Powered by RND

Bitcoin Takeover Podcast

Vlad Costea
Bitcoin Takeover Podcast
Nieuwste aflevering

Beschikbare afleveringen

5 van 290
  • S16 E36: Maud Bannwart & Cheng Wang on Alephium, Proof of Less Work & Bitcoin
    Alephium is one of the most interesting Proof of Work projects, which aims to build secure smart contracts & fast DeFi on a mineable base layer which minimizes electricity consumption. Maud Bannwart & Cheng Wang explain how all of this works.
    --------  
    1:57:33
  • S16 E35: Hunter Beast on Bitcoin's Quantum Resistance & BIP 360
    Hunter Beast is the author of BIP 360: a proposal that seeks to provide quantum resistance to Bitcoin, to prevent powerful computer builders from brute forcing arbitrary addresses to steal the funds. But is the quantum threat real? Does the number of qubits really make a difference when the quantum computer is general purpose? Shouldn't other industries outside of Bitcoin, especially governments and banks, be worried about the fragility of elliptic curve cryptography? In this episode, we'll try to answer some of these questions and also refer to Hunter Beast's previous experience with building RGB for Bitcoin tokens. ––––––––––––––––––––––––––– Time stamps: 01:08 - Introducing Hunter Beast 01:27 - BIP 360 and Quantum Resistance Hunter Beast introduces BIP 360, aimed at making Bitcoin resistant to quantum computing threats, a hot topic due to predictions of advanced quantum computers potentially breaking ECDSA signatures. 02:19 - Defining Bitcoin's Quantum Threat Quantum computing is institutional, not accessible to average Bitcoiners, making verification difficult. The threat is existential but not immediate, though warnings suggest proximity. 03:58 - U.S. Government Warnings U.S. government and institutions are preparing for quantum resistance by 2030, urging upgrades to protect against potential cryptographic breaks. 05:53 - Consensus Challenges Hard forks ensure UTXO migration but face consensus issues; soft forks are preferred, but coins must move to quantum-resistant addresses to avoid vulnerabilities. 06:38 - Bitcoin’s Quantum Vulnerabilities Taproot, reused addresses, mempool-published data, and exposed public keys are vulnerable. ~90% of reused address coins are active, reducing concern, but Taproot needs upgrades. 09:41 - BIP 360 Solution for Taproot BIP 360 focuses narrowly on fixing Taproot’s vulnerability to long-exposure attacks, enabling wallets to commit to multiple scripts, including quantum-resistant ones like SLHDSA. 13:07 - Signature Schemes ECDSA is Bitcoin’s weak point. Lamport and Winternitz signatures are flawed (one-time use), but SLHDSA (using a hypertree of Winternitz signatures) allows secure address reuse. 17:10 - User Experience Impact BIP 360 minimizes changes to user experience, offering opt-in quantum-resistant scripts. Wallets could include security dials, but defaults remain familiar. 20:14 - Transaction Size and Costs Post-quantum signatures are larger (4-8k bytes), but address commitments are minimal (~34 bytes). Block size increases aren’t necessary; solutions like Bitzip could scale transactions. 22:27 – Sideshift.ai 23:17 - Drivechains and Layer Two Labs Drivechains offer secure sidechain solutions, decentralizing custody and scaling Bitcoin. Testing is available on Signet, with Litecoin considering implementation. 29:48 - Bitcoin Ossification Debate Ossification (resistance to change) vs. necessary upgrades debated. Quantum threats may force changes as Bitcoin secures more value, despite opposition. 36:36 - Conspiracy Theory Counter Concerns about government-driven fear dismissed; BIP 360 is opt-in, only used if quantum threats emerge, preserving user choice. 54:26 - Quantum Computing Progress IBM’s Condor has 1,121 qubits; breaking ECDSA needs ~20M qubits. With quantum advancements outpacing Moore’s Law, upgrades are prudent within a decade. 59:58 - Sponsor Plugs Citrea (ZK rollup for Bitcoin financial apps) and Edge Wallet (duress mode, multi-coin support) highlighted. 01:02:30 - BIP 360 Number Selection BIP 360 assigned by reviewers, not chosen by Hunterbeast, reserved for quantum-related proposals. 01:06:04 - BIP 360 Reception from Core Devs Mixed feedback from reviewers like Ava Chow (called it “stupid” but provided useful critique). Still in draft at bip360.org, open for review. 01:11:29 - Unintended Consequences BIP 360 is minimal, unlikely to cause surprises like Taproot’s ordinal inscriptions, as it enhances existing functionality. 01:12:42 - Is Quantum Resistance Perishable and Needs Updates? BIP 360 isn’t definitive; periodic updates may be needed as quantum computers advance, requiring a proactive Bitcoin culture. 01:19:12 - NoOnes, Bitcoin.com, 01:21:46 - Best Practices for Quantum Safety Avoid address reuse, use native SegWit (BC1Q) addresses, don’t expose Xpubs, and consider private mempools like MARA Slipstream for large transactions. 01:24:27 - Closing Remarks Gratitude to Hunter Beast for discussing BIP 360 and quantum threats, wishing success for the proposal.
    --------  
    1:24:26
  • S16 E34: Prof. Richard Werner on Bitcoin, CBDCs & The Big Beautiful Bill
    Prof. Richard Werner, one of the world's most famous economists, is best known for writing "Princes of the Yen" and penning the term "quantitative easing" in the 1990s while working at the Bank of Japan. Today, he is a big advocate for small local banks and a believer in the power of Bitcoin. In this episode, he talks about recent events in economics, ranging from the Big Beautiful Bill in the US and all the way to CBDCs and Bitcoin's viability to bring more economic freedom to the world. –––––––––––––––––––––– Time stamps: 00:00 - Introducing Professor Richard Werner, author of Princes of the Yen and originator of quantitative easing 01:27 - Sponsorships: Sideshift.ai, Citrea, LayerTwo Labs, Bitcoin.com News, NoOnes.com, and Edge Wallet. 02:07 - Big Beautiful Bill & Fiscal Policy: Discussion on the U.S. "Big Beautiful Bill" under Trump, increasing government spending despite promises to cut debt. Werner clarifies fiscal policy isn't direct money printing, using Japan’s experience as an example where massive spending didn’t cause inflation or growth due to lack of monetization. 05:06 - Monetization Concerns: Concerns about monetizing fiscal policy in the U.S., with Trump’s team encouraging banks to buy treasuries, potentially leading to inflation (8:39). The Federal Reserve’s role in possibly counteracting this is uncertain (9:46). 11:42 - Interest Rates & Quantitative Policy: Werner critiques the focus on interest rates, arguing quantitative policy (credit creation) is the real driver. Interest rates follow growth, not vice versa. 17:52 - Tariffs & Trade Policy: Trump’s return to tariffs (e.g., 30% on EU) is discussed. Werner supports tariffs for economic development, citing historical success and criticizing Ricardo’s free trade theory for ignoring terms of trade (19:24). Smart tariffs should encourage high-value exports and raw material imports (36:05). 44:07 - Austrian Economics Critique: Werner criticizes guru-driven economics, including Austrian school, for dismissing data. He emphasizes empirical, fact-based analysis over ideological axioms (45:58). 49:51 - Argentina & Mainstream Economics: Werner discusses Argentina’s free-market shift under Milei, critiquing mainstream economists like Krugman for often being wrong. Balanced budgets are preferred over debt-heavy policies (51:03). 1:08:58 - Central Bank Digital Currencies (CBDCs): Werner sees no upside to CBDCs, calling them a tool for centralized control. They enable tracking and restricting spending, unlike existing digital currencies (1:13:25). China’s cautious CBDC approach is noted, but Western central banks are distrusted (1:15:22). 1:16:51 - Stopping CBDCs: Strategies to oppose CBDCs include increasing cash use, adopting decentralized cryptocurrencies like Bitcoin, and public demonstrations against central banks (1:18:38). 1:20:40 - Stablecoins: Werner views stablecoins like Tether as a potential backdoor for central banks (Plan B) to achieve CBDC-like control, with a stealthier Plan C involving corporate digital reporting (1:23:04). 1:30:22 - EU’s Dictatorial Structure: Werner criticizes the EU’s undemocratic structure, comparing it to the Soviet Union. The European Commission’s power and corruption (e.g., vaccine deals) are highlighted (1:31:22). 1:40:38 - Bitcoin’s Role: Werner doubts a purely deflationary currency like Bitcoin can sustain an economy without credit creation. He suggests small banks using Bitcoin for credit to enable growth (1:41:40). Bitcoin’s shift to a store of value increases risks of a “death switch” (1:47:45). 1:44:42 - Bitcoin Price Prediction: Werner predicts Bitcoin reaching ~$995,000, driven by momentum and institutional adoption, but cautions about risks like an EMP or coded vulnerabilities (1:45:24). 1:52:22 - Bitcoin as Currency: Using Bitcoin for transactions rather than just a store of value could reduce risks and enhance longevity. Werner plans to integrate crypto in his Swiss bank project (1:53:40). 1:55:04 - Closing & Promotions: Werner promotes his Swiss Rhyntal bank project, Substack (rwerner.substack.com), and YouTube channel (Werner Economics).
    --------  
    1:57:46
  • S16 E33: Liz Steininger on Least Authority & Auditing Open Source Software
    Liz Steininger is the CEO of Least Authority: a company which specializes in auditing open source software since 2014. Originally founded by Zooko Wilcox, Least Authority has conducted more than 100 security audits in the space. Some of the best known contractors who requested an expert review include the Ethereum Foundation, the Electric Coin Company, Metamask, the KeyStone hardware wallet, and Avalanche. Least Authority also builds products that make use of Zero Knowledge Proofs: PrivateStorage (a cloud storage system that's designed to make the host unaware of the files being stored), ZKAPs (Zero Knowledge Access Passes, an authorization system that separates the payer from the data on the items being bought), and Winden (a file-sharing service that's encrypted and requires no identity from the sender and receiver). In a space which often defers to "check the code, it's open source", companies such as Least Authority offer high quality verification which makes it easier for the average non-technical person to trust that something is safe. Also, it helps builder have the peace of mind that what they're working on will not bring any unforeseen consequences. Time stamps: 00:00 - Intro and Sponsor Mentions 
Introduction to the podcast and sponsors: Sideshift, Bitcoin.com News, EdgeWallet, LayerTwo Labs, Citrea, NoOnes.com, and HODLING.ch. 01:17 - Guest Introduction: Liz Steininger 
Liz Steininger, CEO of Least Authority, is introduced. Discussion begins about the company’s focus on security, privacy, and auditing in the crypto space. 1:57 - Irony of "Least Authority" Having a CEO 
Liz addresses the irony of a company named Least Authority having a CEO, explaining their non-hierarchical approach and balance of leadership. 03:04 - Least Authority Philosophy and Nick Szabo’s Influence 
Discussion on the principle of least authority, referencing Nick Szabo’s 2005 paper and its connection to Zooko, founder of Least Authority. 05:19 - Liz’s Tech Background 
Liz shares her journey into tech, from early internet experiences to open-source and privacy-focused technologies. 09:36 - Role of Auditing Firms in Open-Source 
Exploration of why auditing firms like Least Authority are necessary despite open-source code being publicly verifiable. 11:45 - Surprising Audit Findings 
Liz discusses instances where Least Authority found unexpected issues during audits and the value of helping clients fix them. 12:16 - Notable Clients and Audits 
Overview of Least Authority’s clients, including Zcash, MetaMask, Ethereum Foundation, Filecoin, Polygon, and Keystone hardware wallet. 14:35 - Predicting the Ethereum DAO Hack 
Liz reflects on Least Authority’s 2015 Ethereum audit, which identified vulnerabilities that later contributed to the 2016 DAO hack. 17:43 - When to Conduct Audits 
Discussion on the optimal timing for audits, depending on project roadmaps and feature development. 19:51 - Auditor Liability and Security Guarantees 
Liz explains that no system can be 100% secure and discusses the limitations of auditor liability. 22:25 - Social Engineering and Security 
Exploration of how social engineering can bypass even the most secure systems, with examples like SIM swapping and Pfizer leaks. 29:55 - Least Authority’s Products: Private Storage, ZKAPs, Winden 
Overview of Least Authority’s products: Private Storage (client-side encrypted storage), ZKAPs (zero-knowledge access passes), and Winden (anonymous file transfer). 36:45 - ZKAPs Applications Beyond Storage 
Liz discusses potential uses of ZKAPs for other services requiring privacy in payments, like VPNs or electricity. 43:53 - Winden’s Features and Use Cases 
Detailed explanation of Winden’s end-to-end encrypted, identity-free file transfer, ideal for secure peer-to-peer sharing. 46:21 - Destiny: Mobile Version of Winden 
Introduction to Destiny, a mobile app version of Winden using the same magic wormhole protocol. 50:00 - HRO Cloud for Human Rights Organizations 
Discussion of HRO Cloud, a free version of Private Storage for qualified human rights organizations. 51:00 - Moon Math Manual 
Overview of the Moon Math Manual, a resource for learning about ZK-SNARKs, inspired by the term “moon math” from Vitalik Buterin. 57:38 - Privacy, Law Enforcement, and Zero-Knowledge Proofs 
Liz discusses how Least Authority minimizes data collection to avoid sharing with law enforcement, emphasizing privacy design. 1:01:59 - Privacy Market and Big Tech Adoption 
Reflections on the growing demand for privacy tech and potential adoption of zero-knowledge proofs by major tech companies. 1:05:00 - Auditing Non-Crypto Projects 
Liz notes that while most clients are crypto-related, they also audit non-crypto open-source projects, though funding is a challenge. 1:07:17 - Vibe Coding and Auditing Demand 
Discussion on the rise of vibe coding (AI-generated code) and its potential to increase demand for audits, especially for smart contracts. 1:11:07 - Zcash Audit and Bitcoin Codebase 
Liz considers whether their Zcash audit indirectly audited Bitcoin’s codebase, noting it’s an interesting question for further review. 1:13:05 - Publishing Audit Reports 
Liz advocates for more industry-wide publication of audit reports to improve transparency and user education. 1:18:01 - Competing Auditing Firms 
Liz discusses competition in the auditing space, varying by project type (e.g., smart contracts vs. protocols). 1:21:12 - Future of Privacy and Zcash Integration 
Liz expresses hope for Zcash’s privacy tech to be integrated into Bitcoin, emphasizing its potential to drive mass adoption. 1:24:00 - Liz’s First Computer and Early Tech Memories 
Liz shares nostalgic memories of using an Atari, Commodore 64, and AOL, encouraging listeners to comment “AOL” to prove they watched to the end. 1:28:37 - Closing and Winden Recommendation 
Liz thanks the host and encourages listeners to try Winden, an open-source, free file transfer tool.
    --------  
    1:29:22
  • S16 E32: Bitcoin vs Monero vs Zcash Privacy with Diego Salazar & Luke Szramowski of Cypher Stack
    Diego Salazar & Luke Szramowski are working to build Cypher Space: a privacy & sovereignty company. In this episode, they compare + rate the privacy of Bitcoin, Monero, Zcash, Firo, Mimble Wimble (Litecoin, Grin), Zano & Beam. Time stamps: (00:00:59) Introducing Diego Salazar & Luke Szramowski (00:02:04) Tribalism and Privacy Protocols in Crypto (00:03:55) Why Privacy Matters & Personal Motivations (00:04:58) Diego’s Background and Cypher Stack (00:06:58) Luke’s Background and Mathematical Perspective (00:08:40) CoinJoin and the Limits of Bitcoin Privacy (00:09:10) Threat Models and Privacy Tool Selection (00:12:22) CoinJoin’s Effectiveness and Metadata Attacks (00:14:18) Comparing CoinJoin to Tor/VPN Usage (00:17:26) Overconfidence and Under-Researched Privacy Claims (00:19:52) Levels of Privacy and User Education (00:24:31) Defining Adversaries in Privacy Research (00:26:10) CoinJoin’s Real-World Threats and Research Gaps (00:27:17) Social Media, Nuance, and Privacy Debates (00:29:11) CoinJoin as “Add-On” Privacy and Side-Channel Attacks (00:31:46) Underestimating Adversaries and Attack Tools (00:38:37) Sponsor Plugs and Criteria for Privacy Evaluation (00:42:47) Scoring CoinJoin on Privacy Criteria (00:51:09) WabiSabi and Wasabi Wallet Improvements (00:59:29) Other Bitcoin Privacy Tools: BIP47 & Silent Payments (01:06:19) Human Error and Privacy Tool Usability (01:08:51) The Limits of Privacy Ratings and the Need for Nuance (01:12:19) Tribalism, Community Research, and Productive Debate (01:15:33) Non-Interactive Proofs and Security Assumptions (01:16:27) Bitcoin Maximalism and the Limits of Debate (01:17:34) Academic Rigor and the Need for More Research (01:20:01) Bitcoin’s Privacy Risks if Mainstream Adoption Happens (01:21:44) The State of Bitcoin Privacy Research and Funding (01:34:03) Bitcoin’s Missed Privacy Opportunities (01:37:14) Monero’s History and Privacy Technologies (01:41:03) Monero’s Anonymity Set and Privacy Trade-Offs (01:46:52) Monero’s Current Weaknesses and Upcoming FCMP (01:55:24) Monero’s Privacy Scores and Scalability (02:27:50) Zcash: History, Community, and Technology (03:00:29) Zcash’s Privacy Model and Accumulator Approach (03:05:56) Zero-Knowledge Proofs Explained (03:20:08) Zcash’s Privacy Scores and Tachyon Scalability (03:35:12) Firo (formerly Zcoin) and Spark Protocol (03:44:45) Firo’s Privacy Scores and Future Upgrades (03:52:06) Litecoin MWEB and Mimblewimble (04:01:32) MWEB Privacy Scores and Limitations (04:07:03) Other Privacy Projects: Zano, Beam, Salvium (04:10:02) Toxicity, Community, and the Human Element (04:17:00) Philosophy of Privacy and Human Nature (04:24:28) Fungibility, Bitcoin, and Social Realities (04:44:15) Summary and Chart of Privacy Scores (04:57:52) Resources for Privacy Research and Final Thoughts
    --------  
    5:08:14

Meer Zaken en persoonlijke financiën podcasts

Over Bitcoin Takeover Podcast

On the Bitcoin Takeover podcast you're going to hear the builders and innovators who make the Bitcoin project valuable. It's thanks to their work that the BTC price goes up, and it's their efforts that convince large investors that Bitcoin is the future of money. Here you will find the projects and ideas that will radically improve Bitcoin in the future, presented by the creators and innovators themselves. Time to learn!
Podcast website

Luister naar Bitcoin Takeover Podcast, The Diary Of A CEO with Steven Bartlett en vele andere podcasts van over de hele wereld met de radio.net-app

Ontvang de gratis radio.net app

  • Zenders en podcasts om te bookmarken
  • Streamen via Wi-Fi of Bluetooth
  • Ondersteunt Carplay & Android Auto
  • Veel andere app-functies
Social
v7.22.0 | © 2007-2025 radio.de GmbH
Generated: 8/2/2025 - 9:29:24 PM