pull down to refresh

0 sats \ 0 replies \ @standardcrypto 15 Sep \ parent \ on: Open letter to core devs bitcoin
good catch
unclench and use up to 4mb.
on a quiet day you can probably get it in for the price of a fancy latte.
there were theoretical benefits to privacy that haven't materialized yet.
bwcause no one actually cares about privacy.
but I say give it a little time.
main one that comes to mind is multisig indistinguishable from single sig transaction .
nice infographic.
can you add links to authoritative source material this was based on? (bips, canonical wikis, etc)
"I don't mind paying 5%"
No homie what you mind is paying 5% and still getting exit scammed by your custodian anyway.
Lol great clip though.
no, the tweet doesn't say this.
cypherpunk isn't pro spam. the argument is over how to limit spam.
hashcash was one way.
Bitcoin (normal core Bitcoin defaults) is a better way. Impose costs on spammers so they can't dominate use of the system.
Knots argues core doesn't go far enough, not that core doesn't limit spam.
You only get spam now because Bitcoin is underutilized because of ETFs and whatnot. My feeling is this will get fixed organically just with the passage of time, more users will utilize Bitcoin and the spammers will mostly get priced out.
But I suppose a 'non filters" way to fight spam would be a soft fork to idk maybe 50 bytes instead of a thousand, forcing regular users to outbid spam. But no one wants to do this.
But it is more cypherpunk ethos than filters.
Filters is whack a mole. You want to fix the problem at the source, by metering utilization.
what problem is covenants trying to solve?
"I need shitcoins on Bitcoin to ROI my investors before they break my kneecaps."
that one doesn't count.
also (ibid)
"One of Bitcoin’s most fascinating properties is the fact you can have a level of security that once was only available to the people in power. You can verify that a payment is valid (you’re not receiving fool’s gold) without any special tool. You can make sure the monetary policy is being followed without needing to trust anyone’s information. But to achieve this, you have to run a node. Your security dramatically declines if you’re using someone else’s node. But running a node has historically been an onerous task, requiring a good 24/7 running computer and a good internet connection. Floresta changes that by enabling you to run a full node on almost any device, without hassle."