Thread

Zero-JS Hypermedia Browser

Relays: 5
Replies: 74
Generated: 06:12:50
Old methods of storing evil stuff required obfuscation: they would need to break it up into multiple chunks and reassembly would require specific software and knowledge of what the data is and how to reconstruct and interpret it exactly. The old formats looked like this: "Hi, I'm a Bitcoin transaction, here's my first output of 45 outputs - <filepart1>, here's my second output <filepart2>, here's my third output<filepart3>" along with a tonne of other stuff that has to get parsed out when processing the highly obfuscated material. This is thankfully also true of inscriptions. OP_RETURN however is just a dump for raw, serialized data. It's not the same. It says the equivalent of "Hi I'm a Bitcoin transaction, here's an unspendable output: <file> end". This wasn't a problem for tiny OP_RETURNs i.e their current limit of 80 bytes. If they're permitted to be 100kb, that's where the abuse begins. And that's the end of plausible deniability. When the stuff gets processed - which it has to be for your node to verify that they are valid transactions - then you just have a raw, unadulterated file that will trigger primitive antivirus/forensics software to alert the user: "Hi, you have CP on your computer." You now need a licence to run a Bitcoin node, everyone thinks you're disgusting if you do, and they're not even wrong. https://youtu.be/JLtmSzeLXOU
2025-08-31 21:28:44 from 1 relay(s) 36 replies ↓
Login to reply

Replies (74)

Great presentation. Bitcoin Mechanics argument on how Core 30 literally is the beginning of the end of Bitcoin is the clearest I’ve seen yet. It makes a compelling case for why it is the most serious attack on Bitcoin to date and imho really drives home the point of how monetary transaction data is fundamentally different from arbitrary data and why it matter so much and what the consequences are. nostr:nevent1qqs9mnye99pkh22xl8cqrzyyfmlpmvkwel3ua68a96ea9mqdlrqlq2qpupmhxue69uhhyetvv9ujuerpd46hxtnfduhj2v3swaehxw309aex2mrp0yhxumm5daeks6fwwa5kute9xgc8wumn8ghj7mn0wvhxcmmv9ujnyvrhwden5te0wfjkccte9eekjctdwd68ytnrdakj7ffjxpmhxue69uhhyetvv9ujuvrcvd5xzapwvdhk6te9xgc8wumn8ghj7mnxwfjkccte9eshqup0y5erqamnwvaz7tmjv4kxz7tjwvhxumm5daeks6fwwa5kute9xgc8wumn8ghj7un9d3shjtnwv4u8getj0ghxxmmd9ujnyvrhwden5te0vejkuunfwgkhxtnwda6x7umgdyh8w6twqgs8fl79rnpsz5x00xmvkvtd8g2u7ve2k2dr3lkfadyy4v24r4k3s4srqsqqqqqpckxlgg
2025-08-31 22:31:33 from 1 relay(s) ↑ Parent Reply
They are contiguous data and they look exactly like a real file if you have no file table info to go off of.
2025-08-31 22:39:43 from 1 relay(s) ↑ Parent Reply
Excellent video! I suggest everyone watch and understand why running knots is vitally important to #Bitcoin future. Run knots ya”ll. nostr:nevent1qqs9mnye99pkh22xl8cqrzyyfmlpmvkwel3ua68a96ea9mqdlrqlq2qpupmhxue69uhhyetvv9ujuerpd46hxtnfduhj2v3swaehxw309aex2mrp0yhxumm5daeks6fwwa5kute9xgc8wumn8ghj7mn0wvhxcmmv9ujnyvrhwden5te0wfjkccte9eekjctdwd68ytnrdakj7ffjxpmhxue69uhhyetvv9ujuvrcvd5xzapwvdhk6te9xgc8wumn8ghj7mnxwfjkccte9eshqup0y5erqamnwvaz7tmjv4kxz7tjwvhxumm5daeks6fwwa5kute9xgc8wumn8ghj7un9d3shjtnwv4u8getj0ghxxmmd9ujnyvrhwden5te0vejkuunfwgkhxtnwda6x7umgdyh8w6twgd65ez
2025-08-31 23:45:02 from 1 relay(s) ↑ Parent Reply
Bitcoin’s value comes from being neutral and censorship-resistant. Abuse vectors exist, yes, but once we accept filtering, licensing, or “allowed” use-cases, Bitcoin is dead. The solution isn’t to compromise the protocol, it’s to harden the culture of self-custody, verification, and personal responsibility.
2025-09-01 05:00:51 from 1 relay(s) ↑ Parent Reply
I'm pretty sure pruned nodes do this. 80 bytes per block for the whole chain, tx payloads for the UTXOs that are er. Unspent. The blocks have the integrity data and are the hashed prevblock itself.so, no. You don't need to keep any spam someone will have the full block either way. You personally only need the txs relevant to your wallet.
2025-09-01 10:27:59 from 1 relay(s) ↑ Parent 1 replies ↓ Reply
If you’re still running core at this point, I don’t even know what you’re doing with your life. And I don’t want to be friends. nostr:nevent1qqs9mnye99pkh22xl8cqrzyyfmlpmvkwel3ua68a96ea9mqdlrqlq2qpupmhxue69uhhyetvv9ujuerpd46hxtnfduhj2v3swaehxw309aex2mrp0yhxumm5daeks6fwwa5kute9xgc8wumn8ghj7mn0wvhxcmmv9ujnyvrhwden5te0wfjkccte9eekjctdwd68ytnrdakj7ffjxpmhxue69uhhyetvv9ujuvrcvd5xzapwvdhk6te9xgc8wumn8ghj7mnxwfjkccte9eshqup0y5erqamnwvaz7tmjv4kxz7tjwvhxumm5daeks6fwwa5kute9xgc8wumn8ghj7un9d3shjtnwv4u8getj0ghxxmmd9ujnyvrhwden5te0vejkuunfwgkhxtnwda6x7umgdyh8w6twgd65ez
2025-09-01 12:05:33 from 1 relay(s) ↑ Parent Reply
wouldn't there be an op return tag at the beginning and end of each 80 byte set? since what core enabled is multiple op returns per tx. Doesn't sound like its raw data uninterrupted.
2025-09-01 15:55:12 from 1 relay(s) ↑ Parent Reply
Is that supposed to be witty funny reply nostr:nprofile1q9yhwue69uhksar5wqhj76fhw3cx5upn0pskx6rsdvmrv6txw9kx67r2va6ny7n8dpux7emvd4jnw6m60f4xyvnjwd6hw6f5wvmksar6dsmkzepwdahxjmmwq99hwumn8ghj76r5w3cr5te0dymhgur2wqehsctrdpcxkd3kd9n8zmrd0p4xwafj0fnks7r0vakx6efhdda856nzxfe8xathdy68xdmgw3axcdmpvshx7mnfdahqqgykf003g7lwd09nyz8z5a5xwgvd8097mdvdyqtyj4r53ed29v9r9vsffhdz ? Maybe this would be considered smart where you come from on reddit ?
2025-09-02 01:37:04 from 1 relay(s) ↑ Parent Reply
OK I apologize my other comment is ridiculous without context. the "CP attack" on nodes is well known and always had different mitigations and legal theories in bitcoin history. my comment today is in the context of this note, from the "bcore vs knots" mempool war: nostr:nevent1qvzqqqqqqypzqa8lc5wvxq2seaumdje3d5aptnen92ef5w87e845sj4325wk6xzkqqs9mnye99pkh22xl8cqrzyyfmlpmvkwel3ua68a96ea9mqdlrqlq2q6mlpgu If you find this issue concerning I would encourage you to do your own research on this issue. At the least- be aware of what it means to run a node and understand that you have some control- to demonstrate your intentions using the software.
2025-09-02 02:46:14 from 1 relay(s) ↑ Parent Reply
Filters have been in bitcoin the whole time in the goal of it being intended as a monetary network. This is no different and comes with a ton of unintended consequences
2025-09-02 11:44:06 from 1 relay(s) ↑ Parent Reply
What nostr:nprofile1qqsq743lut8a7xqvkyz9s6u4suehngxplh8mcvq6sryz2hen690s88gpz9mhxue69uhkummnw3ezuamfdejj7qg4waehxw309aex2mrp0yhxgctdw4eju6t09u8p9k8z says, as well as the fact that knots is LITERALLY 99% Core so its fair to say knots is only 10. Its Core + 10
2025-09-02 11:47:15 from 1 relay(s) ↑ Parent 1 replies ↓ Reply
What court is it that you think has jurisdiction over a distributed open source software protocol?
2025-09-02 23:17:02 from 1 relay(s) ↑ Parent Reply
Download the source code yourself? If not tech savy, maybe asking some different LLMs and see what they say. Chatgpt says 95% the same with 100% with consensus, 95/99% with core functionality, and 70/80% user configurability.
2025-09-03 00:51:45 from 1 relay(s) ↑ Parent Reply
hey mechanic, just fyi you can already store 4kb files in control block sibling hashes in plain text without having to reconstruct them. plenty of malware is under 4kb in size, so you will have to stop relaying taproot transactions if you believe this is a real threat glhf
2025-09-08 18:56:20 from 1 relay(s) ↑ Parent 1 replies ↓ Reply