
Bitcoin Takeover Podcast
S16 E10: Eric Voskuil & John Carvalho on Bitcoin & Austrian Economics
Feb 26, 2025
08:21:14
In recent years, Bitcoin has undergone a major culture shift which promotes stagnation, complacency & simping to politicians over maximizing the utility of the money. Eric Voskuil & John Carvalho join the show to remind everyone what the mission really is.
State of Bitcoin - [00:01:17]
Bitcoin Maximalism - [00:01:32]
Bitcoin as a Ponzi Scheme - [00:02:27]
Transaction Fees - [00:04:57]
History of Bitcoin Tokens (Omni, Counterparty, Mastercoin)
Definition of Tokens - [00:08:01]
Custodial Problems with Tokens - [00:09:12]
Bitcoin and Fiat Money - [00:11:09]
Why Bitcoiners Talk About Money - [00:15:49]
Stateless Money - [00:17:44]
Austrian Economics and Bitcoin - [00:21:01]
Monetary Inflation vs. Price Inflation - [00:26:01]
Cantillon Effect - [00:29:00]
Dollar Inflation and Gold - [00:33:59]
Misunderstandings in the Bitcoin Community - [00:41:42]
Bitcoin Semantics - [00:43:21]
Bitcoin Divisibility - [01:00:13]
Bitcoin Deflation - [01:03:41]
Maxi Price and One Coin Assumption - [01:07:43]
Competition Between Monies - [01:13:42]
Scaling Bitcoin - [01:22:41]
Bitcoin for the Unbanked - [01:26:14]
Maximizing Throughput - [01:36:11]
Right to Fork - [01:45:45]
Running Old Bitcoin Versions - [01:51:35]
Bitcoin as Money vs. Credit - [01:56:26]
Settlement in Bitcoin - [02:07:45]
Peer-to-Peer Credit Systems - [02:14:47]
Fractional Reserve Banking - [02:26:32]
Bitkit Wallet and Spending vs. Saving - [02:36:13]
Block size increases and Bitcoin adoption - [03:00:00]
Scaling Bitcoin and transaction validation - [03:01:00]
Bitcoin overflowing into Litecoin and quantum resistance - [03:02:00]
Pruning historical data and exchange price - [03:03:00]
Lightning system complexity and Bitcoin's value proposition - [03:05:00]
Bitcoin as an investment and speculation - [03:07:00]
Optimizing Bitcoin throughput and developer motivations - [03:09:00]
Scaling Bitcoin and speculation - [03:11:00]
Shitcoins, scams, and Bitcoin's security model - [03:13:00]
Litecoin's extension blocks and Mimblewimble - [03:15:00]
Bitcoin's security and the legitimacy of altcoins - [03:17:00]
Shitcoins and Bitcoin's essential aspects - [03:19:00]
Majority hash power censorship and attacks - [03:21:00]
Bitcoin speculation and market dynamics - [03:23:00]
Michael Saylor's Bitcoin strategy and MicroStrategy's history - [03:26:00]
Saylor's Bitcoin investment and market manipulation - [03:29:00]
Saylor's stock sales and Bitcoin's future - [03:31:00]
Blockstream's accomplishments and the Chia project - [03:33:00]
Blockstream's influence and SegWit - [03:35:00]
Adam Back's influence and Blockstream's hype - [03:37:00]
Bitcoin Core's power and the need for competition - [03:39:00]
Initial block download performance and Bitcoin Core's architecture - [03:41:00]
UTXO store and Bitcoin Core's performance - [03:43:00]
Parallelism in Bitcoin Core and assumed UTXO - [03:45:00]
Initial block download time and Bitcoin Core's scalability - [03:47:00]
Monoculture in Bitcoin development and IBD performance - [03:49:00]
UTXO cache and shutdown time - [03:51:00]
Trust assumptions in Bitcoin Core and UTXO commitments - [03:53:00]
Bitcoin Core's halting problem and theoretical download limits - [03:55:00]
Sponsorships: Sideshift, LayerTwo Labs, Ciurea - [03:57:00]
Drivechains and ZK rollups - [04:02:00]
ZK rollups and liquidity on Ethereum - [04:04:00]
Drivechains and altcoins - [04:06:00]
Scaling Bitcoin and cultural taboos - [04:08:00]
Engineer-driven change and Monero's approach - [04:10:00]
Confidential transactionsL Zano & DarkFi - [04:12:00]
Fungibility and Bitcoin's metadata - [04:14:00]
Privacy, metadata, and state surveillance - [04:16:00]
Privacy, taint, and Bitcoin mixing - [04:18:00]
Bitcoin mixing and plausible deniability - [04:20:00]
Mining and company registration - [04:22:00]
Block reward and hash power - [04:24:00]
Privacy and mixing - [04:26:00]
Privacy in the Bitcoin whitepaper and zero-knowledge proofs - [04:28:00]
Dark Wallet and John Dillon - [04:30:00]
Dark Wallet and Li Bitcoin - [04:32:00]
Amir Taaki's projects and software development - [04:34:00]
Dark Wallet funding and developer costs - [04:36:00]
Libbitcoin's code size and developer salaries - [04:38:00]
John Dillon and Greg Maxwell - [04:40:00]
Opportunistic encryption and BIPs 151/152 - [04:42:00]
Dandelion and privacy - [04:44:00]
BIP 37 and Bloom filters - [04:46:00]
Consensus cleanup and the Time Warp bug - [04:48:00]
Merkle tree malleability and 64-byte transactions - [04:50:00]
64-byte transactions and SPV wallets - [04:52:00]
Coinbase transactions and malleability - [04:54:00]
Invalid block hashes and DoS vectors - [04:56:00]
Core bug and ban list overflow - [04:58:00]
Storing hashes of invalid blocks - [05:00:00]
DoS vectors and invalid blocks - [05:02:00]
Malleated Merkle trees and 64-byte transactions - [05:04:00]
64-byte transactions and Merkle tree malleability - [05:06:00]
Null points and malleated blocks - [05:08:00]
Redundant checks and the inflation soft fork - [05:10:00]
Op code separator and code complexity - [05:12:00]
Transaction order in a block - [05:14:00]
Forward references in blocks - [05:16:00]
Coinbase transaction rules - [05:18:00]
Time Warp bug and Litecoin support - [05:20:00]
Quadratic op roll bug - [05:22:00]
Stack implementation and op roll - [05:24:00]
Templatized stack and op roll optimization - [05:26:00]
Non-standard transactions and direct submission to miners - [05:28:00]
Mempool policy and DoS - [05:30:00]
Monoculture and competing implementations - [05:32:00]
Consensus cleanup and Berkeley DB - [05:34:00]
Code vs. consensus - [05:36:00]
Bitcoin Knots and Luke-jr - [05:38:00]
300 kilobyte node and Luke-jr's views - [05:40:00]
Bitcoin Knots and performance - [05:42:00]
Bitcoin Knots and censorship - [05:44:00]
Censorship and miner incentives - [05:46:00]
Censorship and hash power - [05:48:00]
Soft forks and censorship - [05:50:00]
Ordinals and covenants - [05:52:00]
RBF and zero-confirmation transactions - [05:54:00]
Double spending and merchant risk - [05:56:00]
First-seen mempool policy and RBF - [05:58:00]
Low-value transactions and RBF - [06:00:00]
Computational cost of actions - [06:00:15]
Building infrastructure and system disruption - [06:00:20]
Threat actors and economic disruption - [06:00:26]
Double spending detection and system control - [06:00:29]
Safety and manageability of zero comp transactions - [06:00:41]
Security of zero comp transactions - [06:00:51]
RBF (Replace-by-fee) and its relevance - [06:01:06]
Bitcoin's mempool and transaction handling - [06:01:25]
Mempool overflow and resource management - [06:02:08]
Transaction storage and mining - [06:02:45]
Miners' incentives and fee maximization - [06:03:07]
Mempool policy and DOS protection - [06:03:41]
Transaction validation and block context - [06:04:11]
Fee limits and DOS protection - [06:05:13]
Transaction sets, graph processing, and fee maximization - [06:06:24]
Mining empty blocks and hash rate - [06:07:34]
Replace-by-fee (RBF) and its purpose - [06:08:07]
Infrastructure and RBF - [06:09:14]
Transaction pool and conflict resolution - [06:09:44]
Disk space, fees, and DOS protection - [06:11:06]
Fee rates and DOS protection - [06:12:22]
Opt-in RBF and mempool full RBF - [06:13:45]
Intent flagging in transactions - [06:14:45]
Miners obeying user intent and system value - [06:17:06]
Socialized gain and individual expense - [06:18:17]
Service reliability and profitability - [06:19:06]
First-seen mempool policy - [06:19:37]
Mempool policy and implementation - [06:20:06]
User perspective on transaction priority - [06:21:14]
Mempool conflicts and double spending - [06:22:10]
CPFP (Child Pays for Parent) - [06:22:24]
Mempool management and fee rates - [06:24:30]
Mempool complexity and Peter Wuille's work - [06:25:54]
Memory and disk resource management - [06:27:37]
First-seen policy and miner profitability - [06:29:25]
Miners' preference for first-seen - [06:30:04]
Computational cost and fee optimization - [06:31:10]
Security, Cypherpunk mentality, and the state - [06:35:25]
Bitcoin's security model and censorship resistance - [06:41:02]
State censorship and fee increases - [06:43:00]
State's incentive to censor - [06:46:15]
Lightning Network and regulation - [06:48:41]
NGU (Number Go Up) and deference to the state - [06:51:10]
Reasons for discussing Bitcoin's security model - [06:53:25]
Bitcoin's potential subversion and resilience - [06:55:50]
Lightning Network subsidies and scaling - [06:57:36]
Mining protocols and security - [07:02:02]
Braidpool and centralized mining - [07:04:44]
Compact blocks and latency reduction - [07:07:23]
Orphan rates and mining centralization - [07:08:16]
Privacy and threat environments - [07:08:40]
Social graphs, reputation, and identity - [07:10:23]
Social scalability and Bitcoin - [07:12:36]
Individual empowerment and anonymity - [07:16:48]
Trust in society and the role of the state - [07:18:01]
Payment methods and trust - [07:20:15]
Credit reporting agencies and regulation - [07:22:17]
Hardware wallets and self-custody - [07:23:46]
Security vulnerabilities in Ledger - [07:27:14]
Disclosure of secrets on Ledger devices - [07:36:27]
Compromised machines and hardware wallets - [07:42:00]
Methods for transferring signed transactions - [07:48:25]
Threat scenarios and hardware wallet security - [07:50:47]
Hardware wallet usage and personal comfort - [07:56:40]
Coldcard wallets and user experience - [08:02:23]
Security issues in the VX project - [08:03:25]
Seed generation and hardware randomness - [08:12:05]
Mastering Bitcoin and random number generation - [08:17:41]
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.