Bitcoin Optech Newsletter #205: Key Developments and Updates

·

This week’s newsletter covers proposed changes to Bitcoin Core’s transaction replacement policies, details about the Hertzbleed side-channel vulnerability, conclusions from discussions on timestamp system design, and a review of a new Sybil-resistant protocol using Bitcoin UTXOs. Additionally, we highlight notable updates in Bitcoin client and service software, including new releases and significant changes across popular infrastructure projects.

News

Full Replace-by-Fee Option for Bitcoin Core

Two pull requests have been initiated to support a full replace-by-fee (RBF) option in Bitcoin Core, which would be disabled by default. If enabled, any unconfirmed transaction in the node’s mempool could be replaced by an alternative version that pays a higher fee, adhering to specific rules.

Currently, Bitcoin Core only allows RBF if the transaction being replaced has signaled opt-in as defined in BIP125. This poses challenges for multi-party contract protocols like the Lightning Network (LN) and Discreet Log Contracts (DLCs), where one party might remove the BIP125 signal to prevent replacements by others. Such actions can lead to delays or, in worst-case scenarios, financial losses in time-sensitive protocols like Hashed Timelock Contracts (HTLCs).

One of the pull requests has already garnered significant developer support. Since it only adds the capability for full RBF without enabling it by default, it does not alter Bitcoin Core’s current behavior. In the long term, some developers may advocate for enabling full RBF by default, prompting a discussion thread on the Bitcoin-Dev mailing list to gather feedback from service providers, application developers, and alternative full-node implementers.

Hertzbleed Side-Channel Vulnerability

A recently disclosed security vulnerability, Hertzbleed, affects many mainstream laptop, desktop, and server CPUs. When private keys are used to create signatures for Bitcoin transactions, this vulnerability could potentially allow attackers to extract those keys. Notably, the attack impacts signature-generation code specifically designed to use consistent CPU operations to prevent information leakage.

Exploiting Hertzbleed requires attackers to measure CPU power consumption or the duration of specific operations. The vulnerability is more likely to affect frequently used hot wallets, such as those employed by custodial services and LN routing nodes, especially in cases of address reuse. Cold wallets or those used in secure offline environments are less susceptible.

At this time, the full impact on Bitcoin users remains unclear. Many existing wallets, including popular hardware signing devices, use signature-generation code vulnerable to power and timing analysis. Users with higher security requirements should monitor developments and consider reaching out to software developers via support channels like Bitcoin Stack Exchange for specific guidance.

Timestamping System Design Debate

A prolonged debate on the Bitcoin-Dev mailing list regarding the design of Bitcoin-based timestamping systems, such as Open Timestamps (OTS), appears to have reached a conclusion. The discussion highlighted two distinct approaches to timestamping:

TSPoE systems, like OTS, are efficient and scalable, requiring minimal global storage since users store their own proofs. They are also simpler in concept and implementation. EO systems, by contrast, require all participants to store every document commitment, increasing complexity but enabling verification of initial publication timing.

The discussion did not lead to proposed changes for existing systems like OTS or transaction sponsorship but provided clarity for participants with differing views on timestamping implications.

RIDDLE: A New Sybil-Resistance Protocol

Adam “Waxwing” Gibson proposed a Sybil-resistant mechanism on the Bitcoin-Dev mailing list that uses Bitcoin UTXOs while preserving privacy. Users generate a list of UTXOs—one owned by the user and others by different parties—and create a signature provably from one UTXO owner without revealing which one.

Malicious users can generate multiple proofs but are limited by the number of available UTXOs, curbing their ability to consume network resources excessively. Spending a UTXO to acquire a new one incurs transaction fees, further discouraging abuse. Services can impose additional constraints, such as accepting only UTXOs with specific values or ages.

Gibson’s RIDDLE protocol supports both global and local contexts for membership proofs. Global proofs are shared among verifiers, allowing one proof per UTXO in a given context (e.g., one account registration per 1 BTC UTXO aged over a year). Local proofs are specific to individual verifiers or groups, enabling UTXO reuse across services.

High-value UTXOs can be treated as multiple lower-value ones, enhancing flexibility. While RIDDLE offers privacy advantages over other Sybil-resistance mechanisms, Gibson cautions that combining system data with external information could weaken privacy guarantees.

On the Lightning-Dev mailing list, developer ZmnSCPxj suggested RIDDLE could decouple Sybil-resistance from UTXO-based channel identifiers in the Lightning Network, improving privacy in the era of Taproot and signature aggregation.

Services and Client Updates

This section covers interesting changes in Bitcoin wallets and services.

New Releases and Release Candidates

New versions and release candidates for popular Bitcoin infrastructure projects. Consider upgrading or helping test candidate versions.

Notable Code and Documentation Changes

This week saw significant developments across key Bitcoin projects:

👉 Explore real-time development tools

Frequently Asked Questions

What is replace-by-fee (RBF)?
RBF allows replacing an unconfirmed transaction with a new version that pays a higher fee. This is useful for accelerating confirmations but requires opt-in signaling under current Bitcoin Core rules.

How does Hertzbleed affect Bitcoin users?
Hertzbleed is a CPU vulnerability that could leak private keys during signature generation. It primarily impacts hot wallets and services with frequent signing operations, though offline wallets remain relatively secure.

What are the benefits of Taproot?
Taproot improves privacy and efficiency by making all transactions appear identical on the blockchain. It also enables complex smart contracts with lower fees and enhanced scalability.

How does RIDDLE prevent Sybil attacks?
RIDDLE uses Bitcoin UTXOs to create proofs of ownership without revealing specific details. This limits users’ ability to create multiple identities while maintaining privacy.

What is the difference between TSPoE and EO timestamping?
TSPoE provides independent proofs of existence for documents, while EO enables verifiable event ordering, showing when a document was first timestamped.

Why are zero-conf channels important?
Zero-conf channels allow Lightning Network participants to use channels before they are fully confirmed, reducing open/close delays and improving user experience.