ZeroNoise Logo zeronoise

Bitcoin Technical Intelligence

Public Daily Brief

by avergin 66 sources

Tracks Bitcoin protocol developments, layer-2 innovations, infrastructure updates, and fundamental adoption while filtering out price speculation and altcoin noise

Relay Policy, Covenants, and Client Updates Define Bitcoin’s Near-Term Path
06 September 2025
8 minutes read
Citadel Dispatch Citadel Dispatch
TFTC TFTC
Bitcoin Magazine Bitcoin Magazine
12 sources
Relay-policy disputes, covenant proposals (CTV/OP_CAT), and new client releases dominate this cycle alongside Lightning router economics, emerging ecash overlays, and an incident affecting the Blockstream app. We map the technical stakes, infrastructure health, and philosophical debates shaping Bitcoin’s near-term path.

Protocol Development

  • Mempool relay policy vs consensus rules. Current disputes are about node policy (transaction relay/mempool) rather than consensus validity. Core maintainers argue that certain consensus‑valid but historically non‑standard transactions (e.g., very large OP_RETURN/inscriptions and sub‑1 sat/vB) are being mined via out‑of‑band paths, introducing centralization risk (reduced visibility, poorer fee estimation for nodes) if default relay does not account for this 17 16 15 . Alternative implementations that relax filters aim to relay a broader set of transactions at the cost of accepting some centralization and estimation trade‑offs 13 .

  • OP_RETURN defaults context. Gloria Zhao reiterated that the recent OP_RETURN defaults discussion “has absolutely nothing to do with wanting arbitrary data stuffed in the chain,” pointing to the PR commentary for details 95 94 .

  • Arbitrary data can’t be reliably banned by policy alone. A conference talk summarized BitMEX Research’s view that encodings can embed arbitrary data (even image payloads) into standard structures like keys; preventing it would imply forbidding normal primitives, which is not feasible within Bitcoin’s current design 41 .

  • Covenants and soft‑fork pathfinding. A soft fork is a backward‑compatible rule change that lets non‑upgrading nodes stay on the same chain 39 . Script is intentionally limited (no native future‑spend constraints or in‑script proof verification within block limits), constraining on‑chain programmability 38 37 . CheckTemplateVerify (CTV) is discussed for simpler vaults and safety rails (future‑spend restrictions), and for reducing interactivity in constructions like ARC 36 35 . Additional proposals such as OP_CAT and state‑carrying covenants could enable on‑chain verification of L2 state rather than relying on federations, but may introduce new risks (e.g., MEV‑like dynamics that could pressure miner centralization) 34 31 . Speakers noted social consensus is the bottleneck; delaying decisions increases ossification risk 32 27 .

  • Inscriptions/fee market observations. On‑chain JPEG inscriptions rose from ~88M (May) to ~105M four months later (~20% increase), primarily using Taproot inscriptions 107 . One estimate attributed ~1% excess fees vs. normal transactions and roughly ~1.5% of combined fee+reward (estimated from reward only) to this activity; persistently higher fees encourage miner investment in hashpower 103 84 .

  • Governance primacy of validating nodes. Several reminders from prior conflicts: economic nodes enforce consensus; miners can’t unilaterally change protocol; market forces decided the block‑size dispute 106 104 .

Bitcoin is owned by humanity, the protocol developers are stewards, and need consensus from users to change it materially. bitcoin is about money, spam has no place in the timechain. what defaults the bitcoin core project puts in the reference client matter in this.
x.com

Lightning & Layer‑2 Progress

  • LN router economics: automation is trending but naive “safe, high‑fee” strategies cut volume and lower total revenue. More sophisticated fee automation is needed for better router yield 102 . Technical significance: smarter dynamic pricing could improve network liquidity and forwarding reliability.

  • User‑level Lightning. Fees are typically very small and settlement is near‑instant, but users must pre‑provision channels/liquidity to have a usable spending limit 49 . Multiple payment layers (e.g., Lightning) extend Bitcoin’s transactional throughput, with popular mobile implementations such as Wallet of Satoshi and Phoenix 48 .

  • Overlay protocols and trade‑offs (ARK/“arkade_os”). Summary from discussion: arkade behaves like an overlay‑mempool system; unilateral exits exist but their cost‑effectiveness depends on vTXO size; VM state transitions rely on cooperating servers. Zero‑conf‑like swaps reduce latency but introduce reliance on the operator batching users; if servers don’t cooperate, users may face double‑spend/collusion risks akin to statechains 99 100 98 101 . Impact: faster UX at the expense of stronger trust/minimization.

  • L2 status and requirements. One talk asserted only two Bitcoin L2s are in production today: Lightning and Spark 28 . Trust‑minimized L2s need data posted to Bitcoin (data availability), preserving miner fees while allowing off‑chain sequencing/business models 29 . CTV could lower interactivity in some L2s and enable on‑chain slashing for Bitcoin staking scripts (today emulated via committees, which can collude to avoid slashing) 35 33 . Caution: more expressive opcodes like OP_CAT may also enable MEV‑like vectors and miner centralization pressures 31 .

  • Ecash overlays (Nostr + Cashu). NPUB Cash turns any Nostr npub into a Lightning address; the service originally held bearer Cashew tokens server‑side (next‑in‑line custodian while the mint is ultimate custodian) 4 3 . Security enhancements lock tokens to user pubkeys so the server cannot spend them 2 . The experimental NPUBX design stores mint quotes (secrets) instead of pre‑minted tokens so clients redeem directly, further reducing server custody 1 . Significance: federation/ecash overlays can improve UX and privacy but introduce operator/mint trust; multi‑mint and key‑lock features mitigate some risks.

  • UX signals. A Spiral podcast highlighted the importance of simple addresses/UX and a community shift toward sats as the everyday unit—helpful for small payments and mental accounting 93 .

Infrastructure Updates

  • Node software releases and choices.

    • Bitcoin Knots v29.1.knots20250903 released. Users are urged to verify downloads; tag: v29.1.knots20250903 97 96 88 87 . The last 21.x Knots (v21.2.knots20210629) has known security issues; version numbering moved from “0.x” to “x” by dropping the leading zero 85 86 .
    • Wasabi Wallet v2.7: stabilization update, improved node integration, “smarter” coordinators, UI refresh, and bug fixes. Update notifications and verification are now distributed via Nostr relays to reduce reliance on centralized channels; best practice remains PGP verification 22 21 . Sparrow is desktop‑only; beware fake mobile apps—install from sparrowwallet.com and verify signatures 20 . Node platforms like Start9 make it easy to select Core vs Knots and adjust configs; operators can also run Core in blocks‑only mode (no mempool) for reliability preferences 18 19 .
  • Client incident: Blockstream app/Jade reports. Multiple users reported wallet login/loading failures across platforms, sometimes with on‑chain accounts visible while Lightning accounts failed to load; app warnings cited “network issues,” and one user could not restore to a fresh device during the incident. Logs showed repeated empty UTXO results; users noted lack of timely public status updates 71 70 56 55 54 53 52 51 50 . Technical takeaway: avoid single‑vendor dependencies for critical access; ensure alternate wallet paths and backups work under service degradation.

  • Mining and physical infra. A “Hash Hut: Texas Edition” test video circulated; one observer praised operators for actively fixing “filters” while others “LARP” 92 91 90 . Impact: ongoing industrialization and operational improvements at mining sites.

  • Network health snapshot. At block height 913,191 with ~57 blocks to the next retarget, an estimated +5.4% difficulty adjustment was cited; average block interval ~9m29s during the sample. One mempool instance showed ~5,975 transactions and ignored sub‑1 sat/vB transactions in that view 26 25 24 23 . Empty blocks were also noted as periodically occurring 79 . Anecdotally, a user reported a 24‑minute confirmation for ~$0.25 in fees, consistent with currently light mempools in some periods 57 .

  • Peer behavior anomaly. An investigation described peers with version timestamps behind by up to ~5,100 minutes (noted on Core v27.1/v27.2), triggering Libbitcoin to drop them. A maintainer acknowledged and said they would fix; full write‑up linked 47 45 46 .

  • Weekly engineering round‑up. Optech Newsletter #370 summarizes consensus‑change discussions, new releases/RCs, and notable infrastructure software changes 69 68 67 .

Developer Discussions

  • Relay policy trade‑offs quantified. A summary framed the impasse: pro‑filter view claims significant spam reduction with minimal miner centralization; anti‑filter view claims negligible spam reduction with substantial centralization from filtering. Better measurement is needed on both effects 12 .

  • Implementation diversity and operator choice. By design, Core developers cannot force upgrades (no auto‑updates), reinforcing that policy defaults affect primarily the node that opts into them 10 17 . Knots is a Core‑derived client that filters non‑monetary transactions by design, changing relay behavior; supporters cite added decentralization choices while critics point to potential harm (e.g., the OP_RETURN episode) 14 59 .

“Core devs cannot force you to do anything. There’s no auto updates.” 10

  • Maintainer credentials. One talk referenced contribution stats to contextualize maintainer trust: Gloria Zhao listed as the 12th most active Core contributor; Luke Dashjr the 15th 40 .

  • OP_RETURN defaults clarification. As noted above, the reposted summary stressed the change was not about inviting arbitrary data 95 94 .

  • Arbitrary data and pragmatism. Another discussion argued that reversing inscriptions/large payloads would require disruptive consensus changes (e.g., removing OP_RETURN or reducing block size), so operational pragmatism and clear local policy choices are emphasized 8 .

Adoption Fundamentals

  • Money properties and supply. Bitcoin implements a digital bearer asset enabling true peer‑to‑peer digital transfers without third‑party coordination; the protocol’s core properties include permissionlessness, censorship resistance, unconfiscatability, and absolute scarcity—anchored in the 21 million cap 83 82 81 . Issuance mechanically halves: at 3.125 BTC/block today, ~3.125% of total supply will be mined this epoch; next epoch’s 1.526 BTC/block implies ~1.526% over that four‑year period 74 . Many advocates prefer sats as the practical unit (100,000,000 sats per BTC) to normalize everyday amounts 58 93 .

  • Non‑price health indicators. Some community members recommend watching hash rate and broadening time horizons rather than focusing on short‑term fiat price volatility 89 .

  • Lightning and grassroots usage. Examples include in‑person Lightning acceptance (e.g., a Tokyo food truck) and social tipping via Nostr “zaps” for content creators, indicating repeated small‑value flows over L2 7 6 5 . Note: practical access for many still funnels through KYC exchange choke points, and developers in privacy contexts have faced legal risk 80 .

  • Institutional infrastructure and “economic nodes.” Large custodial actors (e.g., major ETF issuers/custodians) can sway upgrade debates due to business incentives that may not align with self‑custody UX; this adds a social‑consensus layer to technical decisions 30 .

  • Non‑custodial commerce rails. Payment‑forwarding services that generate invoices and monitor the chain without taking custody (e.g., Blockonomics) reduce third‑party control; funds settle directly to user self‑custody 64 .

  • Custody hygiene and UTXO management. Community guidance remains: not your keys, not your coins; several users cite avoiding losses during exchange failures by withdrawing to self‑custody 44 43 . Others report losses at failed exchanges, reinforcing the risk 42 . When off‑ramps impose low per‑withdrawal caps, users can accumulate many small UTXOs, increasing future consolidation fees; planning periodic consolidation helps 62 61 . Moving coins from exchange to hardware wallets transitions from an IOU to on‑chain ownership with keys held locally (bitcoin “lives” on the chain; wallets secure the keys) 73 72 .

  • Operational literacy for on‑chain verification. Verify transfers via txid and block explorers (e.g., mempool.space). Be wary when counterparties refuse to provide complete recipient addresses/txids; Bitcoin transfers are irreversible 78 77 76 75 63 .

Cultural Evolution

  • Ossification vs iteration. Multiple voices warn that allowing an “ossification camp” to dominate could stall upgrades that improve self‑custodial UX and scaling, while others fear centralization or unintended consequences from new opcodes 32 27 31 .

  • Roles and authority. Reaffirmations that validating nodes, not miners, set the rules; developers are stewards who need user consensus for material changes 106 104 105 .

  • What counts as “spam.” Some argue paid transactions are, by definition, not spam; others still prefer filtering non‑monetary data. The debate currently rides on measurements and policy defaults, not changes to consensus 11 17 .

  • Language and identity. Community reminders note Satoshi used terms like “time‑stamping server” and “Timechain,” not “blockchain,” reflecting Bitcoin’s roots in timestamped proof‑of‑work ledgers 66 65 .

  • Self‑custody as ethos. Across podcasts and community threads, the emphasis remains on open‑source, verifiable clients and hardware, independent funding for protocol work, and minimizing reliance on centralized infrastructure 9 60 .

Core v29.1, OP_RETURN Policy Pivot, and L2 Tooling Advance as Knots Share Rises
05 September 2025
7 minutes read
Bitcoin - The Currency of the Internet Bitcoin - The Currency of the Internet
Guy Swann Guy Swann
Bitcoin Magazine Bitcoin Magazine
10 sources
Core v29.1 is tagged with performance and stability improvements; BIP 153 is assigned; Core is removing the OP_RETURN policy cap amid debate. Lightning tooling advances (auto‑swaps, BTCPay plugin), covenant use‑cases, mining and node composition shifts, and governance realities shape the current landscape.

Protocol Development

  • Bitcoin Core v29.1 is tagged. The maintainer notes bug fixes, improved compact block reconstruction, and lower risk of unexpected node offline events. Release notes and test binaries are available; builds can be bootstrapped via Guix instructions 91 68 95 97 96 67 .
  • BIP 153 (“Sharing Block Templates with Peers” / sendtemplate) was assigned to ajtowns, with the draft PR tracked on the BIPs repo 93 92 . Technical significance: standardizing block-template exchange at the P2P layer can clarify interfaces between mining participants and peers, potentially improving interoperability of block construction workflows.
  • OP_RETURN policy shift: Core contributors decided to remove the 80‑byte OP_RETURN relay policy limit after discussions that it drove more harmful workarounds (data stored in unspendable outputs) without achieving intended constraints 89 90 . Rationale from proponents: some time‑sensitive off‑chain protocols need small proofs of publication in the non‑witness portion and timely propagation over the P2P relay network; the 80‑byte cap was a binding constraint for them 74 . A developer also noted that large data storage already had a cheaper, established path (so expanding OP_RETURN was not about bulk data) 88 . A usage snapshot suggested only 0.007% of August OP_RETURN outputs exceeded 80 bytes 94 . According to one video summary, Core plans to remove the 80‑byte limit in the v30 release (targeted for October) 66 . Counterarguments warn of non‑financial spam risks and tension with Bitcoin’s monetary focus; proponents note pruned nodes can discard OP_RETURN data post‑validation 65 64 63 .
  • Data-at-rest clarification: concerns that embedded blockchain data ends up verbatim on disks are unfounded; Core obfuscates on‑disk data (PR 6650) to avoid malware signature false positives, and one reply pointed out disk firmware-level behavior, too 80 85 79 78 . Technical significance: reduces operational risk from anti‑virus scanners while preserving validation semantics.

Lightning & Layer‑2 Progress

  • BTCPay Server “samrock protocol” plugin links BTCPay to Aqua to accept on‑chain (including Liquid) and Lightning without manual channel management; it generates a QR setup link to pair the wallet. It’s not live yet, but reported as heavily tested 59 58 . Significance: lowers merchant onboarding friction by abstracting L2 liquidity operations behind a wallet pairing flow.
  • Albi Hub introduced auto‑swaps: when a Lightning channel saturates, funds can be swapped out to on‑chain destinations without closing channels; users can also set auto‑policies (maintain X in-channel) and perform swap in/out. Sub‑wallets allow segregated spending under one node (e.g., family accounts). Nostr integration and easier node linking via NWC‑style flows were highlighted 57 56 55 54 52 . Significance: automated inbound liquidity management and simpler UX reduce operator overhead for sustained Lightning availability.
  • Miniscript/Taproot policy tooling: Nunchuk released Miniscript templates; Taproot support was already present 29 28 . Significance: safer, auditable spending policies (timelocks, multisig) with better UX, enabling more robust self‑custody setups.
  • Covenants proposals (CTV + CHECKSIGFROMSTACK): talks outlined how most scaling mechanisms rely on pre‑signed transactions; CTV allows committing to transaction templates without multi‑party online coordination, while CHECKSIGFROMSTACK authorizes signatures against arbitrary data. Together they enable re‑authorizing CTV templates off‑chain, improving flexibility for constructs like coin pools and backup/state workflows 44 43 42 41 40 . Vaults enabled by covenants add a reversal window for high‑value self‑custody (e.g., delayed spends with pre‑approved recovery paths), reducing loss/coercion risk compared to brittle pre‑signed chains 39 38 37 36 35 . Pushback: some developers view these as optimizations of existing capabilities and not urgent to activate; a panelist suggested more proofs‑of‑concept and possibly targeting an activation client in 2026 34 33 31 .

Infrastructure Updates

  • Node software and compatibility:
    • v29.1 tag and improvements noted above 91 68 95 .
    • Some users choose to remain on 29.x and avoid 30.x policy defaults; relay policy backports also affect the 29.x line 10 23 .
    • Reports that Ashigaru Dojo coinjoin flows require running Core (not Knots) in current setups 50 , and that Knots can’t be combined with Dojo in some Start9 deployments 9 . Significance: node policy and implementation choices can have immediate wallet/tooling implications.
  • Node software composition: One video cites Core at ~81.25% of reachable nodes and Knots at ~18.5%, with total node count rising and Knots growing from tens to thousands since early 2024 62 61 . A separate user claimed 2–3k additional nodes YTD, “almost all” Knots 8 . Significance: multi‑implementation diversity can increase protocol ossification pressure and raise the cost of unilateral changes 60 .
  • Mining operations and hardware:
    • Ocean Pool reported a step‑function hash increase (including NiceHash participation), reaching ~1.5% of network hash and projecting ~2.5 blocks/day at that share; at times, near‑empty blocks appeared alongside sub‑1 sat/vB relay defaults 19 18 17 . Significance: pool hash dynamics and node relay policy interact with observed block composition and fee markets.
    • A roundtable discussion described an open, modular ASIC mining platform with hot‑swappable hash boards, separation of chassis/power/cooling from chips, and a reported 800 TH/s unit; claims included open‑sourcing the platform to reduce vendor lock‑in 16 15 14 . Significance: modular, open designs could diversify the hardware supply chain and shorten iteration cycles, though ecosystem adoption remains to be seen.
  • Hardware wallet interoperability: COLDCARD emphasized broad compatibility via open standards and warned against single‑app lock‑in; “No lock‑in” was highlighted as a Bitcoin strength 73 72 71 70 69 . Significance: interchangeable wallet stacks support user sovereignty and resilience against vendor failure.

Developer Discussions

  • Mempool policy and “filters”: Practitioners debated whether filters “work” and what “work” even means, with suggestions to enumerate definitions to align terminology. A 2023 ten‑part series on mempool and relay policy was referenced for foundational reading 82 83 84 77 76 . A roundtable cited a BitMEX experiment demonstrating steganographic payloads (e.g., hiding images across key material), underlining that perfect filtering is infeasible—supporters argue partial filters can still shape incentives without enabling censorship 20 22 21 .
  • Inscription load and miner incentives: Adam Back cited growth from 88M to 105M JPEG inscriptions in four months, with ~7,000 BTC in fees paid by May; he reaffirmed that economic nodes—not miners—enforce protocol rules, recalling the blocksize wars, and floated a wallet‑level fee‑routing sketch to favor pools filtering JPEGs while warning of centralization trade‑offs and the “trust‑the‑pool” aspects of sv2/datum 53 47 45 48 49 51 .
  • OP_RETURN policy debate: Proponents cite protocol needs for small, timely non‑witness attestations via the P2P relay path 74 ; critics argue it invites non‑monetary bloat 64 . Luke Dashjr expressed node sovereignty concerns and suggested opt‑in chains for proof‑of‑publication if needed 87 86 .
  • Protocol properties and threat models:
    • Bitcoin doesn’t reject valid requests to spend your own money.
      x.com
    • “Bitcoin relies on users,” with a warning that user co‑option (e.g., botnets) can threaten the system 81 . Technical takeaway: decentralization depends on independent, verifying nodes resisting coordinated capture.

Adoption Fundamentals

  • Node running and privacy: Users increasingly connect wallets (e.g., Sparrow/Electrum) to their own Core/Knots nodes—often on Umbrel/Start9—citing privacy and verification benefits 2 7 6 . Start9 operators noted many listening nodes over Tor, boosting visibility in counts 30 . Guidance threads emphasize that running your own node means you verify rules and transactions yourself, improving privacy and network resilience 13 11 12 .
  • Non‑price distribution: Several reports highlight Germany’s high node density (second after the U.S., with many Tor‑hidden nodes; Frankfurt mentioned as a concentration) 4 1 . Significance: geographic dispersion of validating nodes strengthens censorship resistance and fault tolerance.
  • Operational constraints: Users debate full vs pruned nodes; pruning reduces storage but sacrifices full historical availability some tooling expects 5 . Reported blockchain size estimates vary by source (e.g., ~810 GB in one thread), guiding storage planning 3 .
  • Merchant/institutional rails: Lightning PoS integration at Square was cited as helpful for de‑facto UX standardization, while wallet QR/format mismatches remain a friction; COINOS was noted for BOLT12 support and simple onboarding; a claim surfaced about self‑custodial tipping on X via Spark (LSP model) 25 24 27 26 . Significance: tooling convergence and reliable LN addressability are prerequisites for mainstream retail flows.

Cultural Evolution

Bitcoin is owned by humanity, the protocol developers are stewards, and need consensus from users to change it materially. bitcoin is about money, spam has no place in the timechain. what defaults the bitcoin core project puts in the reference client matter in this.
x.com

  • Governance reality emphasized by developers: Core cannot unilaterally change rules; activation depends on what users and businesses choose to run 32 . Historical precedent (blocksize conflict) is framed as market‑driven user consensus enforcing limits, with miners following as service providers 47 45 .
  • Node sovereignty in practice: “Our nodes aren’t yours to decide for,” and proposals to use opt‑in auxiliary chains rather than pushing policies onto unwilling operators 87 86 . Reinforcing ethos: “No lock‑in is a bitcoin super power” 70 .
  • Mempool policy norms: Ongoing debates weigh anti‑abuse heuristics against censorship concerns; some argue imperfect filters can still shape behavior without central control 21 .

Pointers and References

Core 29.1 near final; Simplicity live on Liquid; OP_CAT/Covenants debated as L2s mature
04 September 2025
6 minutes read
BTC Sessions BTC Sessions
Blockstream Blockstream
Bitcoin - The Currency of the Internet Bitcoin - The Currency of the Internet
12 sources
Core 29.1rc2 tightens block relay and stability while Simplicity debuts on Liquid as a safer smart‑contract language. Developers debate OP_CAT, covenants, and mempool/OP_RETURN policy amid rising L2 activity (ARC, BitVM/Glock, Citrea) and intensifying privacy, custody, and decentralization concerns.

Protocol Development

  • Bitcoin Core v29.1rc2 is available for testing; after a longer-than-usual rc1, rc2 will likely become the final 29.1 release. The update includes bug fixes, faster compact block reconstruction, and changes that reduce the likelihood of nodes unexpectedly going offline 101 98 . Release notes and test binaries are published 100 99 . Technical impact: faster block reconstruction can lower propagation latency during block relay; the stability fix reduces unplanned node downtime—both effects improve network robustness.

  • Jameson Lopp reports contributing code to the Bitcoin Core v30 release and is already running it 68 . Signal: active developer participation and early field use help surface issues ahead of broader adoption.

  • Script upgrades under discussion

    • Taproot’s OP_SUCCESS “escape hatches” enable soft‑fork activation of future stack‑modifying opcodes; advocates argue this makes OP_CAT (string concatenation) a feasible narrow upgrade sooner than broader packages 41 32 . Technical significance: OP_CAT would let Script concatenate byte strings—a primitive needed to construct Merkle structures and compact on‑chain verifiers.
    • “There’s no button for concatenating strings… Turns out that if you can concatenate things and you can hash things, you can build Merkle trees inside Bitcoin script.” 40

    • The “Great Script Restoration” (GSR) vision would reactivate many legacy opcodes and add simple covenants, paired with a resource‑limiting mechanism (an Ethereum‑like “gas” equivalent) to mitigate DoS risk; panelists framed it as a multi‑year effort 33 .
    • Covenants (e.g., CTV, CheckSigFromStack) are presented as minimal, useful additions that remove reliance on large sets of pre‑signed transactions by natively constraining future spends in Script; progress remains gradual and contested 37 35 . Impact: cleaner primitives for vaults and L2 protocol scaffolding, potentially improving safety and operational simplicity.
    • Researchers emphasize L1’s current privacy/throughput shortfalls and argue that enabling on‑chain ZK verification (SNARK/STARK) would simplify private, scalable proofs; until then, optimistic designs (BitVM) and newer “Glock” constructions shift complexity off‑chain 43 42 39 .
    • Trust‑minimized bridges: multiple teams (e.g., Farragut Labs, Starknet, Citrea) are reported to be reducing script size and capital inefficiencies compared to earlier BitVM attempts—an inflection described as “the screws are starting to come off” 44 .

Lightning & Layer-2 Progress

  • Lightning merchant UX: ARC removed vendor‑side channel management/inbound‑liquidity concerns and was used for point‑of‑sale purchases at a conference; the implementation did not require a soft fork 5 4 . Impact: lower operational burden for merchants improves real‑world Lightning acceptance.

  • Blockspace economics: “₿apps are filling Bitcoin blocks,” with a view that a rollup like Citrea could price out low‑value spam by raising the cost of blockspace usage 67 66 . Impact: L2 competition for scarce L1 bandwidth strengthens the fee market, which is a primary spam‑mitigation mechanism.

  • Liquid sidechain: Simplicity smart contracts are live on Liquid mainnet; getting started requires no Bitcoin soft fork. Developer flow: write in SimplicityHL → compile to Simplicity → deploy to Liquid; the language aims for higher expressiveness with stronger safety guarantees than Script 77 75 73 76 . Technical framing from the launch thread:

    Every opcode you’ve ever wanted can be built today with Simplicity.
    x.com

  • Trust‑minimized bridges and L2 proofs: newer BitVM‑style constructions (e.g., Glock/garbled circuits) move nearly all complexity off‑chain while keeping fraud proofs verifiable on Bitcoin—more practical today, though still constrained without covenants or native ZK verification 39 38 .

Infrastructure Updates

  • Mining fleet management: Braiins released a free Manager upgrade with a revamped workers list/details UI, improved batch actions, full Braiins OS fleet control (install, tune, manage), and auto‑boot for Cvitek boards to maximize uptime 72 71 70 69 . Impact: reduced operational overhead and downtime, especially useful for smaller operators.

  • Node data handling and local storage

    • Chainstate stores only the UTXO set; since v28.0, blocks are obfuscated on disk—casual scanning will not detect embedded data without explicit tooling 96 95 .
    • OP_RETURN payloads are stored as contiguous byte blocks and directly recognizable on disk; representing on‑chain bytes as images/video requires external software to interpret them 94 93 92 91 .
    • Operator takeaway: debates about “what’s on the network” vs “what sits on your node” are distinct; storage/obfuscation behavior affects local operational and compliance posture 59 .
  • Funding decentralized infra: a proposal suggests non‑profit funders pivot support toward shared‑UTXO hubs—recalling earlier non‑profit support for competing Lightning implementations—to promote more decentralized infrastructure 97 . Impact: broader multi‑party UTXO patterns and operator participation.

Developer Discussions

  • OP_RETURN limits, mempool policy, and miner decentralization

    • A thread (inspired by a BitMEXResearch article) argues inscription/OP_RETURN traffic adds miner revenue; if some miners exclude it, defectors who include it earn more. This motivates private mempools/out‑of‑band submission, which skews fee estimation, disadvantages smaller miners (who can’t afford private mempools), slows propagation, and raises stale rates—effects that disproportionately favor large operations 88 87 86 85 84 83 82 81 80 79 78 .
    • “Creating and maintaining private mempools adds a cost that smaller miners are unlikely to afford themselves.” 84

  • Relay filters and topology: an explainer highlighted why filters “don’t work well” given tolerant‑minority dynamics, and how preferential peering affects mempool relay 65 . Implication: policy knobs that rely on near‑universal adherence may be brittle in practice.

  • Scope clarification: commenters note the current debate is mempool policy, not consensus. Transactions carrying arbitrary data remain valid by consensus; nodes can trim or adjust local storage without changing consensus 8 7 6 .

  • Legal surface area: community members asked developers to address potential legal exposure from large OP_RETURN transactions and to share any legal reviews 90 89 . Operational implication: jurisdictional risk may influence node policy and organizational governance, regardless of consensus validity.

  • Data‑size accounting: Adam Back contends some critiques conflate payload with formatting overhead; while formatting incurs cost, the usable payload size remains “as advertised” 61 60 .

Adoption Fundamentals

  • Deterministic keys and backups: Wallets derive all addresses from a 12/24‑word seed (BIP39/BIP32); a wallet does not store history—blockchain data is matched using deterministically regenerated addresses 58 57 56 . Treat a hardware wallet as a signing device (a “pen”), not the sole storage location; backups can be restored on compatible devices 46 .

  • Security hygiene: do not photograph, speak aloud, or type seed words into internet‑connected devices; enter seeds only on the hardware device itself 53 55 .

“Never put your seed words into an online connected device for your life savings.” 54

  • Backups and durability: maintain multiple copies, periodically test restores, and consider steel‑based media (washers/plates) for fire/flood resilience 52 51 50 .

  • Multisignature for resilience and inheritance: M‑of‑N (e.g., 2‑of‑3) adds redundancy and geographic separation; some hardware can be initialized together (daisy‑chained) then separated. Community‑built devices (e.g., Frostnap) and collaborative‑custody services can assist without taking control 49 48 47 29 .

  • Acquisition and user‑run infrastructure: favor spot purchases and peer‑to‑peer venues (e.g., Bisq; Robosats over Lightning) where appropriate 45 19 20 .

  • Lightning node economics: channel operators can earn routing fees while retaining key control; however, fees are not “yield” in the custodial‑lending sense 26 25 24 .

  • Institutional custody: expect corporate treasuries to lean on multi‑sig, institutional‑grade custody; in‑kind ETF redemption requests signal demand for delivery of underlying BTC, likely institution‑to‑institution for very large holders 3 2 1 .

  • Hardware note: Ledger devices may reset on abnormal USB voltage; recovery is by restoring the seed directly on the device—never on a phone or computer 36 27 .

  • Device options: Blockstream’s Jade Plus supports multisig and pairs with the Blockstream app; features like air‑gapped QR mode are available 64 63 62 .

Cultural Evolution

  • Privacy urgency: panelists warn that advancing analytics and AI could make reconstructing long transactional histories trivial, increasing the need for stronger privacy approaches (e.g., ZK verification/rollups). Some users likewise perceive Bitcoin as highly trackable today 31 30 28 .

  • Censorship resistance vs. “intended use”: one side argues that paying fees to embed immutable messages exemplifies Bitcoin’s censorship resistance and could support miner revenue post‑subsidy; others emphasize Bitcoin as “a peer‑to‑peer electronic cash system.” The fee market and consensus rules arbitrate permissible uses 11 12 10 9 .

There's never been greater distrust between the bitcoin core developers and the grassroots pleb community than it is right now. Like that problem is worse than it's ever been. There's greater like disohesion within the bitcoin community than there's ever been. And it's getting worse. And in order for softworks to happen, there needs to be cohesion between the developers. Like they have to have some trust. But people are like hating core developers now because they have like some gender political issue that they have the wrong hair color or they, they don't.
www.youtube.com

Utreexo BIPs Assigned, Core Lightning v25.09 Released, and Grassroots Mining Gains Traction
03 September 2025
7 minutes read
What Bitcoin Did What Bitcoin Did
BTC Sessions BTC Sessions
HashrateUp HashrateUp
8 sources
This technical brief covers the assignment of Utreexo BIPs 181-183, the release of Core Lightning v25.09 with new features, and deep dives into mining infrastructure, including energy management, hardware modularity, and the rise of open-source home mining projects.

1. Protocol Development

Utreexo BIPs Assigned Numbers 181–183

The Bitcoin Improvement Proposals (BIPs) for Utreexo have been officially assigned numbers 181, 182, and 183 66 . This marks a formal step in the process of reviewing and potentially integrating Utreexo, a technology designed to reduce the state storage requirements for Bitcoin full nodes, thereby improving scalability and decentralization.

2. Lightning & Layer-2 Progress

Core Lightning Releases v25.09 “Hot Wallet Guardian” Core Lightning has released version 25.09, codenamed “Hot Wallet Guardian” 61 . This release integrates several key features aimed at improving usability and node management:

  • Bookkeeper Integration: The Bookkeeper plugin, which provides real-time visibility into payments, fees, and channel activity, is now fully integrated into the core software 60 .
  • BIP353 Support: The xpay command has been upgraded to support BIP353 “at-user” payment addresses, enabling more human-readable payment identifiers like cln[at]blockstream.com 58 .
  • Splicing and Plugin Enhancements: The release includes smoother channel splicing functionality, and the Reckless tool now supports Python plugins 57 .

This release follows a period of active development, with 321 commits merged in 76 days since version 25.05, including contributions from four first-time contributors 59 .

LN for Incentivizing High-Signal Reviews Alex Bosworth proposed using the Lightning Network to adjust incentives for online reviews 65 . The current model often leads to a bias of either five-star positivity or one-star negativity. By using LN, platforms could create mechanisms to reward reviewers who provide high-signal, valuable feedback 65 .

Spend & Replace Adoption Model A suggested adoption strategy involves using the Lightning Network for small, everyday purchases through services like Bitrefill, and then immediately repurchasing the spent satoshis with fiat currency 34 . This “Spend & Replace” model aims to build a circular economy, encouraging merchant adoption while allowing users to maintain their bitcoin position 34 .

3. Infrastructure Updates

Mining Technology and Operations

Energy Strategy as a Primary Profit Center Discussions highlighted that energy management now constitutes a critical component of a mining operation’s profitability, with energy comprising 70-80% of operational costs 47 . For some machines, an effective energy strategy can account for as much as 70% of the total profit margin 46 . Miners are increasingly participating in sophisticated energy markets:

  • Load Responsiveness: While miners can curtail energy use rapidly (seconds or sub-seconds), the ramp-up time to full efficiency can take from 10 minutes to an hour, complicating simple real-time price response strategies 45 44 .
  • Grid Services: Miners engage in demand response programs and ancillary services, which require daily market participation and adherence to uptime compliance rules 41 40 . Coincidental-peak avoidance programs (like ERCOT’s 4CP) are also a key revenue source 43 .

Hardware Design: Modularity and Predictive Maintenance A significant trend in hardware design is the shift towards modularity and repairability to maximize uptime and reduce total cost of ownership 4 . Instead of focusing solely on headline efficiency (Joules/Terahash), operators are prioritizing durable miners with easily replaceable components, such as fans, to minimize downtime 6 5 . The integration of AI for predictive maintenance, which can forecast component failures before they occur, is also being explored to allow for proactive servicing 3 2 .

Large-Scale Infrastructure Large-scale mining operations continue to push boundaries. A BITMAIN and Hut 8 fireside chat detailed a 205 MW single-building facility that aims for high hash density and power efficiency, with chips running at ~200 kW per rack 56 55 . Such facilities are also exploring synergies with AI data centers, envisioning a future where infrastructure can flexibly switch between running ASICs and GPUs 54 . In Texas, a judge is considering a permit for a third power plant to support a Bitcoin mine expansion in Hood County 35 .

Grassroots and Home Mining

“Telehash” Community Event Successfully Solo-Mines a Block Reflecting a growing movement to decentralize mining, the Bitcoin Park community organized a “Telehash” event where home miners and larger operations donated hash rate to a collective pool 10 . The initiative gathered an average of 800 petahash per second 9 and, against approximately 1-in-1,000 odds, successfully solo-mined a block at height 881,423 30 7 .

Open-Source Hardware Projects Projects like BitAxe and its successor, Ember, are driving the grassroots mining trend by open-sourcing hardware designs 11 1 . These initiatives aim to dismantle the “proprietary bitcoin mining empire” by making it feasible for individuals to mine at home, which also serves as an effective, hands-on tool for learning about the Bitcoin protocol 12 8 .

Wallets and Custody

Trezor’s SLIP39 Implementation Detail Several users observed that Trezor’s 20-word SLIP39 single-share backups consistently generate “academic” as the third and fourth words 39 38 . This is by design; the repeated word acts as a marker to identify the backup type and is not derived from the wallet’s entropy 25 22 . Only 15 of the 20 words in this specific scheme are truly random 26 .

Hardware Wallet Security Models Community discussions continue to compare different hardware wallet security models. Coldcard is often cited as technically superior but more complex for average users, and its secure element is not open source 21 67 . In contrast, Trezor is noted for its user-friendliness and open-source secure element 21 67 . A common security recommendation is to use Bitcoin-only firmware when available to reduce the potential attack surface from code supporting other cryptocurrencies 28 .

4. Developer Discussions

Mempool Policy: Sub-1-Sat/vB Transaction Relay

A technical discussion focused on measuring the number of network peers that relay transactions with fees below 1 satoshi per virtual byte (sat/vB). A jq command was shared to query a node’s peers and identify those actively relaying low-fee transactions 64 63 .

bitcoin-cli getpeerinfo | jq ‘[.[] | select(.relaytxes == true and .minfeefilter < 0.00001 and (.bytessent_per_msg.tx > 0 or .bytesrecv_per_msg.tx > 0)) ] | length’ 64

However, participants noted several caveats that can complicate these measurements:

  • Block-Relay-Only Nodes: Inbound block-relay-only connections do not send a feefilter message, causing their minfeefilter to appear as 0, which can skew results 68 .
  • Monitoring vs. Relaying: Peers with zero bytes sent or received for transaction messages may only be monitoring transaction propagation rather than actively participating in relay 62 .

This conversation touches on the broader debate about mempool policy, including concerns about witness data size being increased to 100kB, which some fear could lead to blockchain “spam” with large data like JPEGs 24 . A counter-argument noted that large data can already be split across multiple smaller transactions to circumvent such filters 23 .

Post-Quantum Cryptography Threat

The potential threat of quantum computers to Bitcoin’s cryptography was raised, along with skepticism about the community’s ability to coordinate a timely fork if needed 33 . Technical counterpoints were offered, stating that current quantum computers have only managed to factor small numbers like 15 and that modern encryption remains secure 32 . It was also clarified that Shor’s algorithm is designed for factoring, not for reversing cryptographic hash functions like the double SHA-256 used in Bitcoin 31 .

5. Adoption Fundamentals

Institutional Infrastructure Requirements For broader institutional adoption, service providers must offer more than basic custody. Key requirements include:

  • Robust Governance: Implementing complex authorization matrices and operational workflows to match clients’ internal governance processes 53 .
  • Compliance and Monitoring: Systems for monitoring transaction origins and destinations to meet regulatory and due diligence standards 52 .
  • Yield and Lending Services: Institutions expect services such as yield generation (e.g., via staking Bitcoin on other networks like Babylon) and collateral management for lending and borrowing against their holdings 51 50 .

ETFs were noted as a critical access vehicle for investment managers who lack the mandate or infrastructure to hold Bitcoin directly 49 .

Traditional Finance Integration Bow Valley Credit Union in Canada was highlighted as the first traditional financial institution in the country to directly integrate Bitcoin through a “Bitcoin gateway.” The service allows members to move between fiat and Bitcoin and withdraw to self-custody at any time 14 .

Regulatory Hurdles for Nonprofits Adoption by non-profits faces significant regulatory challenges. Spike Cohen of “You Are The Power” noted that organizations cannot simply hold Bitcoin in a wallet without adhering to strict reporting requirements, which, if mishandled, can lead to confiscation 13 .

6. Cultural Evolution

The Enduring Ethos of Self-Custody Across numerous discussions, the principle of “not your keys, not your coins” remains a central tenet of Bitcoin culture 27 29 . Community members consistently advocate for the use of hardware wallets for cold storage 48 37 and emphasize that the seed phrase represents ultimate ownership and access to funds 42 19 .

Debate on Security Models: Passphrase vs. Multisig A debate on optimal security practices highlighted differing philosophies. While some advocate for combining a seed phrase with a passphrase as the most secure method for an individual 18 , others argue that it is “utterly pointless” without disciplined operational security for storing the two factors separately 17 15 . Proponents of multisignature (multisig) setups, such as 2-of-3 schemes, contend that they offer a fundamentally more robust security model 16 .

Privacy, Anonymity, and KYC The role of Know Your Customer (KYC) regulations remains a point of contention. Concerns were raised that KYC links on-chain activity to real-world identities, creating risks from data leaks and potential government overreach 36 . It was clarified that the Bitcoin protocol itself is pseudo-anonymous and agnostic to KYC; these regulations are constructs imposed at the fiat on/off-ramps by exchanges 20 .

Bitcoin Technical Update: Lightning Privacy Enhancements, Core Protocol Refinements, and Infrastructure Debates
01 September 2025
7 minutes read
btc++ insider edition btc++ insider edition
Bitcoin Magazine Bitcoin Magazine
Bitcoin - The Currency of the Internet Bitcoin - The Currency of the Internet
6 sources
This update covers recent progress in Bitcoin protocol development, including BIP-353 integration and new encryption in Bitcoin Core. It also details significant advancements and debates in Lightning Network privacy, Layer-2 solutions like Cashu and PayJoin, and key infrastructure discussions around node operation and developer governance.

1. Protocol Development

Recent developments focus on enhancing the security, functionality, and long-term viability of Bitcoin’s core protocol.

Bitcoin Core Updates

Bitcoin Core version 28.0 and later will now encrypt blockchain data by default when a user performs a new Initial Block Download (IBD) 41 . This security enhancement is not applied automatically when upgrading an existing node; it requires syncing the blockchain from scratch 41 . The technical implication is increased data-at-rest security for new node operators, protecting blockchain data stored on disk.

BIP Implementation and Future Proposals

  • BIP-353 Integration: A hackathon project successfully implemented BIP-353, which provides DNSSEC proof validation, into the SeedSigner hardware wallet 44 . Developer Matt Corallo commented that this indicates BIP-353 integration in hardware wallets is coming 43 , signaling progress in making payment information more robust and verifiable.
  • Cross Input Signature Aggregation (CISA): Brink-sponsored Bitcoin Core developer Fabian Jahr presented on CISA, a potential future protocol improvement aimed at increasing transaction efficiency and privacy 31 .
  • Quantum Resistance: Looking toward long-term security threats, there is an expectation that Bitcoin will eventually incorporate quantum-safe mechanisms 40 . Quantum computing is viewed by some as “the only tangible threat” to Bitcoin’s long-term security as a potential world reserve currency 17 .

Scripting and Consensus

Discussions highlighted the nuances of protocol rules. A presentation at bitcoin++ provided an intermediate-level introduction to Miniscript, a language that simplifies writing complex Bitcoin scripts 31 . Separately, Adam Back emphasized that what is consensus-enforceable in Bitcoin is a counter-intuitive and small subset of what is programmable. He noted that features lacking consensus enforceability or incentive compatibility are likely to fail over time 42 , citing the minimum fee rate to prevent relay network DoS attacks as a clever, non-obvious consensus mechanism 45 .

2. Lightning & Layer-2 Progress

Significant research and development are underway to improve the privacy and functionality of second-layer protocols.

Lightning Network Privacy

Research presented at the bitcoin++ privacy summit highlighted key privacy challenges in the Lightning Network:

  • Identified Vulnerabilities: Current implementations are susceptible to tracing funds via wire packet observation and timing attacks 36 . On-path observers can deduce more about a payment’s origin and destination than is desirable 34 .
  • Proposed Solutions: Recommendations include updating the Lightning specification to add message padding, which would frustrate traffic pattern matching, and randomizing payment timings to mitigate timing attacks 36 .
  • Decentralization’s Limits: Research from Claudia Diaz of Nym Technologies showed that simply increasing decentralization does not greatly improve privacy, as network topology and liquidity layout can still narrow down the set of potential payment senders 35 .

Protocol Enhancements and Implementations

  • Hedgehog Protocol: A project named Hedgehog is being developed to improve the Lightning protocol for peer-to-peer payment channels, specifically to facilitate coinjoins 33 .
  • El Tor Project: This project aims to integrate Lightning payments (via BOLT12 offers) to incentivize the operation of more Tor nodes. A current technical hurdle is that the implementation required modifications to the Tor onion for proofs of payment, making the new nodes incompatible with the existing Tor network 29 .

Other Layer-2 and Privacy Solutions

  • CoinJoin: Coordinating large coinjoin rounds presents a trade-off: more participants increase the anonymity set but also raise the probability of a participant failing to sign, which causes the transaction to fail 32 . Peter Todd also presented a report on the privacy guarantees of current CoinJoin implementations 31 .
  • PayJoin: The Payjoin Dev Kit (PDK) Foundation was announced alongside an update on the PayJoin protocol’s development status, signaling continued formalization of the privacy-enhancing protocol 31 .
  • Cashu (e-cash): Development is underway to bring Key Verified Anonymous Credentials (KVACs) to Cashu. This would enable a shift from fixed-size denominations to a more flexible, UTXO-like model with variable-sized notes, using advanced cryptography like rangeproofs to preserve anonymity 30 .

3. Infrastructure Updates

Discussions covered best practices for running nodes, mining challenges, and hardware wallet functionality.

Node Operation

  • Hardware Choices: A user weighed the options of running a full node on a 2TB external hard drive versus a pruned 500GB SSD 6 . While syncing may be slower on an external drive compared to an SSD 4 , the 2TB option for a full node was recommended as being “worth it” long-term 5 .
  • Wallet Connectivity: For connecting a hardware wallet to a personal node, Sparrow wallet was recommended over Trezor Suite to avoid using the company’s servers 3 . A user described their setup of running a node on one machine and connecting to it from another using Sparrow and a hardware wallet 2 1 .
  • Network Mapping: A workshop at bitcoin++ explained the functionality of ASMap, a tool used for mapping the Bitcoin node network 31 .

Mining

The primary technical challenge in Bitcoin mining is the network’s high difficulty level, not the price of electricity. This difficulty renders older hardware, such as a 10-year-old machine, completely outclassed and unprofitable 28 .

Hardware Wallets

4. Developer Discussions

Community discussions have centered on development practices and the fundamental principles of protocol design.

Governance and Development Practices

A Reddit discussion highlighted controversy around developer lukejr and the Bitcoin Knots repository. Criticisms included what was described as “brutal” governance 25 and a practice of “pushing to master without a PR or a code review” 24 . These actions have reportedly drawn concern from other long-time Bitcoin Core contributors 23 . The conversation also referenced an incident where a claim of stolen BTC may have been the result of poor operational security 24 .

Consensus Philosophy

Adam Back cautioned developers against the misconception that “anything we can program” can be implemented in Bitcoin 42 . He stressed that only a “quirky tiny subset” of features are consensus-enforceable and that protocol additions must be incentive-compatible to avoid failure over time 45 . This serves as a reminder of the rigorous and conservative approach required for protocol-level changes.

5. Adoption Fundamentals

Metrics beyond price show the ongoing growth and fundamental utility of the network.

  • Network Decentralization: The Bitcoin network is supported by tens of thousands, and possibly up to one hundred thousand, nodes distributed globally 39 . The ability for users to run their own node to independently verify their transactions remains a cornerstone of the network’s decentralized architecture 38 . Running a personal node allows for verification capabilities that can be faster and more sovereign than relying on traditional audits 8 .
  • Fee Market Concerns: A user raised a long-term question about the sustainability of the fee market. For fees to eventually cover mining costs, the value of transactions will have to rise, given the block size limit. This could lead to a scenario where high fees make smaller UTXOs uneconomical to spend, effectively trapping funds in wallets that hold less than the average transaction fee 22 21 .
  • Grassroots Adoption: In a town in Costa Rica, the practical use of Bitcoin is evident. Many local businesses accept it, a brewery hosts a Bitcoin ATM, and residents use the Lightning Network to settle small debts with each other 7 .

6. Cultural Evolution

Ongoing dialogues within the community shape the philosophical direction and security practices of the Bitcoin ecosystem.

Core Philosophy

  • Conservative Development: A core tenet of Bitcoin’s culture is its prioritization of stability and conservatism in protocol development 37 . This approach is seen as essential for maintaining the network’s security and reliability as a store of value.
  • Bitcoin’s Uniqueness: A common viewpoint is that Bitcoin’s combination of solving the double-spend problem, ensuring value through proof-of-work and scarcity, and achieving uncensorable scale is an unrepeatable event 11 . This contrasts with alternative cryptocurrencies that often sacrifice security and decentralization for features like faster transactions or smart contracts 12 .

Security Practices and Beliefs

  • Self-Custody: The principle of “Not your keys, not your coins” 9 remains a central cultural value, emphasizing the importance of individual sovereignty and security through control of one’s own private keys.
  • Security Setups: A user shared their experience of moving from a 2-of-3 multisig setup (using Ledger, Trezor, and Coldcard) back to a single-signature setup with a strong passphrase on a Coldcard 20 . The reasoning was that for an individual managing their own funds, the complexity of multisig can introduce more vectors for error, making a robust single-sig setup feel more secure and less “messy” 19 .
  • Trust in the Protocol: A discussion highlighted differing views on portfolio strategy. One user cited a lack of complete trust in the protocol as a reason for diversification 18 , while another argued that if Bitcoin remains secure and decentralized, it is incorruptible money that negates the need to diversify 17 .