Satoshi Scoop Weekly, 18 Oct 2024

CryptapeCryptape
5 min read

Crypto Insights

Vulnerabilities in Bitcoin Core Versions Prior to v25.0

Bitcoin Core developer Niklas Gögge disclosed three vulnerabilities affecting Bitcoin Core versions prior to v25.0:

A Consensus Failure Vulnerability Affecting BTCD Full Nodes

Antoine Poinsot and Niklas Gögge disclosed CVE-2024-3836, a consensus failure vulnerability affecting BTCD full nodes. Bitcoin Core’s FindAndDelete function only removes exact matches of signatures from the signature script. The BTCD implementation's removeOpcodeByData function, however, removes any data containing the signature from the script. This can cause BTCD to delete more data from the signature script than Bitcoin Core does before verifying commitments, leading to one system considering a commitment valid while the other not. Any transaction with an invalid commitment is invalid, the same goes for blocks, causing a consensus split between Bitcoin Core and BTCD. Nodes out of consensus could be tricked into accepting invalid transactions and might fail to see the latest transactions that the rest of the network has confirmed, potentially leading to money loss.

Explaining Why Nostr Matters in Ten Minutes

This talk outlines why Nostr matters by highlighting several key concepts.

  • Identity: Represented by a pair of public and private keys, functioning as an open social credit score not limited to specific platforms.

  • Notes: Signed posts allowing anyone to verify authorship and ensure content integrity without permission.

  • Relays: Servers that anyone can run, facilitating communication within the Nostr network.

Nostr promotes voice by circumventing centralized censorship, freedom from API accessibility changes imposed by platforms, authenticity/truth through hashing to verify notes, and the ability to transact with Bitcoin, supporting decentralized finance.

Video: Short Text Note by ODELL

Lightning Network Node Testing Made Easy With lnprototest

As the Lightning Network is rapidly evolving, each node must ensure compliance with the protocol specifications before upgrading to a new version. lnprototest (GitHub repo), a Python library communicating via BOLT8, establishes connections and sends noise messages among peers. To work with lnprototest, a Lightning implementation needs to develop a Runner in Python. This Runner interacts with lnprototest's workflow, serving as a bridge between the test framework and the Lightning node.

Will the .io Domain Disappear? How Geopolitics Reshapes Digital Infrastructure

The UK's relinquishment of the Chagos Archipelago (official name: British Indian Ocean Territory, corresponding domain: .io) to Mauritius will dissolve the geopolitical entity behind the .io domain. The International Organization for Standardization (ISO) is expected to remove the country code IO, promoting the Internet Assigned Numbers Authority (IANA) to cease new .io domain registrations and phase out existing ones.

The .io domain has long been popular among startups, especially those in the cryptocurrency. The author indicates that IANA might create new rules to allow .io to continue existing, as it could represent a significant source of revenue.

  • Asia's Web3 market is burgeoning, driven by tech-savvy populations, proactive governments, and enterprise involvement, with South Korea, Japan, and Vietnam as key players.

  • New regulations in South Korea, Indonesia, and Thailand are facilitating blockchain innovation, with sandbox regulations encouraging experimentation in RWAs, DeFi, and digital asset services.

  • Emerging markets like China and Cambodia present both opportunities and risks. China’s unofficial involvement remains significant despite regulations, while Cambodia offers potential for small and medium-sized businesses willing to navigate legal complexities.

Top Reads on Blockchain and Beyond

Overview of Bitcoin, Ethereum, and Solana Restaking Stack

This article reviews and evaluates the restaking frameworks within Bitcoin, Ethereum, and Solana ecosystems, highlighting projects in each. In terms of Bitcoin, three projects are involved: Babylon, Pell Network, and Photon. Each tackles distinct challenges within’ Bitcoin:

  • Babylon leverages Bitcoin’s staking and restaking capabilities to enhance the security of other PoS blockchains. It converts Bitcoin’s economic value into economic security, offering protection for other blockchains. Babylon operates its own PoS chain using the Cosmos SDK and supports non-custodial staking and restaking directly from Bitcoin without the need for third-party trust.

  • Pell Network integrates Bitcoin into the DeFi ecosystem using cross-chain technology, addressing the challenges of Bitcoin’s lack of liquidity and additional revenue streams.

  • Photon expands Bitcoin’s ability to execute smart contracts without altering its core structure. It implements staking and restaking directly on the Bitcoin mainnet, overcoming the limitation of no native smart contract support. All processes related to staking and restaking are verified on the Bitcoin mainnet, ensuring high security while offering flexible staking options.

Image Source: Four Pillars

How to Optimize C++ Code for CKB-VM: Porting Bitcoin as an Example

This post details the direct porting and optimization of Bitcoin’s C++ code over to CKB virtual machine (CKB-VM). The work highlights the challenges and solutions, particularly for overcoming binary size limitations. This attempt indicates the potential for broader C/C++ code libraries porting to CKB-VM.

Adaptor Signatures: Unlocking the Potential of Applications in Zero-Knowledge Proof Construction and More

This article explores the potential of adaptor signatures, particularly their applications in zero-knowledge proof constructions and the on-chain verification of statements beyond the secp256k1 generator G, outlining a theoretical framework for using adaptor signatures in Zero-Knowledge Proof construction, despite practical verification challenges. It includes theoretical discussions on multi-base single statements, and proposes a practical method of embedding curve points in transaction messages to facilitate BIP340 signatures, enabling the verification of discrete logarithm equality (DLEQ) relationships on-chain.

0
Subscribe to my newsletter

Read articles from Cryptape directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

Cryptape
Cryptape