
Sign up to save your podcasts
Or
Mark “Murch” Erhardt and Mike Schmidt are joined by Daniela Brozzoni and Naiyoma to discuss Newsletter #360.
News
● Fingerprinting nodes using `addr` messages (1:00)
● Does any software use `H` in descriptors? (29:36)
Selected Q&A from Bitcoin Stack Exchange
● Is there any way to block Bitcoin Knots nodes as my peers? (33:42)
● What does OP_CAT do with integers? (42:00)
● Async Block Relaying With Compact Block Relay (BIP152) (43:03)
● Why is attacker revenue in selfish mining disproportional to its hash-power? (52:47)
Releases and release candidates
● Bitcoin Core 28.2 (57:51)
Notable code and documentation changes
● Bitcoin Core #31981 (59:21)
● Eclair #3109 (1:00:48)
● LND #9950 (1:01:31)
● LDK #3868 (1:01:56)
● LDK #3873 (1:03:10)
● Libsecp256k1 #1678 (1:04:11)
● BIPs #1803 (1:06:21)
5
22 ratings
Mark “Murch” Erhardt and Mike Schmidt are joined by Daniela Brozzoni and Naiyoma to discuss Newsletter #360.
News
● Fingerprinting nodes using `addr` messages (1:00)
● Does any software use `H` in descriptors? (29:36)
Selected Q&A from Bitcoin Stack Exchange
● Is there any way to block Bitcoin Knots nodes as my peers? (33:42)
● What does OP_CAT do with integers? (42:00)
● Async Block Relaying With Compact Block Relay (BIP152) (43:03)
● Why is attacker revenue in selfish mining disproportional to its hash-power? (52:47)
Releases and release candidates
● Bitcoin Core 28.2 (57:51)
Notable code and documentation changes
● Bitcoin Core #31981 (59:21)
● Eclair #3109 (1:00:48)
● LND #9950 (1:01:31)
● LDK #3868 (1:01:56)
● LDK #3873 (1:03:10)
● Libsecp256k1 #1678 (1:04:11)
● BIPs #1803 (1:06:21)
765 Listeners
2,161 Listeners
426 Listeners
442 Listeners
410 Listeners
141 Listeners
287 Listeners
251 Listeners
178 Listeners
19 Listeners
82 Listeners
669 Listeners
119 Listeners
16 Listeners
35 Listeners