integral sponsor of related content published through Bitcoin Magazine. For more information on services offered, custody products, and the relationship between Unchained and Bitcoin Magazine, please visit our website


via bitcoinmagazine.com
Open Source Justice Manifesto

Open Source Justice Manifesto

The Open Source Justice Foundation is a 501(c)(3) tax-exempt public charity dedicated to spreading access to justice globally through open-source protocols and technology. Learn more about OSJF's work at opensourcejustice.org.

Most people in the world are denied access to justice. An estimated four billion people live outside the protection of the law. Fifty-four percent of the world's population lives under some form of authoritarian rule. And even in relatively stable democracies, the justice gap between low- and high-income earners is well documented.

The state has failed to provide courts that offer equal justice to all.

This is not a secret. For decades, politicians, lawyers, and charities have publicly decried the lack of affordable and accessible legal services. But politicians' solution has been to simply funnel more taxpayer money into the failing court system. Lawyers continue to lobby for restrictive licensing requirements on the practice of law, jealously guarding their monopoly over justice. Legal aid charities do not exist to change this system, but to work within it. For these groups, "access to justice" means a wider door on the courthouse. They have no incentive to fundamentally alter the state-based justice system, a system that directly benefits them.

Those with the incentive to enact meaningful alternatives to this broken system are those that are excluded from it. These individuals and communities must take justice into their own hands. They should be empowered to resolve their own disputes peacefully and voluntarily without resort to the state, and guided by their own norms and standards of acceptable social conduct. Only once justice ceases to be the exclusive domain of the state can it spread freely to all.

Private, Alternative Dispute Resolution (ADR) systems and Online Dispute Resolution (ODR) technologies have the potential to drastically increase global access to justice. But the transformative power of conventional ADR and ODR tools are hindered by proprietary software licenses that shield source code from view. Without a way for users to verify the operation of these black-box solutions, they suffer from perceptions of unfairness or bias, which disincentivize use. And such closed-source licenses prevent communities from modifying the ODR tools to fit their specific needs.

By taking conventional ADR and ODR designs, however, and deploying them through free open-source software and protocols, communities and individuals can harness the full potential of these private dispute resolution systems. The result is Open Source Justice.

The tenets of the free and open-source software (FOSS) movement are aligned with the goal of advancing equal access to justice. FOSS is permissionless, inclusive, transparent, and anti-discriminatory.

Consider Richard Stallman's four essential freedoms for open source software:

  1. The freedom to run the program as you wish, for any purpose.

  2. The freedom to study how the program works, and change it so it does your computing as you wish. Access to the source code is a precondition for this.

  3. The freedom to redistribute copies so you can help others.

  4. The freedom to distribute copies of your modified versions to others. By doing this you can give the whole community a chance to benefit from your changes. Access to the source code is a precondition for this.

Freedom 0, the freedom to run a program for any purpose, embodies respect for the choices and sovereignty of others. Sovereign communities should be free to set their own norms and values, and decide for themselves how disputes should be resolved consistent with those norms and values.

Freedom 1, the freedom to access, study, and change source code, is essential to empowering sovereign individuals and communities to make those choices for themselves. This freedom further embodies the value of transparency, which is necessary for any dispute resolution system to gain legitimacy, trust, and perceptions of fairness.

Freedom 2, the freedom to redistribute copies to help others, will accelerate the spread of ODR and ADR tools to those jurisdictions where justice is lacking or diminished.

Freedom 3, allowing modification and redistribution of modified software, allows communities to adapt dispute resolution tools to fit their circumstances and values. It also allows communities that have created their own open-source dispute resolution systems to share their tools with other similarly situated or sympathetic communities -- again accelerating access to justice.

The FOSS movement places user freedom above all else. The user should be in control of the software, the software should not control the user.

Likewise, the Open Source Justice movement places the disputant's freedom above all else. While communities should be empowered to define their own concepts of justice and design their own procedures for provisioning that justice, individuals must be given the choice to opt in to their chosen justice system. Voluntaryness and non-coercion are hallmarks of Open Source Justice.

This is a call to all developers, lawyers, entrepreneurs and other stakeholders interested in real access to justice to devise, build, and support new ODR and ADR systems consistent with the values of the FOSS movement.

Join the Open Source Justice movement today.


via bitcoinmagazine.com
The Patriot Act 2.0

The Patriot Act 2.0

Edward Snowden has called the recent renewal of FISA 702, “the biggest encroachment on your privacy rights since the Patriot Act.”

In the middle of the night, in secret, the US Senate voted to renew FISA Section 702 as a part of a broader bill called the Reforming Intelligence and Securing America Act (RISSA) H.R.7888.

The bill had passed through the House the week prior and was set to be voted on Wednesday but the vote was delayed. As Friday came and went, it appeared that we, the People, might have another weekend to rally against the Senate vote.

Alas, Americans woke up Saturday morning to find that the vote had taken place overnight and was signed into law over the weekend.

Mainstream Media would have you believe that the bill is vital for National Security and that the United States was in immediate and dire need of warrantless spying powers. The NY Times published an article titled, “Government Surveillance Keeps Us Safe.”

There is, of course, much more to the story.

Many members of the Senate were told by the House Intelligence Committee that the urgent vote was vital for national security but they were not told that FISA had already granted approval for Section 702 surveillance to continue until April 2025, even if the bill expired. The vote was held under the pretense of a blatant lie.

Warrantless spying not only lives on, it expands.

Liza Goitein is the Co-Director of the Liberty and National Security Program at the Brennan Center for Justice and has been following the renewal closely.

The bill didn’t just renew the FISA provision, which provides targeted warrantless spying powers to the administrative state, it also greatly expanded those powers by changing a few key definitions.

The amended provision will allow the government to require everyday Americans and regular businesses to spy on fellow citizens, effectively turning everyone into a spy. With the new provision in place, FISA courts can now compel anyone with access to communications equipment to cooperate with the NSA in collecting messages and communications. Previously the statute only authorized the collection of data and communications stored by U.S. internet service providers like Google, Facebook and Microsoft or telecom providers such as AT&T and Verizon.

With the new rules in place, nearly anyone, with few exceptions, can be compelled to access and turn over your data, giving US intelligence agencies extensive new powers.

Senator Ron Wyden, addressing the Senate floor, points out that the new powers could “for example, by forcing an employee to insert a USB thumb drive into a server at an office they clean or guard at night.”

It must be considered how bitcoin and crypto companies could now be compelled to turn over full access to their records of every transaction ever facilitated. While such access already exists under BSA regulations there are still some checks and balances in place providing transparency to the process. This is not the case within the FISA court process. Furthermore, a case potentially could be made that the new regulations define node runners as facilitators of communication, opening up anyone running a bitcoin node to the threat of participation with the secret courts.

The RISAA renewal of FISA Section 702 not only abolishes the Fourth Amendment rights of US Citizens, it is also being used to bypass First Amendment rights. A report from 2023, for example, showed that the FBI used Section 702 to spy on protestors and journalists. And that the FBI abused the authority of Section 702 over 300,000 throughout 2020 and 2021.

The Foreign Intelligence Surveillance Act of 1978, FISA, was originally enacted to “provide judicial and congressional oversight of foreign intelligence surveillance activities while maintaining the secrecy necessary to effectively monitor national security threats.” BJA

The USA Patriot Act, first passed in 2001 and reauthorized in 2006, expanded FISA to allow the government to obtain the personal records of ordinary Americans from libraries and Internet Service Providers, even when they have no connection to terrorism.

Section 702 is a key provision of the FISA Amendments Act of 2008.

The 2024 renewal of FISA Section 702 extends the provision for two years, under the new definitions. It’s vital that anyone who cares about their right to privacy or about our First and Fourth Amendment rights as citizens of the United States make their voices heard so that when the time comes to renew the act, it cannot be done in the shadows of the night.

This is a guest post by Michelle Weekley. Opinions expressed are entirely their own and do not necessarily reflect those of BTC Inc or Bitcoin Magazine.


via bitcoinmagazine.com
Hong Kong Bitcoin ETFs to Trade on 30th April: HashKey Capital

Hong Kong Bitcoin ETFs to Trade on 30th April: HashKey Capital

Hong Kong's Securities and Futures Commission recently approved Bitcoin Spot ETFs for several major asset managers, paving the way for the city to become a leading hub for such products. 

The approval comes after months of anticipation and marks a significant milestone for the Bitcoin industry in Asia.

HashKey Capital, a local asset management firm, confirmed that its Bitcoin ETF will start trading next Tuesday. In a statement, a spokesman for the firm acknowledged the launch date, making it one of the first companies to offer a spot Bitcoin ETF in Hong Kong.

OSL, a digital asset platform that acts as a sub-custodian and infrastructure service provider for two major fund managers, has also indicated that spot bitcoin products aim to launch as early as late April. This news further solidifies Hong Kong's position as a frontrunner in the race to offer investors access to Bitcoin through traditional financial instruments.

Elsewhere, some of China's top asset managers are in the final leg of preparations for the spot Bitcoin ETFs to begin trading potentially by the end of April. 

This development is expected to attract significant interest from investors within and outside Hong Kong.

Click the image to learn more.

According to predictions by Singapore-based crypto services provider Matrixport and Markus Thielen, founder of 10x Research, Hong Kong Spot Bitcoin ETFs could bring in and unlock up to $25 billion in new demand. 

This influx of capital could have a profound impact on Bitcoin and further legitimize it as an asset class.


via bitcoinmagazine.com

Bitcoin address types compared: P2PKH, P2SH, P2WPKH, and more

Originally published on Unchained.com.

Unchained is the official US Collaborative Custody partner of Bitcoin Magazine and an integral sponsor of related content published through Bitcoin Magazine. For more information on services offered, custody products, and the relationship between Unchained and Bitcoin Magazine, please visit our website

If you’ve been using bitcoin for a while, you’ve probably noticed that some bitcoin addresses appear quite different from others. You may have also seen discussion around several acronyms beginning with “P2,” such as P2PKH or P2WSH. If you’re unfamiliar with what these acronyms mean, here we’ll look through all the standardized on-chain methods for receiving bitcoin throughout its history and explain some essential differences that make each method unique.

P2PK

Pay-to-Public-Key (P2PK) is the original method of receiving bitcoin, and it does not involve an address. Instead, as the name suggests, bitcoin is paid directly to an exposed public key. The first ever bitcoin transaction from one person to another used P2PK, when Satoshi Nakamoto sent coins to Hal Finney in Block 170.

P2PK is no longer used because it is a more expensive, less private, and less secure way of receiving bitcoin than subsequent methods.

Quick facts

P2PKH

Pay-to-Public-Key-Hash (P2PKH) was available for use at bitcoin’s beginning, and it showed up on the blockchain for the first time less than two weeks after the genesis block. P2PKH makes several improvements upon P2PK, such as utilizing an address. As discussed in our earlier article, addresses contain a checksum that helps prevent typos and lost bitcoin.

P2PKH addresses are typically 34 or 33 characters in length (but could theoretically be as short as 26 characters), and they are encoded in Base58 format. They begin with a prefix of 1 and are currently responsible for receiving and securing 43% of the mined bitcoin supply, more than any other address type.

Upgrade your Bitcoin security and get access to exclusive discounts on Unchained financial services. Visit our website to learn more.

Creating a P2PKH address involves putting a single public key through hash functions SHA-256 and RIPEMD-160. This shortens the amount of data, which in turn helps save block space and transaction fees for the user. It also introduces further resistance to reverse-engineering the private key beyond the already believed-to-be-unbreakable secp256k1 elliptic curve.

Quick facts

P2MS

Pay-to-Multisig (P2MS) is a trivial transaction type that was only briefly relevant and has never been responsible for holding more than 100 bitcoin at one time across all network participants. Nevertheless, P2MS is a part of bitcoin’s history.

P2MS was introduced as a standard script in early 2012, as specified by BIP 11. However, this transaction type suffered from the same problems as P2PK since it included exposed public keys and did not use any address format. It also limited the number of public keys in a multisig quorum to three. Within months P2MS would be replaced by an alternative method for receiving bitcoin into a multisig arrangement called P2SH, which we will cover next.

Quick facts

P2SH

Pay-to-Script-Hash (P2SH) was introduced to bitcoin as a soft fork in accordance with BIP 16 on April 1, 2012. Like most forks, the story behind it is fascinating. P2SH shares a lot in common with P2PKH. The main difference is that the address is created by hashing a redeem script instead of hashing a single public key. 

A redeem script can be thought of as coded instructions specifying how bitcoin received to the P2SH address can be spent in the future. There could be a wide range of possibilities, including multiple different public keys. The receiver, not the sender, determines the script details, and the spending instructions are not exposed publicly until bitcoin is spent out of the address.

While advanced users can construct complex scripts, the most common uses for P2SH have been to create Nested SegWit addresses (covered below) and multisig wallets. For example, a script can include three public keys and specify that signatures from any two of the corresponding private keys can spend the bitcoin. This would create a 2-of-3 multisig address.

Get $100 off Unchained IRA and receive 1-year free of Bitcoin Magazine Pro market research ($250 value). Visit unchained.com and enter code “btcmag” at checkout.

P2SH addresses are exactly 34 characters in length, and they begin with a prefix of 3, as specified by BIP 13. Before the soft fork on April 1st, a handful of transactions experimented with this alternative prefix, the first of which is found in Block 170,052.

Quick facts

P2WPKH

Pay-to-Witness-Public-Key-Hash (P2WPKH) is the first of two address types introduced to bitcoin upon the SegWit soft fork in August 2017. The story behind this extremely important and particularly contentious soft fork is documented in a book called The Blocksize War, written by Jonathan Bier.

P2WPKH is the SegWit variant of P2PKH, which at a basic level, means that choosing this address type rather than older P2PKH addresses will help you save money on transaction fees when moving your bitcoin around.

SegWit addresses look quite different from the older address types because, per BIP 173, they use Bech32 encoding instead of Base58. Most notably, there are no capital letters in Bech32. P2WPKH addresses can be identified by a prefix of bc1q and a character length of exactly 42.

Quick facts

P2WSH

Pay-to-Witness-Script-Hash (P2WSH) is the SegWit variant of P2SH. The main advantage to using P2WSH over P2SH is that it can help lower transaction fees, and the primary reason to use a script hash instead of a public key hash is to accommodate multisig arrangements.

Like P2WPKH, a P2WSH address begins with a prefix of bc1q. However, it has a longer character length of exactly 62. Unlike the address types covered thus far, P2WSH addresses are created using the SHA-256 hashing function alone, without including RIPEMD-160, resulting in the increased character length. This was implemented cautiously, adding extra protection from a fairly nuanced and extremely unlikely multisig attack vector.

Quick facts

Nested SegWit (P2SH-P2WPKH and P2SH-P2WSH)

Nested SegWit (also known as Wrapped SegWit) is technically not a different address type than we’ve covered above. Still, it is a unique way to use previously discussed address types in a manner that was temporarily useful for the bitcoin community.

When the SegWit soft-fork occurred, not all bitcoin nodes, software, and services immediately upgraded to support the new Native SegWit address types, P2WPKH and P2WSH. Only the entities that did upgrade could send to these new addresses. This meant that folks who wanted the ability to receive bitcoin from anybody (including those who hadn’t upgraded) couldn’t use a Native SegWit wallet yet. However, since SegWit offered cheaper transaction fees, most people were keen to begin using it.

The crafty solution to this dilemma was to utilize the P2SH transaction type. The entities that had not yet implemented SegWit could still send bitcoin to P2SH addresses—which, as discussed above, are built with a redeem script specifying the instructions on how the bitcoin can be spent later on. As it turns out, these instructions could incorporate the new SegWit spending model, providing users with a bridge to reduced fees. Therefore, the P2SH addresses using this trick became known as Nested SegWit, and they played a significant role in the SegWit adoption process.

On the surface, Nested SegWit addresses are indistinguishable from other P2SH addresses, so the supply of bitcoin held in this arrangement is unknowable. Additionally, since all modern bitcoin tools can now send directly to Native SegWit addresses, there is no longer any good reason to use Nested SegWit.

Quick facts

P2TR

Pay-to-Taproot (P2TR) is the newest address type, made available by the Taproot soft-fork in November 2021. P2TR adoption remains quite low at the time of writing, and many bitcoin softwares and services are still working on integration.

While P2WPKH and P2WSH are known as SegWit V0, P2TR is considered SegWit V1. Notably, P2TR utilizes a digital signature algorithm called Schnorr, which differs from the ECDSA format used in earlier bitcoin transaction types. Schnorr signatures have several advantages, including additional transaction fee reductions and increased privacy.

Regarding privacy, the key and signature aggregations made possible by Schnorr allow multisig addresses to be indistinguishable from singlesig, and the full spending conditions for a P2TR address are not necessarily revealed publicly. The creator of the address can even include multiple customized redeem scripts to choose from in order to spend the bitcoin later.

P2TR addresses are 62 characters long, and they use Bech32m encoding, a slightly modified version of Bech32, as described in BIP 350. P2TR addresses can be identified by their unique bc1p prefix.

Quick facts

Reference chart

Now that we have covered all standardized methods to receive bitcoin on-chain, some of the quick facts and address features can be combined into a convenient chart for reference.

Originally published on Unchained.com.

Unchained is the official US Collaborative Custody partner of Bitcoin Magazine and an integral sponsor of related content published through Bitcoin Magazine. For more information on services offered, custody products, and the relationship between Unchained and Bitcoin Magazine, please visit our website


via bitcoinmagazine.com
Jack Dorsey And Block Are Developing A Full Bitcoin Mining System

Jack Dorsey And Block Are Developing A Full Bitcoin Mining System

Block, a prominent global technology company focusing on financial services, has unveiled significant advancements in its bitcoin mining project today. The company has successfully completed the development of their three-nanometer (nm) bitcoin mining chip and is now in the final stages of producing the design with a leading global semiconductor foundry. This achievement marks a crucial milestone in Block's mission to decentralize the supply of bitcoin mining hardware and distribute hashrate effectively, according to the announcement.

In addition to the chip development, Block also announced the development of a full "bitcoin mining system", aiming to address challenges faced by mining operators and support mining decentralization. The company said it welcomes input from the bitcoin mining community to enhance the system's design and functionality.

"We’re building a mining rig," Block CEO Jack Dorsey stated.

Previously, Block had progressed with manufacturing a five-nanometer mining chip prototype and received positive feedback from its foundry partner, reaching its design goals and teaching them valuable learnings. Since then, Block has been working on its three-nanometer chip design, the company said.

Now, with the successful completion of the three-nanometer chip design, Block says the chip showcases competitive performance by utilizing the most advanced semiconductor process currently available, ensuring mining operators of all types can "thrive" now that Bitcoin is in its fifth mining epoch post the fourth halving of the block subsidy.

Block's commitment to supporting mining decentralization is evident in its plans to offer both a standalone mining chip and a full mining system. The company says their standalone chip will make Block the only large, well-capitalized mining hardware vendor with such a solution, encouraging innovation and new use cases in the mining industry. 

The company requests further insights and feedback from the mining community on challenges related to pre-sales discovery, purchasing processes, reliability, maintenance, software features, transparency, and post-sale support.

Today's Announcement

Mining operators and enthusiasts were asked to share their thoughts and feedback with Block by contacting them at mining@block.xyz.


via bitcoinmagazine.com