Bitcoin Takeover Podcast

Vlad Costea
undefined
Aug 6, 2025 • 1h 39min

S16 E37: Andrew Poelstra on Simplicity, Bitcoin Smart Contracts & Upgrades

Simplicity, a scripting language so simple that it can fit on a t-shirt, has finally launched on Liquid after a decade of development. Andrew Poelstra, who works as director of research at Blockstream, explains how it works & why it's good for Bitcoin. Time stamps: (00:00:50) Introducing Andrew Poelstra (00:01:45) Simplicity: Now Live on Liquid (00:02:12) Elements and Liquid’s Technical Evolution (00:03:09) Is Simplicity a Response to Solidity? (00:05:40) Simplicity’s Programming Model & Rust Inspiration (00:08:04) Demo Applications and Simplicity Playground (00:10:03) Why Not Stick with Bitcoin Script? (00:11:48) Bitcoin Script’s Limitations and Quirks (00:19:14) Simplicity’s Capabilities: Computation & Covenants (00:22:26) Formal Verification and Multi-Language Implementations (00:25:21) Machine-Checkable Proofs and Contract Safety (00:29:07) Covenants, OP_CAT, and Script Extension Fears (00:33:26) Simplicity as a Future Script Extension Path (00:34:31) Ethereum’s Design Mistakes & Simplicity’s Approach (00:53:00) Simplicity’s Lateness and Ethereum’s Rise (01:01:12) Simplicity’s Usability and Adoption Challenges (01:04:18) Potential Use Cases for Simplicity: Vaults, Business Logic, Quantum Signatures (01:08:06) Wallets and Simplicity Integration (01:16:30) Simplicity vs. Soft Forks for New Opcodes (01:19:01) Jets: Optimizing Simplicity with Native Code (01:22:44) Collider Script and High-Cost Emulation (01:24:44) Resource Limits and Transaction Size (01:29:34) Non-Scammy, Technologically Interesting Altcoins: Monero, Zcash, Grin, and Sia (01:33:14) Where to Learn More About Simplicity
undefined
Aug 1, 2025 • 1h 58min

S16 E36: Maud Bannwart & Cheng Wang on Alephium, Proof of Less Work & Bitcoin

Alephium is one of the most interesting Proof of Work projects, which aims to build secure smart contracts & fast DeFi on a mineable base layer which minimizes electricity consumption. Maud Bannwart & Cheng Wang explain how all of this works. Time stamps: 00:00:53 – Introducing Cheng & Maud 00:02:06 – Alephium's Origins & Motivation Cheng explains the technical challenge of blockchain scalability and the project's evolution from sharding to DeFi. 00:04:36 – Choosing UTXO vs. Account Model Why Alephium uses the UTXO model for assets and account model for application state, combining both for scalability. 00:09:50 – Privacy and UTXO Model Advantages of UTXO for privacy and scalability, and how it enables advanced privacy features. 00:11:03 – Blockchain Scalability & Parallelization Cheng details Alephium’s approach to scaling via parallel blockchains, sharding, and optimizing block times. 00:14:41 – Decentralization vs. Shard Coordination Balancing decentralization and coordination in sharded blockchains, and how Alephium’s block flow algorithm works. 00:17:31 – DAG Structure Explanation Explanation of DAG (Directed Acyclic Graph) and its benefits for transaction management and scalability. 00:19:44 – Shard Synchronization & Security Handling shard failures, synchronization, and ensuring security with proof of work and honest hashrate. 00:21:09 – Block Time, Decentralization & Node Requirements Trade-offs of faster block times, decentralization, and hardware requirements for running Alephium nodes. 00:25:22 – Blockchain Pruning & Storage Current state of blockchain storage, pruning, and why further optimization is not a priority. 00:27:13 – ASICs and Mining History Arrival of ASIC miners, mining history, and the impact on the Alephium network. 00:29:33 – Taproot & Smart Contracting Why Alephium chose taproot, its use for scripting, and differences from Ethereum’s approach. 00:33:05 – Proof of Work vs. Proof of Stake Rationale for choosing proof of work, ASIC-friendliness, and the benefits for decentralization and security. 00:37:45 – Technical Advantages of Proof of Work How proof of work simplifies sharding, increases performance, and reduces network complexity. 00:39:56 – DeFi on Proof of Work Addressing claims that DeFi requires proof of stake, and Alephium’s block time and throughput. 00:42:09 – Value of Proof of Work & Community Discussion on the value of proof of work, community importance, and Ethereum’s transition to proof of stake. 00:44:56 – Pre-mine & Project Funding Explanation of Alephium’s pre-mine, funding model, and transparency in initial allocations. 00:50:41 – Transparency & Genesis Block Details on public visibility of genesis allocations and proof of no hidden pre-mine. 00:54:11 – Proof of Less Work Mechanism Introduction and explanation of "proof of less work," reducing energy use by combining proof of work and proof of burn. 01:00:16 – Environmental Criticism & Value Proposition Addressing environmental concerns, mining’s evolving perception, and the necessity of cost in money creation. 01:04:01 – Alephium’s Unique Value & Comparison Alephium’s unique features: smart contracts on proof of work, UTXO security, and differences from Cardano/Ethereum Classic. 01:07:39 – Developer Experience & EVM Compatibility Ease of transitioning from EVM, Alephium’s developer-friendly environment, and challenges with industry standards. 01:14:11 – Alephium Virtual Machine & Language Alephium’s programming language inspired by Rust, Scala, and Solidity, designed for security and ease of use. 01:19:04 – Ecosystem & DApps Overview of existing DApps, third-party development, and ecosystem growth on Alephium. 01:22:16 – Killer App & Platform Potential Discussion on the search for Alephium’s killer app and its potential as a generic platform. 01:23:37 – Danube Hard Fork & Optimizations Faster blocks, better scalability, and user/developer experience improvements. 01:26:25 – Mining Accessibility & Hardware Mining requirements, ASIC recommendations, and the end of GPU mining profitability. 01:29:10 – Hashrate Growth & NiceHash 01:31:56 – Price & Market Position 01:35:19 – Lessons for Bitcoin & Future-Proofing 01:38:56 – Tokenized Bitcoin & UTXO Benefits 01:43:25 – Privacy, Rollups, and Future Features 01:51:11 – Getting Started with Alephium Wallets, documentation, and running a node. 01:53:08 – Upgrade Naming & Community 01:53:43 – Final Thoughts & Contact
undefined
Jul 24, 2025 • 1h 24min

S16 E35: Hunter Beast on Bitcoin's Quantum Resistance & BIP 360

Hunter Beast is the author of BIP 360: a proposal that seeks to provide quantum resistance to Bitcoin, to prevent powerful computer builders from brute forcing arbitrary addresses to steal the funds. But is the quantum threat real? Does the number of qubits really make a difference when the quantum computer is general purpose? Shouldn't other industries outside of Bitcoin, especially governments and banks, be worried about the fragility of elliptic curve cryptography? In this episode, we'll try to answer some of these questions and also refer to Hunter Beast's previous experience with building RGB for Bitcoin tokens. ––––––––––––––––––––––––––– Time stamps: 01:08 - Introducing Hunter Beast 01:27 - BIP 360 and Quantum Resistance Hunter Beast introduces BIP 360, aimed at making Bitcoin resistant to quantum computing threats, a hot topic due to predictions of advanced quantum computers potentially breaking ECDSA signatures. 02:19 - Defining Bitcoin's Quantum Threat Quantum computing is institutional, not accessible to average Bitcoiners, making verification difficult. The threat is existential but not immediate, though warnings suggest proximity. 03:58 - U.S. Government Warnings U.S. government and institutions are preparing for quantum resistance by 2030, urging upgrades to protect against potential cryptographic breaks. 05:53 - Consensus Challenges Hard forks ensure UTXO migration but face consensus issues; soft forks are preferred, but coins must move to quantum-resistant addresses to avoid vulnerabilities. 06:38 - Bitcoin’s Quantum Vulnerabilities Taproot, reused addresses, mempool-published data, and exposed public keys are vulnerable. ~90% of reused address coins are active, reducing concern, but Taproot needs upgrades. 09:41 - BIP 360 Solution for Taproot BIP 360 focuses narrowly on fixing Taproot’s vulnerability to long-exposure attacks, enabling wallets to commit to multiple scripts, including quantum-resistant ones like SLHDSA. 13:07 - Signature Schemes ECDSA is Bitcoin’s weak point. Lamport and Winternitz signatures are flawed (one-time use), but SLHDSA (using a hypertree of Winternitz signatures) allows secure address reuse. 17:10 - User Experience Impact BIP 360 minimizes changes to user experience, offering opt-in quantum-resistant scripts. Wallets could include security dials, but defaults remain familiar. 20:14 - Transaction Size and Costs Post-quantum signatures are larger (4-8k bytes), but address commitments are minimal (~34 bytes). Block size increases aren’t necessary; solutions like Bitzip could scale transactions. 22:27 – Sideshift.ai 23:17 - Drivechains and Layer Two Labs Drivechains offer secure sidechain solutions, decentralizing custody and scaling Bitcoin. Testing is available on Signet, with Litecoin considering implementation. 29:48 - Bitcoin Ossification Debate Ossification (resistance to change) vs. necessary upgrades debated. Quantum threats may force changes as Bitcoin secures more value, despite opposition. 36:36 - Conspiracy Theory Counter Concerns about government-driven fear dismissed; BIP 360 is opt-in, only used if quantum threats emerge, preserving user choice. 54:26 - Quantum Computing Progress IBM’s Condor has 1,121 qubits; breaking ECDSA needs ~20M qubits. With quantum advancements outpacing Moore’s Law, upgrades are prudent within a decade. 59:58 - Sponsor Plugs Citrea (ZK rollup for Bitcoin financial apps) and Edge Wallet (duress mode, multi-coin support) highlighted. 01:02:30 - BIP 360 Number Selection BIP 360 assigned by reviewers, not chosen by Hunterbeast, reserved for quantum-related proposals. 01:06:04 - BIP 360 Reception from Core Devs Mixed feedback from reviewers like Ava Chow (called it “stupid” but provided useful critique). Still in draft at bip360.org, open for review. 01:11:29 - Unintended Consequences BIP 360 is minimal, unlikely to cause surprises like Taproot’s ordinal inscriptions, as it enhances existing functionality. 01:12:42 - Is Quantum Resistance Perishable and Needs Updates? BIP 360 isn’t definitive; periodic updates may be needed as quantum computers advance, requiring a proactive Bitcoin culture. 01:19:12 - NoOnes, Bitcoin.com, 01:21:46 - Best Practices for Quantum Safety Avoid address reuse, use native SegWit (BC1Q) addresses, don’t expose Xpubs, and consider private mempools like MARA Slipstream for large transactions. 01:24:27 - Closing Remarks Gratitude to Hunter Beast for discussing BIP 360 and quantum threats, wishing success for the proposal.
undefined
Jul 20, 2025 • 1h 58min

S16 E34: Prof. Richard Werner on Bitcoin, CBDCs & The Big Beautiful Bill

Prof. Richard Werner, one of the world's most famous economists, is best known for writing "Princes of the Yen" and penning the term "quantitative easing" in the 1990s while working at the Bank of Japan. Today, he is a big advocate for small local banks and a believer in the power of Bitcoin. In this episode, he talks about recent events in economics, ranging from the Big Beautiful Bill in the US and all the way to CBDCs and Bitcoin's viability to bring more economic freedom to the world. –––––––––––––––––––––– Time stamps: 00:00 - Introducing Professor Richard Werner, author of Princes of the Yen and originator of quantitative easing 01:27 - Sponsorships: Sideshift.ai, Citrea, LayerTwo Labs, Bitcoin.com News, NoOnes.com, and Edge Wallet. 02:07 - Big Beautiful Bill & Fiscal Policy: Discussion on the U.S. "Big Beautiful Bill" under Trump, increasing government spending despite promises to cut debt. Werner clarifies fiscal policy isn't direct money printing, using Japan’s experience as an example where massive spending didn’t cause inflation or growth due to lack of monetization. 05:06 - Monetization Concerns: Concerns about monetizing fiscal policy in the U.S., with Trump’s team encouraging banks to buy treasuries, potentially leading to inflation (8:39). The Federal Reserve’s role in possibly counteracting this is uncertain (9:46). 11:42 - Interest Rates & Quantitative Policy: Werner critiques the focus on interest rates, arguing quantitative policy (credit creation) is the real driver. Interest rates follow growth, not vice versa. 17:52 - Tariffs & Trade Policy: Trump’s return to tariffs (e.g., 30% on EU) is discussed. Werner supports tariffs for economic development, citing historical success and criticizing Ricardo’s free trade theory for ignoring terms of trade (19:24). Smart tariffs should encourage high-value exports and raw material imports (36:05). 44:07 - Austrian Economics Critique: Werner criticizes guru-driven economics, including Austrian school, for dismissing data. He emphasizes empirical, fact-based analysis over ideological axioms (45:58). 49:51 - Argentina & Mainstream Economics: Werner discusses Argentina’s free-market shift under Milei, critiquing mainstream economists like Krugman for often being wrong. Balanced budgets are preferred over debt-heavy policies (51:03). 1:08:58 - Central Bank Digital Currencies (CBDCs): Werner sees no upside to CBDCs, calling them a tool for centralized control. They enable tracking and restricting spending, unlike existing digital currencies (1:13:25). China’s cautious CBDC approach is noted, but Western central banks are distrusted (1:15:22). 1:16:51 - Stopping CBDCs: Strategies to oppose CBDCs include increasing cash use, adopting decentralized cryptocurrencies like Bitcoin, and public demonstrations against central banks (1:18:38). 1:20:40 - Stablecoins: Werner views stablecoins like Tether as a potential backdoor for central banks (Plan B) to achieve CBDC-like control, with a stealthier Plan C involving corporate digital reporting (1:23:04). 1:30:22 - EU’s Dictatorial Structure: Werner criticizes the EU’s undemocratic structure, comparing it to the Soviet Union. The European Commission’s power and corruption (e.g., vaccine deals) are highlighted (1:31:22). 1:40:38 - Bitcoin’s Role: Werner doubts a purely deflationary currency like Bitcoin can sustain an economy without credit creation. He suggests small banks using Bitcoin for credit to enable growth (1:41:40). Bitcoin’s shift to a store of value increases risks of a “death switch” (1:47:45). 1:44:42 - Bitcoin Price Prediction: Werner predicts Bitcoin reaching ~$995,000, driven by momentum and institutional adoption, but cautions about risks like an EMP or coded vulnerabilities (1:45:24). 1:52:22 - Bitcoin as Currency: Using Bitcoin for transactions rather than just a store of value could reduce risks and enhance longevity. Werner plans to integrate crypto in his Swiss bank project (1:53:40). 1:55:04 - Closing & Promotions: Werner promotes his Swiss Rhyntal bank project, Substack (rwerner.substack.com), and YouTube channel (Werner Economics).
undefined
Jul 9, 2025 • 1h 29min

S16 E33: Liz Steininger on Least Authority & Auditing Open Source Software

Liz Steininger is the CEO of Least Authority: a company which specializes in auditing open source software since 2014. Originally founded by Zooko Wilcox, Least Authority has conducted more than 100 security audits in the space. Some of the best known contractors who requested an expert review include the Ethereum Foundation, the Electric Coin Company, Metamask, the KeyStone hardware wallet, and Avalanche. Least Authority also builds products that make use of Zero Knowledge Proofs: PrivateStorage (a cloud storage system that's designed to make the host unaware of the files being stored), ZKAPs (Zero Knowledge Access Passes, an authorization system that separates the payer from the data on the items being bought), and Winden (a file-sharing service that's encrypted and requires no identity from the sender and receiver). In a space which often defers to "check the code, it's open source", companies such as Least Authority offer high quality verification which makes it easier for the average non-technical person to trust that something is safe. Also, it helps builder have the peace of mind that what they're working on will not bring any unforeseen consequences. Time stamps: 00:00 - Intro and Sponsor Mentions 
Introduction to the podcast and sponsors: Sideshift, Bitcoin.com News, EdgeWallet, LayerTwo Labs, Citrea, NoOnes.com, and HODLING.ch. 01:17 - Guest Introduction: Liz Steininger 
Liz Steininger, CEO of Least Authority, is introduced. Discussion begins about the company’s focus on security, privacy, and auditing in the crypto space. 1:57 - Irony of "Least Authority" Having a CEO 
Liz addresses the irony of a company named Least Authority having a CEO, explaining their non-hierarchical approach and balance of leadership. 03:04 - Least Authority Philosophy and Nick Szabo’s Influence 
Discussion on the principle of least authority, referencing Nick Szabo’s 2005 paper and its connection to Zooko, founder of Least Authority. 05:19 - Liz’s Tech Background 
Liz shares her journey into tech, from early internet experiences to open-source and privacy-focused technologies. 09:36 - Role of Auditing Firms in Open-Source 
Exploration of why auditing firms like Least Authority are necessary despite open-source code being publicly verifiable. 11:45 - Surprising Audit Findings 
Liz discusses instances where Least Authority found unexpected issues during audits and the value of helping clients fix them. 12:16 - Notable Clients and Audits 
Overview of Least Authority’s clients, including Zcash, MetaMask, Ethereum Foundation, Filecoin, Polygon, and Keystone hardware wallet. 14:35 - Predicting the Ethereum DAO Hack 
Liz reflects on Least Authority’s 2015 Ethereum audit, which identified vulnerabilities that later contributed to the 2016 DAO hack. 17:43 - When to Conduct Audits 
Discussion on the optimal timing for audits, depending on project roadmaps and feature development. 19:51 - Auditor Liability and Security Guarantees 
Liz explains that no system can be 100% secure and discusses the limitations of auditor liability. 22:25 - Social Engineering and Security 
Exploration of how social engineering can bypass even the most secure systems, with examples like SIM swapping and Pfizer leaks. 29:55 - Least Authority’s Products: Private Storage, ZKAPs, Winden 
Overview of Least Authority’s products: Private Storage (client-side encrypted storage), ZKAPs (zero-knowledge access passes), and Winden (anonymous file transfer). 36:45 - ZKAPs Applications Beyond Storage 
Liz discusses potential uses of ZKAPs for other services requiring privacy in payments, like VPNs or electricity. 43:53 - Winden’s Features and Use Cases 
Detailed explanation of Winden’s end-to-end encrypted, identity-free file transfer, ideal for secure peer-to-peer sharing. 46:21 - Destiny: Mobile Version of Winden 
Introduction to Destiny, a mobile app version of Winden using the same magic wormhole protocol. 50:00 - HRO Cloud for Human Rights Organizations 
Discussion of HRO Cloud, a free version of Private Storage for qualified human rights organizations. 51:00 - Moon Math Manual 
Overview of the Moon Math Manual, a resource for learning about ZK-SNARKs, inspired by the term “moon math” from Vitalik Buterin. 57:38 - Privacy, Law Enforcement, and Zero-Knowledge Proofs 
Liz discusses how Least Authority minimizes data collection to avoid sharing with law enforcement, emphasizing privacy design. 1:01:59 - Privacy Market and Big Tech Adoption 
Reflections on the growing demand for privacy tech and potential adoption of zero-knowledge proofs by major tech companies. 1:05:00 - Auditing Non-Crypto Projects 
Liz notes that while most clients are crypto-related, they also audit non-crypto open-source projects, though funding is a challenge. 1:07:17 - Vibe Coding and Auditing Demand 
Discussion on the rise of vibe coding (AI-generated code) and its potential to increase demand for audits, especially for smart contracts. 1:11:07 - Zcash Audit and Bitcoin Codebase 
Liz considers whether their Zcash audit indirectly audited Bitcoin’s codebase, noting it’s an interesting question for further review. 1:13:05 - Publishing Audit Reports 
Liz advocates for more industry-wide publication of audit reports to improve transparency and user education. 1:18:01 - Competing Auditing Firms 
Liz discusses competition in the auditing space, varying by project type (e.g., smart contracts vs. protocols). 1:21:12 - Future of Privacy and Zcash Integration 
Liz expresses hope for Zcash’s privacy tech to be integrated into Bitcoin, emphasizing its potential to drive mass adoption. 1:24:00 - Liz’s First Computer and Early Tech Memories 
Liz shares nostalgic memories of using an Atari, Commodore 64, and AOL, encouraging listeners to comment “AOL” to prove they watched to the end. 1:28:37 - Closing and Winden Recommendation 
Liz thanks the host and encourages listeners to try Winden, an open-source, free file transfer tool.
undefined
Jul 3, 2025 • 5h 8min

S16 E32: Bitcoin vs Monero vs Zcash Privacy with Diego Salazar & Luke Szramowski of Cypher Stack

Diego Salazar & Luke Szramowski are working to build Cypher Space: a privacy & sovereignty company. In this episode, they compare + rate the privacy of Bitcoin, Monero, Zcash, Firo, Mimble Wimble (Litecoin, Grin), Zano & Beam. Time stamps: (00:00:59) Introducing Diego Salazar & Luke Szramowski (00:02:04) Tribalism and Privacy Protocols in Crypto (00:03:55) Why Privacy Matters & Personal Motivations (00:04:58) Diego’s Background and Cypher Stack (00:06:58) Luke’s Background and Mathematical Perspective (00:08:40) CoinJoin and the Limits of Bitcoin Privacy (00:09:10) Threat Models and Privacy Tool Selection (00:12:22) CoinJoin’s Effectiveness and Metadata Attacks (00:14:18) Comparing CoinJoin to Tor/VPN Usage (00:17:26) Overconfidence and Under-Researched Privacy Claims (00:19:52) Levels of Privacy and User Education (00:24:31) Defining Adversaries in Privacy Research (00:26:10) CoinJoin’s Real-World Threats and Research Gaps (00:27:17) Social Media, Nuance, and Privacy Debates (00:29:11) CoinJoin as “Add-On” Privacy and Side-Channel Attacks (00:31:46) Underestimating Adversaries and Attack Tools (00:38:37) Sponsor Plugs and Criteria for Privacy Evaluation (00:42:47) Scoring CoinJoin on Privacy Criteria (00:51:09) WabiSabi and Wasabi Wallet Improvements (00:59:29) Other Bitcoin Privacy Tools: BIP47 & Silent Payments (01:06:19) Human Error and Privacy Tool Usability (01:08:51) The Limits of Privacy Ratings and the Need for Nuance (01:12:19) Tribalism, Community Research, and Productive Debate (01:15:33) Non-Interactive Proofs and Security Assumptions (01:16:27) Bitcoin Maximalism and the Limits of Debate (01:17:34) Academic Rigor and the Need for More Research (01:20:01) Bitcoin’s Privacy Risks if Mainstream Adoption Happens (01:21:44) The State of Bitcoin Privacy Research and Funding (01:34:03) Bitcoin’s Missed Privacy Opportunities (01:37:14) Monero’s History and Privacy Technologies (01:41:03) Monero’s Anonymity Set and Privacy Trade-Offs (01:46:52) Monero’s Current Weaknesses and Upcoming FCMP (01:55:24) Monero’s Privacy Scores and Scalability (02:27:50) Zcash: History, Community, and Technology (03:00:29) Zcash’s Privacy Model and Accumulator Approach (03:05:56) Zero-Knowledge Proofs Explained (03:20:08) Zcash’s Privacy Scores and Tachyon Scalability (03:35:12) Firo (formerly Zcoin) and Spark Protocol (03:44:45) Firo’s Privacy Scores and Future Upgrades (03:52:06) Litecoin MWEB and Mimblewimble (04:01:32) MWEB Privacy Scores and Limitations (04:07:03) Other Privacy Projects: Zano, Beam, Salvium (04:10:02) Toxicity, Community, and the Human Element (04:17:00) Philosophy of Privacy and Human Nature (04:24:28) Fungibility, Bitcoin, and Social Realities (04:44:15) Summary and Chart of Privacy Scores (04:57:52) Resources for Privacy Research and Final Thoughts
undefined
Jun 27, 2025 • 3h 23min

S16 E31: Andrew Camilleri ”Kukks” on Ark, BTCPay Server & Open Source Bitcoin Software

Andrew Camilleri, known as Kukks, is a key contributor to BTCPay Server and is currently building Bitcoin Layer 2 applications at Ark Labs. He discusses the innovative ARK framework that enhances Bitcoin's transaction efficiency and user experience. The conversation dives into privacy solutions integrated with BTCpay, the significance of off-chain transactions, and the challenges of regulatory compliance. Kukks emphasizes the importance of community collaboration while exploring future advancements in cryptocurrency, particularly in scaling and usability.
undefined
Jun 14, 2025 • 5h 24min

S16 E30: Peter Rizun on Scaling Bitcoin with Hardware

Peter Rizun is the chief scientist at Bitcoin Unlimited: a software client that aims to scale Bitcoin with big blocks, while also empowering regular users to run nodes. In this episode, we talk about what went wrong during the block size wars & his research in scaling hardware. Time stamps: 00:01:15 — Introducing Peter Rizun 00:03:32 — Early Block Size Debates and Satoshi’s Vision 00:07:45 — Block Size Limit History and Miner Soft Limits 00:10:10 — Dan Kaminsky’s 2011 Scaling Predictions 00:12:01 — Scaling Philosophy: Zero, One, Infinity and Earth-Scale 00:15:09 — Block Size Wars, Chain Splits, and Altcoin Proliferation 00:16:43 — Stablecoins, Lightning, and Bitcoin’s Use Case 00:19:03 — Zcash, Ethereum, and Bitcoin’s Missed Opportunities 00:22:11 — Bitcoin’s Script Limitations and Smart Contract Innovation 00:25:10 — Scaling Limits: Hardware, Storage, and Bandwidth 00:35:31 — Node Software, Formal Specs, and Core’s Dominance 00:44:00 — Censorship, Reddit, and the Block Size Debate 00:48:04 — SPV Nodes, Custodial Wallets, and Decentralization 00:51:30 — Block Size, Internet Speed, and Global Node Access 00:57:26 — UTXO Model, Dust, and State Management 01:01:37 — Ethereum, Zcash, and Node Benchmarking 01:03:26 — Hardware Acceleration and Specialized Chips 01:07:00 — Sponsorship Break and Bitcoin Adoption via Debit Cards 01:14:59 — History of Block Size Proposals and Client Forks 01:21:07 — Consensus, Forks, and the Role of Exchanges 01:25:40 — SegWit, SegWit2x, and Political Compromises 01:33:04 — Bitcoin Cash, Market Dynamics, and Altcoin Competition 01:39:34 — Stablecoin Fees, Global Demand, and El Salvador 01:46:52 — Decline of Bitcoin Payments and Missed Opportunities 02:10:56 — Lightning Network: Promise vs. Reality 02:22:12 — Shitcoin vs. Bitcoin Maximalism and Open Source Innovation 03:05:52 — Spam, Miner Policy, and Transaction Filtering 03:17:05 — Hardware Scaling: M.2 Accelerator and Node Commoditization 03:29:11 — Nexa: Experimenting with Proof-of-Work and Node Bottlenecks 03:37:44 — Craig Wright, Satoshi Identity, and Big Block Movement Damage 04:02:03 — Fork Proliferation, Community Division, and Stablecoins 04:04:31 — Bitcoin’s Future, Experimentation, and Open Research
undefined
Jun 4, 2025 • 6h 7min

S16 E29: Zooko on Ecash, Bitcoin & Zcash

Zooko has been thinking about building decentralized Chaumian ecash since the mid 1990s. When Bitcoin came out, he was the first cypherpunk to write a blog post about it. And today, he's honoring Satoshi's last wish of researching ZK proofs with Zcash. Time stamps: Introducing Zooko (00:00:55) Early Cypherpunk and Digital Cash Days (00:03:18) Cypherpunk vs. Cryptography Mailing List (00:03:52) Discovering Digital Cash and Chaum’s Blind Signing (00:04:44) The Internet, BBS, and the Fall of the Berlin Wall (00:09:10) Growing Up with Technology in Eastern Europe (00:12:04) First Computers and Early Programming (00:13:02) Loading Games and Computer Limitations (00:14:05) Impact of Tariffs and Internet Access (00:16:47) Economies of Scale and Computer Conferences (00:18:28) Social Media, Privacy, and Information Overload (00:19:33) Twitter Blocking & Echo Chambers (00:21:06) Personal AI and Information Control (00:24:08) First Computer Memories and Speech Synthesis (00:28:55) Programming Languages: BASIC, Pascal, and C++ (00:31:15) Vocoder Technology and Privacy (00:32:27) Video Games and University Life (00:34:28) Science Fiction and Cypherpunk Literature (00:36:10) Working at DigiCash and Early Digital Currency (00:39:04) Nick Szabo, Social Scalability, and Economic Thought (00:46:27) AI-Generated Personas and Real-Life Community (00:52:42) Global Talent, Work Ethic, and Financial Management (00:55:51) David Chaum as a Boss and DigiCash’s Downfall (01:00:06) Decentralizing Ecash and Early Bitcoin Attempts (01:04:50) Wei Dai, Crypto++ and Peer-to-Peer Innovation (01:06:19) Open Source Maintenance and Funding Challenges (01:10:00) Why Digital Cash Mattered in the 1990s (01:12:30) Cypherpunks, Remailers, and Privacy Motivation (01:13:46) Bitcoin’s Early Days and Zooko’s Initial Skepticism (01:19:55) Bitcoin Advocacy and Security Flaws (01:39:07) Zooko’s Triangle and Naming Systems (01:43:31) Altcoins, Experimentation, and Maximalism (01:51:09) Bitcoin’s 2013 Privacy Papers: ZeroCoin & ZeroCash (01:55:12) Funding Innovation and Open Source Economics (02:00:27) Zcash Launch, Sidechains, and Market Dynamics (02:03:40) Sponsors and Bitcoin Innovation Renaissance (02:09:01) Proof of Stake, Hybrid Models, and Cross Link (02:26:14) Network Sustainability and Burn Mechanisms (02:33:37) Quantum Resistance and Lost Coins (02:37:26) Peter Todd’s Compute Node, Zcash Ceremony and Trusted Setup (02:42:19) Zero Knowledge Proofs and Counterfeiting Bug (03:05:35) Zcash Design Choices and Block Size (03:43:04) Bitcoin Blocksize War and Evolution (03:49:09) Zcash vs. Monero and Privacy Models (04:27:33) Tachyon: Sean Bowe’s Scalable Privacy Breakthrough (04:08:22) Live Zcash Demo and Address Privacy (05:27:00) Zcash Mining, Liquidity, and DEX Integration (05:49:57) Decentralization, Transparency, and the Future (06:02:22) Closing Remarks and Podcast Wrap-Up (06:05:15)
undefined
May 31, 2025 • 1h 22min

S16 E28: Proof of Work Alliance with Charles Chong, Summer Meng & Spencer Yang

In a predominantly Proof of Stake world, The Proof of Work Alliance emerges as a champion of research & education among Proof of Work miners. Fractal Bitcoin's Charles Chong & Spencer Yang, plus Bitmars' ASIC Queen Summer Meng tell us how it all works. Time stamps: Introducing Charles, Summer & Spencer (00:00:50) Overview of the PoW Alliance (00:01:43) Challenges in Launching PoW Projects (00:02:32) Formation of the PoW Alliance (00:04:19) Importance of Collaboration (00:05:21) Significance of the PoW Alliance (00:06:48) Members of the PoW Alliance (00:08:26) Addressing Environmental Concerns (00:09:24) Renewable Energy in Bitcoin Mining (00:10:29) Electricity Usage Comparisons (00:12:37) AI and Bitcoin Mining Competition (00:15:21) Centralization vs. Decentralization in Alliances (00:20:55) Discussion on Risk and Collaboration (00:22:50) Analogy with Polling (00:23:44) Social Coordination in Bitcoin (00:24:15) ASIC Manufacturing Oligopoly (00:25:04) Challenges for New ASIC Manufacturers (00:26:55) Emerging Competitors in Mining (00:28:43) Mining's Capital Intensity (00:29:39) ASIC Resistance Debate (00:30:42) Economic Incentives in Mining (00:31:16) Proof of Work Alliance Benefits (00:32:38) Historical Context of Mining Innovations (00:33:50) Decentralization vs. Large Mining Pools (00:35:10) Impact of Economic and Social Factors (00:36:34) Innovation in Proof of Work (00:38:05) Challenges in Mining Innovation (00:40:30) Broader Ecosystem Innovations (00:41:11) Micro Innovations in Mining (00:42:15) Merge Mining Popularity (00:43:17) Proof of Stake Popularity (00:45:03) Validator Business Models (00:45:29) Alignment Issues in Mining (00:47:10) Blind Merged Mining Discussion (00:48:34) Risks of Drivechains (00:49:20) Concerns Over Block Rewards (00:52:14) Debate on OP_Return Function (00:54:19) Passion in Bitcoin Debates (00:56:20) Concerns About Ossification (01:00:04) Impact of Inscriptions on Miners (01:03:26) The Importance of Cross-Chain Integration (01:05:30) Challenges of Bitcoin Adoption (01:06:05) Gas Fees Comparison (01:07:12) Stablecoins in the Bitcoin Ecosystem (01:08:05) Celebrating Pizza Day (01:10:53) Fractal Bitcoin's Pizza Challenge (01:14:30) Reflections on Market Volatility (01:16:14) Joining the PoW Alliance (01:18:22) How to Contact Charles, Summer & Spencer (01:19:12) Closing Remarks and Future Announcements (01:20:42)

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app