Liam Eagen (Alpen Labs), Robin Linus (Zero Sync, BitVM) & Jonas Nick (Blockstream, Taproot) talk about their groundbreaking research paper about Shielded Client-Side Validation – a new way to bring privacy & scalability to Bitcoin.
––––––––––––––––––––––––––
Time stamps:
Introduction (00:00:51)
What is Client-Side Validation? (00:02:09)
Trade-offs in Client-Side Validation (00:04:20)
Comparison with Existing Protocols (00:05:18)
On-chain Throughput and Privacy (00:09:21)
Connecting Bitcoin and Shielded CSV (00:09:55)
User Interaction with the Protocol (00:11:07)
Challenges with the Lightning Network (00:12:22)
Atomic Swaps and Compatibility (00:14:56)
Shielded CSV vs Monero & Zcash (00:16:12)
Discussion on STARKs (00:19:28)
OP_CAT and Covenants (00:21:46)
OP_CAT and Functional Encryption (00:24:03)
Exploration of BitcoinOS (00:25:21)
Potential of BitVM (00:26:11)
Bitcoin as a Currency (00:28:21)
Funding for CSV Projects (00:30:40)
Taint Concept in Shielded Transactions (00:31:14)
Adoption and Privacy Protocols (00:34:08)
Transaction Fees in Shielded Transactions (00:35:08)
Throughput and Base Layer Efficiency (00:36:04)
Node Behavior During Transactions (00:38:12)
Comparison with MimbleWimble (00:39:41)
CryptoSteel’s New Device (00:40:29)
Drivechains (00:41:04)
Discussion about crypto steel backups and a sponsor, Layer Two Labs, promoting drive chains.
Concerns Over Soft Forks (00:43:51)
Rough Consensus Definition (00:45:04)
Challenges of Soft Fork Implementation (00:46:15)
Balancing Stability and Innovation (00:47:29)
Miner Incentives and Fee Structures (00:48:38)
Future of Post-Quantum Proposals (00:49:44)
Increasing Block Size for CSV (00:50:00)
Ideal Block Size Debate (00:53:08)
Quantum Computing Threat (00:59:02)
Potential Consequences of Quantum Attacks (01:00:24)
Post-Quantum Solutions (01:02:23)
Quantum Computing Timeline (01:02:50)
Complexity of Quantum Computers (01:03:31)
Quantum Records and Limitations (01:05:44)
Chat Question on Shielding Protocol (01:06:12)
Hodling.ch (01:06:45)
Self-Custody Security (01:09:15)
Threat Models in Security (01:09:58)
Hardware Wallet Cautionary Tale (01:10:33)
Conference Discussions (01:12:05)
Shielded CSV Funding and Development Timeline (01:13:58)
Prototype Development Outlook (01:15:29)
Concerns Over Adoption (01:17:31)
Scalability vs. Privacy Debate (01:19:34)
Tether on Shielded CSV? (01:22:04)
Revenue Models Discussion (01:22:22)
Transaction Fees and Profitability (01:23:25)
Publisher Fees in CSV Protocol (01:24:16)
Competition and Business Models (01:25:40)
Soft Fork Proposals for Improvement (01:26:07)
Script Restoration and Arithmetic Improvements (01:27:30)
Future of Shielded Client-Side Validation (01:37:23)
Keeping Up with Developments (01:38:44)
Self-Promotion and Team Dynamics (01:41:05)
Proof of Stake? (01:42:51)
Rare Pepes in Shielded CSV (01:43:56)
Acknowledgment of Guests (01:46:18)
Call to Action: Shield Emoji (01:47:57)
Importance of Learning Bitcoin (01:48:07)
Resources for Learning Bitcoin (01:48:31)
Commentary on Peter Wuille (01:49:26)
Block Size Debate (01:50:02)
Optimizing Bitcoin for Global Use (01:51:05)