Founder of Bitcoin Runners and LightningPiggy | Co-founder of the Running Bitcoin Challenge | Running Bitcoin for Hal. Sub-3 marathoner, Chartered Engineer, passionate about freedom tech and proof-of-work.
Few realise at this point that Satoshi will be turning 50 next year and all of his birthday parties happening around the world, on April 5th 2025, are going to be insane 🥳
Proud to have represented @BitcoinRunners at Goodwood this morning. The vibes were high with around 1,000 competitors across all race distances. An ever growing number of marshals and spectators cheered for #bitcoin and “Mr. Bitcoin”. I was most grateful for the passionate encouragement. #teamsatoshi #ProofOfWork #bitcoin
Earlier I ran 21km and completed the #RunningBitcoinChallenge 🥳
Going to continue stacking kms… 50km done so far.
Today’s a good day to join if you haven’t already.
Run/Walk 21km in @halfin’s memory
⁃ Sign-up 👉
As #bitcoin approaches 15 years of age and as far as I can tell there’s still no consensus on what the sat symbol should be.
One idea I heard recently is to recycle the $ symbol in lower case form, once the dollar has gone. I would go one step further and suggest taking over the $ symbol when 1 sat equals 1 dollar (USD) and calling it a V-shaped recovery!
In a similar spirit to ‘laser eyes’, in the run up to hyperbitcoinization we could wear $-$ eyes.
If like me you're probably wondering: What’s the difference between 'Seed XOR' and 'Shamir's Secret Sharing'?
Well, both seed XOR and Shamir’s Secret Sharing (SSS) are methods to split secrets, but they work differently and have distinct properties:
1. Mechanism:
• Seed XOR: This method involves the simple splitting of a secret into two parts using the XOR operation. Given a secret S and a random value R, you compute the value S XOR R to get T. Now, the two shares are R and T. To retrieve S, you’d XOR R and T again.
• Shamir’s Secret Sharing (SSS): SSS is based on polynomial interpolation over finite fields. The idea is to represent the secret as a coefficient in a polynomial and provide different points on that polynomial as shares. Using a sufficient number of these points (based on the degree of the polynomial), the secret can be reconstructed.
2. Number of Shares:
• Seed XOR: Typically creates two shares (though you could extend this idea to more).
• Shamir’s Secret Sharing: Can create any number of shares. You can specify a threshold, say k, such that any k shares are sufficient to reconstruct the secret.
3. Flexibility:
• Seed XOR: Less flexible. Always requires all the shares to reconstruct the original secret.
• Shamir’s Secret Sharing: More flexible. Allows you to specify how many shares (threshold) are needed to reconstruct the secret. For example, you could create 10 shares and set a threshold of 5, meaning any 5 out of the 10 shares can be used to reconstruct the secret.
4. Security:
• Seed XOR: Simple and based on the properties of the XOR operation. If you have one share, it reveals no information about the secret.
• Shamir’s Secret Sharing: More mathematically complex but offers strong security properties. Without a minimum number of shares (below the threshold), it’s computationally infeasible to retrieve the secret.
5. Applications:
• Seed XOR: More appropriate for simple, two-party secret splitting.
• Shamir’s Secret Sharing: Suited for scenarios where a secret needs to be split among multiple parties, and you want to ensure that only a certain number of them collaborating can recover the secret.
In essence, while both methods can be used to split secrets, Shamir’s Secret Sharing offers more flexibility and is appropriate for more complex use-cases.
This was our 3rd year running the Clarendon Marathon Relay 🇬🇧representing @BitcoinRunners and our greatest achievement so far at this excellent charity event. The challenge involved running Salisbury to Winchester. We came 2nd/50 mixed teams & 4th/79 overall. Here's some proof-of-work🧡