<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[massmux.org Labs]]></title><description><![CDATA[Tips, Snippets, Notes, Code, HowTos and more about Bitcoin, Lightning Network, Nostr, AI and Financial Freedom. Subscribe Now for free!]]></description><link>https://massmux.org</link><image><url>https://substackcdn.com/image/fetch/$s_!-Zua!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8da0270c-91f7-45c6-a5ce-f6d5b14b2df6_400x400.jpeg</url><title>massmux.org Labs</title><link>https://massmux.org</link></image><generator>Substack</generator><lastBuildDate>Mon, 20 Apr 2026 11:03:46 GMT</lastBuildDate><atom:link href="https://massmux.org/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Massimo Musumeci]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[massmux@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[massmux@substack.com]]></itunes:email><itunes:name><![CDATA[Max Musumeci]]></itunes:name></itunes:owner><itunes:author><![CDATA[Max Musumeci]]></itunes:author><googleplay:owner><![CDATA[massmux@substack.com]]></googleplay:owner><googleplay:email><![CDATA[massmux@substack.com]]></googleplay:email><googleplay:author><![CDATA[Max Musumeci]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Your Encrypted Messages may not be as Private as You Think — And the FBI Just Proved It]]></title><description><![CDATA[Signal&#8217;s encryption wasn&#8217;t broken. But the FBI read the messages anyway. Here&#8217;s what actually happened &#8212; and the two-minute fix that would have prevented it.]]></description><link>https://massmux.org/p/your-encrypted-messages-may-not-be</link><guid isPermaLink="false">https://massmux.org/p/your-encrypted-messages-may-not-be</guid><dc:creator><![CDATA[Max Musumeci]]></dc:creator><pubDate>Tue, 14 Apr 2026 13:29:33 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!QfhG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16eae325-fd07-4665-88a7-d5930f5208d4_640x360.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!QfhG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16eae325-fd07-4665-88a7-d5930f5208d4_640x360.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!QfhG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16eae325-fd07-4665-88a7-d5930f5208d4_640x360.png 424w, https://substackcdn.com/image/fetch/$s_!QfhG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16eae325-fd07-4665-88a7-d5930f5208d4_640x360.png 848w, https://substackcdn.com/image/fetch/$s_!QfhG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16eae325-fd07-4665-88a7-d5930f5208d4_640x360.png 1272w, https://substackcdn.com/image/fetch/$s_!QfhG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16eae325-fd07-4665-88a7-d5930f5208d4_640x360.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!QfhG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16eae325-fd07-4665-88a7-d5930f5208d4_640x360.png" width="640" height="360" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/16eae325-fd07-4665-88a7-d5930f5208d4_640x360.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:360,&quot;width&quot;:640,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:311317,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://massmux.org/i/194181316?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16eae325-fd07-4665-88a7-d5930f5208d4_640x360.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!QfhG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16eae325-fd07-4665-88a7-d5930f5208d4_640x360.png 424w, https://substackcdn.com/image/fetch/$s_!QfhG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16eae325-fd07-4665-88a7-d5930f5208d4_640x360.png 848w, https://substackcdn.com/image/fetch/$s_!QfhG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16eae325-fd07-4665-88a7-d5930f5208d4_640x360.png 1272w, https://substackcdn.com/image/fetch/$s_!QfhG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16eae325-fd07-4665-88a7-d5930f5208d4_640x360.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The case seemed routine at first. A group of people accused of vandalizing and attacking an ICE detention facility in Alvarado, Texas on July 4, 2025. A federal trial in Fort Worth. Standard digital evidence.</p><p>Then, on March 10, 2026, FBI Special Agent Clark Wiethorn took the stand and described something that stopped the security community cold.</p><p>Investigators had recovered Signal messages from a defendant&#8217;s iPhone. Not because they hacked Signal. Not because they exploited some zero-day vulnerability. Signal&#8217;s end-to-end encryption was never touched. <strong>The messages were sitting in a completely different place &#8212; in Apple&#8217;s own internal notification database</strong> &#8212; and they had been there the whole time, <strong>even after Signal had been deleted from the phone</strong>.</p><h3>How end-to-end encryption actually works &#8212; and where it stops</h3><p>End-to-end encryption (E2EE) means that a message is scrambled on your device before it leaves, travels across the internet in unreadable form, and is only decrypted on the recipient&#8217;s device. Signal&#8217;s servers never see the content. Neither does anyone intercepting the connection.</p><p>This is real, and it works exactly as advertised. The problem is what happens next.</p><p>When a message arrives on your phone, Signal has to display a notification. To do that, it decrypts the message locally and passes the readable text to iOS &#8212; to Apple&#8217;s notification system &#8212; so it can appear on your lock screen. At that moment, iOS takes that decrypted text and writes it into its own internal notification database. A database that Signal has no control over. A database that doesn&#8217;t get deleted when you delete Signal. A database that can retain content for weeks.</p><p>Forensic investigators, using tools like Cellebrite, know exactly where that database lives. And with physical access to a seized device, they can pull everything from it &#8212; including the full text of messages from apps long since uninstalled.</p><p>That is precisely what happened in the Prairieland case. Defense attorney Harmony Schuerman described the mechanism in plain terms in her trial notes:</p><blockquote><p><em>They were able to capture these chats because of the way she had notifications set up on her phone &#8212; anytime a notification pops up on the lock screen, Apple stores it in the internal memory of the device.</em></p></blockquote><p>Only incoming messages were recovered, not outgoing ones. The notification database captures what arrives on your lock screen, nothing else.</p><h3>This isn&#8217;t a Signal problem. It&#8217;s a layer problem.</h3><p>Signal did not fail here. The encryption between sender and recipient worked perfectly. What failed was an assumption most users make without realizing it: that an encrypted app controls everything that happens to its messages on your device.</p><p>It doesn&#8217;t.</p><p>The operating system is a separate layer, and it has its own logic. Once a message clears the encrypted channel and lands on your phone, the OS can &#8212; and does &#8212; make its own copies for its own purposes. Notifications, caches, system logs. None of these are within the app&#8217;s reach.</p><p>The same vulnerability applies to WhatsApp, Telegram, iMessage, and any other app that shows message content in lock screen previews. The Prairieland case surfaced it in a Signal context, but the underlying mechanism is universal.</p><p>It&#8217;s also worth nothing what this attack requires: physical access to your unlocked device. This is not a remote exploit. It&#8217;s not surveillance over the network. It&#8217;s a forensic extraction that happens after a device has been seized. For most people, that narrows the threat significantly. For journalists, lawyers, activists, or anyone whose device could end up in the wrong hands &#8212; it&#8217;s a direct and documented risk.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://massmux.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">massmux.org Labs is a reader-supported publication. To receive new posts, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3>The fix is two settings, not one</h3><p>Here is where many guides get it wrong: disabling notification previews at the iOS system level alone is not sufficient. You need to act at both layers.</p><p><strong>On iOS:</strong></p><p>Go to Settings &#8594; Notifications &#8594; Signal &#8594; Show Previews &#8594; <strong>Never</strong>.</p><p>This prevents iOS from writing decrypted content into its notification database.</p><p><strong>Inside Signal:</strong></p><p>Go to Signal &#8594; Settings &#8594; Notifications &#8594; Notification Content &#8594; <strong>No Name or Content</strong>.</p><p>This prevents Signal from passing the decrypted message text to the iOS notification API in the first place.</p><p>Both steps are necessary. One without the other leaves a gap.</p><p><strong>On Android</strong>, the situation is structurally similar but the system&#8217;s built-in notification history only retains data for 24 hours by default, and users can disable it entirely via Settings &#8594; Notifications &#8594; Notification History. The primary mitigation remains the same: inside Signal, set notification content to show nothing. No text reaches the OS layer if it&#8217;s never passed there.</p><p><strong>Three things that do not fix this problem:</strong></p><p>Disappearing messages won&#8217;t help &#8212; the notification preview is written to the database before Signal&#8217;s deletion timer ever runs. Deleting the Signal app won&#8217;t help &#8212; the OS database persists independently. Enabling iCloud Advanced Data Protection won&#8217;t help &#8212; that protects cloud backups from server-side access, which is an entirely different threat model.</p><h3>What have we learnt?</h3><p>Encryption protects the channel. It does not protect the device. The device can be always seized legally or with violence. You cannot trust data you have on it.</p><p>These are two separate threat models, and conflating them leads to a false sense of security. Signal is not broken. Using Signal is still significantly more private than using unencrypted alternatives. But privacy is a stack of choices, not a single switch. The app is one layer. The operating system is another. Physical device security is a third.</p><p>The Prairieland case is useful precisely because it makes this concrete. A real investigation. A real forensic technique. A real courtroom exhibit. And a real setting that, had it been configured differently, would have prevented the recovery entirely.</p><p>Two settings. That&#8217;s all it would have taken.</p><p><em>Want to see exactly how this works &#8212; with a full walkthrough of the technical mechanism and the step-by-step configuration for both iOS and Android? I covered everything in a dedicated video on my YouTube channel (in italian): <a href="https://www.youtube.com/watch?v=KL9At4pgDw8">youtube video</a></em></p><p><em>If you use servers or communications infrastructure for a business and want to think seriously about your security posture &#8212; including private hosting outside major cloud providers &#8212; take a look at <a href="https://denali.pro/">Denali PRO</a>. Swiss-based infrastructure provider, Lightning Network payments accepted.</em></p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://massmux.org/p/your-encrypted-messages-may-not-be?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading massmux.org Labs! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://massmux.org/p/your-encrypted-messages-may-not-be?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://massmux.org/p/your-encrypted-messages-may-not-be?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p>]]></content:encoded></item><item><title><![CDATA[Enhancing privacy with Lightning]]></title><description><![CDATA[Coin control, unannounced channels, and the loop-out technique]]></description><link>https://massmux.org/p/enhancing-privacy-with-lightning</link><guid isPermaLink="false">https://massmux.org/p/enhancing-privacy-with-lightning</guid><dc:creator><![CDATA[Max Musumeci]]></dc:creator><pubDate>Wed, 08 Apr 2026 15:31:07 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!er8L!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1c06993-984a-4e7f-85f3-2f6072724b90_640x360.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!er8L!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1c06993-984a-4e7f-85f3-2f6072724b90_640x360.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!er8L!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1c06993-984a-4e7f-85f3-2f6072724b90_640x360.png 424w, https://substackcdn.com/image/fetch/$s_!er8L!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1c06993-984a-4e7f-85f3-2f6072724b90_640x360.png 848w, https://substackcdn.com/image/fetch/$s_!er8L!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1c06993-984a-4e7f-85f3-2f6072724b90_640x360.png 1272w, https://substackcdn.com/image/fetch/$s_!er8L!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1c06993-984a-4e7f-85f3-2f6072724b90_640x360.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!er8L!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1c06993-984a-4e7f-85f3-2f6072724b90_640x360.png" width="640" height="360" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b1c06993-984a-4e7f-85f3-2f6072724b90_640x360.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:360,&quot;width&quot;:640,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:185576,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://massmux.org/i/193545448?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1c06993-984a-4e7f-85f3-2f6072724b90_640x360.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!er8L!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1c06993-984a-4e7f-85f3-2f6072724b90_640x360.png 424w, https://substackcdn.com/image/fetch/$s_!er8L!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1c06993-984a-4e7f-85f3-2f6072724b90_640x360.png 848w, https://substackcdn.com/image/fetch/$s_!er8L!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1c06993-984a-4e7f-85f3-2f6072724b90_640x360.png 1272w, https://substackcdn.com/image/fetch/$s_!er8L!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1c06993-984a-4e7f-85f3-2f6072724b90_640x360.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Every Bitcoin transaction is permanently recorded on a public ledger. Every UTXO you spend leaves a trace. Every address you reuse becomes a thread that chain analysis firms can pull. This is not a bug &#8212; it is how the protocol works, by design. But it does mean that if you care about financial privacy, you need to think carefully about how you move your coins.</p><p>The Lightning Network does not solve every privacy problem in Bitcoin. But used with intention, it offers tools that on-chain transactions simply cannot replicate. This article covers how to open Lightning channels with privacy in mind, how to use specific UTXOs for channel funding, how private (unannounced) channels work, and how the loop-out technique can effectively break the on-chain link between old and new UTXOs.</p><p>All examples use LND (Lightning Network Daemon) with <code>lncli</code> version 0.20.1 on mainnet.</p><div><hr></div><h3>What the Blockchain Actually Reveals</h3><p>When you open a Lightning channel, a funding transaction is broadcast on-chain. This transaction creates a 2-of-2 multisig output &#8212; the channel itself. It is visible to everyone. The UTXO you used to fund the channel is publicly linked to the channel&#8217;s funding transaction. That link is permanent and irreversible on-chain.</p><p>This is why the choice of which UTXO you use to open a channel matters. If that UTXO is associated with your identity &#8212; because it came from a KYC exchange, or was received at an address you&#8217;ve publicly shared &#8212; then the channel open carries that identity forward.</p><p>Lightning transactions themselves do not appear on-chain. Payments are routed off-chain through channels, using onion routing to obscure the path from intermediate nodes. Common on-chain analysis heuristics &#8212; common-input-ownership, change address detection, amount-based clustering &#8212; fundamentally do not apply to Lightning payments because there are no on-chain inputs or outputs for each individual payment. The channel balance is known only to the two parties sharing it.</p><p>But &#8220;better than on-chain&#8221; is not the same as &#8220;private.&#8221; Let&#8217;s look at where the real risks and real opportunities lie.</p><div><hr></div><h3>Public Channels vs. Private (Unannounced) Channels</h3><p>By default, when you open a Lightning channel, you announce it to the network. Your node ID, your peer&#8217;s node ID, the channel capacity, and the funding UTXO all become part of the public channel graph &#8212; discoverable by anyone querying the network.</p><p>For routing nodes, this is necessary. Announcing a channel allows other nodes to route payments through you, which earns fees. But if you are not running a routing node &#8212; if you just want to send and receive payments privately &#8212; announcing your channels is an unnecessary exposure.</p><p>LND offers a <code>--private</code> flag precisely for this purpose. A private channel (also called an unannounced channel) is not broadcast to the network graph. Your peer knows about it, and you can still route payments through it using route hints, but no third party can discover its existence by querying the graph.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://massmux.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">massmux.org Labs is a reader-supported publication. To receive new posts, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h4>Opening a Standard (Announced) Channel</h4><p>in this example we open to the Loop node, using a specified UTXO in the onchain wallet.</p><pre><code><code>lncli openchannel \
  --node_key 021c97a90a411ff2b10dc2a8e32de2f29d2fa49d41bfbb52bd416e460db0747d0d \
  --connect 50.112.125.89:9735 \
  --utxo XXX:0 \
  --fundmax \
  --sat_per_vbyte 5
</code></code></pre><p>This opens a channel that will be announced to the network. The channel will appear in graph queries. Anyone can see your node&#8217;s connection to this peer.</p><h4>Opening a Private (Unannounced) Channel</h4><pre><code><code>lncli openchannel \
  --node_key 021c97a90a411ff2b10dc2a8e32de2f29d2fa49d41bfbb52bd416e460db0747d0d \
  --connect 50.112.125.89:9735 \
  --utxo XXX:0 \
  --fundmax \
  --private \
  --sat_per_vbyte 5
</code></code></pre><p>The <code>--private</code> flag tells LND not to announce this channel. The funding transaction still appears on-chain &#8212; you cannot avoid that &#8212; but the association between your node and this peer is not broadcast to the graph.</p><p><strong>Important nuance:</strong> the funding transaction is still publicly visible. A sufficiently motivated chain analyst who knows your node&#8217;s on-chain wallet addresses can still identify the funding output as a 2-of-2 multisig and flag it as a likely Lightning channel. What they lose is the graph-level confirmation of who your peer is and that this channel exists as an active route. This is a meaningful improvement, not a complete solution.</p><div><hr></div><h3>Coin Control: Choosing Which UTXO Funds the Channel</h3><p>One of the most significant privacy tools available in modern LND is explicit UTXO selection for channel opens. This was introduced in LND v0.17.0 and is available in all subsequent versions including 0.20.1.</p><p>The <code>--utxo</code> flag lets you specify exactly which UTXO the funding transaction will consume. Combined with <code>--fundmax</code>, it ensures the entire UTXO is consumed &#8212; no change output is created.</p><pre><code><code>lncli openchannel \
  --node_key &lt;PEER_PUBKEY&gt; \
  --utxo &lt;txid&gt;:&lt;vout&gt; \
  --fundmax \
  --sat_per_vbyte 5</code></code></pre><p>Why does this matter? Two reasons:</p><p><strong>No change output.</strong> When LND&#8217;s wallet automatically selects coins for a channel open, it may combine multiple UTXOs or create a change output. Change outputs are a classic privacy leak &#8212; chain analysis heuristics use them to cluster UTXOs and infer wallet ownership. Using <code>--utxo</code> with <code>--fundmax</code> eliminates this by spending the entire selected UTXO into the channel, leaving no residue.</p><p><strong>Deliberate UTXO segregation.</strong> If you have UTXOs of different origin &#8212; some from a KYC exchange, some mined, some received peer-to-peer &#8212; you want full control over which history gets attached to a channel open. Letting the wallet pick automatically risks merging inputs from different sources, which is one of the strongest signals chain analysis can find.</p><p>To list your available UTXOs before opening a channel:</p><pre><code><code>lncli listunspent</code></code></pre><p>This will show you each UTXO, its <code>txid:vout</code> reference, amount, and confirmation status.</p><div><hr></div><h3>The Loop-Out Technique: Breaking the UTXO Trail</h3><p>This is where Lightning becomes genuinely useful for privacy beyond just &#8220;not broadcasting transactions.&#8221; The loop-out technique allows you to effectively sever the on-chain link between an old UTXO and a new one &#8212; without CoinJoin, without a centralized mixer, and without closing your channel.</p><p>The mechanism is a <strong>submarine swap</strong> &#8212; a trustless atomic exchange between an off-chain Lightning payment and an on-chain Bitcoin output. The key property is that the swap is non-custodial: the counterparty cannot steal your funds because the on-chain payment is conditional on the completion of the off-chain payment, enforced by hash time-locked contracts (HTLCs). As <em>Mastering the Lightning Network</em> explains, submarine swaps allow the exchange of on-chain bitcoin for Lightning payments and vice versa, atomically and without requiring trust in the counterparty.</p><p>The privacy flow looks like this:</p><pre><code><code>UTXO you want to dissociate from &#8594; channel funding tx &#8594; off-chain LN payment &#8594; submarine swap &#8594; clean UTXO at fresh address</code></code></pre><p>Step by step:</p><ol><li><p><strong>Open a channel</strong> using the whole UTXO you want to disassociate from. Preferably an unannounced channel.</p></li><li><p><strong>Execute a loop-out</strong>: send a Lightning payment through the channel and receive the equivalent amount on-chain at a brand-new address that has never appeared on the blockchain before.</p></li><li><p><strong>Result</strong>: the original UTXO is now &#8220;inside&#8221; the channel&#8217;s funding transaction. The blockchain sees the funding tx, then sees a new on-chain output at an unrelated address. The connection between the two is not visible on-chain.</p></li></ol><p>The channel closing transaction will eventually appear on-chain if you close, but by that point the funds have already exited through the loop-out. The chain sees disconnected events, not a direct transfer.</p><h3>Example opening</h3><p>we open a private channel to Aciq:</p><div class="highlighted_code_block" data-attrs="{&quot;language&quot;:&quot;plaintext&quot;,&quot;nodeId&quot;:null}" data-component-name="HighlightedCodeBlockToDOM"><pre class="shiki"><code class="language-plaintext">dev@lnbits00:~$ lncli openchannel --node_key 03864ef025fde8fb587d989186ce6a4a186895ee44a926bfc370e2c366597a3f8f \
--connect 34.239.230.56:9735 \
--utxo edd21f89192aa98592d08323320c6d19d7c92e395664ccXXXX:0 \
--fundmax \
--private \
--sat_per_vbyte 2
{
    "funding_txid": "fab3afc09824bbc7ef22f31727ec390190cfbXXX"
}</code></pre></div><p>result</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5ISY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8bfc39ac-c672-4e75-953f-b7df20e9fcd8_1132x545.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5ISY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8bfc39ac-c672-4e75-953f-b7df20e9fcd8_1132x545.png 424w, https://substackcdn.com/image/fetch/$s_!5ISY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8bfc39ac-c672-4e75-953f-b7df20e9fcd8_1132x545.png 848w, https://substackcdn.com/image/fetch/$s_!5ISY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8bfc39ac-c672-4e75-953f-b7df20e9fcd8_1132x545.png 1272w, https://substackcdn.com/image/fetch/$s_!5ISY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8bfc39ac-c672-4e75-953f-b7df20e9fcd8_1132x545.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5ISY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8bfc39ac-c672-4e75-953f-b7df20e9fcd8_1132x545.png" width="1132" height="545" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8bfc39ac-c672-4e75-953f-b7df20e9fcd8_1132x545.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:545,&quot;width&quot;:1132,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:74357,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://massmux.org/i/193545448?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8bfc39ac-c672-4e75-953f-b7df20e9fcd8_1132x545.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5ISY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8bfc39ac-c672-4e75-953f-b7df20e9fcd8_1132x545.png 424w, https://substackcdn.com/image/fetch/$s_!5ISY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8bfc39ac-c672-4e75-953f-b7df20e9fcd8_1132x545.png 848w, https://substackcdn.com/image/fetch/$s_!5ISY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8bfc39ac-c672-4e75-953f-b7df20e9fcd8_1132x545.png 1272w, https://substackcdn.com/image/fetch/$s_!5ISY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8bfc39ac-c672-4e75-953f-b7df20e9fcd8_1132x545.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>here the correct channel setup ready to manage with loop out</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!jqfC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0750285-36fc-4db6-be1b-08185df6ee16_1578x50.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!jqfC!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0750285-36fc-4db6-be1b-08185df6ee16_1578x50.png 424w, https://substackcdn.com/image/fetch/$s_!jqfC!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0750285-36fc-4db6-be1b-08185df6ee16_1578x50.png 848w, https://substackcdn.com/image/fetch/$s_!jqfC!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0750285-36fc-4db6-be1b-08185df6ee16_1578x50.png 1272w, https://substackcdn.com/image/fetch/$s_!jqfC!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0750285-36fc-4db6-be1b-08185df6ee16_1578x50.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!jqfC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0750285-36fc-4db6-be1b-08185df6ee16_1578x50.png" width="1456" height="46" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e0750285-36fc-4db6-be1b-08185df6ee16_1578x50.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:46,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:8960,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://massmux.org/i/193545448?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0750285-36fc-4db6-be1b-08185df6ee16_1578x50.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!jqfC!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0750285-36fc-4db6-be1b-08185df6ee16_1578x50.png 424w, https://substackcdn.com/image/fetch/$s_!jqfC!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0750285-36fc-4db6-be1b-08185df6ee16_1578x50.png 848w, https://substackcdn.com/image/fetch/$s_!jqfC!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0750285-36fc-4db6-be1b-08185df6ee16_1578x50.png 1272w, https://substackcdn.com/image/fetch/$s_!jqfC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0750285-36fc-4db6-be1b-08185df6ee16_1578x50.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>as you can see onchain, this channel opening has not generated a change output, exactly as we needed for the purpose of this experiment</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ka8n!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4875c97-b42e-4e9e-a894-08eb47c59faa_1120x140.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ka8n!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4875c97-b42e-4e9e-a894-08eb47c59faa_1120x140.png 424w, https://substackcdn.com/image/fetch/$s_!ka8n!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4875c97-b42e-4e9e-a894-08eb47c59faa_1120x140.png 848w, https://substackcdn.com/image/fetch/$s_!ka8n!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4875c97-b42e-4e9e-a894-08eb47c59faa_1120x140.png 1272w, https://substackcdn.com/image/fetch/$s_!ka8n!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4875c97-b42e-4e9e-a894-08eb47c59faa_1120x140.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ka8n!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4875c97-b42e-4e9e-a894-08eb47c59faa_1120x140.png" width="1120" height="140" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f4875c97-b42e-4e9e-a894-08eb47c59faa_1120x140.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:140,&quot;width&quot;:1120,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:16817,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://massmux.org/i/193545448?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4875c97-b42e-4e9e-a894-08eb47c59faa_1120x140.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ka8n!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4875c97-b42e-4e9e-a894-08eb47c59faa_1120x140.png 424w, https://substackcdn.com/image/fetch/$s_!ka8n!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4875c97-b42e-4e9e-a894-08eb47c59faa_1120x140.png 848w, https://substackcdn.com/image/fetch/$s_!ka8n!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4875c97-b42e-4e9e-a894-08eb47c59faa_1120x140.png 1272w, https://substackcdn.com/image/fetch/$s_!ka8n!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4875c97-b42e-4e9e-a894-08eb47c59faa_1120x140.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><h4>Using Loop (Lightning Labs)</h4><p>Loop is the official submarine swap tool from Lightning Labs, the team behind LND. It requires a running LND node:</p><pre><code><code>loop out --amt &lt;satoshis&gt; --addr &lt;new_onchain_address&gt;</code></code></pre><p>Replace <code>&lt;satoshis&gt;</code> with the amount you want to swap out (must be within your channel&#8217;s local balance), and <code>&lt;new_onchain_address&gt;</code> with a fresh address generated from a wallet that has no prior transaction history &#8212; ideally a hardware wallet address you have never used.</p><p>You can monitor progress with:</p><pre><code><code>loop monitor</code></code></pre><p>Loop charges a small fee for the service, which includes both routing fees for the off-chain leg and on-chain fees for the sweep.</p><h4>Using Boltz (Non-Custodial Alternative)</h4><p>If you prefer not to use a Lightning Labs service, <a href="https://boltz.exchange/">Boltz</a> offers the same submarine swap functionality and is widely used in the Bitcoin privacy community. The conceptual flow is identical:</p><pre><code><code>you &#8594; (private channel) &#8594; peer &#8594; ... &#8594; Boltz &#8594; fresh UTXO on-chain</code></code></pre><p>Boltz also operates non-custodially using the same HTLC mechanism. You initiate the swap from their interface or API, pay the Lightning invoice through your node, and receive on-chain funds at the address you specify. No account, no KYC.</p><div><hr></div><h3>What This Does Not Protect You From</h3><p>Privacy techniques are only useful if you understand their actual scope. Here is what the above methods do <strong>not</strong> protect you from:</p><p>The funding transaction is always public. Whether your channel is announced or private, the on-chain funding transaction exists. A chain analyst can see a 2-of-2 multisig output being created. Post-Taproot, cooperative channel closes look like regular single-sig transactions, which improves this picture &#8212; but unilateral closes still reveal HTLC scripts, which are identifiable.</p><p>Your peer knows everything about the channel. In a private channel, your direct peer knows the channel exists, knows the funding UTXO, and observes every payment going through it. If your peer is a large, well-connected routing node run by a company, you are trusting them with significant information.</p><p>A node with only one channel has no anonymity set. If your node has a single channel to a single peer, that peer can observe all your payments regardless of onion routing. As documented in the Bitcoin Wiki Privacy page, when a Lightning node wallet has only a single channel connection, the intermediate node can obtain a lot of information about payments regardless of the onion-routing used. Multiple channels to diverse peers expand your anonymity set.</p><p>Loop-out is not full unlinkability. Blockchain analysis firms like Chainalysis are aware of the patterns created by Lightning channel opens and loop-outs. The &#8220;Star&#8221; and &#8220;Collector&#8221; heuristics can identify likely channel funding transactions and cluster activity around Lightning nodes. The loop-out disrupts the direct UTXO link, but if your node&#8217;s on-chain wallet is already associated with your identity, the channel open itself carries that forward.</p><p>Run your node over Tor.<strong> </strong>Without Tor, your node&#8217;s IP address is publicly associated with your node ID. This is an orthogonal leak but a significant one.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!CFYq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65d2afab-81fb-47b8-9907-feb44bb8093d_1292x532.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!CFYq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65d2afab-81fb-47b8-9907-feb44bb8093d_1292x532.png 424w, https://substackcdn.com/image/fetch/$s_!CFYq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65d2afab-81fb-47b8-9907-feb44bb8093d_1292x532.png 848w, https://substackcdn.com/image/fetch/$s_!CFYq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65d2afab-81fb-47b8-9907-feb44bb8093d_1292x532.png 1272w, https://substackcdn.com/image/fetch/$s_!CFYq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65d2afab-81fb-47b8-9907-feb44bb8093d_1292x532.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!CFYq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65d2afab-81fb-47b8-9907-feb44bb8093d_1292x532.png" width="1292" height="532" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/65d2afab-81fb-47b8-9907-feb44bb8093d_1292x532.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:532,&quot;width&quot;:1292,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:67658,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://massmux.org/i/193545448?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65d2afab-81fb-47b8-9907-feb44bb8093d_1292x532.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!CFYq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65d2afab-81fb-47b8-9907-feb44bb8093d_1292x532.png 424w, https://substackcdn.com/image/fetch/$s_!CFYq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65d2afab-81fb-47b8-9907-feb44bb8093d_1292x532.png 848w, https://substackcdn.com/image/fetch/$s_!CFYq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65d2afab-81fb-47b8-9907-feb44bb8093d_1292x532.png 1272w, https://substackcdn.com/image/fetch/$s_!CFYq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65d2afab-81fb-47b8-9907-feb44bb8093d_1292x532.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>Just a small recap</h3><p>Lightning channels are not a privacy silver bullet, but they are a meaningful tool when used correctly. The combination of:</p><ul><li><p><strong>Explicit UTXO selection</strong> (<code>--utxo</code> + <code>--fundmax</code>) to control which coin history enters a channel,</p></li><li><p><strong>Private channels</strong> (<code>--private</code>) to keep your peer relationships off the public graph,</p></li><li><p><strong>Loop-out via Loop or Boltz</strong> to exit the Lightning layer at a fresh on-chain address,</p></li><li><p><strong>Running over Tor</strong> to prevent IP-to-identity correlation,</p></li></ul><p>...represents a practical, non-custodial privacy stack available to anyone running LND today.</p><p>It requires deliberate effort. It is not zero-risk. But it is real, it works, and it does not require trusting a third party with your funds.</p><p>If you want to go deeper on Lightning node setup, privacy practices, or hosting your own node on a security enhanced VPS with Tor pre-configured, check out <a href="https://lightning.denali.pro/">denali.pro</a> &#8212; we run production Lightning infrastructure and can help you get it right from the start.</p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://massmux.org/p/enhancing-privacy-with-lightning?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading massmux.org Labs! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://massmux.org/p/enhancing-privacy-with-lightning?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://massmux.org/p/enhancing-privacy-with-lightning?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p>]]></content:encoded></item><item><title><![CDATA[Manage encrypted folders from Linux terminal]]></title><description><![CDATA[How to Encrypt Files and Folders on Linux easily with gocryptfs]]></description><link>https://massmux.org/p/manage-encrypted-folders-from-linux</link><guid isPermaLink="false">https://massmux.org/p/manage-encrypted-folders-from-linux</guid><dc:creator><![CDATA[Max Musumeci]]></dc:creator><pubDate>Thu, 26 Mar 2026 07:13:44 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!mtKA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa00fe44-32b6-409e-8067-6c2b14227f50_640x360.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mtKA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa00fe44-32b6-409e-8067-6c2b14227f50_640x360.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mtKA!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa00fe44-32b6-409e-8067-6c2b14227f50_640x360.png 424w, https://substackcdn.com/image/fetch/$s_!mtKA!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa00fe44-32b6-409e-8067-6c2b14227f50_640x360.png 848w, https://substackcdn.com/image/fetch/$s_!mtKA!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa00fe44-32b6-409e-8067-6c2b14227f50_640x360.png 1272w, https://substackcdn.com/image/fetch/$s_!mtKA!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa00fe44-32b6-409e-8067-6c2b14227f50_640x360.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mtKA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa00fe44-32b6-409e-8067-6c2b14227f50_640x360.png" width="640" height="360" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/aa00fe44-32b6-409e-8067-6c2b14227f50_640x360.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:360,&quot;width&quot;:640,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:404797,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://massmux.org/i/192177815?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa00fe44-32b6-409e-8067-6c2b14227f50_640x360.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!mtKA!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa00fe44-32b6-409e-8067-6c2b14227f50_640x360.png 424w, https://substackcdn.com/image/fetch/$s_!mtKA!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa00fe44-32b6-409e-8067-6c2b14227f50_640x360.png 848w, https://substackcdn.com/image/fetch/$s_!mtKA!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa00fe44-32b6-409e-8067-6c2b14227f50_640x360.png 1272w, https://substackcdn.com/image/fetch/$s_!mtKA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa00fe44-32b6-409e-8067-6c2b14227f50_640x360.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>The idea</h2><p>Full-disk encryption is a good baseline. But it only protects you when your machine is off.</p><p>Once system is running and you&#8217;re logged in, your entire filesystem is decrypted and accessible &#8212; to you, to any process running under your user, and to anyone who gets a shell on your system. If your session is open, a stolen laptop, a rogue script, or a compromised application can read everything.</p><p>That&#8217;s where file-based encryption fills the gap.</p><p><strong>gocryptfs is a FUSE-mounted, file-level encryption program</strong>. Because it encrypts at the file level rather than the entire disk, your files exist as individual encrypted objects on disk &#8212; and only become readable when you explicitly mount the encrypted directory with your password. When you&#8217;re done working, you unmount it. The data goes back to being unreadable noise.</p><p>The underlying cryptography is solid: AES-GCM for file contents, EME wide-block encryption for file names, and scrypt for password hashing. It was inspired by the older EncFS project, and was specifically designed to fix EncFS&#8217;s know n security weaknesses.</p><p>The practical upside is that gocryptfs is fast, lightweight, well-documented, and available in most major Linux distribution repositories.  It doesn&#8217;t require root to mount. It works transparently with your existing tools &#8212; your text editor, your file manager, your scripts. You don&#8217;t change your workflow; you just add a lock to the things that actually need one.</p><p>In this guide, we&#8217;ll walk through installing gocryptfs, creating an encrypted vault, mounting and unmounting it, and a few best practices to avoid locking yourself out of your own data.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Sza5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F03f73858-1a8e-474f-895d-24cfe00891df_1292x532.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Sza5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F03f73858-1a8e-474f-895d-24cfe00891df_1292x532.png 424w, https://substackcdn.com/image/fetch/$s_!Sza5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F03f73858-1a8e-474f-895d-24cfe00891df_1292x532.png 848w, https://substackcdn.com/image/fetch/$s_!Sza5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F03f73858-1a8e-474f-895d-24cfe00891df_1292x532.png 1272w, https://substackcdn.com/image/fetch/$s_!Sza5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F03f73858-1a8e-474f-895d-24cfe00891df_1292x532.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Sza5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F03f73858-1a8e-474f-895d-24cfe00891df_1292x532.png" width="1292" height="532" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/03f73858-1a8e-474f-895d-24cfe00891df_1292x532.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:532,&quot;width&quot;:1292,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:67658,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://massmux.org/i/192177815?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F03f73858-1a8e-474f-895d-24cfe00891df_1292x532.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Sza5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F03f73858-1a8e-474f-895d-24cfe00891df_1292x532.png 424w, https://substackcdn.com/image/fetch/$s_!Sza5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F03f73858-1a8e-474f-895d-24cfe00891df_1292x532.png 848w, https://substackcdn.com/image/fetch/$s_!Sza5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F03f73858-1a8e-474f-895d-24cfe00891df_1292x532.png 1272w, https://substackcdn.com/image/fetch/$s_!Sza5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F03f73858-1a8e-474f-895d-24cfe00891df_1292x532.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Run your own VPS with high security standards at denali.pro</figcaption></figure></div><h2>Installation</h2><p>Ok now we are confident, we go on with installation and configuration</p><div class="highlighted_code_block" data-attrs="{&quot;language&quot;:&quot;plaintext&quot;,&quot;nodeId&quot;:null}" data-component-name="HighlightedCodeBlockToDOM"><pre class="shiki"><code class="language-plaintext">massmux@penguin:~$ sudo apt install gocryptfs</code></pre></div><p>Now, let&#8217;s create our first encrypted gocrypt folder</p><div class="highlighted_code_block" data-attrs="{&quot;language&quot;:&quot;plaintext&quot;,&quot;nodeId&quot;:null}" data-component-name="HighlightedCodeBlockToDOM"><pre class="shiki"><code class="language-plaintext">massmux@penguin:~$ mkdir secret-folder
massmux@penguin:~$ gocryptfs --init secret-folder
Choose a password for protecting your files.
Password:
Repeat: 

Your master key is:
    8f68fc74-9e35626d-36923ce7-9c7adb42-
    31d456a8-90e4367e-d4dcfd2e-067c0ced
</code></pre></div><p>The masterkey here is very important: if you forget your password, the masterkey is the only way to recover your folder&#8217;s contents. So keep it in a secure place.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://massmux.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">massmux.org Labs is a reader-supported publication. To receive new posts, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Now you can mount, for example on open-folder/ . So what happens? gocryptfs decrypts the encrypted folder and mounts it to open-folder/ where you can freely work in plain.</p><div class="highlighted_code_block" data-attrs="{&quot;language&quot;:&quot;plaintext&quot;,&quot;nodeId&quot;:null}" data-component-name="HighlightedCodeBlockToDOM"><pre class="shiki"><code class="language-plaintext">massmux@penguin:~$ mkdir open-folder
massmux@penguin:~$ gocryptfs secret-folder/ open-folder
Password: 
Decrypting master key
DetectQuirks: Btrfs detected, forcing -noprealloc. See https://github.com/rfjakob/gocryptfs/issues/395 for why.
Filesystem mounted and ready.</code></pre></div><p>We can see that the encrypted folder is uncrypted and mounted</p><div class="highlighted_code_block" data-attrs="{&quot;language&quot;:&quot;plaintext&quot;,&quot;nodeId&quot;:null}" data-component-name="HighlightedCodeBlockToDOM"><pre class="shiki"><code class="language-plaintext">massmux@penguin:~$ df -m
Filesystem                  1M-blocks  Used Available Use% Mounted on
/dev/vdc                        20480  2392     17690  12% /
none                                1     1         1   1% /dev
/dev/vdc                        20480  2392     17690  12% /dev/kvm
tmpfs                               1     0         1   0% /dev/lxd
run                              3236     1      3236   1% /dev/.cros_milestone
9p                               3860     2      3859   1% /mnt/chromeos
tmpfs                            3236     0      3236   0% /mnt/external
tmpfs                               1     0         1   0% /dev/.lxd-mounts
devtmpfs                         3235     0      3235   0% /dev/tty
tmpfs                            3236     0      3236   0% /dev/shm
tmpfs                            1295     1      1295   1% /run
tmpfs                               5     0         5   0% /run/lock
tmpfs                               4     0         4   0% /sys/fs/cgroup
tmpfs                             648     1       648   1% /run/user/1000
/home/massmux/secret-folder     20480  2392     17690  12% /home/massmux/open-folder</code></pre></div><p>When we are ok with our work we can unmount the folder.</p><div class="highlighted_code_block" data-attrs="{&quot;language&quot;:&quot;plaintext&quot;,&quot;nodeId&quot;:null}" data-component-name="HighlightedCodeBlockToDOM"><pre class="shiki"><code class="language-plaintext">massmux@penguin:~$ umount  /home/massmux/open-folder </code></pre></div><p>And now you can check if all is ok</p><div class="highlighted_code_block" data-attrs="{&quot;language&quot;:&quot;plaintext&quot;,&quot;nodeId&quot;:null}" data-component-name="HighlightedCodeBlockToDOM"><pre class="shiki"><code class="language-plaintext">massmux@penguin:~$ umount  /home/massmux/open-folder 
massmux@penguin:~$ ls open-folder/
massmux@penguin:~$ ls secret-folder/
Fes37GGPQvKs0h4H1AIlBILPWErpmm-Pn9hJuzba4B8  gocryptfs.conf  gocryptfs.diriv  K6t_24a34oeArDCGYjCdPKLAAXm9J0s4pXnRMRTcOf0</code></pre></div><p>As you can see open-folder/ (as it was just a mount point) is empty, while the secret-folder is populated with encrypted files as you expected. If you want, you can sync the encrypted folder to a cloud without risking anything.</p><p>Follow me on youtube, instagram, tiktok, X, nostr for more value added contents for free.</p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://massmux.org/p/manage-encrypted-folders-from-linux?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading massmux.org Labs! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://massmux.org/p/manage-encrypted-folders-from-linux?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://massmux.org/p/manage-encrypted-folders-from-linux?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[The Foundation of Financial Sovereignty]]></title><description><![CDATA[Why Automated, Hardened Environments Matter for Bitcoin Infrastructure]]></description><link>https://massmux.org/p/the-foundation-of-financial-sovereignty</link><guid isPermaLink="false">https://massmux.org/p/the-foundation-of-financial-sovereignty</guid><dc:creator><![CDATA[Max Musumeci]]></dc:creator><pubDate>Fri, 13 Mar 2026 13:51:43 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!YWHI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e03cdef-d310-45a5-87f0-152b67e47e92_1458x1010.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!YWHI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e03cdef-d310-45a5-87f0-152b67e47e92_1458x1010.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!YWHI!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e03cdef-d310-45a5-87f0-152b67e47e92_1458x1010.png 424w, https://substackcdn.com/image/fetch/$s_!YWHI!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e03cdef-d310-45a5-87f0-152b67e47e92_1458x1010.png 848w, https://substackcdn.com/image/fetch/$s_!YWHI!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e03cdef-d310-45a5-87f0-152b67e47e92_1458x1010.png 1272w, https://substackcdn.com/image/fetch/$s_!YWHI!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e03cdef-d310-45a5-87f0-152b67e47e92_1458x1010.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!YWHI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e03cdef-d310-45a5-87f0-152b67e47e92_1458x1010.png" width="1456" height="1009" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6e03cdef-d310-45a5-87f0-152b67e47e92_1458x1010.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1009,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1573372,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://massmux.org/i/190822206?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e03cdef-d310-45a5-87f0-152b67e47e92_1458x1010.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!YWHI!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e03cdef-d310-45a5-87f0-152b67e47e92_1458x1010.png 424w, https://substackcdn.com/image/fetch/$s_!YWHI!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e03cdef-d310-45a5-87f0-152b67e47e92_1458x1010.png 848w, https://substackcdn.com/image/fetch/$s_!YWHI!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e03cdef-d310-45a5-87f0-152b67e47e92_1458x1010.png 1272w, https://substackcdn.com/image/fetch/$s_!YWHI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6e03cdef-d310-45a5-87f0-152b67e47e92_1458x1010.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In the world of decentralized and open finance created by Bitcoin, the security of the underlying operating system is not a luxury&#8212;it is a requirement. Running Bitcoin lightning nodes, payment infrastructures, or web applications demands a platform that is both <strong>replicable and resilient</strong>. By using an automated Ansible profile to deploy a hardened, Docker-centered Debian environment, administrators can ensure their infrastructure is built on a &#8220;secure-by-default&#8221; layer that eliminates human error and configuration drift. We need more Lightning liquidity, more nodes and more Bitcoin related transactions (layer1 and superior layers).</p><h3>The Critical need of a Hardened OS and VPS for Lightning Infrastructure</h3><p>Operating a Lightning Network Daemon (LND) is not merely about running software; it is about managing a <strong>24/7 financial router</strong> that requires absolute precision and high availability. To achieve this, the underlying operating system (OS) and the Virtual Private Server (VPS) must be configured for maximum <strong>security, efficiency, and network stability</strong>.</p><h4>1. Precision Timing and System Reliability</h4><p>A Lightning node must maintain an accurate system clock to stay synchronized with the network state and validate transactions effectively. The provided automation profile ensures this by installing <code>systemd-timesyncd</code> and forcing <strong>NTP time synchronization</strong>. On a VPS, which is designed for high uptime, this ensures the node never drifts out of sync with the blockchain or with gossip. Furthermore, the use of a <strong>swap file</strong> (recommended at 2GB or more) with a low &#8220;swappiness&#8221; value (e.g., 10) prevents the OS from crashing under sudden memory pressure, ensuring the node remains responsive even when system resources are tight.</p><h4>2. Hardening the VPS Frontier</h4><p>Because a VPS is exposed to the public internet, it is a constant target for unauthorized access. A secure OS configuration is the first line of defence for your digital assets. </p><h4>3. Meeting High-Performance Network Demands</h4><p>The Lightning Network requires a reliable, high-bandwidth connection to handle the constant flow of gossip messages and payment routing. A VPS provides the <strong>static IP address</strong> and the <strong>100 Mbps (or higher) internet connection</strong> necessary for a stable node.</p><p>To handle this traffic efficiently, the OS must reside on high-performance hardware. While the minimum requirement is a 1 GHz CPU and 2 GB of RAM, the recommended specification for a professional node is a <strong>quad-core processor and at least 4 GB of RAM</strong>. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!LJ4c!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7772567-18db-4e6c-9730-12640494b5c2_1292x532.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!LJ4c!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7772567-18db-4e6c-9730-12640494b5c2_1292x532.png 424w, https://substackcdn.com/image/fetch/$s_!LJ4c!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7772567-18db-4e6c-9730-12640494b5c2_1292x532.png 848w, https://substackcdn.com/image/fetch/$s_!LJ4c!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7772567-18db-4e6c-9730-12640494b5c2_1292x532.png 1272w, https://substackcdn.com/image/fetch/$s_!LJ4c!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7772567-18db-4e6c-9730-12640494b5c2_1292x532.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!LJ4c!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7772567-18db-4e6c-9730-12640494b5c2_1292x532.png" width="1292" height="532" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f7772567-18db-4e6c-9730-12640494b5c2_1292x532.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:532,&quot;width&quot;:1292,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:67658,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://massmux.org/i/190822206?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7772567-18db-4e6c-9730-12640494b5c2_1292x532.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!LJ4c!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7772567-18db-4e6c-9730-12640494b5c2_1292x532.png 424w, https://substackcdn.com/image/fetch/$s_!LJ4c!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7772567-18db-4e6c-9730-12640494b5c2_1292x532.png 848w, https://substackcdn.com/image/fetch/$s_!LJ4c!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7772567-18db-4e6c-9730-12640494b5c2_1292x532.png 1272w, https://substackcdn.com/image/fetch/$s_!LJ4c!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7772567-18db-4e6c-9730-12640494b5c2_1292x532.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h4>4. Replicability through Containerization</h4><p>By deploying these requirements within a <strong>Docker-centered environment</strong>, the node benefits from a standardised layer that is decoupled from the underlying host OS. This ensures that the complex dependencies of Bitcoin Core and LND are isolated, making the environment <strong>replicable and easy to migrate</strong> across different VPS providers without compromising the security profile.</p><h4>The Power of a Predetermined Profile</h4><p>The mentioned goals may be achieved by Ansible playbooks using a <strong>specified profile</strong> to create a standard environment. Instead of manual configuration, the script automatically detects the specific distribution and codename of the system to ensure the correct repository variables are applied. This level of automation ensures that every server&#8212;whether it is a local node or a cloud-based payment gateway&#8212;is identical, providing the <strong>standardness</strong> required for professional-grade Bitcoin operations.</p><h4>Hardening the Entry Point</h4><p>Security in this profile is established at the lowest levels of the system:</p><ul><li><p><strong>SSH Hardening:</strong> The configuration proactively secures remote access by <strong>disabling password authentication</strong> and enforcing key-based access only. It further restricts security risks by limiting <code>MaxAuthTries</code> to two and disabling <code>X11Forwarding</code>.</p></li><li><p><strong>Firewall Protection:</strong> The <code>ufw</code> (Uncomplicated Firewall) is automatically enabled and configured to allow only essential traffic (Port 22), creating a protective perimeter around the Docker environment from the moment of deployment.</p></li><li><p><strong>Privilege Management:</strong> Rather than operating as root, the profile creates a dedicated <code>dev</code> user with specific Docker permissions and migrates SSH keys from the root account to ensure a secure, non-root workflow.</p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://massmux.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">massmux.org Labs is a reader-supported publication. To receive new posts, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h4>Docker: The Standard for Bitcoin Applications</h4><p>A <strong>Docker-centered environment</strong> is vital for the Bitcoin ecosystem because it provides a consistent runtime for complex applications. The playbook installs the full Docker suite, including <code>docker-compose-plugin</code> and <code>containerd.io</code>, to facilitate the deployment of containerized services.</p><p>This containerization is essential for:</p><ol><li><p><strong>Replicability:</strong> Ensuring that a Lightning Network node runs exactly the same way in a test environment as it does in production.</p></li><li><p><strong>Isolation:</strong> Keeping payment processing logic separate from other web applications or system services.</p></li><li><p><strong>Ease of Updates:</strong> Allowing for rapid deployment of Lightning implementation and all the added software updates with minimal downtime.</p></li></ol><h4>System Reliability and Precision</h4><p>Beyond security, the profile optimizes the system for the high-uptime requirements of financial infrastructure. It establishes a <strong>swap file</strong> with specific &#8220;swappiness&#8221; values to manage memory pressure gracefully. Most importantly for payment applications involving Bitcoin, it configures <strong>NTP time synchronization</strong> via <code>systemd-timesyncd</code>, ensuring the system clock is always accurate&#8212;a critical factor for valid block propagation and lightning channel state management.</p><h4>Conclusion</h4><p>By moving away from manual setups and adopting a hardened, automated profile, operators can deploy Bitcoin infrastructure that is secure, standard, and ready for the demands of the modern web. This profile-driven approach ensures that the layer beneath your applications is just as robust as the decentralized protocols running on top of it.</p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://massmux.org/p/the-foundation-of-financial-sovereignty?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading massmux.org Labs! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://massmux.org/p/the-foundation-of-financial-sovereignty?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://massmux.org/p/the-foundation-of-financial-sovereignty?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p>]]></content:encoded></item><item><title><![CDATA[The Erosion of Human Time and Corruption]]></title><description><![CDATA[Bitcoin as Humanity&#8217;s Response to Monetary Debasement]]></description><link>https://massmux.org/p/the-erosion-of-human-time-and-corruption</link><guid isPermaLink="false">https://massmux.org/p/the-erosion-of-human-time-and-corruption</guid><dc:creator><![CDATA[Max Musumeci]]></dc:creator><pubDate>Tue, 17 Feb 2026 16:31:13 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!DqfL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f9c9b6c-0e60-4003-acf9-1e68b8105959_640x360.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!DqfL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f9c9b6c-0e60-4003-acf9-1e68b8105959_640x360.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!DqfL!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f9c9b6c-0e60-4003-acf9-1e68b8105959_640x360.png 424w, https://substackcdn.com/image/fetch/$s_!DqfL!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f9c9b6c-0e60-4003-acf9-1e68b8105959_640x360.png 848w, https://substackcdn.com/image/fetch/$s_!DqfL!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f9c9b6c-0e60-4003-acf9-1e68b8105959_640x360.png 1272w, https://substackcdn.com/image/fetch/$s_!DqfL!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f9c9b6c-0e60-4003-acf9-1e68b8105959_640x360.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!DqfL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f9c9b6c-0e60-4003-acf9-1e68b8105959_640x360.png" width="640" height="360" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1f9c9b6c-0e60-4003-acf9-1e68b8105959_640x360.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:360,&quot;width&quot;:640,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:199906,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://massmux.org/i/188176083?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f9c9b6c-0e60-4003-acf9-1e68b8105959_640x360.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!DqfL!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f9c9b6c-0e60-4003-acf9-1e68b8105959_640x360.png 424w, https://substackcdn.com/image/fetch/$s_!DqfL!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f9c9b6c-0e60-4003-acf9-1e68b8105959_640x360.png 848w, https://substackcdn.com/image/fetch/$s_!DqfL!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f9c9b6c-0e60-4003-acf9-1e68b8105959_640x360.png 1272w, https://substackcdn.com/image/fetch/$s_!DqfL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f9c9b6c-0e60-4003-acf9-1e68b8105959_640x360.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I felt the need to express my opinion and also cite examples and explanations by Jack Mallers (thank you for your contributions to the freedom), which I fully agree with. I am trying to explain how the modern world is taking time away from people and what Bitcoin means in this context.</p><p>Across modern societies, a peculiar paradox has emerged: despite unprecedented technological advancement and productivity gains, the average person finds basic life milestones&#8212;homeownership, financial security, family formation&#8212;increasingly unattainable. This phenomenon transcends individual circumstances or temporary economic downturns. Instead, it represents a fundamental breakdown in how we store and transfer value across time.</p><h2>Reconceptualizing Money: The Battery Analogy</h2><p>At its essence, money serves as a technology for storing human effort. When you spend eight hours building furniture, treating patients, or writing code, you&#8217;re converting a non-renewable resource&#8212;your finite time on Earth&#8212;into something that should retain that value. Think of money as a battery: it&#8217;s meant to capture the energy you&#8217;ve expended so you can discharge it later to acquire goods or services created by others&#8217; time and effort.</p><p>This abstraction&#8212;transforming immediate labor into storable value&#8212;represents one of humanity&#8217;s most crucial innovations. It enables the specialization that defines modern civilization. A surgeon needn&#8217;t personally grow food, construct shelter, or manufacture tools. Instead, she can focus entirely on medical expertise, storing the value of her specialized work in a medium that others accept in exchange for their own specialized contributions.</p><p>But what happens when the battery itself is fundamentally flawed? What if the container holding your life&#8217;s work develops systematic leaks?</p><h2>The Historical Search for Non-Perishable Value</h2><p>Throughout history, humans have experimented with various vessels for storing economic energy. Early agricultural societies faced immediate challenges: grain spoils, livestock requires continuous care, and physical commodities are cumbersome to transport. Imagine trying to save a decade of labor in the form of wheat. Beyond the logistical nightmare of storage, you&#8217;d watch your accumulated wealth literally rot before your eyes.</p><p>This practical problem drove the evolution toward more durable stores of value. Precious metals&#8212;particularly gold&#8212;emerged as a superior solution because of their chemical stability and relative scarcity. Gold doesn&#8217;t oxidize, doesn&#8217;t decay, and historically couldn&#8217;t be arbitrarily multiplied. For centuries, these properties made gold humanity&#8217;s best approximation of a &#8220;non-leaky battery.&#8221;</p><p>Yet even gold-backed systems contained inherent vulnerabilities. Physical gold requires vault storage, creates security risks during transport, and ultimately depends on centralized institutions to guarantee its authenticity and backing. More fundamentally, gold supplies can still expand through mining, and governments can&#8212;and historically did&#8212;manipulate gold-backed currencies through various mechanisms including fractional reserve practices and outright confiscation.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://denali.pro" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!DZch!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26ed298c-2133-4214-aa47-be0f53d85bfd_1292x532.png 424w, https://substackcdn.com/image/fetch/$s_!DZch!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26ed298c-2133-4214-aa47-be0f53d85bfd_1292x532.png 848w, https://substackcdn.com/image/fetch/$s_!DZch!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26ed298c-2133-4214-aa47-be0f53d85bfd_1292x532.png 1272w, https://substackcdn.com/image/fetch/$s_!DZch!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26ed298c-2133-4214-aa47-be0f53d85bfd_1292x532.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!DZch!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26ed298c-2133-4214-aa47-be0f53d85bfd_1292x532.png" width="1292" height="532" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/26ed298c-2133-4214-aa47-be0f53d85bfd_1292x532.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:532,&quot;width&quot;:1292,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:67658,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://denali.pro&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://massmux.org/i/188176083?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26ed298c-2133-4214-aa47-be0f53d85bfd_1292x532.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!DZch!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26ed298c-2133-4214-aa47-be0f53d85bfd_1292x532.png 424w, https://substackcdn.com/image/fetch/$s_!DZch!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26ed298c-2133-4214-aa47-be0f53d85bfd_1292x532.png 848w, https://substackcdn.com/image/fetch/$s_!DZch!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26ed298c-2133-4214-aa47-be0f53d85bfd_1292x532.png 1272w, https://substackcdn.com/image/fetch/$s_!DZch!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26ed298c-2133-4214-aa47-be0f53d85bfd_1292x532.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>The Invisible Tax: How Monetary Expansion Steals Time</h2><p>Modern fiat currency systems have removed even the nominal constraints that physical commodities imposed. Central banks can now expand the money supply through purely digital means, without any physical or chemical limitations. While proponents frame this as necessary economic flexibility, the mathematical reality is far more sobering.</p><blockquote><p>When a central bank creates new currency units, it doesn&#8217;t create new value&#8212;it divides existing value into more pieces. </p></blockquote><p>If you&#8217;ve stored your labor in a currency whose supply then doubles, the purchasing power of your savings is mathematically diluted. The month you spent working last year now buys only half of what it should have.</p><p><strong>This process operates as a hidden confiscation</strong>. Traditional taxation is explicit: you receive a paycheck, see the deductions, and understand precisely how much the state has claimed. Currency debasement is taxation by stealth. The number in your bank account remains unchanged, creating an illusion of stability, while the actual value&#8212;the hours of your life that number represents&#8212;quietly evaporates.</p><p>Consider the philosophical implication: someone else is reaching backward through time, erasing a portion of work you&#8217;ve already completed. They&#8217;re retroactively reducing the value of past efforts you can never reclaim. Those hours of your finite existence are gone, and the compensation you received for them has been partially nullified by third-party decision-makers you never elected to control your stored labor.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://massmux.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">massmux.org Labs is a reader-supported publication. To receive new posts, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h2>The Mathematics of Scarcity and Meaning</h2><p>There exists a profound connection between scarcity and value that extends beyond economics into existential philosophy. Humans derive meaning from their limited time on Earth precisely because it&#8217;s limited. <strong>If you knew with certainty you would live for ten thousand years, would you maintain the same urgency about your goals? Would today&#8217;s effort carry the same weight?</strong></p><p>This principle applies equally to money. <strong>In a system where supply is theoretically infinite&#8212;where central authorities can create unlimited new units&#8212;the concept of saving becomes philosophically incoherent</strong>. You&#8217;re attempting to preserve value in a medium specifically designed to lose value over time through intentional dilution.</p><p>A fixed money supply creates what economists call &#8220;hard money&#8221;&#8212;a currency that resists debasement. More importantly, <strong>it creates temporal coherence</strong>. When the total quantity of monetary units cannot expand, the purchasing power of each unit becomes a more stable representation of human effort across time. Your work today can be reliably stored for future deployment without systematic erosion.</p><p><strong>This scarcity mirrors human mortality itself</strong>. We value our limited years because we know they&#8217;ll end. Similarly, money with a fixed supply respects the temporal limitations of human existence by providing a stable measurement of time already spent.</p><h2>Empirical Evidence: The Post-1971 Economic Divergence</h2><p>The year 1971 marked a pivotal transition in monetary history. In August of that year, the United States permanently severed the dollar&#8217;s final connection to gold, eliminating the last commodity restraint on currency creation. <strong>What followed provides a natural experiment in the consequences of purely fiat monetary systems</strong>.</p><p>Prior to this shift, housing costs relative to earnings remained relatively stable across generations. In 1970s Britain, a typical physician earning &#163;4,000 annually faced housing prices around &#163;15,000&#8212;representing approximately four years of focused saving. This ratio was consistent with historical norms across developed nations.</p><p>Fast forward to the present: that same proportion has collapsed catastrophically. Contemporary housing in equivalent areas might cost twenty to thirty times annual earnings, transforming what was once a medium-term goal into a multi-decade struggle that consumes the majority of a working lifespan.</p><p>This isn&#8217;t merely about housing. The phenomenon extends across fundamental life requirements: education, healthcare, childcare. Each has experienced costs rising far faster than general inflation, while wages&#8212;when measured in purchasing power rather than nominal numbers&#8212;have stagnated or declined for median workers.</p><p>The social consequences are measurable and disturbing. Marriage ages have shifted dramatically upward as young adults delay family formation until achieving financial stability that remains perpetually out of reach. Birth rates in developed nations have plummeted below replacement levels. Mental health indicators have deteriorated. Social cohesion has fractured as economic anxiety converts to political polarization.</p><p>These aren&#8217;t disconnected social problems&#8212;they&#8217;re symptoms of a monetary system that forces individuals to run faster and faster just to maintain the same relative position.</p><h2>Why Previous Solutions Failed</h2><p>Recognizing monetary debasement as a root cause, individuals have historically sought alternatives for preserving wealth. Real estate emerged as a popular choice based on the intuition that &#8220;they&#8217;re not making any more land.&#8221; Yet this strategy contains multiple flaws.</p><p>First, while land area is fixed, usable space is not. Construction technology allows ever-more-intensive development&#8212;building upward, excavating downward, and maximizing density. Second, real estate carries substantial costs: property taxes, maintenance, insurance. Third, it&#8217;s profoundly illiquid and location-dependent, making it unsuitable for day-to-day economic activity.</p><p><strong>Gold has persisted as an alternative, but it faces its own limitations in modern contexts</strong>. Storage requires either personal security measures or trust in third-party custodians. Verification of authenticity and purity requires expertise or specialized equipment. Physical transfer is cumbersome for large values. Most critically, gold&#8217;s supply still expands through mining, and its geographic distribution makes it vulnerable to concentrated control.</p><p>Equities represent another common approach, but they introduce fundamental mismatches. Companies exist to generate profit through productive activity, not to serve as inert stores of value. Their valuation depends on countless operational factors beyond monetary policy. Using stocks as a savings vehicle conflates the distinct purposes of preserving value and accepting entrepreneurial risk.</p><h2>Bitcoin: Engineered Finitude</h2><p>Bitcoin represents a novel approach to the ancient problem of storing economic energy. <strong>Rather than relying on physical scarcity (gold) or geographic constraints (real estate), Bitcoin employs mathematical scarcity enforced by cryptographic consensus.</strong></p><blockquote><p>The protocol explicitly limits total supply to 21 million units, with a predictable issuance schedule that cannot be altered without the agreement of a distributed network of independent participants. No central authority can decide to create more bitcoin, regardless of political pressure or economic emergency.</p></blockquote><p>This absolute scarcity is unprecedented. Even gold, humanity&#8217;s previous best attempt at hard money, lacks this property&#8212;gold supply continuously expands as mining technology improves and new deposits are discovered. Bitcoin&#8217;s supply curve is fixed by mathematics, not by the contingent physical properties of matter or the limited extent of planetary crust.</p><p>The implications extend beyond mere supply constraints. <strong>Because Bitcoin operates on a distributed ledger maintained by thousands of independent nodes, no single institution can confiscate it through legal decree, manipulate its supply through policy decisions, or restrict its transfer through capital controls. </strong>It exists as what computer scientists call &#8220;permissionless&#8221;&#8212;anyone can participate without requiring approval from gatekeepers.</p><h2>The Psychological Shift: From Infinite Debt to Finite Value</h2><p>Adopting a fixed-supply monetary system requires a profound psychological recalibration. Modern economic thought, trained on decades of fiat currency, assumes that money supply should expand to &#8220;stimulate&#8221; economic activity and that moderate inflation is not just acceptable but desirable.</p><p>This framework normalizes a specific temporal orientation: short-term thinking. <strong>If your savings lose purchasing power predictably, you&#8217;re incentivized to spend immediately rather than defer consumption.</strong> If debt can be inflated away, you&#8217;re encouraged to borrow against an uncertain future rather than build actual savings. The entire economic structure optimizes for immediate gratification at the expense of long-term planning.</p><p>A fixed money supply inverts these incentives. When the currency reliably maintains or increases purchasing power over time, saving becomes rational rather than self-defeating. Long-term planning becomes feasible because the foundation&#8212;the monetary unit itself&#8212;provides stable measurement across years or decades.</p><p>Economists call this shift &#8220;low time preference&#8221;&#8212;the ability to defer immediate gratification for greater future benefit. It&#8217;s the psychological foundation for all forms of civilizational advancement: education, infrastructure development, scientific research, environmental stewardship. These activities require sacrificing present resources for future returns, which only makes sense when the measurement unit itself is stable across that time horizon.</p><h2>Addressing the Critics: Volatility and Adoption</h2><p>Skeptics immediately raise Bitcoin&#8217;s notorious price volatility as evidence against its suitability as money. This criticism contains validity&#8212;Bitcoin&#8217;s exchange rate against fiat currencies has experienced dramatic fluctuations since its inception.</p><blockquote><p>However, this objection conflates different phases of adoption. Bitcoin remains in what technologists call &#8220;price discovery&#8221;&#8212;the extended process by which a new asset finds its equilibrium value relative to existing alternatives. During this phase, volatility is not a flaw but an inevitable characteristic as market participants incrementally recognize its properties and adjust their holdings accordingly.</p></blockquote><p>More fundamentally, the criticism accepts fiat currency as the stable reference point against which Bitcoin&#8217;s volatility is measured. This framing obscures a deeper question: volatile relative to what? Bitcoin&#8217;s supply is perfectly predictable&#8212;21 million units, released on a predetermined schedule. Fiat currencies, by contrast, have supplies that vary based on central bank policy decisions that respond to political pressures and changing economic theories.</p><p>From a long-term perspective, Bitcoin&#8217;s volatility represents growing pains during a transition from near-zero adoption to increasing recognition. The relevant question is not whether it experiences price fluctuations during this transition, but whether its fundamental properties&#8212;fixed supply, permissionless access, cryptographic security&#8212;provide superior value storage once adoption stabilizes.</p><h2>The Moral Dimension: Time Theft as Violence</h2><p>Viewing money as stored time transforms currency debasement from a technical policy debate into a moral crisis. When central authorities dilute the money supply, they&#8217;re not merely adjusting abstract economic variables&#8212;they&#8217;re confiscating the lived experience of millions of people.</p><p>E<strong>very hour you spent at work, every skill you developed through years of practice, every contribution you made to others&#8217; welfare&#8212;all of this gets partially erased when the medium storing that effort is systematically debased.</strong> You cannot reclaim those hours. Your life has a finite duration, and the portion already expended is irrevocable.</p><p><strong>This makes monetary debasement a form of violence</strong>&#8212;not physical violence, but a violation of your temporal autonomy. Someone else is deciding that your past efforts are worth less than you agreed to when you accepted payment in that currency. This happens without your consent, often without your awareness, and you have no practical recourse.</p><p>Bitcoin offers an alternative: a monetary system where no authority can reach back through time to erase your stored labor. The 21-million cap is not just a technical specification&#8212;it&#8217;s a commitment that your fraction of the total supply remains fixed, that the time you&#8217;ve stored cannot be diluted by policy decisions made in distant capitals.</p><h2>Conclusion: Restoring Temporal Sovereignty</h2><p>The case for Bitcoin ultimately rests not on its technological sophistication or its price performance, but on its alignment with fundamental properties of human existence. We live finite lives in which time flows in one direction. We exchange portions of our limited existence for resources that sustain us and allow us to pursue meaning.</p><p><strong>Any money that fails to respect this temporal reality&#8212;that leaks value through intentional debasement&#8212;fundamentally disrespects human dignity.</strong> It treats people&#8217;s lives as raw material to be consumed by institutions pursuing short-term political expediency.</p><p>Bitcoin proposes a different arrangement: a monetary system that acknowledges scarcity as fundamental rather than treating it as a problem to overcome through printing. It offers humanity the possibility of storing time in a vessel that doesn&#8217;t leak, of building toward futures that remain coherent because the measurement unit itself remains stable.</p><p>The choice before us is not primarily technical or economic&#8212;it&#8217;s philosophical. Do we continue accepting a system that requires running faster each year just to stay in place? Or do we adopt a tool that respects the finite nature of human existence by providing a finite measure for human effort?</p><p>Your time is the only resource you truly possess. The question is whether you&#8217;ll store it in a container designed to preserve it, or continue watching it evaporate in a system built for its slow confiscation.</p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://massmux.org/p/the-erosion-of-human-time-and-corruption?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading massmux.org Labs! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://massmux.org/p/the-erosion-of-human-time-and-corruption?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://massmux.org/p/the-erosion-of-human-time-and-corruption?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p>]]></content:encoded></item><item><title><![CDATA[Quantum Computers vs. Bitcoin]]></title><description><![CDATA[Why the &#8220;Death of Bitcoin&#8221; Is Science Fiction]]></description><link>https://massmux.org/p/quantum-computers-vs-bitcoin</link><guid isPermaLink="false">https://massmux.org/p/quantum-computers-vs-bitcoin</guid><dc:creator><![CDATA[Max Musumeci]]></dc:creator><pubDate>Fri, 13 Feb 2026 08:03:14 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!2oDL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12d0b94b-f4b7-4557-9903-56baac7bba79_640x360.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2oDL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12d0b94b-f4b7-4557-9903-56baac7bba79_640x360.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2oDL!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12d0b94b-f4b7-4557-9903-56baac7bba79_640x360.png 424w, https://substackcdn.com/image/fetch/$s_!2oDL!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12d0b94b-f4b7-4557-9903-56baac7bba79_640x360.png 848w, https://substackcdn.com/image/fetch/$s_!2oDL!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12d0b94b-f4b7-4557-9903-56baac7bba79_640x360.png 1272w, https://substackcdn.com/image/fetch/$s_!2oDL!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12d0b94b-f4b7-4557-9903-56baac7bba79_640x360.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2oDL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12d0b94b-f4b7-4557-9903-56baac7bba79_640x360.png" width="640" height="360" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/12d0b94b-f4b7-4557-9903-56baac7bba79_640x360.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:360,&quot;width&quot;:640,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:288796,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://massmux.org/i/187832171?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12d0b94b-f4b7-4557-9903-56baac7bba79_640x360.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!2oDL!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12d0b94b-f4b7-4557-9903-56baac7bba79_640x360.png 424w, https://substackcdn.com/image/fetch/$s_!2oDL!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12d0b94b-f4b7-4557-9903-56baac7bba79_640x360.png 848w, https://substackcdn.com/image/fetch/$s_!2oDL!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12d0b94b-f4b7-4557-9903-56baac7bba79_640x360.png 1272w, https://substackcdn.com/image/fetch/$s_!2oDL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12d0b94b-f4b7-4557-9903-56baac7bba79_640x360.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>1. Introduction: The Ghost in the Machine</h3><p>In recent months, a &#8220;quantum panic&#8221; has permeated the digital asset space, fueled by a relentless cycle of sensationalist media and &#8220;miraculous declarations&#8221; from Big Tech marketing departments. The narrative is as predictable as it is flawed: the imminent arrival of a universal quantum computer that will instantaneously dissolve Bitcoin&#8217;s cryptographic foundations. While researchers and certain &#8220;quantum-resistant&#8221; shitcoin promoters amplify this anxiety to capture headlines or market share, a scientifically grounded analysis reveals a different reality. To suggest Bitcoin is on the brink of collapse is to ignore the colossal engineering chasm that separates experimental noise-generators from the functional, error-corrected machines required to challenge the decentralized ledger.</p><h3>2. Takeaway: &#8220;Quantum Supremacy&#8221; is Currently Just Expensive Noise</h3><p>Google and IBM&#8217;s recent announcements regarding &#8220;Quantum Supremacy&#8221; are masterclasses in technical obfuscation. In these contexts, &#8220;supremacy&#8221; merely denotes a machine performing a specialized calculation that a classical computer cannot complete in a reasonable timeframe. It is not a synonym for utility. Google&#8217;s Willow processor, utilizing 105 qubits, achieved supremacy by generating a verifiable distribution of random noise. This is computationally impressive but cryptographically irrelevant; generating noise is worlds apart from the structured, high-precision mathematics required to reverse-engineer a private key.</p><p>&#8220;The fact that some very large companies that provide successful services are shooting out technical terms at random is nothing new. It is not something that should surprise us much; big tech often uses these miraculous declarations to sell cloud services or hype products that aren&#8217;t yet scientifically sustainable.&#8221;</p><p>For the strategist, these machines are currently nothing more than highly specialized, extraordinarily expensive lab experiments that lack the stability to perform a single meaningful operation on Bitcoin timechain.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://massmux.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">massmux.org Labs is a reader-supported publication. To receive new posts, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h3>3. Takeaway: The &#8220;Logical Qubit&#8221; Chasm and Gate Complexity</h3><p>The distance between today&#8217;s hardware and a machine capable of cracking Bitcoin&#8217;s secp256k1 curve is not a gap&#8212;it is a canyon. While we currently track &#8220;Physical Qubits,&#8221; these are essentially useless due to decoherence. To achieve anything practical, the <strong>Threshold Theorem</strong> requires us to bundle thousands of physical qubits into a single &#8220;Logical Qubit&#8221; to facilitate error correction. The hardware requirements for a &#8220;one-day&#8221; crack of a Bitcoin key are staggering:</p><ul><li><p><strong>Coherence Scale:</strong> We currently struggle to keep even a triad of three qubits in a state of coherence for more than 35 seconds.</p></li><li><p><strong>Physical Hardware:</strong> An attack requires an estimated <strong>13 million physical qubits</strong>, whereas current state-of-the-art processors barely exceed 150.</p></li><li><p><strong>Gate Precision:</strong> We must achieve an astronomical increase in precision, moving from a current error rate of roughly <strong>10^{-4} to 10^{-15}</strong>. This represents a million-fold improvement for which no viable engineering roadmap currently exists.</p></li><li><p><strong>Circuit Depth:</strong> A Shor&#8217;s algorithm attack on Bitcoin signatures requires approximately <strong>5 trillion quantum gates</strong> (or 10^{10} Toffoli gates).</p></li></ul><p>Managing that level of complexity while shielding the system from a single stray electromagnetic wave is an engineering feat currently comparable to stabilizing a house of cards in a hurricane.</p><h3>4. Takeaway: The &#8220;Quantum Shield&#8221; of Hashing vs. Public Key Exposure</h3><p>A critical distinction must be made between Bitcoin&#8217;s two primary cryptographic primitives: SHA-256 (mining) and ECDSA/Schnorr (signatures).</p><ul><li><p><strong>SHA-256 (Mining Resilience):</strong> Using Grover&#8217;s algorithm, a quantum adversary achieves only a &#8220;quadratic speedup.&#8221; This is not a &#8220;break&#8221; of the system but a hardware shift. Much like the transition from GPUs to ASICs, quantum miners would simply force a hardware migration. Bitcoin&#8217;s difficulty adjustment would absorb the increased efficiency, maintaining the 10-minute block interval.</p></li><li><p><strong>ECDSA/Schnorr (The Signature Vulnerability):</strong> Shor&#8217;s algorithm represents an &#8220;exponential&#8221; threat to signatures. However, Bitcoin has a built-in defense: <strong>hashing</strong>. In modern <strong>P2PKH</strong> (Pay-to-PubKey-Hash) addresses, the public key is not revealed on the blockchain until a transaction is initiated. The address itself is a hash, which is quantum-resistant. <strong>Your signature only becomes vulnerable the moment you spend, creating a narrow window of attack that requires a machine to solve the discrete log problem faster than the next block is mined</strong>.</p></li></ul><blockquote><p>The real &#8220;Quantum Ghost&#8221; haunts Satoshi-era <strong>P2PK</strong> addresses, where the public key sits exposed on the ledger. For the rest of the network, the hashing of public keys provides a robust &#8220;quantum shield.&#8221;</p></blockquote><h3>5. Takeaway: The Economic &#8220;TradFi&#8221; Shield</h3><p>If a nation-state ever possessed a machine with 10 billion Toffoli gates, Bitcoin would be a tertiary target at best. The global financial infrastructure rests on the same vulnerabilities but at a far more lucrative scale.</p><ul><li><p><strong>Target Prioritization:</strong> An adversary would likely prioritize de-authenticating global satellite networks, bankrupting rival central banks, or compromising the <strong>154 trillion** fixed-income and **128 trillion</strong> equity markets long before attempting to drain individual BTC wallets.</p></li><li><p><strong>The Roadmap:</strong> Traditional Finance (TradFi) will be forced to develop and deploy quantum-resistant standards (PQC) first. Bitcoin, as a smaller and more nimble target, will benefit from the battle-tested standards developed by central banks and global settlement rails.</p></li></ul><h3>6. Takeaway: The Migration Path and the &#8220;Bloat&#8221; Dilemma</h3><p>A &#8220;soft fork&#8221; can introduce <strong>Post-Quantum Cryptography (PQC)</strong>. A proposed <strong>Quantum-Resistant Address Migration Protocol (QRAMP)</strong> would involve a &#8220;burn and migrate&#8221; strategy, moving funds to new addresses using lattice-based or hash-based signatures. However, this introduces two major strategic hurdles:</p><ol><li><p><strong>The Lost Coin Problem:</strong> Satoshi-era or &#8220;lost&#8221; coins cannot sign the migration transaction. These funds would likely have to be declared unspendable after a hard deadline&#8212;a move that challenges the core principle of immutability.</p></li><li><p><strong>Efficiency Degradation:</strong> PQC signatures like Dilithium or SPHINCS+ are significantly larger in byte size than current signatures.</p></li></ol><p>&#8220;Many of these currently proposed quantum-resistant signatures are &#8216;untested.&#8217; Some have been found to be insecure even against classical computers because they haven&#8217;t been &#8216;battle-tested&#8217; in an adversarial environment for decades, as ECDSA has.&#8221;</p><h3>7. Conclusion: A Century-Long Horizon</h3><p>While the underlying physics of quantum computation is sound, the engineering reality is currently in a state of infancy. A practical, cost-effective quantum attack on Bitcoin remains more akin to &#8220;interstellar travel&#8221; or &#8220;low-cost nuclear fusion&#8221; than a near-term financial risk. We are likely decades, if not a century, away from the hardware stability required to execute Shor&#8217;s algorithm on a 256-bit key.</p><p>The ultimate question for the Bitcoin community is not whether the physics will work, but whether we are prepared for the social and technical trade-offs. Upgrading to quantum-resistant signatures means accepting larger transactions, slower validation, and the potential abandonment of &#8220;lost&#8221; coins. For the foreseeable future, however, the &#8220;Death of Bitcoin&#8221; remains a science fiction narrative designed to sell cloud services and clickbait, not a reflection of cryptographic reality. We leave such titles to shitty media and newspapers.</p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://massmux.org/p/quantum-computers-vs-bitcoin?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading massmux.org Labs! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://massmux.org/p/quantum-computers-vs-bitcoin?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://massmux.org/p/quantum-computers-vs-bitcoin?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p>]]></content:encoded></item><item><title><![CDATA[Essential basic Bitcoin Privacy Precautions for Self-Custody]]></title><description><![CDATA[Start doing self-custody correctly from the beginning]]></description><link>https://massmux.org/p/essential-basic-bitcoin-privacy-precautions</link><guid isPermaLink="false">https://massmux.org/p/essential-basic-bitcoin-privacy-precautions</guid><dc:creator><![CDATA[Max Musumeci]]></dc:creator><pubDate>Sun, 11 Jan 2026 08:08:29 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!46hW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93155cb1-6ae1-4971-ac19-af07f887eaec_1458x1010.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!46hW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93155cb1-6ae1-4971-ac19-af07f887eaec_1458x1010.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!46hW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93155cb1-6ae1-4971-ac19-af07f887eaec_1458x1010.png 424w, https://substackcdn.com/image/fetch/$s_!46hW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93155cb1-6ae1-4971-ac19-af07f887eaec_1458x1010.png 848w, https://substackcdn.com/image/fetch/$s_!46hW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93155cb1-6ae1-4971-ac19-af07f887eaec_1458x1010.png 1272w, https://substackcdn.com/image/fetch/$s_!46hW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93155cb1-6ae1-4971-ac19-af07f887eaec_1458x1010.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!46hW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93155cb1-6ae1-4971-ac19-af07f887eaec_1458x1010.png" width="1456" height="1009" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/93155cb1-6ae1-4971-ac19-af07f887eaec_1458x1010.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1009,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:932318,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://massmux.org/i/184127515?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93155cb1-6ae1-4971-ac19-af07f887eaec_1458x1010.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!46hW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93155cb1-6ae1-4971-ac19-af07f887eaec_1458x1010.png 424w, https://substackcdn.com/image/fetch/$s_!46hW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93155cb1-6ae1-4971-ac19-af07f887eaec_1458x1010.png 848w, https://substackcdn.com/image/fetch/$s_!46hW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93155cb1-6ae1-4971-ac19-af07f887eaec_1458x1010.png 1272w, https://substackcdn.com/image/fetch/$s_!46hW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93155cb1-6ae1-4971-ac19-af07f887eaec_1458x1010.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>An outline of the most important and basic privacy precautions for keeping Bitcoin in self-custody. Self-custody is nowadays the only way to keep safe and secure Bitcoin. Centralized agencies, government and authorities are collecting information and preventing you to use your funds as you would need to. Using self-custody is the only way to protect yourself. Here some basic recap:</p><h3>1. <strong>Never Reuse Addresses</strong></h3><ul><li><p><strong>What</strong>: Use each Bitcoin address only once to receive funds</p></li><li><p><strong>Why</strong>: Address reuse is the single biggest privacy leak. It links multiple transactions together and reveals your balance</p></li><li><p><strong>How</strong>: Use wallets with built-in address generation (HD wallets). Generate a new address for every transaction</p></li></ul><h3>2. <strong>Run Your Own Full Node</strong></h3><ul><li><p><strong>What</strong>: Download and verify the entire Bitcoin blockchain yourself</p></li><li><p><strong>Why</strong>: Third-party servers can track all your addresses and transactions. Your ISP can see you&#8217;re using Bitcoin</p></li><li><p><strong>How</strong>: Install Bitcoin Core or similar full node software</p></li><li><p><strong>Alternative</strong>: Use client-side block filtering (BIP 157/158) if full node isn&#8217;t feasible</p><p></p><p></p></li></ul><h3>3. <strong>Use Tor for All Bitcoin Network Activity</strong></h3><ul><li><p><strong>What</strong>: Route all Bitcoin traffic through the Tor network</p></li><li><p><strong>Why</strong>: Hides your IP address from peers, ISPs, and transaction surveillance companies</p></li><li><p><strong>How</strong>: Configure your wallet/node to run over Tor, or use Tails OS for maximum privacy</p></li><li><p><strong>Always </strong>Broadcast on-chain transactions over Tor this is very important for preventing IP address correlation with transactions</p></li></ul><h3>4. <strong>Avoid KYC/AML</strong></h3><ul><li><p><strong>What</strong>: Obtain Bitcoin without providing personal identification, documents and related information</p></li><li><p><strong>Why</strong>: KYC exchanges link your real identity to all your Bitcoin addresses and transactions and share these details to government agencies</p></li><li><p><strong>How</strong>: Use cash trades, Peer2Peer purchases, Bitcoin ATMs without KYC, earn Bitcoin, or mining</p></li><li><p>Avoiding AML/KYC is the number 1 and most basic rule for an individual to improve their privacy&#8221;</p></li></ul><h3>5. <strong>Practice Coin Control</strong></h3><ul><li><p><strong>What</strong>: Manually select which UTXOs (coins) to spend in each transaction</p></li><li><p><strong>Why</strong>: Prevents accidentally linking separate income sources or revealing your total balance</p></li><li><p><strong>How</strong>: Use wallets with coin control features </p></li><li><p>Coin control as essential for preventing privacy leaks from transaction inputs</p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://massmux.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">massmux.org Labs is a reader-supported publication. To receive new posts, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h3>6. <strong>Avoid Change Outputs When Possible</strong></h3><ul><li><p><strong>What</strong>: Structure transactions to spend entire UTXOs without creating change</p></li><li><p><strong>Why</strong>: Change addresses can be detected and linked to future transactions</p></li><li><p><strong>How</strong>: Use exact amounts, consolidate UTXOs, or accept slightly higher fees</p></li><li><p>Try to avoid creating change addresses, for example when funding a lightning channel spend an entire UTXO into it without any change</p></li></ul><h3>7. <strong>Use Lightning Network for Payments</strong></h3><ul><li><p><strong>What</strong>: Make off-chain Bitcoin payments through payment channels</p></li><li><p><strong>Why</strong>: Lightning transactions don&#8217;t appear on the blockchain and have much better privacy properties</p></li><li><p><strong>How</strong>: Set up a Lightning wallet connected to your full node</p></li><li><p>Use Lightning Network as much as possible, it provides near-instant, private, cheap transactions. Better is using it with your own Lightning Node, where keys and channels are under your control.</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://members.denali.pro/cart.php?a=confproduct&amp;i=1" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_FI2!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3367b6d9-4edc-4f30-a492-aa672844fa17_1200x480.png 424w, https://substackcdn.com/image/fetch/$s_!_FI2!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3367b6d9-4edc-4f30-a492-aa672844fa17_1200x480.png 848w, https://substackcdn.com/image/fetch/$s_!_FI2!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3367b6d9-4edc-4f30-a492-aa672844fa17_1200x480.png 1272w, https://substackcdn.com/image/fetch/$s_!_FI2!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3367b6d9-4edc-4f30-a492-aa672844fa17_1200x480.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_FI2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3367b6d9-4edc-4f30-a492-aa672844fa17_1200x480.png" width="1200" height="480" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3367b6d9-4edc-4f30-a492-aa672844fa17_1200x480.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:480,&quot;width&quot;:1200,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1372802,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://members.denali.pro/cart.php?a=confproduct&amp;i=1&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://massmux.org/i/184127515?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3367b6d9-4edc-4f30-a492-aa672844fa17_1200x480.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!_FI2!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3367b6d9-4edc-4f30-a492-aa672844fa17_1200x480.png 424w, https://substackcdn.com/image/fetch/$s_!_FI2!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3367b6d9-4edc-4f30-a492-aa672844fa17_1200x480.png 848w, https://substackcdn.com/image/fetch/$s_!_FI2!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3367b6d9-4edc-4f30-a492-aa672844fa17_1200x480.png 1272w, https://substackcdn.com/image/fetch/$s_!_FI2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3367b6d9-4edc-4f30-a492-aa672844fa17_1200x480.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><h3>8. <strong>Implement CoinJoin for On-Chain Privacy</strong></h3><ul><li><p><strong>What</strong>: Collaborative transactions that mix your coins with others</p></li><li><p><strong>Why</strong>: Breaks the common-input-ownership heuristic that surveillance companies rely on</p></li><li><p><strong>How</strong>: Use JoinMarket, other solutions are nowadays less affordable</p><p></p></li></ul><h3>9. <strong>Minimize Information Disclosure</strong></h3><ul><li><p><strong>What</strong>: Be cautious about sharing any Bitcoin-related information</p></li><li><p><strong>Why</strong>: Data fusion can combine small leaks into major privacy breaches</p></li><li><p><strong>How</strong>:</p><ul><li><p>Don&#8217;t publish donation addresses publicly</p></li><li><p>Use email aliases</p></li><li><p>Avoid posting transaction IDs or addresses online</p></li><li><p>Be careful with delivery addresses when purchasing goods</p></li></ul></li><li><p>Be careful to reveal as little information as possible about yourself when transacting;</p></li></ul><h3>10. <strong>Secure Your Devices</strong></h3><ul><li><p><strong>What</strong>: Protect your wallet files and transaction history from physical access</p></li><li><p><strong>Why</strong>: Digital forensics can extract all your Bitcoin activity from hard drives</p></li><li><p><strong>How</strong>:</p><ul><li><p>Use encrypted wallets</p></li><li><p>Consider Tails OS or a debian with full OS encryption</p></li><li><p>Securely wipe old devices</p></li><li><p>Use hardware wallets for cold storage</p></li></ul></li><li><p>Never forget devices with clear data on it</p></li></ul><p></p><h3>11. <strong>Understand Your Threat Model</strong></h3><ul><li><p><strong>What</strong>: Define who you&#8217;re protecting your privacy from</p></li><li><p><strong>Why</strong>: Privacy measures should match your specific risks and adversaries</p></li><li><p><strong>How</strong>: Consider whether you&#8217;re protecting against:</p><ul><li><p>Casual observers</p></li><li><p>Transaction surveillance companies</p></li><li><p>Hackers and criminals</p></li><li><p>Government agencies</p></li><li><p>Family members or employers</p></li></ul></li><li><p>Think about what you&#8217;re hiding from, what is your threat model and what is your adversary. This is necessary to understand how to modulate trade off in your configuration.</p></li></ul><h3>12. <strong>Never Use Web Wallets or Custodial Services</strong></h3><ul><li><p><strong>What</strong>: Avoid wallets where someone else controls your keys</p></li><li><p><strong>Why</strong>: These services see every transaction you make and can link your identity to your Bitcoin activity</p></li><li><p><strong>How</strong>: Use self-custody wallets like Electrum (with your own server) with keys managed with hardware wallets</p></li><li><p>Never should not use web wallets, they are evil for privacy</p></li></ul><div><hr></div><h2>Priority Ranking for Beginners</h2><p><strong>Must do immediately:</strong></p><ol><li><p>Never reuse addresses</p></li><li><p>Avoid KYC exchanges</p></li><li><p>Use Tor for transactions</p></li></ol><p><strong>Should implement soon:</strong> 4. Run your own full node 5. Use Lightning Network 6. Practice coin control, 7. Create your own Lightning node</p><p><strong>Advanced but important:</strong> 8. Use CoinJoin 9. Avoid change outputs 10. Secure your devices properly. 11 Use Swap techniques for enhancing privacy.</p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://massmux.org/p/essential-basic-bitcoin-privacy-precautions?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading massmux.org Labs! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://massmux.org/p/essential-basic-bitcoin-privacy-precautions?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://massmux.org/p/essential-basic-bitcoin-privacy-precautions?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p>If you looking for how to run your own Lightning node in an easy way, you may want to try Nimblenode which is a preconfigured LIT, Neutrino stack running on a <a href="https://members.denali.pro/cart.php?a=confproduct&amp;i=1">VPS powered by denali.pro</a> </p>]]></content:encoded></item><item><title><![CDATA[Swap as a privacy step]]></title><description><![CDATA[an pro/con analysis about a privacy setup involving swap to the Lightning Network]]></description><link>https://massmux.org/p/bitcoin-swap-as-a-privacy-step</link><guid isPermaLink="false">https://massmux.org/p/bitcoin-swap-as-a-privacy-step</guid><dc:creator><![CDATA[Max Musumeci]]></dc:creator><pubDate>Fri, 26 Dec 2025 07:39:26 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!RDZY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c060e6d-f7c9-48a6-8f54-10faa38da533_1280x720.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!RDZY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c060e6d-f7c9-48a6-8f54-10faa38da533_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!RDZY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c060e6d-f7c9-48a6-8f54-10faa38da533_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!RDZY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c060e6d-f7c9-48a6-8f54-10faa38da533_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!RDZY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c060e6d-f7c9-48a6-8f54-10faa38da533_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!RDZY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c060e6d-f7c9-48a6-8f54-10faa38da533_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!RDZY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c060e6d-f7c9-48a6-8f54-10faa38da533_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5c060e6d-f7c9-48a6-8f54-10faa38da533_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:886565,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://massmux.org/i/182569429?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c060e6d-f7c9-48a6-8f54-10faa38da533_1280x720.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!RDZY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c060e6d-f7c9-48a6-8f54-10faa38da533_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!RDZY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c060e6d-f7c9-48a6-8f54-10faa38da533_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!RDZY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c060e6d-f7c9-48a6-8f54-10faa38da533_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!RDZY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c060e6d-f7c9-48a6-8f54-10faa38da533_1280x720.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Today my proposal is to discuss about a possible way to enhance privacy of your UTXOs through a technique involving <strong>Lightning Network</strong>. While Coinjoin remains without any doubt the most effective way to increase privacy if the anonset is enough, it&#8217;s good to test additional methods with different trade offs and results and analyze them. Here is one.</p><h2>Description</h2><p>Let's say I have a bitcoin UTXO in a wallet. I want to increase the privacy of this UTXO but without using coinjoin. This is the plan of this setup.<br>- Open a Phoenix wallet using Tor on a phone. it is installed from scratch and first connected with tor;<br>- Spend the entire UTXO (you have on a wallet where you own the keys) to a Phoenix onchain address (as provided by the new installed wallet). Phoenix will automatically open a channel to handle this operation;<br>- Once the channel is open (a channel to acinq), create 2 or more swaps on Boltz from Lightning (on phoenix) to On-chain and pay for them using Phoenix, resulting in the transaction being sent to another of unused onchain addresses you own, through the Boltz service. These swaps need to be executed from tor and without any timing and amount relationship correlations with the original UTXO.<br>The initial amount of the UTXO will be recovered into 2 or more swap operations on 2 or more on-chain destinations without correlation of time and amount.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://massmux.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">massmux.org Labs is a reader-supported publication. To receive new posts, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h2>Let&#8217;s analyze what we have</h2><p>What you are doing:</p><ul><li><p>You are effectively breaking the chain of direct on-chain transactions;</p></li><li><p>Using the Lightning Network as an intermediary creates an obfuscation by going on the layer 2 on the blockchain;</p></li><li><p>Boltz swap adds an additional layer of separation;</p></li><li><p>Using Tor with Phoenix helps protect privacy at the network level;</p></li></ul><h2>Issues and limitations:</h2><p>Opening a Phoenix channel: When you send funds on-chain to Phoenix, the channel opening transaction is visible on the blockchain and directly links your initial UTXO to the Lightning channel address. This link is public and traceable. This channel will be open from the acinq LSP.</p><p>Temporal analysis: If transactions occur in quick succession (send to Phoenix &#8594; Boltz swap), temporal analysis could correlate the transactions, especially if the amounts are similar or identical. For this reason is strongly important to care this aspect.</p><p>Amounts: If the final amount is very close to the initial amount (minus fees), this can be an indicator of correlation. <strong>For this reason it is strongly important to break the initial amount to different LN/On-chain swaps  in different time frames.</strong></p><p>Phoenix as a centralized point: Acinq can theoretically see both the channel opening and the Lightning payments you make, so they could correlate the transactions. This is a point you have to consider. there is no trustless privacy in this part.</p><p>Boltz: Boltz, as a swap service, also sees the correlation between the incoming Lightning payment and the outgoing on-chain UTXO.</p><h2>So what?</h2><p>For an external observer of the blockchain who does not have access to Phoenix or Boltz data, the final funds have no direct on-chain link to the initial UTXO.</p><p>But there are tradeoffs. Privacy is not absolute (when ever it could be) because:</p><ul><li><p>The initial transaction to Phoenix is public</p></li><li><p>You must trust that Phoenix and Boltz do not share/correlate data</p></li><li><p>Time and amount analysis may suggest links, so you must be careful about time and amounts</p><p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!_Byl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9593f7a-b424-46bc-826f-b01343c1eb0e_1116x486.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_Byl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9593f7a-b424-46bc-826f-b01343c1eb0e_1116x486.png 424w, https://substackcdn.com/image/fetch/$s_!_Byl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9593f7a-b424-46bc-826f-b01343c1eb0e_1116x486.png 848w, https://substackcdn.com/image/fetch/$s_!_Byl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9593f7a-b424-46bc-826f-b01343c1eb0e_1116x486.png 1272w, https://substackcdn.com/image/fetch/$s_!_Byl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9593f7a-b424-46bc-826f-b01343c1eb0e_1116x486.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_Byl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9593f7a-b424-46bc-826f-b01343c1eb0e_1116x486.png" width="1116" height="486" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b9593f7a-b424-46bc-826f-b01343c1eb0e_1116x486.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:486,&quot;width&quot;:1116,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:74260,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://massmux.org/i/182569429?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9593f7a-b424-46bc-826f-b01343c1eb0e_1116x486.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!_Byl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9593f7a-b424-46bc-826f-b01343c1eb0e_1116x486.png 424w, https://substackcdn.com/image/fetch/$s_!_Byl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9593f7a-b424-46bc-826f-b01343c1eb0e_1116x486.png 848w, https://substackcdn.com/image/fetch/$s_!_Byl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9593f7a-b424-46bc-826f-b01343c1eb0e_1116x486.png 1272w, https://substackcdn.com/image/fetch/$s_!_Byl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9593f7a-b424-46bc-826f-b01343c1eb0e_1116x486.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div></li></ul><h2>Variations</h2><p>We can do more effective variations to enhance the results. For example using on- demand lightning nodes (like <a href="https://github.com/massmux/nimblenode">nimblenode</a> for example). Or using another layer on liquid swaps. We will go inside these techniques in the next articles and video contents. Stay tuned.</p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://massmux.org/p/bitcoin-swap-as-a-privacy-step?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading massmux.org Labs! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://massmux.org/p/bitcoin-swap-as-a-privacy-step?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://massmux.org/p/bitcoin-swap-as-a-privacy-step?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p>]]></content:encoded></item><item><title><![CDATA[OP_RETURN: let's analyze a little bit]]></title><description><![CDATA[some technical consideration beyond ethical debates]]></description><link>https://massmux.org/p/op_return-lets-analyze-a-little-bit</link><guid isPermaLink="false">https://massmux.org/p/op_return-lets-analyze-a-little-bit</guid><dc:creator><![CDATA[Max Musumeci]]></dc:creator><pubDate>Sat, 22 Nov 2025 07:04:34 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!puvl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7a5b911-4ac9-42e7-8be1-2f8509138eb3_1280x720.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!puvl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7a5b911-4ac9-42e7-8be1-2f8509138eb3_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!puvl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7a5b911-4ac9-42e7-8be1-2f8509138eb3_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!puvl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7a5b911-4ac9-42e7-8be1-2f8509138eb3_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!puvl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7a5b911-4ac9-42e7-8be1-2f8509138eb3_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!puvl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7a5b911-4ac9-42e7-8be1-2f8509138eb3_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!puvl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7a5b911-4ac9-42e7-8be1-2f8509138eb3_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f7a5b911-4ac9-42e7-8be1-2f8509138eb3_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1267662,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://massmux.org/i/179573887?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7a5b911-4ac9-42e7-8be1-2f8509138eb3_1280x720.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!puvl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7a5b911-4ac9-42e7-8be1-2f8509138eb3_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!puvl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7a5b911-4ac9-42e7-8be1-2f8509138eb3_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!puvl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7a5b911-4ac9-42e7-8be1-2f8509138eb3_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!puvl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7a5b911-4ac9-42e7-8be1-2f8509138eb3_1280x720.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The role of <code>OP_RETURN</code> in Bitcoin has long been a point of debate among developers, miners, and businesses building on top of the protocol. Introduced as a standard mechanism for embedding small pieces of arbitrary data in a provably unspendable output, <code>OP_RETURN</code> has historically been constrained by strict relay policies, most notably the long-standing 80-byte limit enforced by Bitcoin Core. Up to version <strong>v29</strong>, Bitcoin Core maintained conservative restrictions to discourage on-chain data storage and preserve Bitcoin&#8217;s primary function as a decentralized monetary network.</p><p>With the release of <strong>Bitcoin Core v30</strong>, however, these rules have undergone their most significant shift in nearly a decade: the maximum permitted OP_RETURN payload has been dramatically increased, and transactions are now allowed to include multiple data-carrying outputs. These changes&#8212;still firmly within policy, not consensus&#8212;have opened the door to new use cases while simultaneously raising fresh concerns about bandwidth, storage costs, and the potential for blockchain bloat.</p><p>At the same time, <strong>Bitcoin Knots</strong>, an alternative Bitcoin implementation known for <strong>stricter validation rules</strong> and a more conservative stance on data-carrying transactions, continues to enforce tighter limits on OP_RETURN. This divergence between Bitcoin Core and Knots highlights a broader discussion within the Bitcoin ecosystem about data embedding, node resource requirements, miner incentives, and the trade-offs between flexibility and long-term sustainability.</p><p>This article examines how OP_RETURN worked up to Bitcoin Core v29, what has changed in v30, how Bitcoin Knots approaches data-carrying outputs, and the benefits and risks associated with each model. The goal is to provide a clear, factual, and balanced analysis for developers, node operators, and Bitcoin infrastructure providers evaluating the implications of these evolving policy choices.</p><h2>Limits on <code>op_return</code> on both Bitcoin Core and Knots</h2><p>The limit on the data carrier size, which relates to the <code>op_return</code> field in a transaction, is a key point of debate between Bitcoin Core and Bitcoin Knots implementations.</p><ul><li><p><strong>Bitcoin Knots:</strong> The default setting for the data carrier size (or <code>op_return</code> limit) in the mempool is <strong>42 bytes</strong>. This small amount of data allows people to embed certain information, such as a little bit of text, but not a huge amount. <strong>Knots offers additional configurability for the mempool, allowing users to change this setting</strong>. For instance, a user can set the limit to zero bytes to filter out all <code>op_return</code> transactions from their mempool.</p></li><li><p><strong>Bitcoin Core (v29):</strong> The previous implementation of Bitcoin Core (v29) has a default data carrier size of about <strong>83 bytes</strong>.</p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://massmux.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">massmux.org Labs is a reader-supported publication. To receive new posts, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>What Bitcoin Core v30 <em>actually</em> changes about OP_RETURN</h2><p>released october. The main changes:</p><ol><li><p><code>-datacarriersize</code><strong> Default Raised to 100,000 Bytes</strong></p><ul><li><p>In v30, the default value for <code>-datacarriersize</code> is increased to <strong>100,000 bytes</strong>. </p></li><li><p>According to the release notes, at that size &#8220;the maximum transaction size limit will be hit first,&#8221; meaning the OP_RETURN limit is no longer the bottleneck for &#8220;standardness&#8221; under many circumstances.</p></li><li><p>You can still override this to the previous behavior by setting <code>-datacarriersize=83</code> to revert to the older limit</p></li></ul></li><li><p><strong>Multiple OP_RETURN Outputs Allowed</strong></p><ul><li><p>v30 allows <strong>multiple data-carrier (OP_RETURN) outputs</strong> in the same transaction (for relay and mining). </p></li><li><p>The <code>-datacarriersize</code> limit applies to the <em>aggregate</em> size of those OP_RETURN <code>scriptPubKeys</code> (i.e., it sums over all those outputs), not individually.</p></li></ul></li><li><p><strong>Policy Change, Not Consensus Change</strong></p><ul><li><p>These changes are <strong>policy-level</strong>, not consensus rules. That means they affect what a node will <em>relay</em> or <em>accept into its mempool</em>, not whether a block is valid. </p></li><li><p>Because of that, there&#8217;s <strong>no risk of a chain split</strong> solely due to this change</p></li></ul></li><li><p><code>-datacarriersize</code><strong> Option Still Present</strong></p><ul><li><p>Even though the default is increased, the <code>-datacarriersize</code> configuration option remains available. </p></li><li><p>There was discussion of deprecation of <code>-datacarriersize</code>, but based on a late-stage change (PR #33453), the deprecation warning was <strong>removed</strong>.</p></li></ul><p></p><p>please checkout: <a href="https://github.com/bitcoin/bitcoin/issues/33595">https://github.com/bitcoin/bitcoin/issues/33595</a></p><p></p><p>One of the many problems cited with this implementation is that it allows users to put in full JPEGs, small MP4s, audio, or <strong>illicit material</strong> into the blockchain. Historically, increasing this limit (as seen with BSV, which increased it to 100 kilobytes) resulted in child abuse imagery being embedded in that blockchain.</p></li></ol><h2>Differences between what happens to a transaction in mempool compared to what happens when a transaction is included in a block</h2><p>The processing of a transaction differs significantly between the mempool (implementation layer) and inclusion in a block (consensus layer).</p><p><strong>mempool is a temporary waiting space</strong> for transactions after they are broadcast to the network. It is the &#8220;waiting room before it gets put into a block&#8221;.  They are governed by <strong>Mempool Policy</strong>. These are optional, subjective decisions and filters set by the individual node runner. </p><p><strong>Consensus Rules</strong>. These are the base layer rules that all miners must accept as valid. <strong> </strong>A node uses its filters to decide if it will <strong>accept and relay</strong> a transaction to its peers. If a transaction violates the node&#8217;s policy (e.g., fee too low or <code>op_return</code> too large), it is rejected from that node&#8217;s mempool. A miner includes transactions from their mempool into a block they mine, and this block is added to the blockchain. <strong>Effect </strong>Policies result in <strong>different mempools</strong> across the network; no mempool looks exactly the same. Filtering can make it more <strong>difficult</strong> or expensive for transactions to get mined. Inclusion in a block is <strong>permanent</strong>. </p><blockquote><p>If a transaction violates consensus rules, it does not get included in <em>any</em> mempool. If a transaction is consensus-valid but violates many mempool policies, a miner can still include it, bypassing the filtering mechanism of most nodes.</p></blockquote><p>Mempool policy configuration is often described as self-defense of a node&#8217;s resources (disk, bandwidth, RAM) against spam. While filtering can make things more difficult and align incentives by increasing the economic friction for certain transactions, it <strong>cannot fully censor</strong> a consensus-valid transaction, as a miner can still choose to include it.</p><p>The <strong>mempool policy</strong> is like your individual email spam filter&#8212;you can set it strictly to protect your inbox (your resources), but that doesn&#8217;t stop the sender from mailing the same letter to someone else who uses a laxer filter.</p><h2>What does Slipstream Mara do?</h2><p><strong><a href="https://slipstream.mara.com/">Slipstream</a></strong><a href="https://slipstream.mara.com/"> </a>is a product that facilitates submitting a transaction directly to a miner, completely <strong>bypassing the standard mempool policy</strong> filters of the network.</p><ul><li><p><strong>Function:</strong> Users can use Slipstream to submit transactions, often those containing a <strong>really high </strong><code>op_return</code> or large amounts of data.</p></li><li><p><strong>Provider:</strong> The service is provided by the massive mining pool <strong>Mara</strong>.</p></li><li><p><strong>Cost:</strong> Mara charges a <strong>massive premium</strong> to include transactions submitted via Slipstream, sometimes double the current mempool fee rate.</p></li><li><p><strong>Internal Filters:</strong> Despite enabling users to bypass network-wide mempool filters, Slipstream itself has terms and conditions that act as filters. Users are prohibited from using Slipstream to engage in activities that violate applicable laws, including participating in money laundering or <strong>uploading illegal content</strong> (such as illicit images). This policy is necessary because, without it, the ability to put massive <code>op_returns</code> into the blockchain could lead to the inclusion of illegal material.</p></li></ul><p>Please let me know what is your opinion about what described in this article. What will be the future of Bitcoin and your position on how spam should be handled in this debate.</p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://massmux.org/p/op_return-lets-analyze-a-little-bit?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading massmux.org Labs! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://massmux.org/p/op_return-lets-analyze-a-little-bit?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://massmux.org/p/op_return-lets-analyze-a-little-bit?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p>]]></content:encoded></item><item><title><![CDATA[Basics of routing on the Lightning Network]]></title><description><![CDATA[Some examples to understand how it works]]></description><link>https://massmux.org/p/basics-of-routing-on-the-lightning</link><guid isPermaLink="false">https://massmux.org/p/basics-of-routing-on-the-lightning</guid><dc:creator><![CDATA[Max Musumeci]]></dc:creator><pubDate>Thu, 30 Oct 2025 16:45:02 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!t2FS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf544d7d-ea3e-457d-9842-00bffcc9cb2c_1458x1010.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!t2FS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf544d7d-ea3e-457d-9842-00bffcc9cb2c_1458x1010.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!t2FS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf544d7d-ea3e-457d-9842-00bffcc9cb2c_1458x1010.png 424w, https://substackcdn.com/image/fetch/$s_!t2FS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf544d7d-ea3e-457d-9842-00bffcc9cb2c_1458x1010.png 848w, https://substackcdn.com/image/fetch/$s_!t2FS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf544d7d-ea3e-457d-9842-00bffcc9cb2c_1458x1010.png 1272w, https://substackcdn.com/image/fetch/$s_!t2FS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf544d7d-ea3e-457d-9842-00bffcc9cb2c_1458x1010.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!t2FS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf544d7d-ea3e-457d-9842-00bffcc9cb2c_1458x1010.png" width="1456" height="1009" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/df544d7d-ea3e-457d-9842-00bffcc9cb2c_1458x1010.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1009,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1026733,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://massmux.org/i/177569884?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf544d7d-ea3e-457d-9842-00bffcc9cb2c_1458x1010.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!t2FS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf544d7d-ea3e-457d-9842-00bffcc9cb2c_1458x1010.png 424w, https://substackcdn.com/image/fetch/$s_!t2FS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf544d7d-ea3e-457d-9842-00bffcc9cb2c_1458x1010.png 848w, https://substackcdn.com/image/fetch/$s_!t2FS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf544d7d-ea3e-457d-9842-00bffcc9cb2c_1458x1010.png 1272w, https://substackcdn.com/image/fetch/$s_!t2FS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf544d7d-ea3e-457d-9842-00bffcc9cb2c_1458x1010.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The Lightning Network uses <strong>source-based onion routing</strong> with the <strong>SPHINX protocol</strong> to enable private, censorship-resistant payments. The sender controls the entire routing path while intermediate nodes only see their immediate neighbors, ensuring transaction privacy across the network.</p><div><hr></div><h2>1. Introduction: What is Onion Routing?</h2><p>Onion routing is a privacy-preserving technique where data is wrapped in multiple layers of encryption&#8212;like the layers of an onion. As the data passes through each node in the network, one layer is &#8220;peeled&#8221; off, revealing only the next destination.</p><p><strong>Key Concept</strong>: The Lightning Network adapted this technique (originally from the Tor network) specifically for payment routing, using a variant called SPHINX.</p><h3>Why Onion Routing for Lightning?</h3><p>Traditional internet routing reveals the sender, receiver, and all intermediaries to each routing node. Lightning Network needed a protocol that:</p><ul><li><p>Hides payment source and destination</p></li><li><p>Prevents censorship</p></li><li><p>Maintains efficiency for financial transactions</p></li><li><p>Protects against traffic analysis</p></li></ul><div><hr></div><h2>2. Source-Based Routing: The Sender is in Control</h2><h3>2.1 Overview</h3><p>In the Lightning Network, <strong>the sending node determines the complete payment path</strong> from source to destination. This is called <strong>source-based pathfinding</strong>.</p><p><strong>Important</strong>: Unlike traditional internet routing where routers decide the path, in Lightning the sender has full control over:</p><ul><li><p>The exact route (sequence of nodes)</p></li><li><p>Total number of hops</p></li><li><p>Total fees paid</p></li><li><p>Time-lock values (CLTV) at each hop</p></li></ul><h3>2.2 Path Discovery Process</h3><p>The sender builds their routing strategy using three key data sources:</p><h4>Network Topology (Channel Graph)</h4><p>The sender maintains a local &#8220;map&#8221; of the Lightning Network by collecting:</p><ul><li><p><strong>Node announcements</strong>: Public keys and addresses of Lightning nodes</p></li><li><p><strong>Channel announcements</strong>: Information about payment channels between nodes</p></li><li><p><strong>Channel updates</strong>: Routing policies (fees, timelocks) for each channel</p></li></ul><p>This information is gathered through the <strong>gossip protocol</strong>&#8212;a peer-to-peer mechanism where nodes share network topology data.</p><h4>Practical Example: Alice Pays Dave</h4><p>Let&#8217;s follow a concrete example:</p><p><strong>Scenario Setup:</strong></p><ul><li><p>Alice wants to pay Dave 4,999,999 millisatoshis (&#8776; 5,000 sats) for a coffee</p></li><li><p>Dave generates an invoice containing:</p><ul><li><p><code>amount</code>: 4,999,999 msats</p></li><li><p><code>payment_hash</code>: Hash of a secret preimage</p></li><li><p><code>payee_pub_key</code>: Dave&#8217;s public key</p></li><li><p><code>min_final_cltv_expiry_delta</code>: 9 blocks (safety buffer)</p></li></ul></li></ul><p><strong>Alice&#8217;s Network View:</strong></p><pre><code><code>Alice&#8217;s available paths to Dave:

Path 1: Alice &#8594; Bob &#8594; Charlie &#8594; Dave
  - Channel AB (fee: 200 base + 2000 ppm)
  - Channel BC (fee: 100 base + 1000 ppm)
  - Channel CD (fee: none, Dave is receiver)

Path 2: Alice &#8594; Eve &#8594; Charlie &#8594; Dave
  - Channel AE (fee: 300 base + 3000 ppm)
  - Channel EC (fee: 100 base + 1000 ppm)
  - Channel CD (fee: none, Dave is receiver)
</code></code></pre><h4>Fee Calculation (Working Backwards)</h4><p>Alice must calculate fees <strong>backwards from the destination</strong>:</p><p><strong>Path 1 Calculation:</strong></p><ol><li><p>Dave receives: 4,999,999 msats</p></li><li><p>Charlie&#8217;s fee: 100 + (1000/1,000,000) &#215; 4,999,999 = 5,100 msats</p><ul><li><p>Charlie forwards: 5,005,099 msats</p></li></ul></li><li><p>Bob&#8217;s fee: 200 + (2000/1,000,000) &#215; 5,005,099 = 10,211 msats</p><ul><li><p>Bob forwards: 5,015,310 msats</p></li></ul></li><li><p><strong>Total Alice pays</strong>: 5,015,310 msats (15,311 msats in fees)</p></li></ol><p><strong>Path 2 Calculation:</strong></p><ol><li><p>Dave receives: 4,999,999 msats</p></li><li><p>Charlie&#8217;s fee: 5,100 msats (same as above)</p><ul><li><p>Charlie forwards: 5,005,099 msats</p></li></ul></li><li><p>Eve&#8217;s fee: 300 + (3000/1,000,000) &#215; 5,005,099 = 15,316 msats</p><ul><li><p>Eve forwards: 5,020,415 msats</p></li></ul></li><li><p><strong>Total Alice pays</strong>: 5,020,415 msats (20,416 msats in fees)</p></li></ol><p><strong>Result</strong>: Alice selects Path 1 as it&#8217;s cheaper by 5,105 msats.</p><div><hr></div><h2>3. Constructing the Onion: Layer-by-Layer Encryption</h2><h3>3.1 The Onion Packet Structure</h3><p>Once Alice has selected her path, she constructs the <strong>onion packet</strong>&#8212;a fixed-size encrypted message containing instructions for each hop.</p><p><strong>Key Components:</strong></p><ul><li><p><strong>Version byte</strong>: Protocol version identifier</p></li><li><p><strong>Ephemeral public key</strong>: Used for shared secret derivation (different for each hop)</p></li><li><p><strong>Routing information</strong>: Encrypted payloads for each hop (1300 bytes fixed size)</p></li><li><p><strong>HMAC</strong>: Message authentication code for integrity verification</p></li></ul><h3>3.2 What Each Hop Needs to Know</h3><p>Each intermediate node receives a <strong>hop payload</strong> containing:</p><pre><code><code>Hop Payload Fields:
&#9500;&#9472;&#9472; short_channel_id    # Which channel to forward on
&#9500;&#9472;&#9472; amt_to_forward      # Amount to send (minus their fee)
&#9500;&#9472;&#9472; outgoing_cltv_value # Time-lock value for next hop
&#9492;&#9472;&#9472; hmac                # Authentication for next hop&#8217;s packet
</code></code></pre><p><strong>Critical Privacy Feature</strong>: Each hop payload is encrypted specifically for that node&#8212;no other node can decrypt it.</p><h3>3.3 Example: Building Alice&#8217;s Onion</h3><p>Using our Alice &#8594; Bob &#8594; Charlie &#8594; Dave example:</p><p><strong>Step 1: Dave&#8217;s Payload (Innermost Layer)</strong></p><pre><code><code>Payload for Dave:
- amt_to_forward: 4,999,999 msats
- outgoing_cltv_value: 1010 (current height 1001 + 9 block delta)
- Payment is final (no next hop)
</code></code></pre><p><strong>Step 2: Wrap with Charlie&#8217;s Payload</strong></p><pre><code><code>Payload for Charlie:
- short_channel_id: CD (channel to Dave)
- amt_to_forward: 4,999,999 msats
- outgoing_cltv_value: 1010
- Encrypted payload for Dave (Charlie cannot read this)
</code></code></pre><p><strong>Step 3: Wrap with Bob&#8217;s Payload</strong></p><pre><code><code>Payload for Bob:
- short_channel_id: BC (channel to Charlie)
- amt_to_forward: 5,005,099 msats
- outgoing_cltv_value: 1020 (1010 + Charlie&#8217;s 10 block delta)
- Encrypted payload for Charlie (Bob cannot read this)
</code></code></pre><p><strong>Step 4: Final Onion Sent to Bob</strong></p><pre><code><code>Complete Onion Packet:
- Version: 0
- Ephemeral key: [Bob&#8217;s ephemeral public key]
- Routing info: [Bob&#8217;s payload | Encrypted(Charlie&#8217;s payload | Encrypted(Dave&#8217;s payload))]
- HMAC: [Authentication code]
</code></code></pre><h3>3.4 The SPHINX Protocol: Advanced Encryption</h3><p>The Lightning Network uses a modified SPHINX Mix Format with these features:</p><h4>Shared Secret Derivation</h4><ul><li><p>Each hop derives a <strong>shared secret</strong> using Elliptic Curve Diffie-Hellman (ECDH)</p></li><li><p>The ephemeral key is <strong>randomized</strong> at each hop using a &#8220;blinding factor&#8221;</p></li><li><p>This prevents linking packets across hops</p></li></ul><h4>Key Generation Formula</h4><pre><code><code>For hop i:
- Shared secret: ss[i] = ECDH(node_private_key[i], ephemeral_public_key[i])
- Blinding factor: b[i] = HMAC-SHA256(ss[i], &#8220;blinding&#8221;)
- Next ephemeral key: ephemeral_key[i+1] = ephemeral_key[i] * b[i]
</code></code></pre><h4>Stream Cipher (ChaCha20)</h4><p>Lightning uses ChaCha20 (not AES) for:</p><ul><li><p>Performance optimization</p></li><li><p>Generating cipher streams to encrypt/decrypt payloads</p></li><li><p>Maintaining fixed packet size</p></li></ul><div><hr></div><h2>4. Intermediate Nodes: Limited Visibility by Design</h2><h3>4.1 What Each Hop Can See</h3><p>When Bob (an intermediate node) receives the onion packet, he can ONLY:</p><ol><li><p><strong>Decrypt his own layer</strong> using his private key</p></li><li><p><strong>Read his hop payload</strong> containing:</p><ul><li><p>Which channel to forward on (<code>short_channel_id</code>)</p></li><li><p>How much to forward (<code>amt_to_forward</code>)</p></li><li><p>What timelock to use (<code>outgoing_cltv_value</code>)</p></li></ul></li><li><p><strong>See predecessor</strong>: He knows Alice sent the packet to him</p></li><li><p><strong>See successor</strong>: He knows he should forward to Charlie</p></li></ol><h3>4.2 What Each Hop CANNOT See</h3><p>Bob <strong>cannot</strong> determine:</p><ul><li><p>Who is the original sender (could be Alice, or she might be forwarding)</p></li><li><p>Who is the final recipient (Dave? Or is Charlie forwarding further?)</p></li><li><p>Total path length (how many hops total?)</p></li><li><p>His position in the route (is he hop 1, 2, 3, or n?)</p></li><li><p>Contents of other hops&#8217; payloads</p></li><li><p>The original payment amount</p></li></ul><p><strong>Critical Privacy Mechanism</strong>: The onion packet size <strong>remains constant</strong> at 1,300 bytes at every hop. After Bob removes his payload, the packet is padded with encrypted &#8220;junk data&#8221; to maintain the same size.</p><h3>4.3 The Forwarding Process</h3><p><strong>Bob&#8217;s Actions:</strong></p><pre><code><code>1. Receive onion from Alice
2. Verify HMAC (check integrity)
3. Decrypt his layer using shared secret
4. Extract his hop payload:
   - Channel BC
   - Forward 5,005,099 msats
   - CLTV value 1020
5. Remove his payload from packet
6. Left-shift remaining data
7. Add random padding to maintain 1,300 bytes
8. Construct new onion with updated ephemeral key
9. Forward to Charlie via channel BC
</code></code></pre><p><strong>Charlie&#8217;s Actions:</strong> Same process&#8212;Charlie:</p><ul><li><p>Decrypts his layer</p></li><li><p>Extracts payload for channel CD</p></li><li><p>Forwards to Dave</p></li><li><p>Still doesn&#8217;t know this is the final hop</p></li></ul><p><strong>Dave&#8217;s Actions:</strong></p><ul><li><p>Receives final payload</p></li><li><p>Sees empty HMAC (indicating final destination)</p></li><li><p>Verifies he has the preimage for payment_hash</p></li><li><p>Claims the payment</p></li></ul><h3>4.4 Visual Analogy: Nested Envelopes</h3><p>Think of the onion like nested, locked boxes:</p><pre><code><code>&#9484;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9488;
&#9474;  For Bob (locked with Bob&#8217;s key)    &#9474;
&#9474;  &#9484;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9488;  &#9474;
&#9474;  &#9474; For Charlie (Charlie&#8217;s key)   &#9474;  &#9474;
&#9474;  &#9474; &#9484;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9488;   &#9474;  &#9474;
&#9474;  &#9474; &#9474; For Dave (Dave&#8217;s key)   &#9474;   &#9474;  &#9474;
&#9474;  &#9474; &#9474;   [Payment: 5000 sats]  &#9474;   &#9474;  &#9474;
&#9474;  &#9474; &#9492;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9496;   &#9474;  &#9474;
&#9474;  &#9492;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9496;  &#9474;
&#9492;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9496;
</code></code></pre><ul><li><p>Bob opens his box, finds instructions and another locked box for Charlie</p></li><li><p>Bob hands Charlie&#8217;s box to Charlie (can&#8217;t open it himself)</p></li><li><p>Charlie opens his box, finds instructions and Dave&#8217;s box</p></li><li><p>Dave opens his box and finds the payment</p></li></ul><div><hr></div><h2>5. Privacy Guarantees</h2><p>The combination of source routing and SPHINX onion routing provides these security properties:</p><h3>5.1 Core Privacy Features</h3><p>Feature Implementation Benefit <strong>Route Anonymity</strong> Sender determines path No intermediate node sees full route <strong>Source Hiding</strong> Ephemeral keys Sender&#8217;s identity hidden from intermediaries <strong>Destination Hiding</strong> Layered encryption Recipient identity hidden until final hop <strong>Position Hiding</strong> Fixed packet size Nodes can&#8217;t determine their position <strong>Path Length Hiding</strong> Constant 1,300 byte packets Total hop count is unknown <strong>Unlinkability</strong> Key blinding Packets can&#8217;t be correlated across hops</p><h3>5.2 What the Network Sees</h3><p><strong>From a network observer&#8217;s perspective:</strong></p><pre><code><code>Observer sees: Encrypted packet traffic between nodes
Observer CANNOT determine:
  - Which packets belong to the same payment
  - Payment source
  - Payment destination
  - Payment route
  - Payment amount
</code></code></pre><h3>5.3 Practical Privacy Considerations</h3><p><strong>Important Caveats:</strong></p><ul><li><p><strong>Timing attacks</strong>: Sophisticated attackers might correlate payments by timing</p></li><li><p><strong>Amount analysis</strong>: If amounts are unique, they could potentially be tracked</p></li><li><p><strong>Route selection</strong>: Using optimal (cheapest) routes reduces anonymity sets</p></li><li><p><strong>Network topology</strong>: Public channels reveal possible routes</p></li></ul><p><strong>Mitigation Strategies:</strong></p><ul><li><p>Random route selection (sacrifice cost for privacy)</p></li><li><p>Shadow routing (add dummy time delays)</p></li><li><p>Multi-path payments (split across routes)</p></li><li><p>Blinded paths (recipient hides last hops)</p></li></ul><div><hr></div><h2>6. Technical Implementation Details</h2><h3>6.1 BOLT #4 Specification</h3><p>The Lightning Network onion routing protocol is formally defined in <strong>BOLT #4: Onion Routing Protocol</strong>.</p><p><strong>Key Technical Specifications:</strong></p><ul><li><p>Packet size: 1,366 bytes total</p><ul><li><p>1 byte version</p></li><li><p>33 bytes ephemeral public key (compressed)</p></li><li><p>1,300 bytes routing information</p></li><li><p>32 bytes HMAC</p></li></ul></li><li><p>Encryption: ChaCha20-Poly1305</p></li><li><p>Shared secret: ECDH with secp256k1</p></li><li><p>Hash function: SHA-256 for HMACs</p></li></ul><h3>6.2 Replay Protection</h3><p><strong>Problem</strong>: Attackers could potentially replay old onion packets to confuse nodes or steal funds.</p><p><strong>Solution</strong>: Lightning implements multi-layered replay protection:</p><ol><li><p><strong>Ephemeral key log</strong>: Nodes maintain a log of used ephemeral keys and reject duplicates</p></li><li><p><strong>Payment hash binding</strong>: HMAC includes payment_hash in associated data</p></li><li><p><strong>HTLC timelock expiry</strong>: Once HTLCs expire, replay logs can be garbage collected</p></li><li><p><strong>Economic disincentive</strong>: Reusing payment_hash lets nodes claim the full payment</p></li></ol><h3>6.3 Error Handling and Failure Messages</h3><p>When a payment fails, error information must propagate back to the sender while maintaining privacy.</p><p><strong>Error Return Process:</strong></p><pre><code><code>1. Node detecting error (e.g., Charlie):
   - Derives error key from shared secret
   - Creates error packet with failure reason
   - Encrypts error packet
   - Sends back to predecessor (Bob)

2. Each intermediate node (Bob):
   - Derives error key from their shared secret
   - Adds another layer of encryption
   - Forwards back to predecessor (Alice)

3. Sender (Alice):
   - Receives encrypted error packet
   - Peels layers using shared secrets
   - Identifies which hop failed
   - Sees failure reason (e.g., &#8220;insufficient balance&#8221;)
</code></code></pre><p><strong>Common Error Types:</strong></p><ul><li><p><code>temporary_channel_failure</code>: Channel temporarily unavailable</p></li><li><p><code>amount_below_minimum</code>: Payment amount too small</p></li><li><p><code>fee_insufficient</code>: Routing fee too low</p></li><li><p><code>incorrect_cltv_expiry</code>: Time-lock value mismatch</p></li><li><p><code>channel_disabled</code>: Channel not accepting payments</p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://massmux.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">massmux.org Labs is a reader-supported publication. To receive new posts, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h3>6.4 Modifications from Original SPHINX</h3><p>Lightning Network adapted the SPHINX protocol with these changes:</p><p>Change Reason MAC over entire header No need for SURB (Single-Use Reply Blocks) Removed end-to-end payload Reduce packet size, not needed for payments ChaCha20 instead of LIONESS Performance optimization Added per-hop payload Provide routing instructions (amount, channel, CLTV) Payment hash in HMAC Strengthen replay protection using HTLC properties</p><div><hr></div><h2>7. Complete Example Walkthrough</h2><p>Let&#8217;s trace the complete journey of our example payment:</p><h3>Phase 1: Invoice Generation</h3><pre><code><code>Dave creates invoice:
{
  &#8220;amount&#8221;: 4999999,
  &#8220;payment_hash&#8221;: &#8220;a1b2c3...&#8221;,
  &#8220;payee_pub_key&#8221;: &#8220;02dave...&#8221;,
  &#8220;min_final_cltv_expiry_delta&#8221;: 9
}
</code></code></pre><h3>Phase 2: Path Finding</h3><pre><code><code>Alice builds channel graph from gossip:
- Discovers Path 1: Alice &#8594; Bob &#8594; Charlie &#8594; Dave (cheaper)
- Calculates fees: 15,311 msats
- Determines CLTV values at each hop
</code></code></pre><h3>Phase 3: Onion Construction</h3><pre><code><code>Alice creates onion packet:
- Generates ephemeral keys for each hop
- Derives shared secrets
- Encrypts hop payloads (Dave &#8594; Charlie &#8594; Bob)
- Constructs 1,366 byte onion packet
</code></code></pre><h3>Phase 4: Payment Initiation</h3><pre><code><code>Alice &#8594; Bob:
- update_add_htlc message
- payment_hash: a1b2c3...
- amount_msat: 5,015,310
- cltv_expiry: 1030
- onion_routing_packet: [1,366 byte onion]
</code></code></pre><h3>Phase 5: Forwarding (Bob)</h3><pre><code><code>Bob receives packet:
1. Verifies HMAC
2. Derives shared secret using ephemeral key
3. Decrypts his layer
4. Reads: &#8220;Forward 5,005,099 on channel BC, CLTV 1020&#8221;
5. Verifies he can forward (sufficient balance, fee acceptable)
6. Peels his layer, maintains 1,300 bytes with padding
7. Generates new ephemeral key (blinded)
8. Sends update_add_htlc to Charlie
</code></code></pre><h3>Phase 6: Forwarding (Charlie)</h3><pre><code><code>Charlie receives packet:
1. Verifies HMAC
2. Decrypts his layer
3. Reads: &#8220;Forward 4,999,999 on channel CD, CLTV 1010&#8221;
4. Verifies forwarding requirements
5. Peels layer, maintains packet size
6. Sends update_add_htlc to Dave
</code></code></pre><h3>Phase 7: Payment Settlement</h3><pre><code><code>Dave receives packet:
1. Verifies HMAC
2. Decrypts final layer
3. Sees empty HMAC (indicates final destination)
4. Checks payment_hash matches invoice
5. Verifies amount: 4,999,999 msats
6. Reveals preimage: &#8220;preimage123...&#8221;
7. Updates commitment with Charlie (claims HTLC)

Payment propagates backwards:
Charlie &#8592; preimage &#8592; Dave (claims his HTLC from Bob)
Bob &#8592; preimage &#8592; Charlie (claims his HTLC from Alice)
Alice &#8592; preimage &#8592; Bob (payment complete!)
</code></code></pre><div><hr></div><h2>8. Advanced Topics</h2><h3>8.1 Trampoline Routing</h3><p>For lightweight clients that can&#8217;t maintain full channel graph:</p><ul><li><p>Client connects to &#8220;trampoline node&#8221;</p></li><li><p>Trampoline nodes handle pathfinding</p></li><li><p>Creates nested onion routing (onion within onion)</p></li></ul><h3>8.2 Multi-Path Payments (MPP)</h3><p>Split large payments across multiple routes:</p><ul><li><p>Sender creates multiple smaller payments</p></li><li><p>Each follows different path</p></li><li><p>Recipient atomically accepts/rejects all parts</p></li><li><p>Improves payment reliability and privacy</p></li></ul><h3>8.3 Blinded Paths (BOLT #12)</h3><p>Enhanced recipient privacy:</p><ul><li><p>Recipient creates &#8220;blinded route&#8221; for last few hops</p></li><li><p>Sender doesn&#8217;t know recipient&#8217;s actual node</p></li><li><p>Useful for receiver privacy and unannounced channels</p></li></ul><div><hr></div><h2>9. Security Analysis</h2><h3>9.1 Attack Vectors and Mitigations</h3><p><strong>Timing Analysis:</strong></p><ul><li><p><em>Attack</em>: Correlate payment timing across hops</p></li><li><p><em>Mitigation</em>: Random delays, batching, trampoline routing</p></li></ul><p><strong>Balance Probing:</strong></p><ul><li><p><em>Attack</em>: Send fake payments to discover channel balances</p></li><li><p><em>Mitigation</em>: Return generic errors, rate limiting</p></li></ul><p><strong>Traffic Analysis:</strong></p><ul><li><p><em>Attack</em>: Monitor network traffic patterns</p></li><li><p><em>Mitigation</em>: Tor integration, decoy traffic, MPP</p></li></ul><p><strong>Route Fingerprinting:</strong></p><ul><li><p><em>Attack</em>: Unique route selections identify users</p></li><li><p><em>Mitigation</em>: Route randomization, shadow routing</p></li></ul><h3>9.2 Comparison with Tor</h3><p>Aspect Tor Lightning <strong>Path Selection</strong> Random guards + middle + exit Source-based (sender chooses) <strong>Optimization</strong> Balanced load Cost-optimized (fees/latency) <strong>Anonymity Set</strong> Large (random selection) Smaller (deterministic routing) <strong>Performance</strong> Higher latency tolerated Low latency required <strong>Packet Format</strong> Original SPHINX Modified SPHINX</p><p><strong>Key Difference</strong>: Lightning prioritizes performance and cost over maximum anonymity, trading off some privacy for payment efficiency.</p><div><hr></div><h2>10. Resources and Further Reading</h2><h3>Official Documentation</h3><ul><li><p><a href="https://github.com/lightning/bolts/blob/master/04-onion-routing.md">BOLT #4: Onion Routing Protocol</a> - Official specification</p></li><li><p><a href="https://github.com/lightningnetwork/lightning-onion">lightning-onion Repository</a> - Go implementation</p></li></ul><h3>Educational Resources</h3><ul><li><p>Mastering the Lightning Network, Chapter 10 - Comprehensive book chapter</p></li><li><p>Elle Mouton: Onion Routing Preliminaries - Excellent visual tutorial with diagrams</p></li><li><p>Voltage Blog: What is Onion Routing - Beginner-friendly explanation</p></li></ul><h3>Academic Papers</h3><ul><li><p>Danezis &amp; Goldberg (2009): &#8220;Sphinx: A Compact and Provably Secure Mix Format&#8221; - Original SPHINX paper</p></li><li><p>&#8220;How Lightning&#8217;s Routing Diminishes its Anonymity&#8221; - Analysis of privacy trade-offs</p></li></ul><h3>Network Visualization</h3><ul><li><p>LnRouter Graph Visualization - Explore Lightning Network topology</p></li><li><p><a href="https://1ml.com/">1ML.com</a> - Network statistics and node explorer</p></li></ul><div><hr></div><h2>11. Glossary</h2><p><strong>Channel Graph</strong>: Local map of Lightning Network topology built from gossip protocol messages</p><p><strong>CLTV (CheckLockTimeVerify)</strong>: Time-lock mechanism ensuring HTLCs expire at specific block heights</p><p><strong>Ephemeral Key</strong>: Temporary public key used once per payment to derive shared secrets</p><p><strong>Gossip Protocol</strong>: P2P mechanism for nodes to share network topology information</p><p><strong>Hop Payload</strong>: Encrypted instructions for each intermediate node in payment route</p><p><strong>HTLC (Hash Time-Locked Contract)</strong>: Conditional payment that requires cryptographic proof (preimage)</p><p><strong>Onion Packet</strong>: Fixed-size encrypted message containing routing instructions for all hops</p><p><strong>Payment Hash</strong>: SHA-256 hash of preimage used in HTLC contracts</p><p><strong>Preimage</strong>: Secret value whose hash is in the invoice; revealing it claims the payment</p><p><strong>Shared Secret</strong>: Secret derived through ECDH, known only to sender and specific hop</p><p><strong>Source Routing</strong>: Routing paradigm where sender determines complete path (vs. router-determined)</p><p><strong>SPHINX</strong>: Cryptographic packet format providing layered encryption and unlinkability</p><div><hr></div><h2>Pros/Cons</h2><p>Lightning Network&#8217;s onion routing represents a sophisticated balance between:</p><ul><li><p><strong>Privacy</strong>: Hiding sender, receiver, and route information</p></li><li><p><strong>Performance</strong>: Enabling instant, low-latency payments</p></li><li><p><strong>Efficiency</strong>: Optimizing for low fees and high success rates</p></li><li><p><strong>Decentralization</strong>: Avoiding trusted third parties</p></li></ul><p>The SPHINX-based implementation ensures that no single intermediary node can:</p><ul><li><p>Determine the payment source or destination</p></li><li><p>Learn their position in the route</p></li><li><p>Discover the total path length</p></li><li><p>Link packets belonging to the same payment</p></li></ul><p>This privacy-preserving architecture, combined with source-based routing, creates a censorship-resistant payment network where users maintain control over their transaction paths while protecting their financial privacy.</p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://massmux.org/p/basics-of-routing-on-the-lightning?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading massmux.org Labs! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://massmux.org/p/basics-of-routing-on-the-lightning?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://massmux.org/p/basics-of-routing-on-the-lightning?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p>]]></content:encoded></item><item><title><![CDATA[Bitcoin: a global reserve asset]]></title><description><![CDATA[Why Bitcoin is becoming a global reserve asset and a way to drive real economy]]></description><link>https://massmux.org/p/bitcoin-a-global-reserve-asset</link><guid isPermaLink="false">https://massmux.org/p/bitcoin-a-global-reserve-asset</guid><dc:creator><![CDATA[Max Musumeci]]></dc:creator><pubDate>Mon, 13 Oct 2025 07:02:21 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!xNJq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a346a48-674d-42dd-863e-c6e36279cfb8_1458x1010.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!xNJq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a346a48-674d-42dd-863e-c6e36279cfb8_1458x1010.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!xNJq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a346a48-674d-42dd-863e-c6e36279cfb8_1458x1010.png 424w, https://substackcdn.com/image/fetch/$s_!xNJq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a346a48-674d-42dd-863e-c6e36279cfb8_1458x1010.png 848w, https://substackcdn.com/image/fetch/$s_!xNJq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a346a48-674d-42dd-863e-c6e36279cfb8_1458x1010.png 1272w, https://substackcdn.com/image/fetch/$s_!xNJq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a346a48-674d-42dd-863e-c6e36279cfb8_1458x1010.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!xNJq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a346a48-674d-42dd-863e-c6e36279cfb8_1458x1010.png" width="1456" height="1009" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6a346a48-674d-42dd-863e-c6e36279cfb8_1458x1010.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1009,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3317548,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://massmux.org/i/175932038?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a346a48-674d-42dd-863e-c6e36279cfb8_1458x1010.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!xNJq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a346a48-674d-42dd-863e-c6e36279cfb8_1458x1010.png 424w, https://substackcdn.com/image/fetch/$s_!xNJq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a346a48-674d-42dd-863e-c6e36279cfb8_1458x1010.png 848w, https://substackcdn.com/image/fetch/$s_!xNJq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a346a48-674d-42dd-863e-c6e36279cfb8_1458x1010.png 1272w, https://substackcdn.com/image/fetch/$s_!xNJq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a346a48-674d-42dd-863e-c6e36279cfb8_1458x1010.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I try to explain why I believe Bitcoin will become the global reserve asset and an ethical method to pay and being paid, preserving all the value inside the real economy without the need of banks. </p><h3>Bitcoin&#8217;s Role and Macroeconomic Shift</h3><p><strong>Bitcoin doesn&#8217;t need governments institutions or even you. But you, institutions and governments all need Bitcoin</strong>.  Bitcoin is an unstoppable technology destined to push humanity forward. People own Bitcoin because it is <strong>apolitical</strong> and has succeeded regardless of government actions, not because of what any political leader says or tweets. Government actions or words are just noise for Bitcoin.</p><p>The current macroeconomic situation can be seen as the <strong>most fascinating time of our era</strong> and a <strong>monetary regime change</strong>. I am quite sure that US dollar will not remain as the world reserve currency. If the dollar continues on its path, debt will explode, and <strong>Bitcoin will become the global reserve currency</strong>.</p><p>As the world reserve currency issuer, the United States has the most debt and runs the largest fiscal deficits, suggesting it will inevitably develop an interest in transitioning away from that status and stockpiling a world reserve asset. </p><h3>Institutional Demand and the End of Traditional Portfolios</h3><p>There is a significant institutional demand for Bitcoin and we can see it every day.</p><p>People having wealth to store, are now seeking real returns, real balance sheets, and real growth, leading them to Bitcoin, which is compounding at 60% a year.  Adopting Bitcoin requires humbling oneself and realizing that <strong>&#8220;this thing is bigger than all of us&#8221;</strong>. Bitcoin is the safest place to store one&#8217;s work because it is bound to the physical realities of the universe and is impossible to produce more of, making it the <strong>hardest money ever conceived</strong>. About these assumptions, please give a look to my previous contents about time and energy aspects of Bitcoin.</p><p>Bitcoin has officially entered its <strong>hyper adoption phase</strong>. This phase is characterized by scarcity becoming the driver of value, leading to a potential supply-driven price breakout compared to US dollar.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://massmux.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">massmux.org Labs is a reader-supported publication. To receive new posts, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h3>Focus on Utility and the Hodler&#8217;s Dilemma</h3><p>There is  the <strong>&#8220;hodler&#8217;s dilemma&#8221;</strong>. This dilemma arises because Bitcoiners, who have amassed wealth in the scarce asset, still need liquidity for life expenses (like marriage, travel, or buying a house or car, etc) but do not want to sell their holdings.</p><p>On the other hand we need Bitcoin even to transact in day-to-day spending, in such a way that it may circulate in real economy, dragging away wealth from banking powers and give it to people who produce value inside the real economy.</p><h3>The real economy without banks</h3><p>Bitcoin, combined with the Lightning Network, is no longer just a store of value &#8212; it&#8217;s becoming a tool for everyday payments. Thanks to Lightning&#8217;s instant and low-cost transactions, people can now send and receive Bitcoin as easily as sending a message. This opens the door to an entirely new kind of economy &#8212; one that operates fully outside the traditional banking system.</p><p>In this emerging model, value flows directly between individuals and businesses. A freelancer can receive Bitcoin instantly for their work. A caf&#233; can accept Lightning payments for a coffee without paying fees to payment processors or banks. Merchants and consumers transact peer-to-peer, in real time, with global reach and without permission from any centralized entity.</p><p>Such an economy keeps wealth circulating within the <em>real economy</em> &#8212; the network of people actually creating value &#8212; instead of being locked into financial intermediaries that extract fees and inflate the money supply. As more people start accepting Bitcoin for their products and services, money returns to its natural role: a medium of exchange directly connecting producers and consumers.</p><p>Bitcoin with Lightning is not just a payment innovation; it&#8217;s a path toward economic sovereignty. It empowers individuals to earn, spend, and save in a system built on open protocols, not banks &#8212; where value flows freely and wealth stays in the hands of those who create it.</p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://massmux.org/p/bitcoin-a-global-reserve-asset?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading massmux.org Labs! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://massmux.org/p/bitcoin-a-global-reserve-asset?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://massmux.org/p/bitcoin-a-global-reserve-asset?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[Bitcoin: imperativo morale (IT)]]></title><description><![CDATA[Cosa Bitcoin &#232; per me e perch&#232; dovrebbe importare a tutti]]></description><link>https://massmux.org/p/bitcoin-imperativo-morale-it</link><guid isPermaLink="false">https://massmux.org/p/bitcoin-imperativo-morale-it</guid><dc:creator><![CDATA[Max Musumeci]]></dc:creator><pubDate>Sun, 12 Oct 2025 05:58:35 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/175930476/297236cf442f0bc8179cbb5dd40a73fe.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Video lettura in italiano dell&#8217;articolo precedente sull&#8217;impatto morale di Bitcoin.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;e53fa807-94ed-4d1e-bc98-11ecc1eb7d82&quot;,&quot;caption&quot;:&quot;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;lg&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Bitcoin: A moral imperative&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:30961110,&quot;name&quot;:&quot;Max Musumeci&quot;,&quot;bio&quot;:&quot;Physicist, Bitcoin Lightning Network dev/Researcher. Freedom Maximalist. https://bitcoinvoucher.bot | https://sats.mobi | Nostr: https://primal.net/massmux | http://linktr.ee/massmux&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8da0270c-91f7-45c6-a5ce-f6d5b14b2df6_400x400.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-08-22T07:15:55.653Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!YH3F!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5b46239-89d8-4d89-a057-5fa2c21dac16_1458x1010.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://massmux.org/p/bitcoin-a-moral-imperative&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:171627270,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:1,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1579176,&quot;publication_name&quot;:&quot;massmux.org Labs&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!-Zua!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8da0270c-91f7-45c6-a5ce-f6d5b14b2df6_400x400.jpeg&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://massmux.org/p/bitcoin-imperativo-morale-it?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading massmux.org Labs! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://massmux.org/p/bitcoin-imperativo-morale-it?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://massmux.org/p/bitcoin-imperativo-morale-it?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[From Cex to Peer 2 Peer]]></title><description><![CDATA[The path from fiat to Bitcoin is becoming increasingly surveilled and regulated]]></description><link>https://massmux.org/p/from-cex-to-peer-2-peer</link><guid isPermaLink="false">https://massmux.org/p/from-cex-to-peer-2-peer</guid><dc:creator><![CDATA[Max Musumeci]]></dc:creator><pubDate>Fri, 10 Oct 2025 09:33:49 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ki8z!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd99bebf8-7ae2-4939-b6a5-1f1d3c0764ea_1458x1010.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ki8z!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd99bebf8-7ae2-4939-b6a5-1f1d3c0764ea_1458x1010.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ki8z!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd99bebf8-7ae2-4939-b6a5-1f1d3c0764ea_1458x1010.png 424w, https://substackcdn.com/image/fetch/$s_!ki8z!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd99bebf8-7ae2-4939-b6a5-1f1d3c0764ea_1458x1010.png 848w, https://substackcdn.com/image/fetch/$s_!ki8z!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd99bebf8-7ae2-4939-b6a5-1f1d3c0764ea_1458x1010.png 1272w, https://substackcdn.com/image/fetch/$s_!ki8z!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd99bebf8-7ae2-4939-b6a5-1f1d3c0764ea_1458x1010.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ki8z!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd99bebf8-7ae2-4939-b6a5-1f1d3c0764ea_1458x1010.png" width="1456" height="1009" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d99bebf8-7ae2-4939-b6a5-1f1d3c0764ea_1458x1010.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1009,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1270515,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://massmux.org/i/175175675?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd99bebf8-7ae2-4939-b6a5-1f1d3c0764ea_1458x1010.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ki8z!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd99bebf8-7ae2-4939-b6a5-1f1d3c0764ea_1458x1010.png 424w, https://substackcdn.com/image/fetch/$s_!ki8z!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd99bebf8-7ae2-4939-b6a5-1f1d3c0764ea_1458x1010.png 848w, https://substackcdn.com/image/fetch/$s_!ki8z!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd99bebf8-7ae2-4939-b6a5-1f1d3c0764ea_1458x1010.png 1272w, https://substackcdn.com/image/fetch/$s_!ki8z!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd99bebf8-7ae2-4939-b6a5-1f1d3c0764ea_1458x1010.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The way people acquire Bitcoin is at a crossroads. As regulatory frameworks tighten around centralized exchanges and privacy concerns mount, many users are reevaluating how they convert their fiat currency into cryptocurrency. Understanding the trade-offs between centralized exchanges (CEXs) and peer-to-peer (P2P) platforms has never been more critical.</p><h2>The Centralized Exchange Model</h2><p>Centralized exchanges like Coinbase, Kraken, and Binance have dominated the Bitcoin onboarding experience for years. They offer a familiar, user-friendly gateway that mirrors traditional financial services. You create an account, verify your identity, deposit fiat currency, and purchase Bitcoin with a few clicks and very low fees but you have a great penetration in your private sphere.</p><p><strong>Advantages of CEXs:</strong></p><p>The primary appeal of centralized exchanges lies in their convenience and liquidity. These platforms provide instant execution of trades at market prices, with deep order books ensuring you can buy or sell significant amounts without dramatic price slippage. Customer support teams stand ready to assist with technical issues, and the interface resembles online banking&#8212;familiar territory for newcomers to cryptocurrency.</p><p>Security infrastructure at major exchanges has matured considerably. Most employ cold storage for the majority of user funds, maintaining only a small percentage in hot wallets for immediate withdrawals. Insurance policies, though limited, provide some protection against platform breaches. The regulated nature of these entities means they must meet certain standards and undergo periodic audits.</p><p><strong>Disadvantages of CEXs:</strong></p><p>The convenience comes at a steep price: your privacy. Know Your Customer (KYC) requirements mean <strong>surrendering extensive personal information</strong> including government-issued identification, proof of address, facial recognition data, and increasingly detailed financial history.<strong> This creates a comprehensive dossier linking your real-world identity to every Bitcoin transaction originating from the exchange.</strong></p><p>This data aggregation presents multiple risks. <strong>Exchanges become honeypots for</strong></p><p><strong> hackers seeking not just cryptocurrency but identity information</strong>. Data breaches have exposed millions of users&#8217; personal details. Beyond security concerns, this information flows to tax authorities, law enforcement, and potentially other government agencies depending on jurisdiction.</p><p><strong>Centralized exchanges also introduce custodial risk.</strong> Despite improved security measures, the fundamental structure means you don&#8217;t control your Bitcoin until you withdraw it. Platform failures, regulatory seizures, or simple technical glitches can lock you out of your funds. The collapse of major exchanges throughout Bitcoin&#8217;s history&#8212;from Mt. Gox to FTX&#8212;demonstrates that even prominent platforms can fail catastrophically.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://massmux.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">massmux.org Labs is a reader-supported publication. To receive new posts, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>The Peer-to-Peer Alternative</h2><p>Peer-to-peer platforms like Bisq, HodlHodl, and the new BitcoinVoucherBot (Peer2Peer edition) take a fundamentally different approach. These platforms facilitate direct trades between individuals, removing the intermediary that holds your funds and personal information so removing any custodial risk.</p><p><strong>Advantages of P2P Platforms:</strong></p><p>Privacy stands as the paramount benefit. Many P2P platforms require minimal or no KYC, allowing users to acquire Bitcoin without creating a permanent record linking their identity to their cryptocurrency holdings. Bisq, for example, operates as fully decentralized software with no company controlling user data. <a href="https://p2p.bitcoinvoucher.bot/?ref=200260523">BitcoinVoucherBot </a>uses the Lightning Network and Tor to provide strong privacy guarantees.</p><p>The decentralized architecture eliminates single points of failure. No company holds a database of user information to be hacked or subpoenaed. No central authority can freeze your account or prevent you from trading. This resilience against both technical failures and regulatory pressure makes P2P platforms attractive for users prioritizing sovereignty over convenience.</p><p>P2P trading also offers flexibility in payment methods. While centralized exchanges typically support only bank transfers and major payment processors, P2P markets accommodate cash transactions, gift cards, payment apps, and various local payment systems. <strong>This diversity can be crucial in regions with limited banking infrastructure or capital controls</strong>.</p><p><strong>Disadvantages of P2P Platforms:</strong></p><p>The decentralized model introduces complexity and inconvenience. Trades take longer&#8212;sometimes hours rather than seconds. You must evaluate counterparty reputation, communicate directly with trading partners, and navigate escrow mechanisms. The learning curve is steeper, and mistakes can be costly.</p><p>Liquidity represents another challenge. P2P markets have thinner order books, meaning you may not find buyers or sellers at your desired price point, especially for larger amounts. Price spreads are wider, effectively increasing the cost of acquisition. In some jurisdictions or for certain payment methods, you might pay a premium of 5-10% above exchange rates.</p><p>Some payment methods are reversible, creating chargeback risks for sellers that translate into higher prices or stricter trading conditions for buyers.</p><h2>The Regulatory Tightening of 2025-2026</h2><p>The regulatory landscape governing Bitcoin exchanges is undergoing dramatic transformation. Understanding these changes is essential for anyone looking to acquire Bitcoin in the coming years.</p><p><strong>Enhanced KYC and Surveillance Requirements:</strong></p><p>The European Union&#8217;s Markets in Crypto-Assets Regulation (MiCA), which came into full effect in 2024, is setting global precedents. Under MiCA, exchanges must collect and verify increasingly detailed customer information, including source of funds documentation for transactions above relatively low thresholds. This means explaining not just who you are, but where your money came from and potentially what you intend to do with your Bitcoin.</p><p>The Financial Action Task Force (FATF) &#8220;travel rule&#8221; is being implemented more stringently across jurisdictions. This regulation requires exchanges to collect and share personal information about both senders and recipients for cryptocurrency transfers above certain amounts. <strong>When you withdraw Bitcoin from an exchange to your personal wallet, the exchange must now collect information about that destination address and potentially report it to authorities</strong>.</p><p>In the United States, proposed regulations would treat certain cryptocurrency software providers and wallet services as money transmitters, extending KYC requirements far beyond traditional exchanges. The Infrastructure Investment and Jobs Act&#8217;s expanded reporting requirements for cryptocurrency brokers, taking effect in phases through 2026, will create comprehensive transaction reporting comparable to traditional securities.</p><p><strong>Transaction Monitoring and Reporting:</strong></p><p>Exchanges are implementing increasingly sophisticated blockchain analytics tools that monitor withdrawal addresses for connections to sanctioned entities, mixing services, or other &#8220;suspicious&#8221; activity. Addresses flagged by these systems may result in account freezes, withdrawal limitations, or mandatory additional verification procedures.</p><p>Tax reporting requirements are expanding globally. Exchanges must report not just annual summaries but detailed transaction-level data to tax authorities. This creates comprehensive government visibility into cryptocurrency holdings and movements for anyone using centralized platforms.</p><p><strong>Impact on Privacy:</strong></p><p>These regulations fundamentally undermine Bitcoin&#8217;s potential for financial privacy. <strong>Every Bitcoin purchased through a KYC exchange is now linked to your identity in multiple government and corporate databases</strong>. Blockchain analysis firms can trace these coins through subsequent transactions, potentially identifying your spending patterns, business relationships, and wealth accumulation.</p><p>The privacy implications extend beyond individual transactions. Aggregated data about cryptocurrency users, their geographic distribution, political affiliations, and financial behaviors becomes available to governments and potentially leaked to bad actors. This surveillance infrastructure, once established for Bitcoin, sets precedents for monitoring all financial activity.</p><p><strong>Impact on Security:</strong></p><p>Increased regulation will decrease rather than enhance security for users. As exchanges accumulate more detailed personal and financial data, they become more attractive targets for sophisticated hackers and state-level actors. The correlation between identity information and cryptocurrency holdings creates specific kidnapping and extortion risks for visible Bitcoin holders.</p><p>Regulatory complexity also concentrates the market among large, well-capitalized exchanges that can afford compliance costs. This concentration increases systemic risk&#8212;fewer platforms holding more user funds and data. When large centralized exchanges fail, whether through hacks, fraud, or regulatory action, the damage is correspondingly greater.</p><p>Enhanced regulatory scrutiny can also paralyze platforms during crises. Exchanges facing regulatory uncertainty may freeze withdrawals or impose arbitrary restrictions, trapping user funds during the exact moments when access is most critical.</p><h2>Making the Choice in the New Regulatory Environment</h2><p>The tightening regulatory environment makes the choice between centralized exchanges and peer-to-peer platforms more consequential than ever. Your decision should reflect your priorities, technical capabilities, and risk tolerance.</p><p>For complete newcomers with limited technical knowledge, regulated exchanges still offer the easiest entry point despite privacy concerns. If you plan to purchase small amounts for short-term speculation or to experiment with cryptocurrency, the convenience may outweigh privacy considerations. Those comfortable with the traditional financial system and unconcerned about transaction surveillance may find the familiar interface and customer support valuable.</p><p>Additionally, if you need to convert large amounts of fiat to Bitcoin quickly and at tight spreads, centralized exchanges provide liquidity that P2P markets struggle to match.</p><p><strong>The Growing Case for P2P:</strong></p><p>As regulations tighten, the advantages of P2P platforms become more compelling. For users prioritizing financial privacy, P2P represents the only realistic option for acquiring Bitcoin without creating permanent identity linkages. This privacy isn&#8217;t merely about hiding illicit activity&#8212;it&#8217;s about maintaining the financial sovereignty and freedom from surveillance that Bitcoin was designed to enable.</p><p><strong>Long-term Bitcoin holders (often called HODLers) should seriously consider P2P acquisition</strong>. The Bitcoin you purchase today <strong>without KYC retains greater fungibility </strong>and privacy for future transactions. As blockchain analysis becomes more sophisticated, the premium for &#8220;clean&#8221; Bitcoin without exchange history may increase.</p><p><strong>Users in jurisdictions with capital controls, unstable currencies, or authoritarian governments find P2P platforms essential</strong>. Europe is becoming a stricter and more authoritative juristiction as well. When official channels close or become prohibitively restricted, peer-to-peer markets provide crucial financial access. The decentralized architecture offers resilience against both technical failures and political interference.</p><h2>Practical Considerations</h2><p><strong>Security Best Practices:</strong></p><p>Regardless of which acquisition method you choose, never leave significant amounts of Bitcoin on any platform&#8212;centralized or peer-to-peer. Withdraw to a personal wallet where you control the private keys. Hardware wallets provide the strongest security for long-term storage.</p><p>For P2P trading, start with small transactions to build reputation and learn the platform. Carefully verify counterparty credentials, use platform escrow systems, and prefer payment methods that offer you protection based on whether you&#8217;re buying or selling.</p><p><strong>Staying Informed:</strong></p><p>The regulatory environment continues evolving rapidly. Rules implemented in 2025 and 2026 may look different from what&#8217;s described here as jurisdictions learn from each other and the industry adapts. Stay informed about regulations in your specific jurisdiction and how they affect both centralized and decentralized platforms.</p><p><strong>The path from fiat currency to Bitcoin is becoming increasingly surveilled and regulated. </strong>Centralized exchanges offer convenience and liquidity but at the cost of comprehensive identity disclosure and custodial risk. Peer-to-peer platforms preserve privacy and decentralization but require more effort and technical sophistication.</p><p>As regulatory frameworks tighten through 2025 and 2026, the privacy and security implications of how you acquire Bitcoin become more significant. The choice between centralized and peer-to-peer isn&#8217;t merely technical&#8212;it&#8217;s philosophical. It reflects your values regarding financial privacy, your trust in centralized institutions, and your willingness to trade convenience for sovereignty.</p><p>For those who believe in Bitcoin&#8217;s original vision of permissionless, censorship-resistant money, peer-to-peer acquisition aligns with those principles. For others prioritizing ease of use within the existing regulatory framework, centralized exchanges remain viable despite their trade-offs.</p><p>The important thing is making an informed choice. Understanding what you&#8217;re gaining and what you&#8217;re surrendering&#8212;in privacy, security, convenience, and cost&#8212;allows you to select the approach that best serves your needs in an increasingly complicated regulatory landscape. As Bitcoin matures and regulations evolve, the method you choose for converting fiat to Bitcoin may prove as important as the decision to acquire Bitcoin itself.</p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://massmux.org/p/from-cex-to-peer-2-peer?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading massmux.org Labs! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://massmux.org/p/from-cex-to-peer-2-peer?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://massmux.org/p/from-cex-to-peer-2-peer?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p>]]></content:encoded></item><item><title><![CDATA[Beyond messages surveillance]]></title><description><![CDATA[Preparing using P2P messaging to stay free]]></description><link>https://massmux.org/p/beyond-messages-surveillance</link><guid isPermaLink="false">https://massmux.org/p/beyond-messages-surveillance</guid><dc:creator><![CDATA[Max Musumeci]]></dc:creator><pubDate>Wed, 17 Sep 2025 14:51:26 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!0wHa!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d2d9e34-07fc-4993-b669-8903cd5c5e15_1458x1010.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!0wHa!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d2d9e34-07fc-4993-b669-8903cd5c5e15_1458x1010.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0wHa!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d2d9e34-07fc-4993-b669-8903cd5c5e15_1458x1010.png 424w, https://substackcdn.com/image/fetch/$s_!0wHa!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d2d9e34-07fc-4993-b669-8903cd5c5e15_1458x1010.png 848w, https://substackcdn.com/image/fetch/$s_!0wHa!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d2d9e34-07fc-4993-b669-8903cd5c5e15_1458x1010.png 1272w, https://substackcdn.com/image/fetch/$s_!0wHa!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d2d9e34-07fc-4993-b669-8903cd5c5e15_1458x1010.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0wHa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d2d9e34-07fc-4993-b669-8903cd5c5e15_1458x1010.png" width="1456" height="1009" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5d2d9e34-07fc-4993-b669-8903cd5c5e15_1458x1010.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1009,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2710952,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://massmux.org/i/173783732?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d2d9e34-07fc-4993-b669-8903cd5c5e15_1458x1010.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!0wHa!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d2d9e34-07fc-4993-b669-8903cd5c5e15_1458x1010.png 424w, https://substackcdn.com/image/fetch/$s_!0wHa!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d2d9e34-07fc-4993-b669-8903cd5c5e15_1458x1010.png 848w, https://substackcdn.com/image/fetch/$s_!0wHa!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d2d9e34-07fc-4993-b669-8903cd5c5e15_1458x1010.png 1272w, https://substackcdn.com/image/fetch/$s_!0wHa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d2d9e34-07fc-4993-b669-8903cd5c5e15_1458x1010.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The possibility of having our digital communications sniffed and stored is a serious threat on our life. It is not just a leak of privacy but it is also a danger for our personal security and our family safety. We must be aware that everyone who may get our digital communication messages has an important way to attack us, even physically. So we must protect ourself and people living with us.</p><h2>What is happening?</h2><p>The digital landscape is increasingly under scrutiny, with proposals such as the <strong>European Parliament's 'Chat Control' law </strong>sparking significant debate over privacy and fundamental rights. This proposed regulation, aimed at combating online child sexual abuse material, has raised <strong>grave concerns about mass scanning of private communications</strong>, including those protected by encryption, thereby threatening to undermine the <strong>data security of citizens, businesses, and institutions</strong>. In this environment, peer-to-peer messaging platforms like Briar (and others) offer a robust model for resisting pervasive digital surveillance.</p><h3>The Threat of 'Chat Control': A Blow to Privacy</h3><p>The 'Chat Control' or CSAM regulation, as reviewed under the Danish Presidency, proposes a technical approach based on <strong>automated content analysis tools</strong>. Critics highlight that such tools often produce <strong>high rates of false positives</strong>, creating a risk of innocent users being wrongly incriminated. </p><blockquote><p>More fundamentally, the proposal envisages a <strong>mandatory weakening of end-to-end encryption</strong>, which is a cornerstone of secure digital communication. This weakening would create <strong>security gaps exploitable by cybercriminals, rival states, and terrorist organisations</strong>, potentially harming the competitiveness of the digital economy. </p></blockquote><p>The core questions raised by Members of the European Parliament include the regulation's compatibility with <strong>Article 7 of the Charter of Fundamental Rights</strong>, how it will ensure effective child protection without violating citizens' rights, and how it plans to prevent the negative impact on cybersecurity and economic competitiveness caused by weakened encryption.</p><h3>Briar: A Decentralised Shield Against Surveillance</h3><p>In stark contrast to central server-reliant messaging software that exposes messages and relationships to surveillance, <strong>Briar is designed from the ground up to resist surveillance and censorship</strong>. It operates as a messaging app for activists, journalists, and anyone needing a secure, easy, and robust communication method. But finally it will be useful for every citizen who cares their own privacy and security. Unlike traditional apps, <strong>Briar doesn&#8217;t rely on a central server</strong>; instead, messages are synchronised directly between users' devices. This decentralised design is key to its resilience against various forms of digital intrusion.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://massmux.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">massmux.org Labs is a reader-supported publication. To receive new posts and support FREEDOM, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><p>Here's how Briar directly counters the threats posed by proposals like 'Chat Control':</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!t0sn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fa03b70-5062-44d2-93bf-f40ddd4691a5_513x221.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!t0sn!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fa03b70-5062-44d2-93bf-f40ddd4691a5_513x221.png 424w, https://substackcdn.com/image/fetch/$s_!t0sn!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fa03b70-5062-44d2-93bf-f40ddd4691a5_513x221.png 848w, https://substackcdn.com/image/fetch/$s_!t0sn!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fa03b70-5062-44d2-93bf-f40ddd4691a5_513x221.png 1272w, https://substackcdn.com/image/fetch/$s_!t0sn!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fa03b70-5062-44d2-93bf-f40ddd4691a5_513x221.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!t0sn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fa03b70-5062-44d2-93bf-f40ddd4691a5_513x221.png" width="513" height="221" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4fa03b70-5062-44d2-93bf-f40ddd4691a5_513x221.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:221,&quot;width&quot;:513,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:14619,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://massmux.org/i/173783732?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fa03b70-5062-44d2-93bf-f40ddd4691a5_513x221.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!t0sn!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fa03b70-5062-44d2-93bf-f40ddd4691a5_513x221.png 424w, https://substackcdn.com/image/fetch/$s_!t0sn!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fa03b70-5062-44d2-93bf-f40ddd4691a5_513x221.png 848w, https://substackcdn.com/image/fetch/$s_!t0sn!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fa03b70-5062-44d2-93bf-f40ddd4691a5_513x221.png 1272w, https://substackcdn.com/image/fetch/$s_!t0sn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fa03b70-5062-44d2-93bf-f40ddd4691a5_513x221.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><ol><li><p><strong>End-to-End Encryption as a Core Principle</strong>: While 'Chat Control' proposes weakening end-to-end encryption, Briar ensures that <strong>all communication between devices is encrypted end-to-end</strong>, protecting content from eavesdropping or tampering. This fundamental design choice safeguards the privacy and integrity of conversations.</p></li><li><p><strong>Protection Against Metadata Surveillance</strong>: Briar actively combats metadata surveillance by <strong>using the Tor network</strong> when the Internet is available. This prevents eavesdroppers from learning which users are communicating with each other, thus protecting users and their relationships from surveillance. Each user&#8217;s contact list is also encrypted and stored only on their own device.</p></li><li><p><strong>Resistance to Content Filtering and Takedown Orders</strong>: Briar's end-to-end encryption inherently <strong>prevents keyword filtering</strong>, a method often employed in mass surveillance proposals. Furthermore, due to its decentralised design, <strong>there are no central servers to block</strong> or attack, making it impervious to server-based takedown orders. Every user who subscribes to a forum keeps a copy of its content, eliminating any single point where a post can be deleted.</p></li><li><p><strong>Resilience to Internet Blackouts and Denial of Service Attacks</strong>: Briar is engineered to keep information flowing even if the internet is down. It can synchronise messages directly via <strong>Bluetooth and Wi-Fi </strong>. This capability means it can operate even during Internet blackouts or if long-range communication channels are comprehensively monitored or blocked by an adversary. Its forums have no central server to attack, ensuring access to content even if users are offline.</p></li><li><p><strong>Robust Threat Model</strong>: Briar's design is based on a threat model that assumes an adversary with extensive capabilities, including <strong>comprehensive monitoring, blocking, delaying, replaying, and modifying traffic on all long-range communication channels</strong> (internet, phone network). It's also designed to be resilient even with limited monitoring or blocking on short-range channels (Bluetooth, Wi-Fi). This explicit focus on adversarial conditions makes it a powerful tool for secure communication in challenging environments.</p></li></ol><h4>We can recap link this:</h4><ul><li><p>Peer-to-peer encrypted messaging and forums</p></li><li><p>Messages are stored securely on your device, not in the cloud</p></li><li><p>Connect directly with nearby contacts, even without Internet</p></li><li><p>Free and open source software</p></li></ul><h3>The Future of Secure Communication</h3><p>Briar's long-term vision extends beyond messaging, aiming to support secure, distributed applications for crisis mapping and collaborative document editing. The ultimate goal is to enable individuals in any country to <strong>create safe spaces for debate, event planning, and organising social movements</strong>.</p><p>In an era where proposals like 'Chat Control' threaten to erode fundamental rights and compromise cybersecurity through mass scanning and weakened encryption, platforms like Briar stand as critical tools. By embracing decentralisation, strong encryption, and robust threat models, they offer a powerful counter-narrative, ensuring that secure, private digital communication remains a possibility for everyone.</p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://massmux.org/p/beyond-messages-surveillance?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading massmux.org Labs! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://massmux.org/p/beyond-messages-surveillance?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://massmux.org/p/beyond-messages-surveillance?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p><p><strong>We stand for free Palestine!  &#10084;&#65039;</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mFKf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c1ac7ca-b43f-436c-b9d9-60853a5f4bec_816x450.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mFKf!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c1ac7ca-b43f-436c-b9d9-60853a5f4bec_816x450.png 424w, https://substackcdn.com/image/fetch/$s_!mFKf!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c1ac7ca-b43f-436c-b9d9-60853a5f4bec_816x450.png 848w, https://substackcdn.com/image/fetch/$s_!mFKf!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c1ac7ca-b43f-436c-b9d9-60853a5f4bec_816x450.png 1272w, https://substackcdn.com/image/fetch/$s_!mFKf!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c1ac7ca-b43f-436c-b9d9-60853a5f4bec_816x450.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mFKf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c1ac7ca-b43f-436c-b9d9-60853a5f4bec_816x450.png" width="816" height="450" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7c1ac7ca-b43f-436c-b9d9-60853a5f4bec_816x450.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:450,&quot;width&quot;:816,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:218104,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://massmux.org/i/173783732?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c1ac7ca-b43f-436c-b9d9-60853a5f4bec_816x450.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!mFKf!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c1ac7ca-b43f-436c-b9d9-60853a5f4bec_816x450.png 424w, https://substackcdn.com/image/fetch/$s_!mFKf!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c1ac7ca-b43f-436c-b9d9-60853a5f4bec_816x450.png 848w, https://substackcdn.com/image/fetch/$s_!mFKf!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c1ac7ca-b43f-436c-b9d9-60853a5f4bec_816x450.png 1272w, https://substackcdn.com/image/fetch/$s_!mFKf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c1ac7ca-b43f-436c-b9d9-60853a5f4bec_816x450.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p>]]></content:encoded></item><item><title><![CDATA[Bitcoin: A moral imperative]]></title><description><![CDATA[What Bitcoin is for me and why it should matter for everyone]]></description><link>https://massmux.org/p/bitcoin-a-moral-imperative</link><guid isPermaLink="false">https://massmux.org/p/bitcoin-a-moral-imperative</guid><dc:creator><![CDATA[Max Musumeci]]></dc:creator><pubDate>Fri, 22 Aug 2025 07:15:55 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!YH3F!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5b46239-89d8-4d89-a057-5fa2c21dac16_1458x1010.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!YH3F!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5b46239-89d8-4d89-a057-5fa2c21dac16_1458x1010.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!YH3F!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5b46239-89d8-4d89-a057-5fa2c21dac16_1458x1010.png 424w, https://substackcdn.com/image/fetch/$s_!YH3F!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5b46239-89d8-4d89-a057-5fa2c21dac16_1458x1010.png 848w, https://substackcdn.com/image/fetch/$s_!YH3F!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5b46239-89d8-4d89-a057-5fa2c21dac16_1458x1010.png 1272w, https://substackcdn.com/image/fetch/$s_!YH3F!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5b46239-89d8-4d89-a057-5fa2c21dac16_1458x1010.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!YH3F!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5b46239-89d8-4d89-a057-5fa2c21dac16_1458x1010.png" width="1456" height="1009" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c5b46239-89d8-4d89-a057-5fa2c21dac16_1458x1010.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1009,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:845270,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://massmux.org/i/171627270?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5b46239-89d8-4d89-a057-5fa2c21dac16_1458x1010.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!YH3F!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5b46239-89d8-4d89-a057-5fa2c21dac16_1458x1010.png 424w, https://substackcdn.com/image/fetch/$s_!YH3F!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5b46239-89d8-4d89-a057-5fa2c21dac16_1458x1010.png 848w, https://substackcdn.com/image/fetch/$s_!YH3F!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5b46239-89d8-4d89-a057-5fa2c21dac16_1458x1010.png 1272w, https://substackcdn.com/image/fetch/$s_!YH3F!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5b46239-89d8-4d89-a057-5fa2c21dac16_1458x1010.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>For many, including myself, the <strong>creation and printing of money represents a profound ethical problem </strong>that is becoming really unacceptable. This perspective posits that entities which <strong>monopolize, print, and allocate capital on behalf of others commit actually a moral violation</strong>. Such actions are seen to deplete the opportunities, time, and energy of future generations, leading to a level of indebtedness that is now impossible to overcome for western people. These behaviors concentrate power in the hands of a few persons, who are often corrupt, and encourage wars and oppression of people all over the world. In this article I am taking in consideration the ideas from Gigi and Jack Mallers who were extremely inspirational for me all along my path to Bitcoin.</p><p>So we must ask ourselves what Bitcoin really is and how we feel it is different from the traditional economy we have seen until now. What Bitcoin can do for the humanity and what we can do to raise awareness of Bitcoin among people.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://massmux.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">massmux.org Labs is a reader-supported publication. To receive new posts consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>In response to this perceived ethical dilemma exposed above, <strong>Bitcoin has emerged as something far beyond mere open source computer code or a digital asset</strong>. Instead, it is increasingly understood as a <strong>moral code</strong>. This redefinition positions Bitcoin as a fundamental philosophical framework for economic interaction. And we know that economic interactions are the foundation of our individual freedom and the free market.</p><p>The core tenets of Bitcoin's moral code are remarkably simple and direct and can be resumed like these:</p><p>&#8226; do not inflate</p><p>&#8226; do not confiscate</p><p>&#8226; do not counterfeit</p><p>This foundational ethical stance is what makes Bitcoin, for many, very ethical and moral. The underlying premise is that <strong>everyone operates under the same rules and has the same access</strong> to the system. Bitcoin is open to anyone and no one can be prevented from using it. The difference from the traditional economic system is obvious.</p><p>Ultimately, for me, Bitcoin is a <strong>moral idea</strong> and a <strong>philosophy</strong>. It is an <strong>idea expressed in open source and collaborative code that operates as a network that is realized as an asset (cit)</strong>. This profound shift in understanding signifies that what has been learned in Bitcoin transcends technical specifications; it delves into the realm of ethical governance of monetary systems. It is an ethical revolution which is going to fix issues in the modern age.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://massmux.org/p/bitcoin-a-moral-imperative?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://massmux.org/p/bitcoin-a-moral-imperative?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[Running a Lightning node in a flash]]></title><description><![CDATA[NIMBLENODE: LIT, neutrino, LND for making all fast and simple]]></description><link>https://massmux.org/p/running-a-lightning-node-in-a-flash</link><guid isPermaLink="false">https://massmux.org/p/running-a-lightning-node-in-a-flash</guid><dc:creator><![CDATA[Max Musumeci]]></dc:creator><pubDate>Mon, 21 Jul 2025 07:31:17 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!kEIy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F481e4874-ae21-460d-97f6-656cb5f74049_1458x1010.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!kEIy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F481e4874-ae21-460d-97f6-656cb5f74049_1458x1010.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!kEIy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F481e4874-ae21-460d-97f6-656cb5f74049_1458x1010.png 424w, https://substackcdn.com/image/fetch/$s_!kEIy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F481e4874-ae21-460d-97f6-656cb5f74049_1458x1010.png 848w, https://substackcdn.com/image/fetch/$s_!kEIy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F481e4874-ae21-460d-97f6-656cb5f74049_1458x1010.png 1272w, https://substackcdn.com/image/fetch/$s_!kEIy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F481e4874-ae21-460d-97f6-656cb5f74049_1458x1010.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!kEIy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F481e4874-ae21-460d-97f6-656cb5f74049_1458x1010.png" width="1456" height="1009" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/481e4874-ae21-460d-97f6-656cb5f74049_1458x1010.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1009,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1164970,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://massmux.org/i/167650382?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F481e4874-ae21-460d-97f6-656cb5f74049_1458x1010.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!kEIy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F481e4874-ae21-460d-97f6-656cb5f74049_1458x1010.png 424w, https://substackcdn.com/image/fetch/$s_!kEIy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F481e4874-ae21-460d-97f6-656cb5f74049_1458x1010.png 848w, https://substackcdn.com/image/fetch/$s_!kEIy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F481e4874-ae21-460d-97f6-656cb5f74049_1458x1010.png 1272w, https://substackcdn.com/image/fetch/$s_!kEIy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F481e4874-ae21-460d-97f6-656cb5f74049_1458x1010.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>We want to run a Lightning node in the simplest way and with the minimum hardware requirements. There are a lot of solutions out there and you know that i am usual speaking about nodes and smart solutions to get into the Lightning world in a fast and easy way.</p><p>So today i am talking about the solution of LIT with neutrino built in. I specifically made a full setup that makes this configuration magic. Let&#8217;s see together.</p><p>Specifically, when running LiT, you can choose to run the bundled LND in "neutrino mode". This means that LiT, via its integrated LND instance, can utilise Neutrino as its backend. This configuration allows for a quick setup, as it avoids the need to run Bitcoin Core on your machine.</p><h2><strong>Install and run</strong></h2><p>Register a domain name and point the DNS A record to the VPS's public IP or you can use a CNAME of an existing domain. Don't start the procedure until the zone is propagated and you have a fully qualified domain name which A to your VPS</p><pre><code><code>git clone https://github.com/massmux/nimblenode</code></code></pre><ul><li><p>edit docker-compose.yml setting: 1) the UI password (at least 8 chars long), 2) your node's ALIAS, 3) your fully qualified hostname</p></li><li><p>I have created full docker image ready to go. You can pull the image from dockerhub</p></li><li><p>port 80 must be open on the host machine to allow letsencrypt automation on the selected domain</p></li></ul><pre><code><code>docker pull massmux/lit</code></code></pre><ul><li><p>Run the container</p></li></ul><pre><code><code>cd nimblenode
docker-compose up -d</code></code></pre><ul><li><p>Create the wallet. first usage</p></li></ul><pre><code><code>./scripts/create</code></code></pre><p>You will be asked about the wallet encryption key and how to setup the seed phrase. Backup them all carefully offline. As you can see you own the seed and the encryption key.</p><ul><li><p>that's it</p></li><li><p>after around 20 minutes, connect to the server with:</p></li></ul><pre><code>https://your-domain-name:8443</code></pre><p>IMPORTANT: if you stop the docker container and restart you need to unlock your wallet with command</p><pre><code><code>./scripts/unlock</code></code></pre><p>Configuration files are kept on your node&#8217;s disk in the .lit/ directory. In that directory a lit configuration file is stored and can be customized. </p><p>The primary configuration parameter for LiT to use a built-in LND, which subsequently leverages Neutrino as its backend, is:</p><p>&#8226; <strong>lnd-mode=integrated</strong></p><p>When <code>litd</code> (the Lightning Terminal daemon) is executed in this <code>integrated mode</code>, it bundles and runs LND directly within its process. In this setup, the integrated LND instance is configured to use the <strong>Neutrino backend</strong>. This is also referred to as running in "neutrino mode".</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://massmux.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">massmux.org Labs is a reader-supported publication. To receive new posts , consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h2><strong>Maintenance</strong></h2><p>Just connect to your running container with</p><pre><code><code>docker exec -ti lit bash</code></code></pre><p>then you can access the lncli command as usual to manage your node from the command line. With lncli you can do whatever you want in terms of maintenance of your node, such as macaroons creation, channel opening and so on.</p><p>If you want to see logs, just move into the docker-compose directory and run the following command:</p><pre><code><code>dev@lnbits00:~/smnode$ docker-compose logs -t -f --tail 300</code></code></pre><p>Your logs page while running:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!tKDo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F629f6c0e-517c-4159-8cf4-1c84aaa1157b_1201x698.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!tKDo!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F629f6c0e-517c-4159-8cf4-1c84aaa1157b_1201x698.png 424w, https://substackcdn.com/image/fetch/$s_!tKDo!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F629f6c0e-517c-4159-8cf4-1c84aaa1157b_1201x698.png 848w, https://substackcdn.com/image/fetch/$s_!tKDo!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F629f6c0e-517c-4159-8cf4-1c84aaa1157b_1201x698.png 1272w, https://substackcdn.com/image/fetch/$s_!tKDo!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F629f6c0e-517c-4159-8cf4-1c84aaa1157b_1201x698.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!tKDo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F629f6c0e-517c-4159-8cf4-1c84aaa1157b_1201x698.png" width="1201" height="698" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/629f6c0e-517c-4159-8cf4-1c84aaa1157b_1201x698.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:698,&quot;width&quot;:1201,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:224854,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://massmux.org/i/167650382?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F629f6c0e-517c-4159-8cf4-1c84aaa1157b_1201x698.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!tKDo!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F629f6c0e-517c-4159-8cf4-1c84aaa1157b_1201x698.png 424w, https://substackcdn.com/image/fetch/$s_!tKDo!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F629f6c0e-517c-4159-8cf4-1c84aaa1157b_1201x698.png 848w, https://substackcdn.com/image/fetch/$s_!tKDo!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F629f6c0e-517c-4159-8cf4-1c84aaa1157b_1201x698.png 1272w, https://substackcdn.com/image/fetch/$s_!tKDo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F629f6c0e-517c-4159-8cf4-1c84aaa1157b_1201x698.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>You can connect to the Lightning terminal through the pairing phrase and in that way you can manage your node without hassles.</p><h2>What is Neutrino? </h2><p>Neutrino is a <strong>lightweight Bitcoin client protocol</strong>. It enables wallets to verify Bitcoin transactions and manage balances <strong>without needing to download the entire blockchain</strong>, which typically requires a full node.</p><p><strong>How Neutrino Works with Lightning Wallets:</strong></p><p>&#8226; Neutrino uses <strong>compact block filters</strong> (BIP157 and BIP158). Instead of downloading every block, the wallet downloads these much smaller filters (only a few kilobytes per block) to identify relevant transactions.</p><p>&#8226; Lightning wallets, like those compatible with LiT, need to monitor the Bitcoin blockchain to track channel states and detect any attempts by counterparties to broadcast outdated states (which could be a form of cheating). A Neutrino-based Lightning wallet can perform this securely without requiring a full node.</p><p><strong>Advantages of using Neutrino with LiT:</strong></p><p>&#8226; It offers <strong>greater privacy compared to Simplified Payment Verification (SPV) wallets</strong>, as you don't reveal your addresses to a remote server.</p><p>&#8226; It provides a path to <strong>non-custodial Lightning channels</strong> on personal devices like phones or laptops.</p><p>&#8226; It is <strong>significantly lighter and faster to set up</strong> than a full Bitcoin node. As demonstrated in the "LND Speed Run" video, setting up a functioning LND Lightning node using <code>litd</code> in integrated mode with Neutrino can be done in approximately 13 minutes</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://massmux.org/p/running-a-lightning-node-in-a-flash?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://massmux.org/p/running-a-lightning-node-in-a-flash?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p>To get in touch with me please contact me on <a href="https://massmux.com">https://massmux.com</a> and consider what i can do for you or for your Bitcoin or freedom project. If you have an event of speech you want to organize, a project to build and create, contents and so on, feel free to contact me.</p>]]></content:encoded></item><item><title><![CDATA[Communication layers on the Lightning Network]]></title><description><![CDATA[the structure of BOLT communication layers]]></description><link>https://massmux.org/p/communication-layers-on-the-lightning</link><guid isPermaLink="false">https://massmux.org/p/communication-layers-on-the-lightning</guid><dc:creator><![CDATA[Max Musumeci]]></dc:creator><pubDate>Wed, 18 Jun 2025 06:28:32 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!zWh5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32d4fa14-3c91-433d-9732-a6b7b96ae416_1458x1010.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zWh5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32d4fa14-3c91-433d-9732-a6b7b96ae416_1458x1010.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zWh5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32d4fa14-3c91-433d-9732-a6b7b96ae416_1458x1010.png 424w, https://substackcdn.com/image/fetch/$s_!zWh5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32d4fa14-3c91-433d-9732-a6b7b96ae416_1458x1010.png 848w, https://substackcdn.com/image/fetch/$s_!zWh5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32d4fa14-3c91-433d-9732-a6b7b96ae416_1458x1010.png 1272w, https://substackcdn.com/image/fetch/$s_!zWh5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32d4fa14-3c91-433d-9732-a6b7b96ae416_1458x1010.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zWh5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32d4fa14-3c91-433d-9732-a6b7b96ae416_1458x1010.png" width="1456" height="1009" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/32d4fa14-3c91-433d-9732-a6b7b96ae416_1458x1010.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1009,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:863724,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://massmux.org/i/165783442?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32d4fa14-3c91-433d-9732-a6b7b96ae416_1458x1010.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zWh5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32d4fa14-3c91-433d-9732-a6b7b96ae416_1458x1010.png 424w, https://substackcdn.com/image/fetch/$s_!zWh5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32d4fa14-3c91-433d-9732-a6b7b96ae416_1458x1010.png 848w, https://substackcdn.com/image/fetch/$s_!zWh5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32d4fa14-3c91-433d-9732-a6b7b96ae416_1458x1010.png 1272w, https://substackcdn.com/image/fetch/$s_!zWh5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32d4fa14-3c91-433d-9732-a6b7b96ae416_1458x1010.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The Lightning Network (LN) operates through a <strong>complex collection of protocols</strong> that form a <strong>protocol suite</strong>, also known as <strong>BOLTs (Basis of Lightning Technology)</strong>. These BOLTs are <strong>detailed specifications</strong> that define the rules and procedures for how the Lightning Network should operate, ensuring that different LN implementations can communicate and work together seamlessly. Unlike Bitcoin, which has a reference implementation (Bitcoin Core) as its standard, Lightning uses these specification documents for interoperability and has several implementations.</p><h2>The Layers</h2><p>The BOLT protocol suite is generally classified into <strong>five distinct layers</strong>, where each layer builds upon and uses the protocols below it:</p><ul><li><p><strong>Network Connection Layer</strong>: This foundational layer handles how nodes establish connections. It contains protocols that interact directly with internet core protocols like TCP/IP, as well as overlay networks such as Tor (v2/v3), and internet services like DNS. This layer is also responsible for the <strong>cryptographic transport protocols that protect Lightning messages</strong>.</p><ul><li><p><strong>BOLT 8: Encrypted and Authenticated Transport</strong> details how all interactions between Lightning nodes are <strong>encrypted and authenticated by default</strong>, using a unique public key as each node's identity. This ensures confidentiality, integrity, and protection against man-in-the-middle (MITM) attacks. The Lightning Network utilises a custom variant of the <strong>Noise Protocol Framework</strong>, for this purpose, offering strong security guarantees like authentication, encryption, forward secrecy, and identity privacy. The Noise_XK handshake specifically offers <strong>identity hiding</strong> for the responder's public key during connection initiation.</p></li><li><p><strong>BOLT 10: DNS Bootstrap and Assisted Node Location</strong> outlines a method for nodes to <strong>discover each other using the Domain Name System (DNS)</strong>. This helps new nodes find peers and allows existing nodes to track known peers. A new node can issue an SRV query to a DNS seed server (e.g., <code>nodes.lightning.directory</code>) to obtain a set of candidate bootstrap peers.</p></li></ul></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://massmux.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">massmux.org Labs is a reader-supported publication. To receive new posts, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><ul><li><p><strong>Messaging Layer</strong>: This layer is responsible for defining <strong>message structures and encoding formats</strong>. It ensures an encrypted and secure communication and exchange of information via the network connection layer.</p><ul><li><p><strong>BOLT 1: Base Protocol</strong> serves as the cornerstone, outlining <strong>fundamental message structures</strong> and connection protocols, including how nodes initiate, sustain, and multiplex connections. It defines the <strong>Type-Length-Value (TLV) format</strong>, which allows the protocol to evolve by adding new features without altering its core structure. TLV records are used to extend messages in a <strong>forward and backward compatible</strong> manner, meaning older nodes can safely ignore information they don't understand.</p><p>common ports:</p><ul><li><p>Bitcoin mainnet port number 9735 or the corresponding hexadecimal <code>0x2607</code></p></li><li><p>Bitcoin testnet port number 19735 (<code>0x4D17</code>)</p></li><li><p>Bitcoin signet port number 39735 (<code>0x9B37</code>)</p></li></ul></li><li><p><strong>BOLT 9: Assigned Feature Flags</strong> governs the <strong>feature bits</strong> (or flags) that nodes use to <strong>communicate which capabilities they support</strong>. Features are typically assigned in pairs (optional and required bits), enabling nodes to determine compatibility with peers. The simple rule <strong>"it's OK to be odd"</strong> signifies that odd-numbered feature bits are optional, allowing for more flexible interactions. These feature bits are found in <code>node_announcement</code>, <code>channel_announcement</code>, and <code>init</code> messages, enabling peers to negotiate features for connections and payment types.</p></li></ul></li><li><p><strong>Peer-to-Peer (P2P) Layer</strong>: This is the <strong>primary protocol layer for communication</strong> between Lightning nodes. It includes control messages and protocols for channel establishment, operation, and closing.</p><ul><li><p><strong>BOLT 2: Peer Protocol for Channel Management</strong> defines the rules for how <strong>payment channels can be opened and closed</strong> on the Lightning Network, and how nodes can update the channel's balance during normal operation. Channel establishment involves an exchange of messages such as <code>open_channel</code>, <code>accept_channel</code>, <code>funding_created</code>, <code>funding_signed</code>, and <code>funding_locked</code>.</p></li><li><p><strong>BOLT 7: P2P Node and Channel Discovery</strong> elucidates the mechanisms for <strong>peer-to-peer node and channel discovery</strong>, eliminating the need for third-party information distribution. This is primarily achieved through the <strong>gossip protocol</strong>.</p></li></ul></li><li><p><strong>Routing Layer</strong>: This layer defines the rules for <strong>creating payment channels between nodes</strong> and is responsible for <strong>routing payments</strong> between nodes end-to-end and atomically.</p><ul><li><p><strong>BOLT 4: Onion Routing Protocol</strong> outlines the structure and routing of an <strong>onion packet</strong>, facilitating payments from an origin node through intermediate nodes (hops) to a final destination. It describes how nodes build <strong>successive nested layers of encryption</strong> that are "peeled" off by each intermediary node, ensuring that only the sender knows the full route and only the immediate neighbors are known to each hop. This protocol is based on the <strong>SPHINX Mix Format</strong>. The onion packets are sent as part of the <code>update_add_htlc</code> message.</p></li></ul></li><li><p><strong>Payment Layer</strong>: This is the <strong>highest layer</strong> of the network, presenting a reliable payment interface to applications. It defines the rules for using <strong>Hash Time-Locked Contracts (HTLCs)</strong> to route payments.</p><ul><li><p><strong>BOLT 11: Invoice Encoding for Lightning Payments</strong> introduces a straightforward and adaptable protocol for <strong>requesting Lightning Network payments</strong>, designed for compatibility with QR codes. BOLT 11 invoices include the payment hash, amount, description, and expiry time. A key limitation of BOLT 11 invoices is that they are generally <strong>single-use and specify a fixed amount</strong>.</p></li><li><p><strong>BOLT 12: Offers</strong> is an<strong> upgrade</strong> that aims to address BOLT 11 limitations by enabling <strong>reusable payment requests</strong> and allowing static QR codes for both receiving and sending payments. Offers can be used multiple times and can be generated by either the sender or receiver. They contain enough information for a wallet to dynamically fetch a "real" invoice from the vendor through the Lightning Network itself, eliminating the need for external web servers.</p></li></ul></li></ul><h2>Communication mechanisms</h2><p><strong>Key communication mechanisms</strong> within these layers include:</p><ul><li><p><strong>Gossip Protocol</strong>: This peer-to-peer protocol allows nodes to <strong>share information about the topology of the Lightning Network</strong>. Nodes open encrypted connections and share (gossip) information received from other peers, such as newly created channels. This information is crucial for nodes to <strong>construct a channel graph</strong> (a map of publicly advertised channels and nodes) to find paths for payments. The main messages are <code>node_announcement</code> (communicates node public key, network address, and features), <code>channel_announcement</code> (proves channel existence and capabilities), and <code>channel_update</code> (describes routing policies like fees and timelocks for each channel direction). These messages are authenticated to prevent counterfeiting.</p></li><li><p><strong>Hash Time-Locked Contracts (HTLCs)</strong>: HTLCs are a fundamental component for <strong>routing payments across multiple channels atomically and trustlessly</strong>. They are Bitcoin Scripts that require a recipient to either spend the payment before a deadline by presenting a <strong>secret preimage</strong> (derived from the payment hash in the invoice) or the sender can claim a refund after a timelock expires. The disclosure of the preimage propagates backward along the payment path, effectively settling all intermediate HTLCs. The <code>update_add_htlc</code> message is used to add an HTLC to a channel, while <code>update_fulfill_htlc</code> and <code>update_fail_htlc</code> are used for successful redemption or failure, respectively.</p></li><li><p><strong>Payment Routing</strong>: Payments are forwarded along a path of channels from the sender to the recipient. The sender (origin node) selects the entire payment path in a process called <strong>source-based pathfinding</strong>. The routing information for each hop is then encoded within the onion packet, encrypted layer by layer.</p></li></ul><p>Changes to existing BOLTs or the introduction of new ones (like BOLT 12) require at least <strong>two distinct Lightning Client implementations</strong> to successfully integrate the feature and demonstrate interoperability before formal inclusion in the official specifications.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://massmux.org/p/communication-layers-on-the-lightning?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://massmux.org/p/communication-layers-on-the-lightning?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[Basis of privacy on the Lightning Network]]></title><description><![CDATA[What are the basic aspects of privacy when dealing with Lightning transactions?]]></description><link>https://massmux.org/p/basis-of-privacy-on-the-lightning</link><guid isPermaLink="false">https://massmux.org/p/basis-of-privacy-on-the-lightning</guid><dc:creator><![CDATA[Max Musumeci]]></dc:creator><pubDate>Mon, 09 Jun 2025 07:54:39 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Gh31!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1847e311-9314-4a8b-963b-71f939704378_1458x1010.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Gh31!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1847e311-9314-4a8b-963b-71f939704378_1458x1010.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Gh31!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1847e311-9314-4a8b-963b-71f939704378_1458x1010.png 424w, https://substackcdn.com/image/fetch/$s_!Gh31!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1847e311-9314-4a8b-963b-71f939704378_1458x1010.png 848w, https://substackcdn.com/image/fetch/$s_!Gh31!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1847e311-9314-4a8b-963b-71f939704378_1458x1010.png 1272w, https://substackcdn.com/image/fetch/$s_!Gh31!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1847e311-9314-4a8b-963b-71f939704378_1458x1010.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Gh31!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1847e311-9314-4a8b-963b-71f939704378_1458x1010.png" width="1456" height="1009" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1847e311-9314-4a8b-963b-71f939704378_1458x1010.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1009,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2390369,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://massmux.org/i/165517694?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1847e311-9314-4a8b-963b-71f939704378_1458x1010.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Gh31!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1847e311-9314-4a8b-963b-71f939704378_1458x1010.png 424w, https://substackcdn.com/image/fetch/$s_!Gh31!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1847e311-9314-4a8b-963b-71f939704378_1458x1010.png 848w, https://substackcdn.com/image/fetch/$s_!Gh31!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1847e311-9314-4a8b-963b-71f939704378_1458x1010.png 1272w, https://substackcdn.com/image/fetch/$s_!Gh31!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1847e311-9314-4a8b-963b-71f939704378_1458x1010.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The are many aspects of privacy on the Lightning Network and they are more complex compared to transactions  happening on the base layer (on-chain transactions).</p><p>The first important aspect to understand is the use of <strong>onion routing</strong>. This mechanism is designed to provide different levels of information to the participants in a payment route. In fact each payment is routed from the source to the destination through the channels network and onion is used to perform such an action.</p><h2>Onion Routing at work</h2><p>Here's how:</p><ul><li><p><strong>For the sender (origin node) and the recipient (final node):</strong></p><ul><li><p>Typically, only the <strong>sender and the recipient are fully aware of the source, destination, and amount</strong> transacted in a particular payment.</p></li><li><p>The sender knows the <strong>entire path</strong> of payment channels chosen to route the payment.</p></li><li><p>In a standard invoice-based payment, the recipient provides the invoice, containing the payment hash and their node ID, to the sender. So a certain amount of information are revealed to the sender node.</p></li></ul></li><li><p><strong>For intermediary nodes (routing nodes):</strong></p><ul><li><p>Due to <strong>onion routing</strong>, intermediary nodes are only explicitly aware of the <strong>one node immediately preceding them and the one node immediately following them</strong> in the route.</p></li><li><p>They <strong>do not know who initiated the payment or to whom the payment is ultimately destined</strong>.</p></li><li><p>Intermediary nodes see the <strong>payment amount</strong> for the specific HTLC traversing their channel, as well as <strong>Timelock deltas</strong>. This is necessary for them to create the outgoing HTLC to the next hop (on the chosen path).</p></li><li><p>Features like <strong>fixed-length onion packets</strong> and <strong>padding</strong> are used to prevent intermediaries from determining their position in the path or the total length of the path, further enhancing privacy from these nodes.</p></li></ul></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://massmux.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">massmux.org Labs is a reader-supported publication. To receive new posts, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>The end parties (sender and receiver) possess full knowledge of the transaction details (in a different way) and path (for the sender), while the intermediate routing nodes are intentionally blinded to the origin and final destination, seeing only the immediate previous and next hop, along with the amount and timelock for their specific segment of the route. This architecture allows payments to traverse the network while minimizing the information available to third parties involved only in forwarding.</p><h2>What if a LSP is involved?</h2><p>If you use a Lightning Service Provider (LSP) &#8211; which can be described as third-party or central hub nodes that wallets connect to or rely on for services &#8211; they can gather certain information about your node and its activity.</p><p>Here is the type of information a third party, such as a central hub node that a wallet connects to, might gather:</p><ul><li><p>When you connect your node or wallet to the LSP's node, the LSP learns your <strong>node's public key</strong> and your <strong>network address</strong> (e.g., IP or Tor address). This permanently links your node identity to your network location for the LSP.</p></li><li><p>If your wallet relies on the LSP's node for routing payments, the LSP (acting as an intermediary or hub) can <strong>know the sender of a payment</strong>.</p></li><li><p>The LSP can <strong>potentially know the recipient</strong> of a payment, especially if they are involved in constructing the payment route on your behalf.</p></li><li><p>They will observe the <strong>payment amount</strong> for payments routed through their node.</p></li><li><p>If the LSP is providing channel management or is the node you opened a channel with (as discussed in relation to wallet types using third-party nodes), they would have knowledge of the <strong>details and state of that payment channel</strong>, although the channel balance distribution between you and them is only fully known to the two channel partners.</p></li><li><p>Relying on a "hub" node for functionality simplifies the user experience but <strong>reduces user privacy</strong>. Outsourcing wallet components or functionality to a third party means you <strong>give up some privacy</strong> as that third party will learn some information about you.</p></li></ul><p>So, finally, by connecting your node via an LSP (a third-party hub), you are diminishing the privacy benefits typically offered by Lightning's onion routing for those specific transactions.</p><p>As you can see there are no definitive recipes for getting the best privacy. There are always trade offs and everything must be evaluated for your specific case.</p><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://massmux.org/p/basis-of-privacy-on-the-lightning?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://massmux.org/p/basis-of-privacy-on-the-lightning?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p> </p>]]></content:encoded></item><item><title><![CDATA[Path finding on the Lightning Network]]></title><description><![CDATA[how path-finding and routing works to deliver value on the Lightning Network]]></description><link>https://massmux.org/p/pathfinding-on-the-lightning-network</link><guid isPermaLink="false">https://massmux.org/p/pathfinding-on-the-lightning-network</guid><dc:creator><![CDATA[Max Musumeci]]></dc:creator><pubDate>Fri, 16 May 2025 06:00:48 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!0oy6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bec0bda-b320-4ceb-99f6-4736f3e1f787_1458x1010.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!0oy6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bec0bda-b320-4ceb-99f6-4736f3e1f787_1458x1010.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0oy6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bec0bda-b320-4ceb-99f6-4736f3e1f787_1458x1010.png 424w, https://substackcdn.com/image/fetch/$s_!0oy6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bec0bda-b320-4ceb-99f6-4736f3e1f787_1458x1010.png 848w, https://substackcdn.com/image/fetch/$s_!0oy6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bec0bda-b320-4ceb-99f6-4736f3e1f787_1458x1010.png 1272w, https://substackcdn.com/image/fetch/$s_!0oy6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bec0bda-b320-4ceb-99f6-4736f3e1f787_1458x1010.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0oy6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bec0bda-b320-4ceb-99f6-4736f3e1f787_1458x1010.png" width="1456" height="1009" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9bec0bda-b320-4ceb-99f6-4736f3e1f787_1458x1010.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1009,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2609266,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://massmux.org/i/163687057?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bec0bda-b320-4ceb-99f6-4736f3e1f787_1458x1010.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!0oy6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bec0bda-b320-4ceb-99f6-4736f3e1f787_1458x1010.png 424w, https://substackcdn.com/image/fetch/$s_!0oy6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bec0bda-b320-4ceb-99f6-4736f3e1f787_1458x1010.png 848w, https://substackcdn.com/image/fetch/$s_!0oy6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bec0bda-b320-4ceb-99f6-4736f3e1f787_1458x1010.png 1272w, https://substackcdn.com/image/fetch/$s_!0oy6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bec0bda-b320-4ceb-99f6-4736f3e1f787_1458x1010.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>On the Lightning Network we cannot just interconnect nodes with channels, we must find a way to route transactions across the existing channels. Infact our node cannot connect each existing node which it wants to send funds to; this would not escalate. This is why pathfinding and routing is basics on the Lightning Network theory.</p><h2>Path-finding vs routing</h2><p><strong>Pathfinding</strong> is the process of finding and choosing a contiguous path made of payment channels that connects a sender (origin node) to a recipient (final node). It is important to distinguish pathfinding from <strong>routing</strong>, which refers to the series of interactions across the network that attempt to forward a payment along the previously selected path.</p><p>In the Lightning Network, <strong>pathfinding is source-based</strong>, meaning that the sender of the payment is responsible for finding the path through the network to the intended destination. This differs from typical internet routing where intermediary nodes decide how to forward packets.</p><p>To find a path, the sending node needs information about the network's structure or topology. This information is gathered by nodes building an internal map of the Lightning Network, known as a <strong>channel graph</strong>.</p><h2>Channel Graph Construction</h2><ul><li><p>The channel graph is the interconnected set of publicly advertised channels and the nodes that these channels interlink.</p></li><li><p>Nodes build and maintain their perspective of this graph by listening to <strong>gossip protocol messages</strong> from their peers.</p></li><li><p>Key gossip messages include:</p><ul><li><p><code>node_announcement</code>: Provides information needed to create the nodes (vertices) of the graph.</p></li><li><p><code>channel_announcement</code>: Allows nodes to create the edges of the graph representing payment channels. Since channel balance splits mean liquidity differs in each direction, the graph is directed. A <code>channel_announcement</code> also includes proof that a channel exists between two nodes. Channels are referenced using a <strong>short channel ID (scid)</strong>, which encodes their location in the Bitcoin blockchain.</p></li><li><p><code>channel_update</code>: Contains metadata for a channel, such as routing fees and timelock duration. This allows incorporating fees and timelocks to set the cost or weight of the graph edges.</p></li></ul></li><li><p>Nodes continuously build and update their channel graph from the moment they start and connect to peers. More gossip information improves a node's "map" and pathfinding effectiveness.</p></li><li><p>It is crucial to understand that <strong>there is no single, canonical "the" channel graph</strong>; each node constructs its own channel graph based on the information it has received, which is necessarily incomplete, incorrect, and out-of-date to some extent.</p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://massmux.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">massmux.org Labs is a reader-supported publication. To receive new posts, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>The Pathfinding Problem</h2><ul><li><p>Pathfinding in the Lightning Network falls under graph theory and graph traversal. It's a problem of finding a path through a directed graph with numerical capacity constraints on its edges, similar to a flow network.</p></li><li><p>If exact channel balances were known, standard pathfinding algorithms could easily compute paths, optimizing for factors like fees.</p></li><li><p>However, <strong>channel balances (liquidity) are not known</strong> to the sender for privacy and scalability reasons. Nodes only know the aggregate channel capacity. For a payment to succeed, there must be adequate balance on the sending side of each channel in the path in the correct direction.</p></li><li><p>This lack of knowledge about liquidity makes pathfinding significantly more complex than in theoretical computer science problems. The information is also highly dynamic.</p></li></ul><h3>Finding Candidate Paths</h3><ul><li><p>With only partial information about channel liquidity, innovative pathfinding strategies are needed.</p></li><li><p>Nodes can use the channel graph information (nodes, channels, topology, announced capacities, fee policies) to find paths.</p></li><li><p>Since fees are accumulated from the recipient backward to the sender, pathfinding algorithms like Dijkstra's or A* are often applied <strong>backward from the recipient to the sender</strong>. The cost function for edges might include fees, estimated liquidity, timelock delta, or a combination.</p></li><li><p>Paths must have sufficient liquidity not only for the payment amount but also for the cumulative fees of all subsequent hops.</p></li></ul><h3>Payment Delivery (Trial-and-Error Loop)</h3><ul><li><p>The pathfinding mechanism currently implemented in Lightning nodes often involves creating a list of candidate paths, filtering and sorting them by some function (e.g., cost, capacity combination).</p></li><li><p>The node or wallet then <strong>probes paths</strong> by attempting to deliver the payment in a trial-and-error loop until a path is found that successfully delivers the payment. This probing is not directly seen by the user but may cause delays.</p></li><li><p>During the trial-and-error process, nodes can <strong>learn from failures and successes</strong>. For example, receiving an "insufficient balance" error from a node for a specific channel narrows the estimated range of liquidity for that channel. A successful payment indicates that all channels on that path had sufficient liquidity for the amount plus fees, allowing the node to update its liquidity estimates. This reduces the uncertainty of balances.</p></li></ul><h2>Multipart Payments (MPP)</h2><ul><li><p>Multipart payments (MPP) are an advanced pathfinding strategy where a large payment is <strong>split into multiple smaller parts</strong> and sent over different paths simultaneously.</p></li><li><p>This strategy helps overcome the challenge of uncertain liquidity, as smaller payments have a higher chance of succeeding on individual channels.</p></li><li><p>MPP algorithms aim to find the optimal number of splits and amounts for each split, potentially utilizing paths that might not have sufficient liquidity for the full amount but can handle a smaller part.</p></li><li><p>The process can involve multiple rounds of pathfinding, updating the channel graph after each round based on payment successes and failures to optimize subsequent attempts for any remaining amount.</p></li></ul><p>While the process of finding the "best" path is complex and still an area of active research, the combination of building a channel graph from gossip, utilising pathfinding algorithms adapted for uncertain liquidity, and the trial-and-error probing process with learning from failures/successes enables payment delivery on the network. Pathfinding is not specified in a BOLT standard, allowing different implementations to use varying strategies.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://massmux.org/p/pathfinding-on-the-lightning-network?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://massmux.org/p/pathfinding-on-the-lightning-network?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[Cooperative Channel Closing on the Lightning Network]]></title><description><![CDATA[What happens when we close a Lightning channel?]]></description><link>https://massmux.org/p/cooperative-channel-closing-on-the</link><guid isPermaLink="false">https://massmux.org/p/cooperative-channel-closing-on-the</guid><dc:creator><![CDATA[Max Musumeci]]></dc:creator><pubDate>Sun, 27 Apr 2025 07:35:18 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!51Lt!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a7a21d2-c17e-46eb-8f4b-9eb211e4ec18_1458x1010.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!51Lt!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a7a21d2-c17e-46eb-8f4b-9eb211e4ec18_1458x1010.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!51Lt!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a7a21d2-c17e-46eb-8f4b-9eb211e4ec18_1458x1010.png 424w, https://substackcdn.com/image/fetch/$s_!51Lt!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a7a21d2-c17e-46eb-8f4b-9eb211e4ec18_1458x1010.png 848w, https://substackcdn.com/image/fetch/$s_!51Lt!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a7a21d2-c17e-46eb-8f4b-9eb211e4ec18_1458x1010.png 1272w, https://substackcdn.com/image/fetch/$s_!51Lt!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a7a21d2-c17e-46eb-8f4b-9eb211e4ec18_1458x1010.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!51Lt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a7a21d2-c17e-46eb-8f4b-9eb211e4ec18_1458x1010.png" width="1456" height="1009" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2a7a21d2-c17e-46eb-8f4b-9eb211e4ec18_1458x1010.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1009,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1336882,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://massmux.org/i/162191244?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a7a21d2-c17e-46eb-8f4b-9eb211e4ec18_1458x1010.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!51Lt!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a7a21d2-c17e-46eb-8f4b-9eb211e4ec18_1458x1010.png 424w, https://substackcdn.com/image/fetch/$s_!51Lt!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a7a21d2-c17e-46eb-8f4b-9eb211e4ec18_1458x1010.png 848w, https://substackcdn.com/image/fetch/$s_!51Lt!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a7a21d2-c17e-46eb-8f4b-9eb211e4ec18_1458x1010.png 1272w, https://substackcdn.com/image/fetch/$s_!51Lt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a7a21d2-c17e-46eb-8f4b-9eb211e4ec18_1458x1010.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>Closing a channel</h2><p>A good and wisely open channel seldom needs to be closed. By &#8220;good channel&#8221; we mean a channel open with an interconnected and well managed partner, with good capacity and efficient flow of transactions. By the way sometimes we need to close a channel, in order to terminate the financial relationship between our node and the remote one, and we can do that cooperatively.</p><p>Cooperatively closing a Lightning Network channel is the preferred method for ending a channel partnership. This method involves a series of steps designed to ensure both parties receive their respective balances without delays or excessive fees.</p><p>What happens when a channel is closed? When a Lightning Network channel is closed, the funds that were held within the channel's 2-of-2 multisignature address are settled on the Bitcoin blockchain, and the channel is no longer available for transacting or routing payments. So the current balance of both parties is returned to each owner on-chain.</p><p>How the procedure looks like?</p><h3>1. Initiating the Closure:</h3><ul><li><p><strong>shutdown Message:</strong> One channel partner (e.g., Alice) initiates the closing process by sending a shutdown message to the other partner (Bob). This message includes:</p></li><li><p><strong>channel_id:</strong> The unique identifier of the channel to be closed.</p></li><li><p><strong>scriptpubkey:</strong> A Bitcoin script specifying the address where Alice wants to receive her funds. This could be any standard Bitcoin address. Just for recap: normally, referring to an on-chain transaction, a <strong>scriptPubKey</strong> is a <strong>locking script</strong> that is placed on a transaction output, specifying the conditions that must be met to spend that output in the future.</p></li><li><p><strong>Acknowledgement:</strong> Bob responds with his own shutdown message, indicating his agreement to close the channel and providing the scriptpubkey for his chosen receiving address.</p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://massmux.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">massmux.org Labs is a reader-supported publication. To receive new posts, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3>2. Negotiating Closing Fees:</h3><ul><li><p><strong>closing_signed Message (Alice):</strong> Alice, as the channel funder, initiates the fee negotiation by sending a closing_signed message to Bob. This message proposes a transaction fee for the on-chain closing transaction and includes Alice's signature for the transaction.</p></li><li><p><strong>closing_signed Message (Bob):</strong> Bob can either:</p></li><li><p><strong>Accept:</strong> If Bob agrees with the proposed fee, he responds with a closing_signed message echoing the same fee and his own signature for the transaction.</p></li><li><p><strong>Propose a Different Fee:</strong> If Bob disagrees, he responds with a closing_signed message containing a different fee_satoshis value.</p></li><li><p><strong>Fee Negotiation:</strong> This back-and-forth exchange of closing_signed messages continues until both parties agree on a suitable fee for the closing transaction.</p></li></ul><h3>3. Constructing and Broadcasting the Closing Transaction:</h3><ul><li><p><strong>Final Agreement:</strong> Once Alice receives a closing_signed message from Bob with the same fee she proposed, the negotiation concludes.</p></li><li><p><strong>Transaction Construction:</strong> Both nodes construct the final closing transaction, which is similar to a commitment transaction but without timelocks or penalty mechanisms. The outputs of this transaction directly pay Alice and Bob their respective balances at the specified addresses.</p></li><li><p><strong>Transaction Broadcast:</strong> Alice, as the initiator, broadcasts the signed closing transaction to the Bitcoin network.</p></li></ul><h3>4. Channel Closure Confirmation:</h3><ul><li><p><strong>Transaction Confirmation:</strong> The closing transaction is confirmed on the Bitcoin blockchain, effectively closing the channel.</p></li><li><p><strong>Fund Availability:</strong> Alice and Bob can now spend their received funds as desired.</p></li></ul><h3>What is important to remember:</h3><ul><li><p><strong>Cooperative Nature:</strong> Both channel partners actively participate in the closing process, agreeing on the final balance distribution and the transaction fee. They both need to be online during the whole closing process.</p></li><li><p><strong>On-Chain Fees:</strong> Closing a channel incurs on-chain transaction fees, which are paid by the channel funder.</p></li><li><p><strong>Efficiency:</strong> A cooperative close generally results in lower fees and faster fund availability compared to a unilateral force close. This is because the parties agrees on all the aspects of the closing process.</p></li><li><p><strong>Finality:</strong> The confirmed closing transaction provides a definitive record of the final channel balance on the Bitcoin blockchain and terminates the channel existence.</p></li><li><p><strong>Up-Front Shutdown Script (Optional):</strong> An optional feature where parties can pre-specify a "delivery address" for their funds during the channel opening. This enhances security by restricting the destination of funds upon closure, mitigating risks in case of a compromise. </p><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://massmux.org/p/cooperative-channel-closing-on-the?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://massmux.org/p/cooperative-channel-closing-on-the?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p>I hope you enjoyed this value added article. If you did, please share it and subscribe to my other social channels as Youtube, Instagram, Tiktok for even more contents.</p></li></ul>]]></content:encoded></item></channel></rss>