#bitcoin
30 items · 30 articles
Articles
The Instrument Returns: An Introduction to Bitcredit
Bitcredit is the concrete protocol reconstructing bills of exchange on Bitcoin, closing the credit layer gap that prior posts have diagnosed.
The Key Inside the Ciphertext: A Full Introduction to PIPEs v2
PIPEs v2 turns spend conditions into key-recovery conditions, letting Bitcoin enforce proof-gated authorization through ordinary Schnorr signatures and extraordinary off-chain cryptography.
Every Crowd Hides You Differently
From Bitcoin CoinJoin to zero-knowledge proofs, every serious approach to financial privacy bets on a different crowd to disappear into.
Sign What You Cannot See: A Field Guide to Blind Signatures
Four decades of blind signatures show that one algebraic trick, letting someone sign what they cannot see, protects ecash and CoinJoin.
Programmable Magic Internet Money: How Nostr Apps Can Monetize Ethically and Profitably
Bitcoin plus Nostr creates programmable money that solves software monetization through micropayments respecting user sovereignty.
The Engine of Prosperity: How Four Sources Drive All Economic Progress
Four sources of economic progress form an interdependent system that emerges spontaneously from voluntary exchange when property rights remain completely intact.
The Mathematics That Bridges Bitcoin: From BitVM to Argo
Cryptographic enforcement succeeds where trust fails, and nowhere does this principle matter more than in Bitcoin's quest for trustless bridges.
The Non-Computational Nature of Agency
Vervaeke proves agency emerges from non-algorithmic relevance realization, explaining why Bitcoin and Nostr preserve human autonomy while algorithmic systems destroy it.
The Merchant's Return: When Systems Fail, Producers Prosper
Being cast out of the system reveals its deepest secret: you were never its beneficiary, only its fuel. Freedom begins with this recognition.
The Root of Money
Money is neither vice nor virtue but the material expression of human judgment exercised through time. Only parasites hate it.
The Consumption You Call Saving
Holding money does not defer gratification but consumes the opportunity cost of lending, making hoarding a present expense rather than proof of low time preference.
The Action That Accomplishes Nothing
Decentralization does not prevent the adversary from acting against you. It ensures that his action accomplishes nothing.
The Price of Patience
Hoarding is not low time preference; only lending expresses it. Wealth lowers time preference via diminishing marginal utility, not the reverse.
The Right to Walk Away: Angor and the Future of Bitcoin Crowdfunding
Angor gives investors what ICOs and crowdfunding never could: the cryptographic ability to recover their funds if projects fail to deliver.
What Your Loved One Is Actually Trying to Tell You
They haven't joined a cult. They stumbled onto questions they couldn't stop asking, and they love you too much to keep them to themselves.
Strategic Intelligence for Freedom-Builders: Paul Rosenberg's Quarterly Newsletter
Rosenberg predicted Bitcoin in fiction seven years early. His quarterly newsletter delivers strategic intelligence for freedom-builders, not commentary for readers.
The Praxeology of Privacy ~ Chapter 21: Building the Parallel Economy
The parallel economy grows through counter-economics. Cheap defense defeats expensive attack. When theft becomes unprofitable, the state withers. Build. Trade. Resist.
The Praxeology of Privacy ~ Chapter 18: Lessons from History
DigiCash, e-gold, and Silk Road failed through centralization and poor OPSEC. Bitcoin succeeded through decentralization, open source, and properly aligned economic incentives.
The Praxeology of Privacy ~ Chapter 16: Zero-Knowledge Proofs
Zero-knowledge proofs enable verification without disclosure. SNARKs, STARKs, and Bulletproofs make different tradeoffs. Deployed in Zcash and rollups; broader adoption developing.
The Praxeology of Privacy ~ Chapter 15: Bitcoin: Resistance Money
Bitcoin solves double-spending without trusted third parties. Sound money enforced by code. Base layer privacy requires additional tools like Lightning and coinjoin.
The Praxeology of Privacy ~ Chapter 9: Monetary Theory and Sound Money
Sound money emerges spontaneously from markets, not decrees. Bitcoin implements digital soundness with fixed supply and censorship resistance; privacy requires additional tools.
The Praxeology of Privacy ~ Chapter 5: The Axiom of Resistance
The Axiom of Resistance assumes systems can resist control. Mathematics, empirical evidence, and similar systems support this well-grounded but non-self-evident assumption.
The Praxeology of Privacy ~ Preface
Austrian economists theorize but cannot build. Cypherpunks build but lack theory. This book synthesizes both to make the state irrelevant.
Builders, Not Talkers
Decades of libertarian theory and cypherpunk tools have produced almost nothing because ideas without builders are worthless. Act or leave us alone.
The Art of Waiting: Random Delays for Private Payments
Two scripts that randomize timing between Wasabi coinjoin rounds, making your payment patterns indistinguishable from organic human behavior.
When Math Catches Your Typos
Bech32's BCH code detects up to 4 typos with 100% certainty, locates up to 2 error positions, but deliberately refuses to auto-correct to prevent catastrophic mistakes.
Counting Grains of Sand in an Infinite Universe: Why CoinJoin Privacy Doesn't Need Perfect Math
Coinjoin entropy becomes computationally impossible to calculate exactly for large transactions, but lower-bound estimates provide rigorous cryptographic guarantees through information theory.
Disappear Into the Crowd: Wasabi's Hidden Payment Superpower
Three bash scripts to queue, cancel, and run Wasabi coinjoin payments from terminal - with smart denomination suggestions for maximum privacy.
Bitcoin Address Lookup: A Question of Privacy
Bitcoin wallets face a fundamental tradeoff: how to discover your transactions without revealing your addresses. Full nodes (2009) provide perfect privacy by downloading everything but require ~700 GB storage. Electrum (2011) achieves instant sync by transmitting your addresses directly to servers, exposing your complete transaction history. Block filters (2017-2019) restore privacy through client-side filtering - you download compact filters, check them locally, and only request matching blocks, revealing just block-level interest. Utreexo (2019) compresses the UTXO set from 11 GB to 480 bytes using cryptographic accumulators while maintaining full-node privacy, but requires 20% more bandwidth. Each approach trades privacy, storage, bandwidth, and convenience differently.
Summary of: The Praxeology of Privacy ~ Economic Logic in Cypherpunk Implementation
A book explaining why Privacy = Economic necessity proven through Austrian logic. Three axioms (Action + Argumentation + Resistance) demonstrate that surveillance destroys market calculation like socialist planning, while cryptography restores conditions for voluntary coordination. Complete bridge between Austrian economics and cypherpunk technology.