<div dir="ltr">Hi all,<br><br>The following are some notes I took during Breaking Bitcoin 2019, selected for relevance. Any mistakes are most likely my own.<br><br>Carl Dong gave an excellent talk on guix as a replacement for the gitian build system:<br><a href="http://diyhpl.us/wiki/transcripts/breaking-bitcoin/2019/bitcoin-build-system/">http://diyhpl.us/wiki/transcripts/breaking-bitcoin/2019/bitcoin-build-system/</a><br>but really just watch his presentation: <a href="https://www.youtube.com/watch?v=I2iShmUTEl8">https://www.youtube.com/watch?v=I2iShmUTEl8</a><br><br>Mempool analysis, client-side filtering, client updates<br><a href="http://diyhpl.us/wiki/transcripts/breaking-bitcoin/2019/mempool-analysis-simulation/">http://diyhpl.us/wiki/transcripts/breaking-bitcoin/2019/mempool-analysis-simulation/</a><br><a href="http://diyhpl.us/wiki/transcripts/breaking-bitcoin/2019/neutrino/">http://diyhpl.us/wiki/transcripts/breaking-bitcoin/2019/neutrino/</a><br><a href="http://diyhpl.us/wiki/transcripts/breaking-bitcoin/2019/p2p-encryption/">http://diyhpl.us/wiki/transcripts/breaking-bitcoin/2019/p2p-encryption/</a><br><br>Some privacy and coinjoin talks:<br><a href="http://diyhpl.us/wiki/transcripts/breaking-bitcoin/2019/breaking-bitcoin-privacy/">http://diyhpl.us/wiki/transcripts/breaking-bitcoin/2019/breaking-bitcoin-privacy/</a><br><a href="http://diyhpl.us/wiki/transcripts/breaking-bitcoin/2019/breaking-wasabi/">http://diyhpl.us/wiki/transcripts/breaking-bitcoin/2019/breaking-wasabi/</a><br clear="all"><div><br>Hardware wallets:<br><a href="http://diyhpl.us/wiki/transcripts/breaking-bitcoin/2019/extracting-seeds-from-hardware-wallets/">http://diyhpl.us/wiki/transcripts/breaking-bitcoin/2019/extracting-seeds-from-hardware-wallets/</a><br><a href="http://diyhpl.us/wiki/transcripts/breaking-bitcoin/2019/future-of-hardware-wallets/">http://diyhpl.us/wiki/transcripts/breaking-bitcoin/2019/future-of-hardware-wallets/</a><br><br>Bitcoin upgrades:<br><a href="http://diyhpl.us/wiki/transcripts/breaking-bitcoin/2019/secure-protocols-bip-taproot/">http://diyhpl.us/wiki/transcripts/breaking-bitcoin/2019/secure-protocols-bip-taproot/</a><br><br>p2pool analysis:<br><a href="http://diyhpl.us/wiki/transcripts/breaking-bitcoin/2019/security-attacks-decentralized-mining-pools/">http://diyhpl.us/wiki/transcripts/breaking-bitcoin/2019/security-attacks-decentralized-mining-pools/</a><br><br>Lightning network:<br><a href="http://diyhpl.us/wiki/transcripts/breaking-bitcoin/2019/lightning-network-routing-security/">http://diyhpl.us/wiki/transcripts/breaking-bitcoin/2019/lightning-network-routing-security/</a><br><a href="http://diyhpl.us/wiki/transcripts/breaking-bitcoin/2019/lightning-network-topological-analysis/">http://diyhpl.us/wiki/transcripts/breaking-bitcoin/2019/lightning-network-topological-analysis/</a><br><a href="http://diyhpl.us/wiki/transcripts/breaking-bitcoin/2019/lightning-network-security-panel/">http://diyhpl.us/wiki/transcripts/breaking-bitcoin/2019/lightning-network-security-panel/</a><br><br>Of possible interest (general, not really development focused):<br><a href="http://diyhpl.us/wiki/transcripts/breaking-bitcoin/2019/defense-of-bitcoin/">http://diyhpl.us/wiki/transcripts/breaking-bitcoin/2019/defense-of-bitcoin/</a><br><br></div><div dir="ltr" class="gmail_signature" data-smartmail="gmail_signature">- Bryan<br><a href="http://heybryan.org/" target="_blank">http://heybryan.org/</a><br></div></div>