If you enjoy the Bitcoin, Explained podcast, you may want to check out my new book! It covers softfork activation mechanisms, what's cool about SegWit and Taproot, how nodes bootstrap to the network and find their peers, what an address really is, how AssumeUTXO can make initial block download suck less, how UtreeXO could compress the entire UTXO set into a kilobyte of merkle forest, how Guix makes reproduceable builds great again, and more.
More details and preview at: https://btcwip.com
Nice quick update on the bird site "deal" progress by Patrick Boyle https://youtu.be/_SfXoCj4TLk
I started dropping individual chapters in printer friendly PDFs. They're €0.99 a piece now (you're still welcome to compile it yourself from the source code).
Payment with ⚡ only. No personal details required, even email is optional. Eat that, fiat!
The first three chapters are:
1. Addresses (was already free to preview, but in regular book format)
7. Eclipse Attacks*
9. Guix (reproducible builds)*
* = shop also links to a free blog version
@dave @adam regarding an index of Lightning Addresses: a lot of users are putting their lightning addresses prefixed with a ⚡ in their profiles, e.g. ⚡s@ts.dergigi.com
Alby and ZBD support this already. There is also a meta tag for HTML: https://github.com/BitcoinAndLightningLayerSpecs/rfc/issues/1
Both could be crawled and indexed.
G'day 'Strayans. Due to distribution related shitfuckery, I started an experiment where I'll ship the book directly to ya from the Melbourne printer.
Well obviously I won't do it myself, I just chuck your address into IngramSpark's manual ordering system (yeah, there's no API).
Powered by @BTCPayServer, maybe fiat later if Stripe doesn't pre-emptively cancel me.
All this for a mere AU$34.99 and with free shipping! No more slow imports from the UK and Murica.
https://shop.purpledunes.com/product/bitcoin-a-work-in-progress/
Hello and good morning,a critical vulnerability in the Matrix IRC bridge has been patched, deployed, and disclosed (see https://matrix.org/blog/2022/05/04/0-34-0-security-release-for-matrix-appservice-irc-high-severity for details) and we will shortly be disconnecting all affected third party Matrix bridges we can find in the interest of protecting their users.
Original toot by Matrix folk:
https://mastodon.matrix.org/@matrix/108242582363604964
thanks for the cooperation and stay safe out there, folk
If you enjoy the Bitcoin, Explained podcast, you may want to check out my new book! It covers softfork activation mechanisms, what's cool about SegWit and Taproot, how nodes bootstrap to the network and find their peers, what an address really is, how AssumeUTXO can make initial block download suck less, how UtreeXO could compress the entire UTXO set into a kilobyte of merkle forest, how Guix makes reproduceable builds great again, and more.
More details and preview at: https://btcwip.com
Oops, I managed to maroon myself by incorrectly building OpenSSL here. I could still see everyones toots, post things and reply. But afaik nobody go to see any of it.
Until I actually paid attention to the Sidekiq errors: "OpenSSL::SSL::SSLError: SSL_connect returned=1 errno=0 state=error: certificate verify failed (unable to get local issuer certificate) "
@kalle Github desktop, with whitespace ignored, does a descent job too.
This single commit:
* limits script size to 20.000, stack to 1000
* returns false if an exception is thrown (rather than crash?)
* adds the OP_NOP future softfork codes
* disables OP_VER((NOT)IF)
* adds a failure case to OP_VERIFY, OP_CHECKSIGVERIFY, OP_RSHIFT
* makes OP_RETURN stop processing
Those last 3 sound like vulnerability fixes, especially OP_RETURN.
* enforces nMaxNumSize
* prevents OP_(L/R)SHIFT overflow
Looking for the code fix for this bug (CVE-2010-5141), but can't find version 0.3.5 which is stated to be the version with the fix.
What commit represents 0.3.5?
There's no tag for it, nor are there any traces of that version in the history of setup.nsi or serialize.h.
https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures#CVE-2010-5141
🇬🇧 Partial success for hundreds of thousands who took to the streets with us #pirates in 2019 against error-prone #uploadfilter censorship machines: ECJ severely restricts #uploadfilters. They are not allowed to "block legal content from being uploaded." 🧵
Pro tip: don't upgrade to Ubuntu 22.04 if you're running a Mastodon instance.
But if you do, you may need this incantation to get OpenSSL 1.1.1 and Ruby 3.0.4 to work: https://github.com/mastodon/mastodon/pull/17798#issuecomment-1107648097
Official #Mastodon apps now available for iOS and Android ✨
https://blog.joinmastodon.org/2022/04/official-apps-now-available-for-ios-and-android/
🇬🇧A draft EU Parliament report published today would ban anonymous payments and donations in #cryptocurrencies such as #Bitcoin & #Ethereum. The stated aim to tackle money laundering and terrorism is only a pretext to gain more control over personal data.
#Mastodon 3.5 is out! 🐘 🎉
Here's my post (it's also linked in the article): https://sprovoost.nl/2017/07/22/historical-bitcoin-core-client-performance-c5f16e1f8ccb/
Great writeup by @lopp who picked up where I left off in 2017: https://blog.lopp.net/running-bitcoin-core-v0-7-and-earlier/
As much as I hate RT, it's important to take notice here: removing apps from app stores is now standard procedure in war.
I haven't seen removal from phones yet.
Censorship is a normal part of war, even in democracies, but it's useful to be aware of how that translates to modern times.
https://m.investing.com/news/stock-market-news/google-blocks-russias-rt-app-downloads-on-ukrainian-territory-says-rt-2773225?ampMode=1
TIL Putin ended the Russian - Netherlands tax treaty per 1-1-2022. In retrospect that was a more obvious red flag for a sanctions-worthy move coming soon. It removed much of the incentive of oligarchs to park their stolen money in our little tax paradise.
Or maybe it was unrelated, who knows...
https://www.pwc.nl/en/insights-and-publications/tax-news/enterprises/russia-to-terminate-double-tax-treaty-with-the-netherlands.html