Connect with us

Opinion

Lightning Network In A Class Of Its Own At Bitcoin 2024 Conference

Published

on


I was asked repeatedly throughout this year’s Bitcoin 2024 conference what my highlight of the moment was — what the signal was amongst the noise. As I returned from Nashville, it occurred to me that, each time, I could never answer the question satisfyingly.

In part, because I simply couldn’t keep up. The activity around the news desk and my support for those running the show left me with little time to focus on anything else. I can’t say I regret it. Anyone who gravitated around our livestream studio space during the week can attest to the energy surrounding it. The Bitcoin Magazine news desk was the veritable heartbeat of the conference.

Now that I’ve had time to collect my thoughts, I can confidently say what stood out most from the conference was the understated presence of the Lightning Network. In different times this would have been a concern but this felt different. It struck me that Lightning has not only arrived but has matured beyond what any other scaling layer can realistically claim.

Largely unnoticed, the payment protocol has quietly inserted itself into every piece of major Bitcoin infrastructure. Most of the world’s leading exchanges now support it, with some running the largest nodes on the network. The dollar-denominated capacity of the network is at an all-time high, and every operator I spoke with this week confirmed its rapidly improving reliability. 

Though it might have looked to the casual conference goer that Lightning had taken a back seat to other popular up-and-coming protocols, it was clear during the conference how vastly ahead it is from the rest of the field. While I was fortunate to meet many talented individuals working on this new generation of Bitcoin technical design, I left the event with more questions about their progress than when I arrived. Lightning, on the other hand, answered many concerns about its status and the road ahead.

Sights on settlements

A recurring narrative during the event was the protocol’s promises as a settlement network. Initially promoted as a retail payment solution, Lightning’s latest and biggest headways might be among businesses and institutions looking to satisfy liquidity needs. The vision, popularized notably by Jack Mallers at Strike, feels more concrete than ever, with infrastructure company Lightspark now at the forefront of these accomplishments. Last Thursday, on the Nakamoto stage, Lightspark’s co-founder Christian Catalini argued for Lightning’s favorable position as a bridge between companies and various financial institutions:

If you think about the challenge of moving value not just between a few countries but two hundred or more countries, every day, 24/7, with deep liquidity. There is only one asset, and that asset is bitcoin. It has regulatory clarity, it has on and off-ramps in pretty much every country around the globe. Now we can connect it all in an open way.

Lightspark’s recent announcement of its partnership with Latin America’s banking giant Nubank clearly outlines the potential for existing firms to modernize their infrastructure using the Lightning network.

Further strengthening the case of Lightning as a rail to connect the global economy, last week’s release of Lightning Labs’ Taproot Asset protocol introduces yet another opportunity for the scaling layer to establish itself as the dominant value transfer protocol on the internet. Before Lightning can come for VISA, it might have to start by displacing SWIFT.

Improving payments

On the payment front, the talk of the town in Nashville was the improvement in user experience brought about by the arrival of features like BOLT12.

Years in the making, the payment protocol offers an intuitive way for users to receive Lightning payments without relying on unreliable, expiring, invoices. It also paves a promising path toward improving users’ ability to receive payments offline, a major pain point of current implementations.

BOLT12 achieves this through static, reusable, offers that do not compromise receiver privacy. Combined with other innovations like DNS payment instructions, it is now possible to create human-readable Bitcoin addresses (ex: alex@twelve.cash) that support different payment formats. Imagine using a single identifier to receive on-chain and Lightning payments regardless of your preferred standards. Twelve.cash, a standout project from this year’s conference hackathon, did a remarkable job highlighting the versatility of this technology, implementing “a simple way to share your bitcoin payment info with the world.”

Other forms of human-readable addresses have existed for some time using the LNURL format but the hope is for users to converge to more mature solutions. Long-time Lightning infrastructure provider Amboss also announced during the event a new Lightning wallet supporting a novel, multi-asset, payment system they’ve called “MIBAN”.

Fragmentation between standards and compatibility issues is anticipated in open and permissionless financial systems. Lightning is further than any alternative in terms of optimizing around these interoperability challenges to ensure seamless payment experiences.

BOLT12 is currently supported by leading wallets like Phoenix and ZEUS, and could land on the Strike app soon.

Following Bitcoin Park’s Lightning Summit around the same time last year, I remember feeling pretty disillusioned about the prospects of consumer Lightning apps. What a difference a year makes. While a fully non-custodial experience might always command a premium, new optimizations, and different security models are emerging that can meet retail users where they are.

Infrastructure at scale

This progress, at every level, would not be possible without the momentous efforts that have gone into infrastructure work over the last couple of years.

Lightspark, which supports Lightning integration for other industry giants like Coinbase and Bitso, is powered by Spiral’s Lightning Development Kit (LDK). Recently announced Alby Hub is also the first production wallet deployed using the LDK node library.

Keep in mind LDK has been in the works for almost four years now. Good things take time. Many people I spoke to during the conference expect the scope and quality of projects to be deployed using this toolkit to significantly accelerate.

Another signal of the evolving Lightning infrastructure came from the release during the week of Breez LDK’s new Liquid integration. This is a trend that is picking up pace and has been pioneered by Boltz’s swapping services. Used in wallet applications like Aqua, Liquid empowers developers to use the sidechain network’s cheap fees to settle transactions in and out of Lightning into L-BTC. While this involves custody tradeoffs, proponents argue it remains a superior option to fully custodial Lightning wallets.

Also in topic during the conference was the progress made at the Lightning Service Provider (LSP) specification level. As a result, the quality of service providers on the network has significantly increased. LSPs are used to provide infrastructure support and liquidity provision to companies wanting to connect to the Lightning Network.

Zeus’s founder Evan Kaloudis shared his company’s effort in this direction:

Since the legal uncertainty in the space arose following the arrest of the Samourai Wallet developers, we’ve doubled down and now have two different services that provide users with connectivity to the Lightning Network. We’ve also massively expanded the Olympus LSP userbase; we now are not only powering the ZEUS wallet, but we’ve now got integrations in a total of four different wallets, including a role as the default LSP in Mutiny Wallet.

Security is another area of the protocol seeing impressive growth. Spiral grantee Sean Gillian’s work on Validating Lightning Signer (VLS) will play a significant role in scaling this technology to power users. Allowing operators to leverage secure enclaves to protect hot signing keys and set spending policies will be required to onboard the next wave of institutional players.

In a panel I hosted Saturday afternoon called “Lightning for Institutions”, the protocol’s co-creator Tadge Dryja expressed strong interest in the development of more secure key management processes.

We’ve worked out how you can implement multi-signature support for Lightning nodes. We have done the math, we know it works. Now we have to work with everyone to get there.

It would not be an infrastructure section without mentioning the massive innovation around the Nostr protocol and its implications for Lightning. One of my favorite Pitchday projects at the conference was Flash, a new payment gateway platform that leverages Nostr for seamless integration of Lightning into any internet services or products. The consequences of using the Nostr messaging protocol as a bridge between Bitcoin applications are not yet fully appreciated. The Flash team has an incredible vision for it. Shoutout also to Justin from Shocknet who I met and is exploring many interesting ways to scale the Lightning protocol using Nostr’s magic sauce.

It’s time to stop fading Lightning. 





Source link

hardware wallets

Celebrating 10 Years of the Hardware Wallet Revolution

Published

on



As we celebrate the 10th anniversary of the first hardware wallet, it’s remarkable to see how far Bitcoin security has come. From the early days of precarious self-custody methods to the game-changing creation of the Trezor Model One, this revolution has transformed the way we protect our digital assets. With a decade of this experience behind us, it’s worth revisiting the challenges of early Bitcoin self-custody, the pivotal impact of the first hardware wallet, the essential role of self-custody in today’s Bitcoin landscape, and the innovative advancements continuing to shape the future of crypto security.

The Origin Story

It all began in 2011 when Marek “Slush” Palatinus logged onto his mining pool server and discovered 3,000 BTC were missing. A mining pool is a collective of miners who combine their computational resources to increase their chances of successfully mining Bitcoin blocks. Slushpool, now known as Braiins Pool, was the pioneering mining pool in the Bitcoin community, established in 2010.

This incident highlighted a significant issue: even tech-savvy Bitcoin enthusiasts could fall victim to online attacks. At that time, securing and managing Bitcoin was a daunting task, involving storing private keys on a computer. However, securing information on a computer is difficult; these complex machines are vulnerable to many threats that allow thieves to steal private keys controlling Bitcoin. The hack that cost Palatinus 3,000 BTC was a reminder of these early vulnerabilities.

Recognizing a pressing need for a simple, stand-alone device that could securely store Bitcoin, Slush, along with Pavol “Stick” Rusnák, embarked on creating the world’s first hardware wallet. Their vision was to develop an offline computer specifically designed to store Bitcoin securely and make it accessible to non-technical users. The concept was straightforward yet revolutionary: a small, single-purpose device that would keep private keys in an isolated environment, protected from online threats.

Before Hardware Wallets

Before hardware wallets became widely available, users had to rely on software wallets installed on computers or smartphones, which exposed them to a range of security threats. Malware infections and other attacks were common. Paper wallets were considered more secure but still required a computer to create the wallet. More secure methods, such as using air-gapped computers for cold storage, required significant technical expertise, and even these methods lacked an adequate level of security for larger amounts of Bitcoin.

The usability of early Bitcoin wallets was also a significant issue, with clunky interfaces and complicated backup processes. Many users failed to back up their wallets properly, leading to permanent loss of funds if a device was lost or damaged. Users were frequently unaware of best practices for backups, and the lack of standardized backup methods further increased the risk. A major improvement in backup standardization came with the introduction of Hierarchical Deterministic (HD) Wallets with BIP32 in 2012, allowing for easier and more reliable backups. Despite these advancements, there was still a lack of easy and user-friendly options for newcomers. In short, the period before Hardware Wallets was marked by significant security and usability challenges, making Bitcoin self-custody a complex and risky endeavor.

The First Hardware Wallet

In the years leading up to 2014, various attempts were made to develop simple, single-purpose devices for cryptocurrency storage. However, these efforts failed to gain traction or meet the necessary security standards. Recognizing the need for a robust solution, Slush and Stick monitored the landscape for two years before they finally decided to create their own hardware wallet.

In 2014, they released the Trezor Model One. This device was the first ever hardware wallet, combining user-friendly design, truly random private key generation, and the ability to easily sign transactions completely offline. In addition, it implemented the BIP39 standard, a new standard created by the Trezor creators to back up wallets using a list of 24 words representing the private keys, a standard adopted by many wallets and familiar to anyone who has put their Bitcoin in self-custody.

When the user first connects the device, it guides them through the setup process to create a new wallet. The device generates a recovery seed, which represents a human-readable version of the wallet’s master private key and enables wallet recovery in case of device malfunction. The user is prompted to write down this list of words on a piece of paper, ensuring the wallet is backed up, and the private keys remain offline.

This onboarding process ensures that users create a backup and keep it secure. The user-friendly design offers advanced security, making hardware wallets accessible to both beginners and experienced users.

The Open Source Advantage

A key aspect of Bitcoin is its commitment to open-source principles, and that’s why the founders of Trezor adhered to the same principles when developing the Trezor Model One. This approach has been adopted by most manufacturers in the industry. Open-source software allows the community to audit and verify a system’s integrity. This transparency ensures that potential vulnerabilities can be identified and addressed promptly and allows improvement by the global community. The first hardware wallet was open source, and many in the industry have embraced this approach for transparency, emphasizing the Bitcoin ethos, “Don’t trust; verify.”

The Importance of Self-Custody

Throughout Bitcoin’s life, we have seen many crypto exchanges and custodians collapse or suffer severe security breaches, showing the importance of holding your private keys. The mantra “not your keys, not your coins” emphasizes that relying on third-party institutions means trusting someone else with your assets, which can lead to big problems if the exchange gets hacked, mismanaged, or faces legal issues.

The Mt. Gox incident in 2014, one of the earliest and most notable exchange collapses, saw the loss of 850,000 Bitcoins, valued at hundreds of millions of dollars at the time. This catastrophic failure was due to both hacking and mismanagement, leaving users unable to recover their funds. Bitfinex also suffered a significant hack in 2016, resulting in the theft of nearly 120,000 Bitcoins. QuadrigaCX in 2019 saw users losing access to their funds after the sudden death of its founder, who was the only one with the keys to the exchange’s wallets. Cryptopia faced a debilitating hack in 2019, and Binance, the largest cryptocurrency exchange by volume, has also experienced breaches and faces increasing regulatory scrutiny. More recently, the FTX collapse in 2022 further reinforced the dangers of entrusting assets to centralized entities. Overall, mismanagement and fraudulent activities led to the loss of billions, impacting countless users and shaking confidence in centralized exchanges.

By using hardware wallets, individuals can achieve true financial independence, keeping their digital assets safe from the vulnerabilities of trusted custodians.

The Evolving Landscape of Hardware Wallets

Over the past decade, the hardware wallet industry has greatly expanded, with many companies offering a variety of products and features to meet different needs. User interfaces now range from simple button-based navigation to touchscreens and full keyboards. Many devices now support multiple cryptocurrencies, while some focus exclusively on Bitcoin. This range of devices caters to both beginners and advanced users, ensuring everyone can find a suitable option.

Another advancement has been the inclusion of secure elements—specialized chips designed to protect devices from physical attacks. However, all secure elements currently available on the market are closed-source, which raises transparency concerns. To address this issue, companies like Tropic Square are actively working on developing open-source secure elements to enhance trust and security.

Other significant advancements in the industry aim to enhance the security and robustness of wallet backups. Techniques such as Shamir’s Secret Sharing, Multisignature Wallets, and SeedXOR allow users to remove single points of failure, making it significantly more difficult for thieves to compromise the wallet.

Looking ahead, we can expect more improvements in hardware wallet security and usability. One notable development is the wider implementation of a new enhanced standard, SLIP39, which uses Shamir’s Secret Sharing. This method is becoming preferred over the traditional BIP39 standard due to its enhanced security and user-friendliness. With SLIP39, users start with a single list of words to back up their wallet and can later upgrade to a “sharded” backup with multiple shares. This approach provides a flexible and highly secure solution, making advanced security measures more accessible and practical for a wider range of users.

Looking Forward to the Next Decade

As we celebrate the first Hardware Wallet, it’s clear that this revolution has fundamentally transformed cryptocurrency security. From humble beginnings as a hobby project to becoming a trusted name in the industry, Trezor has pioneered innovations that have empowered countless individuals to take control of their financial future. The journey from the first prototypes to the sophisticated devices that we now use today is a testament to the vision and dedication of the Trezor team.

With the continuous evolution of Hardware Wallet functionality and a commitment to security and transparency, the future looks promising. As we look forward to the next decade, the industry remains dedicated to securing and innovating Bitcoin security and usability, ensuring that self-custody becomes increasingly accessible and secure for all.

This is a guest post by Josef Tetek. Opinions expressed are entirely their own and do not necessarily reflect those of BTC Inc or Bitcoin Magazine.



Source link

Continue Reading

Fractal Bitcoin

Fractal Bitcoin: A Misleading Affinity

Published

on



Fractal Bitcoin is a recently launched project that bills itself as “the only native scaling solution completely and instantly compatible with Bitcoin. In essence it is a merge mined system portraying itself as a second layer sidechain for Bitcoin, where multiple levels of “sidechains” can be stacked on top of each other. So think of a sidechain of the mainchain, a sidechain of the sidechain, a sidechain of the sidechain of the sidechain, etc. It is not.

Shitcoins Are Not Second Layers

Firstly, the entire system is built around a new native token, Fractal Bitcoin, that is issued completely independent of Bitcoin. It even comes with a massive pre-mine of 50% of the supply being split between an “ecosystem treasury”, a pre-sale, advisors, grants for the community, and developers. This is essentially the equivalent of the entire first halving period of Bitcoin when the block subsidy was 50 BTC per block. From here the network jumps to 25 Fractal Bitcoin (FB) per block.

Secondly, there is no peg mechanism for moving actual bitcoin into the “sidechain.” Yes, you read that correctly. They are framing themselves as a sidechain/layer two, but there is no actual mechanism to move your bitcoin back and forth between the mainchain and “the sidechain” Fractal Bitcoin. It is a completely independent system with no actual ability to move funds back and forth. One of the core aspects of a sidechain is the ability to peg, or “lock,” your bitcoin from the mainchain and move it into a sidechain system so that you can make use of it there, eventually moving those funds back to the mainchain.

Fractal Bitcoin has no such mechanism, and not only that, the discussion around the topic in their “technical litepaper” is completely incoherent. They discuss Discreet Log Contracts (DLCs) as a mechanism for “bridging” between different levels of Fractal sidechains. DLCs are not a suitable mechanism for a peg at all. DLCs function by pre-defining where coins will be sent based on a signature from an oracle or a set of oracles expected at a given time. They are used for gambling, financial products such as derivatives, etc. between two parties. DLCs are not designed to allow funds to be sent to any arbitrary place based on the outcome of the contract, they are designed to allocate funds to one of two participants, or proportionally to each participant, based on the outcome of some contract or event that an oracle signs off on.

This is not suitable for a sidechain or other system peg, which is ideally architected to allow any current owner of coins in the sidechain or second layer system to freely send coins to any destination they choose so long as they have valid control over them on the other system. So not only is there no functional peg mechanism for the live system, but their hand waving about potential designs for one in their litepaper is just completely incoherent.

The whole “design” is a clown show designed to pump bags for pre-mine holders.

“Cadence” Mining

Another troubling aspect of the system is its variation on merge mining, Cadence mining. The network utilizes SHA256 as the hashing algorithm, and it does support conventional Namecoin style merge mining. But there is a catch. Only one third of the blocks produced on the network are capable of being produced by Bitcoin miners engaged in merge mining. The other two thirds must be mined conventionally by miners switching their hashrate entirely over to Fractal Bitcoin.

This is a poisonous incentive structure. It essentially tries to associate itself with the Bitcoin network calling itself a “merge mined system”, when in reality two thirds of the block production mandates turning hashrate away from securing the Bitcoin network and devoting it exclusively to securing Fractal Bitcoin. Most of the retard is not capturable by miners who continue mining Bitcoin, and the greater the value of FB the greater the incentive for Bitcoin miners to defect and begin mining it instead of bitcoin to increase the share of the FB reward they capture.

It essentially functions as an incentive distortion for Bitcoin miners proportional to the value of the overall system. It also offers no advantage in terms of security at all. By forcing this choice it guarantees that most of the network difficulty must remain low enough that whatever small portion of miners find it profitable to defect from Bitcoin to FB can mine blocks at the targeted 30 second block interval. Conventional merge mining would allow the entire mining network to contribute security without having to deal with the opportunity cost of not mining Bitcoin.

What’s The Point of This?

The ostensible point of the network is to facilitate things like DeFi and Ordinals, that consume large amounts of blockspace, by giving them a system to utilize other than the mainchain. The problem with this logic is the reason those systems are built on the mainchain in the first place is because people value the immutability and security that it provides. Nothing about the architecture of Fractal Bitcoin provides the same security guarantees.

Even if they did, there is no functional pegging mechanism at all to facilitate these assets from being interoperable between the mainchain and the Fractal Bitcoin chain. The entire system is a series of handwaves past important technical details to rush something to market that allows insiders to profit off of the pre-mine involved in the launch.

No peg mechanism, an incoherent “merge mining” scheme that not only creates a poisonous incentive distortion should it continue rising in value, but actually guarantees a lower level of proof of work security, and a bunch of buzzwords. It does have CAT active, but so do testnets in existence. So even the argument as a testing ground for things built using CAT is just incoherent and a half assed rationalization for a pre-mined token pump.

Calling this a sidechain, or a layer of Bitcoin, is beyond ridiculous. It’s a token scheme, pure and simple. 



Source link

Continue Reading

Opinion

The (Zero-Knowledge Proof) Singularity Is Near

Published

on



The broader impact of proof singularity extends beyond individual blockchain networks, as it paves the way for a more interconnected and scalable Web3 ecosystem. As ZK proofs become faster and more efficient, cross-chain communication and interoperability can be greatly improved, enabling seamless, secure interactions between various blockchain protocols. This could lead to a paradigm shift where data privacy and security are inherently built into the infrastructure, fostering trust and compliance in industries that require rigorous data protection standards, such as healthcare, finance, and supply chain management.



Source link

Continue Reading
Advertisement [ethereumads]

Trending

    wpChatIcon