Skip to content

Conversation

@bitschmidty
Copy link
Contributor

@bitschmidty bitschmidty commented Dec 2, 2025

  • Stratum v2 - location TBD - @stickies-v

  • Splicing @Gustavojfe we dont have a news item on this but based on notable code merges I think we can add splicing as an item under one of the months. Maybe you can take a look on when merges happened for different implementations, BOLT, etc and we can add splicing to one of the months as an item?

  • Major releases of popular infrastructure projects callout - @Gustavojfe (see previous year in reviews)

  • Bitcoin Optech callout - @bitschmidty (see previous year in reviews)

  • Vulnerabilities callout - @Gustavojfe

  • Deanonymization attacks against centralized coinjoin
  • Vulnerability in LDK claim processing
  • Investigating mining pool behavior before fixing a Bitcoin Core bug
  • Replacement cycling attacks with miner exploitation
  • Channel force closure vulnerability in LDK
  • Disclosure of fixed LND vulnerability allowing theft
  • BIP30 consensus failure vulnerability
  • Vulnerability disclosure affecting old versions of Bitcoin Core
  • LND gossip filter DoS vulnerability
  • Eclair vulnerability
  • Disclosure of four low-severity vulnerabilities in Bitcoin Core
  • Consensus bug in NBitcoin library
  • Quantum callout
  • Quantum computer upgrade path
  • Update on BIP360 pay-to-quantum-resistant-hash (P2QRH)
  • Multiple discussions about quantum computer theft and resistance
  • Quantum computing report
  • OP_CAT enables Winternitz signatures
  • Commit/reveal function for post-quantum recovery
  • Research indicates common Bitcoin primitives are compatible with quantum-resistant signature algorithms
  • Migration from quantum-vulnerable outputs
  • Security against quantum computers with taproot as a commitment scheme
  • Post-quantum signature aggregation
  • SLH-DSA (SPHINCS) post-quantum signature optimizations
  • CTV
    • CTV enhancement opcodes
    • Multiple discussions about a CTV+CSFS soft fork
    • Description of benefits to BitVM from OP_CTV and OP_CSFS
    • CTV+CSFS advantages for PTLCs
    • Continued discussion about CTV+CSFS advantages for BitVM
    • Open letter about CTV and CSFS
    • Taproot-native OP_TEMPLATEHASH proposal
    • LNHANCE soft fork
  • Consensus Cleanup
    • Consensus cleanup timewarp grace period
    • Updates to cleanup soft fork proposal
    • Draft BIP published for consensus cleanup
    • BIP54 implementation and test vectors
  • Transitory soft forks for cleanup soft forks
  • OP_CHECKCONTRACTVERIFY semantics
  • Proposed BIP for 64-bit arithmetic in Script
  • Transaction weight limit with exception to prevent confiscation
  • OP_TXHASH variant with support for transaction sponsorship
  • Draft BIP for adding elliptic curve operations to tapscript
  • Draft BIP for OP_TWEAKADD
  • Draft BIPs for Script Restoration
  • Benchmarking the varops budget
  • Native STARK proof verification in Bitcoin Script

January

February

    • Tradeoffs in LN ephemeral anchor scripts
      • Continued discussion about ephemeral anchor scripts for LN
    • Probabilistic payments - @reardencode
      • Emulating OP_RAND
      • Continued discussion about probabilistic payments
      • Probabilistic payments using different hash functions as an xor function

March - @TumaBitcoiner

April

May

June

July

August

    • Lowering the minimum relay feerate - @murchandamus
      • Continued discussion about lowering the minimum relay feerate
      • Reference earlier Discussion about lowering the minimum transaction relay feerate
    • Peer block template sharing - @TumaBitcoiner
      • Peer block template sharing to mitigate problems with divergent mempool policies
      • Draft BIP for block template sharing
      • Continued discussion of block template sharing
    • Update on differential fuzzing of Bitcoin and LN implementations - @TumaBitcoiner

September

October

    • Theoretical limitations on embedding data in the UTXO set
    • Channel jamming mitigation simulation results and updates - @kevkevinpal

November

    • Comparing performance of ECDSA signature validation in OpenSSL vs. libsecp256k1 - @kevkevinpal
    • Multiple discussions about restricting data
    • Modeling stale rates by propagation delay and mining centralization - @kevkevinpal
    • BIP3 - @murchandamus
      • Updated proposal for updated BIP process
      • Motion to activate BIP3

December

    • A virtualized secure enclave for hardware signing devices

@bitschmidty bitschmidty self-assigned this Dec 2, 2025
@bitschmidty bitschmidty marked this pull request as draft December 2, 2025 15:24
@kevkevinpal
Copy link
Contributor

pushed
16c2591: topic: libsecp256k1 vs OpenSSL
and
53ca82d: topic: channel jamming updates

I might still need to edit them, but putting out a draft early, will look at "Erlay update" next

@stickies-v
Copy link
Collaborator

Just went through the past year's London BitDevs topics, a few that we covered that might be relevant to include? I'm aware my bias/focus is more on Core related stuff, definitely don't mean to nudge things more that way so feel free to leave out anything that's not high-enough signal of course. Consider this just an additional source of inspiration.


- **Erlay update:** Sergi Delgado made [several posts][erlay optech posts] over
the last year about his work and progress implementing [Erlay][erlay] for
Bitcoin Core. In the first post, he gave an overview on the Erlay proposal and
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Bitcoin Core. In the first post, he gave an overview on the Erlay proposal and
Bitcoin Core. In the first post, he gave an overview of the Erlay proposal and

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

updated in 63b9e37

Comment on lines 94 to 95
[filtering based on transaction knowledge][erlay knowledge] not mattering as
much as expected. He also experimented with selecting [how many peers should
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
[filtering based on transaction knowledge][erlay knowledge] not mattering as
much as expected. He also experimented with selecting [how many peers should
[filtering based on transaction knowledge][erlay knowledge] not being as impactful as
expected. He also experimented with selecting [how many peers should

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

updated in 63b9e37

bandwidth savings with 8 outbound peers and 45% with 12 outbound peers, but
also found a 240% increase in latency. In his two other experiments, he
determined the [fanout rate based on how a transaction was
received][erlay transaction received] and [when to select canidate
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
received][erlay transaction received] and [when to select canidate
received][erlay transaction received] and [when to select candidate

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

updated in 63b9e37


{:#garbledlocks}
- **Garbled locks:** Robin Linus [posted][bitvm3 post] to Delving Bitcoin to announce a
significant reduction in the amount of onchain space required by [BitVM][topic acc]-style contracts. Based on an [idea][delbrag rubin] by Jeremy Rubin, the new approach leverages [Garbled Circuits][garbled circuits wiki], a new cryptographic primitive that makes onchain SNARK verification a thousand times more efficient with respect to BitVM2 implementation, at the cost of requiring a multi-terabyte offchain setup.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
significant reduction in the amount of onchain space required by [BitVM][topic acc]-style contracts. Based on an [idea][delbrag rubin] by Jeremy Rubin, the new approach leverages [Garbled Circuits][garbled circuits wiki], a new cryptographic primitive that makes onchain SNARK verification a thousand times more efficient with respect to BitVM2 implementation, at the cost of requiring a multi-terabyte offchain setup.
significant reduction in the amount of onchain space required by [BitVM][topic acc]-style contracts. Based on an [idea][delbrag rubin] by Jeremy Rubin, the new approach leverages [Garbled Circuits][garbled circuits wiki], a cryptographic primitive that makes onchain SNARK verification a thousand times more efficient than the BitVM2 implementation, at the cost of requiring a multi-terabyte offchain setup.

- **Garbled locks:** Robin Linus [posted][bitvm3 post] to Delving Bitcoin to announce a
significant reduction in the amount of onchain space required by [BitVM][topic acc]-style contracts. Based on an [idea][delbrag rubin] by Jeremy Rubin, the new approach leverages [Garbled Circuits][garbled circuits wiki], a new cryptographic primitive that makes onchain SNARK verification a thousand times more efficient with respect to BitVM2 implementation, at the cost of requiring a multi-terabyte offchain setup.

On the same topic, Liam Eagen [posted][eagen ml] to the Bitcoin-Dev mailing list about a [paper][eagen paper] he has written about a new mechanism for creating [accountable computing contracts][topic acc] based on Garbled Circuits, called Glock (Garbled Locks). While the approach is similar, Eagen's research is indipendent from Linus'. According to Eagen, Glock allows for a 550x reduction of onchain data compared to BitVM2.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
On the same topic, Liam Eagen [posted][eagen ml] to the Bitcoin-Dev mailing list about a [paper][eagen paper] he has written about a new mechanism for creating [accountable computing contracts][topic acc] based on Garbled Circuits, called Glock (Garbled Locks). While the approach is similar, Eagen's research is indipendent from Linus'. According to Eagen, Glock allows for a 550x reduction of onchain data compared to BitVM2.
On the same topic, Liam Eagen [posted][eagen ml] to the Bitcoin-Dev mailing list about a [paper][eagen paper] he has written about a new mechanism for creating [accountable computing contracts][topic acc] based on Garbled Circuits, called Glock (Garbled Locks). While the approach is similar, Eagen's research is independent from Linus'. According to Eagen, Glock allows for a 550x reduction of onchain data compared to BitVM2.

{:#channeljamming}

- **Channel jamming mitigation simulation results and updates:** Carla
Kirck-Cohen in collaboration with Clara Shikhelman and elnosh had updated the
Copy link
Collaborator

@LarryRuane LarryRuane Dec 10, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Kirck-Cohen in collaboration with Clara Shikhelman and elnosh had updated the
Kirk-Cohen, in collaboration with Clara Shikhelman and elnosh, had updated the

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

updated in 63b9e37

Kirck-Cohen in collaboration with Clara Shikhelman and elnosh had updated the
[lightning jamming simulation results][channel jamming results], and updates
to their reputation algorithm. The updates included reputation tracking for
outgoing channels, and resources being limited on incoming channels. With
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
outgoing channels, and resources being limited on incoming channels. With
outgoing channels, and tracking incoming channel resource limitations. With

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

updated in 63b9e37

Comment on lines 243 to 244
improvements over the decade and if so did libsecp256k1 keep up. What
Falbesoner found was that over the years libsecp256k1 had improved
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
improvements over the decade and if so did libsecp256k1 keep up. What
Falbesoner found was that over the years libsecp256k1 had improved
improvements over the decade, and if so, whether libsecp256k1 had kept up.
Falbesoner found that over the years, libsecp256k1 had improved

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

updated in 63b9e37

faster than OpenSSL, but this analysis was done to see if OpenSSL had made any
improvements over the decade and if so did libsecp256k1 keep up. What
Falbesoner found was that over the years libsecp256k1 had improved
significantly whereas OpenSSL had remained the same. He also concluded that
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
significantly whereas OpenSSL had remained the same. He also concluded that
significantly, whereas OpenSSL had remained the same. He also concluded that

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

updated in 63b9e37

@LarryRuane
Copy link
Collaborator

@bitschmidty, when do you plan to merge and publish this? (Maybe you can add that info at the beginning of the description.) I would like to review everything a day or two before then. (I may review before then too, if I have time.)

@bitschmidty
Copy link
Contributor Author

@bitschmidty, when do you plan to merge and publish this? (Maybe you can add that info at the beginning of the description.) I would like to review everything a day or two before then. (I may review before then too, if I have time.)

Publishing Friday early morning. Thanks for reviewing @LarryRuane !

@bitschmidty
Copy link
Contributor Author

Pushed some changes to fix the build.

Added December items to quantum and soft forks

@bitschmidty
Copy link
Contributor Author

Pushed a merge from master to pull in recent newsletters that were being referenced (and failing)

Copy link
Contributor Author

@bitschmidty bitschmidty left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Review covering the items so far from @kevkevinpal @reardencode @TumaBitcoiner and @stickies-v

Comment on lines 86 to 87
- **Erlay update:** Sergi Delgado made [several posts][erlay optech posts] over
the last year about his work and progress implementing [Erlay][erlay] for
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
- **Erlay update:** Sergi Delgado made [several posts][erlay optech posts] over
the last year about his work and progress implementing [Erlay][erlay] for
- **Erlay update:** Sergi Delgado made [several posts][erlay optech posts] this
year about his work and progress implementing [Erlay][erlay] in

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

updated in 63b9e37

the last year about his work and progress implementing [Erlay][erlay] for
Bitcoin Core. In the first post, he gave an overview on the Erlay proposal and
how the current transaction relay works (called fanout). In these posts, he
discusses different results that he found while developing Erlay, such as
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think past tense makes sense for this newsletter @kevkevinpal

Suggested change
discusses different results that he found while developing Erlay, such as
discussed different results that he found while developing Erlay, such as

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

updated in 63b9e37

## March

{:#forkingguide}
- **Bitcoin Forking Guide:** Anthony Towns [posted][fork guide post] to Delving
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
- **Bitcoin Forking Guide:** Anthony Towns [posted][fork guide post] to Delving
- **Bitcoin Forking Guide:** In February, Anthony Towns [posted][fork guide post] to Delving

## March

{:#forkingguide}
- **Bitcoin Forking Guide:** Anthony Towns [posted][fork guide post] to Delving
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@TumaBitcoiner I think we should link to our coverage of these items, where applicable. I think the fork guide post link could link to our newsletter coverage (or add another link and keep both)


{:#templatemarketplace}
- **Private block template marketplace to prevent centralizing MEV:** Developers
Matt Corallo and 7d5x9 [posted][template mrkt post] to Delving Bitcoin a
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@TumaBitcoiner similar to above, we should make sure we also link to our own newsletter coverage of this

{:#channeljamming}
- **Channel jamming mitigation simulation results and updates:** Carla
Kirck-Cohen in collaboration with Clara Shikhelman and elnosh had updated the
[lightning jamming simulation results][channel jamming results], and updates
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
[lightning jamming simulation results][channel jamming results], and updates
[Lightning jamming simulation results][channel jamming results], and updates

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

updated in 63b9e37


{:#channeljamming}
- **Channel jamming mitigation simulation results and updates:** Carla
Kirck-Cohen in collaboration with Clara Shikhelman and elnosh had updated the
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It wasnt so much an update as publishing the initial results, right? @kevkevinpal

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yeah that's correct, initial results to their updated reputation algorithm

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

resolved in 63b9e37, let me know if this wording looks good

[resource][channel jamming resource] and [sink][channel jamming sink] attacks.
After this round of updates and simulations, they feel that [channel jamming
attack][channel jamming attack] mitigation has reached a point where it is
good enough.
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Maybe we can elaborate slightly. Good enough for what? @kevkevinpal

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

In the post itself Carla doesn't really elaborate exactly she means by "Good Enough" which is why I left it as is. Not sure if it is okay for me to guess what she means by that.

## November

{:#secpperformance}
- **Comparing performance of ECDSA signature validation in OpenSSL vs. libsecp256k1:** Sebastian Falbesoner conducted an
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think we should cut down this summary by 50%. I think it is just too many words and can be summarized more succinctly. @kevkevinpal

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

resolved in 63b9e37 I removed some of the fluff text

Copy link
Contributor Author

@bitschmidty bitschmidty left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Review covering the items so far from @kevkevinpal @reardencode @TumaBitcoiner and @stickies-v

Copy link
Contributor Author

@bitschmidty bitschmidty left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Left a suggestion for @murchandamus

Suggestions for @TumaBitcoiner (and a commit to change some of the simplicity section formatting)

Couple suggestions for @stickies-v Stratum V2 callout

Few suggestions for @kevkevinpal on the stale rates item

due to node operators manually configuring lower limits. By mid August, [over
30% of confirmed transactions][mononautical 32] paid feerates lower than 1
s/vB. Bitcoin protocol developers observed that the high rate of non-standard
transactions was causing increased latency for block propagation and
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
transactions was causing increased latency for block propagation and
transactions was [causing increased latency for block propagation][0xb10c delving] and

thoughts @murchandamus ? (link reference also recommended below)

[news340 lowering feerates]: /en/newsletters/2025/02/07/#discussion-about-lowering-the-minimum-transaction-relay-feerate
[mononautical 85]: https://x.com/mononautical/status/1949452588992414140
[mononautical 32]: https://x.com/mononautical/status/1958559008698085551
[news366 lower feerate]: /en/newsletters/2025/08/08/#continued-discussion-about-lowering-the-minimum-relay-feerate
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
[news366 lower feerate]: /en/newsletters/2025/08/08/#continued-discussion-about-lowering-the-minimum-relay-feerate
[news366 lower feerate]: /en/newsletters/2025/08/08/#continued-discussion-about-lowering-the-minimum-relay-feerate
[0xb10c delving]: https://delvingbitcoin.org/t/stats-on-compact-block-reconstructions/1052/35


{:#simplicity}
- **Details about the design of Simplicity:** After the release of
[Simplicity][topic simplicity], Russel O'Connor made three posts to
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
[Simplicity][topic simplicity], Russel O'Connor made three posts to
[Simplicity][topic simplicity] on the Liquid network, Russel O'Connor made three posts to

Comment on lines +474 to +477
[posted][Cedarctic post] to Delving Bitcoin about flaws in Border Gateway
Protocol (BGP) to prevent full nodes from being able to connect to peers,
which could be used to partition the network or execute an [eclipse
attack][eclipse attack]. Several mitigations were described by cedarctic,
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
[posted][Cedarctic post] to Delving Bitcoin about flaws in Border Gateway
Protocol (BGP) to prevent full nodes from being able to connect to peers,
which could be used to partition the network or execute an [eclipse
attack][eclipse attack]. Several mitigations were described by cedarctic,
[posted][Cedarctic post] to Delving Bitcoin about flaws in Border Gateway
Protocol (BGP) which could be used to prevent full nodes from being able to connect to honest peers,
potentially allowing partitioning of the network or execution of [eclipse
attacks][eclipse attack]. Several mitigations were described by cedarctic,

which could be used to partition the network or execute an [eclipse
attack][eclipse attack]. Several mitigations were described by cedarctic,
with other developers in the discussion describing other mitigations and
ways to monitor for use of the attack.
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
ways to monitor for use of the attack.
ways to monitor for the attack.

proportional to their share of hashrate. He then outlines two situations in
which a block goes stale. The situations were either another miner found a
block before this miner or another miner found a block after this miner.
Poinsot pointed out that between these two situations a block is more likley
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Poinsot pointed out that between these two situations a block is more likley
Poinsot pointed out that between these two situations, a block is more likely

which a block goes stale. The situations were either another miner found a
block before this miner or another miner found a block after this miner.
Poinsot pointed out that between these two situations a block is more likley
to become stale in the first one, he suggests that miners prefer to hear about
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
to become stale in the first one, he suggests that miners prefer to hear about
to become stale in the first one. He suggests that miners prefer to hear about

block before this miner or another miner found a block after this miner.
Poinsot pointed out that between these two situations a block is more likley
to become stale in the first one, he suggests that miners prefer to hear about
others' blocks faster than publishing their own. Later in the post he computes
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
others' blocks faster than publishing their own. Later in the post he computes
others' blocks faster than publishing their own. Later in the post, he computes

Poinsot pointed out that between these two situations a block is more likley
to become stale in the first one, he suggests that miners prefer to hear about
others' blocks faster than publishing their own. Later in the post he computes
by exactly how much does the probability increase and found that if a mining
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
by exactly how much does the probability increase and found that if a mining
how much does the probability increases and found that a mining

Comment on lines +586 to +587
operation with 5EH/s can expect a revenue of $91M and if blocks took 10
seconds to propogate the revenue would increase by $100k.
Copy link
Contributor Author

@bitschmidty bitschmidty Dec 17, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
operation with 5EH/s can expect a revenue of $91M and if blocks took 10
seconds to propogate the revenue would increase by $100k.
operation with 5EH/s that normally expected $91M of revenue would receive an additional $100k in revenue if blocks took 10
seconds to propagate.

@bitschmidty
Copy link
Contributor Author

Added checkboxes to each item in the PR description. Updated the status of each as of the status in this PR as of a few minutes ago. There are some items that are currently still up for grabs. If authors have additional time, let me know.

In January, Stefan Richter prompted excitement by [discovering][news340 richter ggt]
that an efficient algorithm for the _maximum-ratio closure problem_ from a
1989 research paper could be applied to cluster linearization. Pieter Wuille
extended his research to incorporate this minimal-cut-based third approach.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is something out of order here? The ggt paper is mentioned here as a "third approach", but candidate-set search and spanning-forest linearization are only mentioned below.

Also, this paragraph seems to list events across many months, while it's all under a "May" section?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

When theres an item that was mentioned multiple months, we sort of bite the bullet on where that item might live. I think we could reword some of this item for it to fit a bit more naturally in May. Or alternatively, Cluster Mempool could be its own callout (separate from the monthly entries)

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Oh, when I wrote this, I thought it was its own separate callout. I’ll take another look at the “third approach” being used before introducing the other two.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

For reference, cluster mempool callout from last year: https://bitcoinops.org/en/newsletters/2024/12/20/#cluster

@bitschmidty
Copy link
Contributor Author

Pushed a fixup for the build for the splicing section (trailing spaces).

Converting from draft for review today. Some items still being authored.

@bitschmidty bitschmidty marked this pull request as ready for review December 18, 2025 11:18
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

9 participants