๐Ÿงฐ Too much bitcoin tech knowledge is trapped in videos and podcasts If only there was an easy way to unearth those insights and gemsโ€ฆ ๐Ÿค” We wondered that too, so we redesigned Bitcoin Transcripts! ๐Ÿš€ image ๐Ÿ” Bitcoin Transcripts is a filterable library of transcripts from: โ€ข dev meetups โ€ข conferences โ€ข podcasts โ€ข panels Skim talks, quote insights, and search by keyword. All in one place. ๐Ÿ‘‰ โ›๏ธ Missed a workshop or podcast episode? No worries. You can now quickly search by keyword or topic and read the conversation in minutes instead of watching hours of video, Accelerating your speed to insights. ๐Ÿง‘โ€๐Ÿซ Bitcoin Transcripts is perfect for: - bitcoin devs digging into prior research - educators creating content - researchers analyzing protocol history or - enthusiasts who prefer reading over listening Taproot workshops, Lightning panels, itโ€™s all in there. Open-source and built by the community ๐Ÿงก This project stands on the shoulders of contributors like Bryan Bishop () who manually transcribed hundreds of talks. Now, with modern tools, we can scale that effort for the whole community. image Many thanks to our contributors: - Dev: @npub1madm...4djz , Jamal (), Emmanuel (), @npub1w484...lvz2 - Data & architecture: Andreas (), Urvish () - Vision: @npub1dq94...2pg8 - Design: Tobi (), Khush (), @Stephen DeLorme - Product: @art assoiants - Inspiration: Bryan Bishop () Whatโ€™s next? Weโ€™ll keep adding transcripts from upcoming events and backfill any important historic talks we missed. ๐Ÿ” Would love your help editing transcripts as well. Dive in, explore, and let us know what you think! ๐Ÿ‘‡ btctranscripts.com
Slots are filling up fast for our Warnet track at Friday's #MITBitcoinExpo Hackathon! We stand up a network of Bitcoin Core nodes. You use Bitcoin Core's functional test framework to write attacks in Python and take them down. This event is open to hackers around the globe. Participants can be in-person or remote. And did we mention the $3,000 prize from the MIT Bitcoin Club? ๐Ÿ‘‰ Head over to to sign up today! image We'll also have weโ€™ll have additional prizes for Warnet track winners that are able to join in person. These gorgeous coasters by A+ Engrave are just one example! ๐Ÿคฉ
๐“๐ก๐ž ๐๐ข๐ญ๐œ๐จ๐ข๐ง ๐ƒ๐ž๐ฏ ๐๐ซ๐จ๐ฃ๐ž๐œ๐ญ ๐ก๐š๐ฌ ๐š ๐ญ๐ซ๐š๐œ๐ค ๐š๐ญ ๐ญ๐ก๐ž ๐Œ๐ˆ๐“ ๐๐ข๐ญ๐œ๐จ๐ข๐ง ๐„๐ฑ๐ฉ๐จ ๐‡๐š๐œ๐ค๐š๐ญ๐ก๐จ๐ง, ๐š๐ง๐ ๐ข๐ญ ๐ก๐š๐ฌ ๐š $๐Ÿ‘,๐ŸŽ๐ŸŽ๐ŸŽ ๐ฉ๐ซ๐ข๐ณ๐ž! Participants have 30 hours, starting April 4 and are welcome to hack from around the globe. ๐ŸŒ We repeat, you do not have to attend in person ๐ŸŒŽ ๐Œ๐จ๐ฌ๐ญ ๐ก๐š๐œ๐ค๐š๐ญ๐ก๐จ๐ง ๐ญ๐ซ๐š๐œ๐ค๐ฌ ๐š๐ซ๐ž ๐š๐›๐จ๐ฎ๐ญ ๐›๐ฎ๐ข๐ฅ๐๐ข๐ง๐ , ๐›๐ฎ๐ญ ๐ง๐จ๐ญ ๐ญ๐ก๐ข๐ฌ ๐จ๐ง๐ž. ๐“๐ก๐ข๐ฌ ๐ข๐ฌ ๐š๐›๐จ๐ฎ๐ญ ๐›๐ซ๐ž๐š๐ค๐ข๐ง๐  ๐Ÿ”จ For the Bitcoin Dev Project track, the goal is to take down the bitcoin network. We stand up a network of bitcoin core nodes. You and your team take down as many as possible. Whichever team brings down the most in the shortest amount of time wins. Monitor extreme and yet unknown network behaviors, discover vulnerabilities, and build a stronger, more resilient bitcoin. image This track is for hackers with some level of coding skill, & the ability to use the command line interface (CLI). Familiarity with Bitcoin Core, esp. the JSON-RPC interface is useful. A general understanding of how blockchains and distributed networks work will come in handy. Who's ready to win? Sign up below! ๐Ÿ‘‡
New tool in Decoding Bitcoin! REORG CALCULATOR โš’๏ธ Computes the probability that an attacker could reorganize z blocks with a given % of the total network hashrate Hereโ€™s the probability of an attacker reorganizing 6 blocks with 30% of the total hashrate image
Buckle up for today's #DecodingBitcoin post. It's a long one but we promise it's worth your time. Today we're going to break down how to sign a #bitcoin segwit transaction using a real example from the BIP-143 test vectors (thatโ€™s one of the segwit BIPs!) image ๐‘๐‘œ๐‘ก๐‘’: ๐‘กโ„Ž๐‘–๐‘  ๐‘’๐‘ฅ๐‘Ž๐‘š๐‘๐‘™๐‘’ ๐‘–๐‘  ๐‘“๐‘œ๐‘Ÿ ๐‘Ž ๐‘ ๐‘’๐‘”๐‘ค๐‘–๐‘ก ๐‘ฃ0 ๐‘ก๐‘Ÿ๐‘Ž๐‘›๐‘ ๐‘Ž๐‘๐‘ก๐‘–๐‘œ๐‘› ๐‘ ๐‘œ ๐‘ ๐‘œ๐‘š๐‘’ ๐‘œ๐‘“ ๐‘กโ„Ž๐‘’ ๐‘ ๐‘๐‘’๐‘๐‘–๐‘“๐‘–๐‘๐‘  ๐‘Ž๐‘Ÿ๐‘’ ๐‘‘๐‘–๐‘“๐‘“๐‘’๐‘Ÿ๐‘’๐‘›๐‘ก ๐‘“๐‘œ๐‘Ÿ ๐‘™๐‘’๐‘”๐‘Ž๐‘๐‘ฆ ๐‘Ž๐‘›๐‘‘ ๐‘ก๐‘Ž๐‘๐‘Ÿ๐‘œ๐‘œ๐‘ก (๐‘ ๐‘’๐‘”๐‘ค๐‘–๐‘ก ๐‘ฃ1) ๐‘ก๐‘Ÿ๐‘Ž๐‘›๐‘ ๐‘Ž๐‘๐‘ก๐‘–๐‘œ๐‘›๐‘ . ๐ป๐‘œ๐‘ค๐‘’๐‘ฃ๐‘’๐‘Ÿ, ๐‘กโ„Ž๐‘’ ๐‘”๐‘’๐‘›๐‘’๐‘Ÿ๐‘Ž๐‘™ ๐‘๐‘œ๐‘›๐‘๐‘’๐‘๐‘ก๐‘  ๐‘Ž๐‘Ÿ๐‘’ ๐‘ ๐‘ก๐‘–๐‘™๐‘™ ๐‘กโ„Ž๐‘’ ๐‘ ๐‘Ž๐‘š๐‘’! The transaction we'll be working with has two inputs. The first is a legacy P2PK inputโ€“we wonโ€™t be covering that today. Instead, weโ€™re going to focus on the second input, the P2WPKH (native segwit) one. image Since this example came from one of the BIP-143 test vectors, we know what the final, signed transaction looks like. The goal is to recreate this: image First, we create the base transaction, the transaction without any signatures. Weโ€™ll start with the - version number - marker & flag fields (to indicate the tx is segwit) - locktime image ๐ด ๐‘›๐‘œ๐‘ก๐‘’ ๐‘œ๐‘› ๐‘ ๐‘’๐‘”๐‘ค๐‘–๐‘ก ๐‘ฃ๐‘ . ๐‘™๐‘’๐‘”๐‘Ž๐‘๐‘ฆ ๐‘ก๐‘Ÿ๐‘Ž๐‘›๐‘ ๐‘Ž๐‘๐‘ก๐‘–๐‘œ๐‘›๐‘ : ๐ต๐‘’๐‘๐‘Ž๐‘ข๐‘ ๐‘’ ๐‘Ž๐‘ก ๐‘™๐‘’๐‘Ž๐‘ ๐‘ก ๐‘œ๐‘›๐‘’ ๐‘œ๐‘“ ๐‘กโ„Ž๐‘’ ๐‘–๐‘›๐‘๐‘ข๐‘ก๐‘  ๐‘–๐‘  ๐‘ ๐‘’๐‘”๐‘ค๐‘–๐‘ก (๐‘›๐‘Ž๐‘ก๐‘–๐‘ฃ๐‘’ ๐‘œ๐‘Ÿ ๐‘ค๐‘Ÿ๐‘Ž๐‘๐‘๐‘’๐‘‘), ๐‘กโ„Ž๐‘’ ๐‘ก๐‘Ÿ๐‘Ž๐‘›๐‘ ๐‘Ž๐‘๐‘ก๐‘–๐‘œ๐‘› ๐‘–๐‘  ๐‘Ž๐‘™๐‘ ๐‘œ ๐‘๐‘œ๐‘›๐‘ ๐‘–๐‘‘๐‘’๐‘Ÿ๐‘’๐‘‘ ๐‘ ๐‘’๐‘”๐‘ค๐‘–๐‘ก. image Hereโ€™s what we have so far: image Letโ€™s add inputs! Recall that all inputs come from existing transactions. That means for each input, we need to find the transaction it came from and get: 1. that transactionโ€™s ID 2. the output index ๐–๐ก๐š๐ญโ€™๐ฌ ๐š๐ง ๐จ๐ฎ๐ญ๐ฉ๐ฎ๐ญ ๐ข๐ง๐๐ž๐ฑ? Every transaction has a list of outputs. The โ€œoutput indexโ€ is a way to reference a specific output from the list. We need to ask, "from a transactionโ€™s list of outputs, which one corresponds to the input I care about?โ€ For each input, two more things are needed: the ๐ฌ๐œ๐ซ๐ข๐ฉ๐ญ๐’๐ข๐  (placeholder for data required to spend the input), and a ๐ฌ๐ž๐ช๐ฎ๐ž๐ง๐œ๐ž ๐ง๐ฎ๐ฆ๐›๐ž๐ซ (usually 0xFFFFFFFF) image After adding all the inputs, the transaction looks like this: image Remember when we said the scriptSig would be a placeholder? Hereโ€™s why those fields are currently empty: image Time to add outputs! For each output, we include the - amount (in satoshis) - scriptPubKey: the locking script that defines the rules for how the output can be spent image Things are starting to come together! image A few more things are needed before we can get to signing. First is setting up the ๐ฐ๐ข๐ญ๐ง๐ž๐ฌ๐ฌ field. This is where the signature and corresponding public key go for segwit transactions. The witness field starts off empty. This is different from legacy transactions where signatures are placed directly in the scriptSig field. image The next thing thatโ€™s needed is the ๐ฌ๐œ๐ซ๐ข๐ฉ๐ญ๐‚๐จ๐๐ž. The scriptCode for a P2WPKH (pay-to-witness-public-key-hash) input is: image ๐‘Šโ„Ž๐‘Ž๐‘กโ€™๐‘  ๐‘กโ„Ž๐‘Ž๐‘ก 20 ๐‘๐‘ฆ๐‘ก๐‘’ ๐‘๐‘ข๐‘๐‘˜๐‘’๐‘ฆ โ„Ž๐‘Ž๐‘ โ„Ž? ๐ธ๐‘Ž๐‘Ÿ๐‘™๐‘–๐‘’๐‘Ÿ ๐‘ค๐‘’ ๐‘ ๐‘Ž๐‘ค ๐‘’๐‘Ž๐‘โ„Ž ๐‘œ๐‘ข๐‘ก๐‘๐‘ข๐‘ก โ„Ž๐‘Ž๐‘  ๐‘Ž ๐‘ ๐‘๐‘Ÿ๐‘–๐‘๐‘ก๐‘ƒ๐‘ข๐‘๐พ๐‘’๐‘ฆ (๐‘Ÿ๐‘ข๐‘™๐‘’๐‘  ๐‘“๐‘œ๐‘Ÿ โ„Ž๐‘œ๐‘ค ๐‘ก๐‘œ ๐‘ ๐‘๐‘’๐‘›๐‘‘ ๐‘กโ„Ž๐‘’ ๐‘œ๐‘ข๐‘ก๐‘๐‘ข๐‘ก). ๐ด๐‘™๐‘ ๐‘œ, ๐‘Ÿ๐‘’๐‘๐‘Ž๐‘™๐‘™ ๐‘กโ„Ž๐‘Ž๐‘ก ๐‘กโ„Ž๐‘’ ๐‘–๐‘›๐‘๐‘ข๐‘ก ๐‘ก๐‘œ ๐‘œ๐‘›๐‘’ ๐‘ก๐‘Ÿ๐‘Ž๐‘›๐‘ ๐‘Ž๐‘๐‘ก๐‘–๐‘œ๐‘› ๐‘–๐‘  ๐‘กโ„Ž๐‘’ ๐‘œ๐‘ข๐‘ก๐‘๐‘ข๐‘ก ๐‘“๐‘Ÿ๐‘œ๐‘š ๐‘Ž๐‘›๐‘œ๐‘กโ„Ž๐‘’๐‘Ÿ. ๐‘‡โ„Ž๐‘’ 20 ๐‘๐‘ฆ๐‘ก๐‘’ ๐‘๐‘ข๐‘๐‘˜๐‘’๐‘ฆ โ„Ž๐‘Ž๐‘ โ„Ž ๐‘–๐‘  ๐‘’๐‘ฅ๐‘ก๐‘Ÿ๐‘Ž๐‘๐‘ก๐‘’๐‘‘ ๐‘“๐‘Ÿ๐‘œ๐‘š ๐‘กโ„Ž๐‘’ ๐‘๐‘œ๐‘Ÿ๐‘Ÿ๐‘’๐‘ ๐‘๐‘œ๐‘›๐‘‘๐‘–๐‘›๐‘” ๐‘œ๐‘ข๐‘ก๐‘๐‘ข๐‘ก'๐‘  ๐‘ ๐‘๐‘Ÿ๐‘–๐‘๐‘ก๐‘ƒ๐‘ข๐‘๐พ๐‘’๐‘ฆ. Hereโ€™s the ๐ฌ๐œ๐ซ๐ข๐ฉ๐ญ๐‚๐จ๐๐ž for the example weโ€™re working on: image Lastly, three important hashes are required. The first is ๐ก๐š๐ฌ๐ก๐๐ซ๐ž๐ฏ๐จ๐ฎ๐ญ๐ฌ. Itโ€™s the double SHA256 hash of all input outpoints (outpoint = the transaction id + output index) The second is ๐ก๐š๐ฌ๐ก๐’๐ž๐ช๐ฎ๐ž๐ง๐œ๐ž, the double SHA256 hash of all input sequence numbers. The third is ๐ก๐š๐ฌ๐ก๐Ž๐ฎ๐ญ๐ฉ๐ฎ๐ญ๐ฌ, the double SHA256 hash of all outputs. Thatโ€™s everything (finally!). Letโ€™s put it all together into something that can be signed! When signing a transaction, the spender actually signs a hash of the transaction data, not the entire transaction itself. This hash is called the ๐ฌ๐ข๐ ๐ก๐š๐ฌ๐ก. The data used to create the sighash is called the ๐ฉ๐ซ๐ž๐ข๐ฆ๐š๐ ๐ž. For a transaction input, the preimage is made of these items: image The sighash_type indicates which parts of the transaction the signature is committing to. image After hashing the preimage twice with SHA-256, weโ€™re left with the sighash. At last! Itโ€™s time to do some signing! image There are a few steps for signing a segwit (v0) transaction. First, the signerโ€™s private key is used to create an ECDSA signature for the sighash. The resulting signature has two parts, ๐‘Ÿ and ๐‘ . In ECDSA, there are actually two valid s values for every signature: a "high" value and a "low" value. Both are mathematically valid, but bitcoin requires using the low s value to prevent transaction malleability (that means altering a transaction's ID!) After selecting the low s value, the signature must be encoded into DER format. This is how itโ€™s structured: image And hereโ€™s what the DER encoded signature looks like for our example: image The last step is to add a byte at the end for the sighash type. If we look back at the preimage made earlier we see this example is using SIGHASH_ALL (0x01). The full code for the signing step looks like this: image Remember the transaction witness field we set space aside for? Itโ€™s now time to put the signature in it ๐Ÿš€ image This is how the witness field is structured: image Which works out to be this for our example: image With the completion of the witness field, the transaction is now signed! image This is what the final signed transaction hex looks like broken down: image Bonus: You can use the Bitcoin Core CLI decoderawtransaction command to examine all the parts of the raw transaction hex image * ~ * ~ * ~ * ~ * ~ * ~ If you made it to the end, give yourself a pat on the back. If you enjoyed it, be sure to like this post so we know to make more like it! * ~ * ~ * ~ * ~ * ~ * ~ This material is from Decoding Bitcoin, your go-to resource for understanding bitcoin, #privacy, and #decentralization. You can visit for the full lesson with all the code examples, as well as more free, interactive content. For more of a challenge, play chapters 4, 5, and 6 of @Saving Satoshi () to learn about public-private key cryptography, digital signatures, and transaction building ๐Ÿ˜บ image Hope you learned something new about transaction signing. If you enjoyed this, share it with a friend and donโ€™t forget to follow us, @Bitcoin Dev Project for more content like this. Thanks for reading!
Weโ€™ve got a good #DecodingBitcoin post for you today. The topic? ๐„๐ง๐๐ข๐š๐ง๐ง๐ž๐ฌ๐ฌ, AKA the order of bytes in a computerโ€™s memory. When we put it like that it sounds a little boring, but thereโ€™s something interesting, and dare we say ๐‘Ž๐‘›๐‘›๐‘œ๐‘ฆ๐‘–๐‘›๐‘”, about how bitcoin handles endiannessโ€ฆ Before we get to that, letโ€™s better understand what endianness is. Imagine reading directions in different languages: while English is written and read from left to right, Arabic text flows from right to left. image Similarly, computers have two ways to store data: 1. ๐๐ข๐ -๐ž๐ง๐๐ข๐š๐ง (BE): Most significant byte first 2. ๐‹๐ข๐ญ๐ญ๐ฅ๐ž-๐ž๐ง๐๐ข๐š๐ง (LE): Least significant byte first image When computers with different byte orders try to communicate, they can misread each other. Itโ€™s like two people reading numbers from opposite directions. image ๐๐ข๐ -๐ž๐ง๐๐ข๐š๐ง ๐ฌ๐ญ๐จ๐ซ๐ž๐ฌ ๐ญ๐ก๐ž ๐ฆ๐จ๐ฌ๐ญ ๐ฌ๐ข๐ ๐ง๐ข๐Ÿ๐ข๐œ๐š๐ง๐ญ ๐›๐ฒ๐ญ๐ž ๐Ÿ๐ข๐ซ๐ฌ๐ญ. This is similar to how humans read numbers and Hex in most cases: starting with the most important information. Suppose we want to store the number 12345678 (hexadecimal: 0x00BC614E) in memory. In big-endian, the bytes are stored in this order: 00 BC 61 4E image Observe that: - The ๐ฆ๐จ๐ฌ๐ญ ๐ฌ๐ข๐ ๐ง๐ข๐Ÿ๐ข๐œ๐š๐ง๐ญ ๐›๐ฒ๐ญ๐ž (00) is stored at the ๐ฅ๐จ๐ฐ๐ž๐ฌ๐ญ ๐ฆ๐ž๐ฆ๐จ๐ซ๐ฒ ๐š๐๐๐ซ๐ž๐ฌ๐ฌ (00). - The ๐ฅ๐ž๐š๐ฌ๐ญ ๐ฌ๐ข๐ ๐ง๐ข๐Ÿ๐ข๐œ๐š๐ง๐ญ ๐›๐ฒ๐ญ๐ž (4E) is stored at the ๐ก๐ข๐ ๐ก๐ž๐ฌ๐ญ ๐š๐๐๐ซ๐ž๐ฌ๐ฌ (03). Big-endian is considered more "human-readable" because the data is stored in the order we naturally read it. ๐‹๐ข๐ญ๐ญ๐ฅ๐ž-๐ž๐ง๐๐ข๐š๐ง ๐ฌ๐ญ๐จ๐ซ๐ž๐ฌ ๐ญ๐ก๐ž ๐ฅ๐ž๐š๐ฌ๐ญ ๐ฌ๐ข๐ ๐ง๐ข๐Ÿ๐ข๐œ๐š๐ง๐ญ ๐›๐ฒ๐ญ๐ž ๐Ÿ๐ข๐ซ๐ฌ๐ญ. This might feel counter intuitive to humans but is more efficient for modern processors. Using the same number 12345678 (0x00BC614E), here's how it looks in little-endian: 4E 61 BC 00 image This time, the ๐ฅ๐ž๐š๐ฌ๐ญ ๐ฌ๐ข๐ ๐ง๐ข๐Ÿ๐ข๐œ๐š๐ง๐ญ ๐›๐ฒ๐ญ๐ž (4E) is stored at the ๐ฅ๐จ๐ฐ๐ž๐ฌ๐ญ ๐ฆ๐ž๐ฆ๐จ๐ซ๐ฒ ๐š๐๐๐ซ๐ž๐ฌ๐ฌ (00). The ๐ฆ๐จ๐ฌ๐ญ ๐ฌ๐ข๐ ๐ง๐ข๐Ÿ๐ข๐œ๐š๐ง๐ญ ๐›๐ฒ๐ญ๐ž (00) is stored at the ๐ก๐ข๐ ๐ก๐ž๐ฌ๐ญ ๐š๐๐๐ซ๐ž๐ฌ๐ฌ (03). This "reversal" of bytes is common in the Bitcoin Core codebase. In bitcoin, most data like transaction IDs, block headers, and amounts are all in little-endian format or with the bytes reversed. image ๐‘๐‘œ๐‘ก๐‘’: ๐ธ๐‘›๐‘‘๐‘–๐‘Ž๐‘›๐‘›๐‘’๐‘ ๐‘  ๐‘œ๐‘›๐‘™๐‘ฆ ๐‘Ž๐‘๐‘๐‘™๐‘–๐‘’๐‘  ๐‘ก๐‘œ ๐‘–๐‘›๐‘ก๐‘’๐‘”๐‘’๐‘Ÿ๐‘ . ๐ผ๐‘ก ๐‘–๐‘  ๐‘›๐‘œ๐‘ก ๐‘๐‘œ๐‘Ÿ๐‘Ÿ๐‘’๐‘๐‘ก ๐‘ก๐‘œ ๐‘ ๐‘Ž๐‘ฆ ๐‘Ž โ„Ž๐‘Ž๐‘ โ„Ž ๐‘–๐‘  ๐‘™๐‘–๐‘ก๐‘ก๐‘™๐‘’-๐‘’๐‘›๐‘‘๐‘–๐‘Ž๐‘›. ๐‘†๐‘–๐‘›๐‘๐‘’ ๐‘กโ„Ž๐‘’๐‘Ÿ๐‘’โ€™๐‘  ๐‘›๐‘œ ๐‘œ๐‘“๐‘“๐‘–๐‘๐‘–๐‘Ž๐‘™ ๐‘ก๐‘’๐‘Ÿ๐‘š ๐‘“๐‘œ๐‘Ÿ ๐‘กโ„Ž๐‘–๐‘  ๐‘ค๐‘’ ๐‘ ๐‘Ž๐‘ฆ โ€œ๐‘๐‘ฆ๐‘ก๐‘’ ๐‘ ๐‘ค๐‘Ž๐‘๐‘๐‘’๐‘‘โ€ ๐‘œ๐‘Ÿ โ€œ๐‘Ÿ๐‘’๐‘ฃ๐‘’๐‘Ÿ๐‘ ๐‘’ ๐‘๐‘ฆ๐‘ก๐‘’๐‘ โ€. For readability, the bytes are swapped back to the style of big-endian when this data is displayed to humans. A block explorer is one example of where you can see this. Bitcoin Coreโ€™s JSON-RPC interface was the first time block hashes were printed for human consumption. That was when someone decided to reverse the ordering of hash so that it looked like a human readable integer. image It turns out the real block hash, the actual sha256 value you get if you compute the hash yourself, is: e4b1d56439d46d9070e58c4368cccc97596fa908daf101000000000000000000 The zeros are actually on the right! At first glance it looks like this is a very large number, but we know the integer value of a block hash actually gets smaller as the difficulty increases. It's clear that the bytes are reversed and in the style of little-endian. But why? We can thank Satoshi for that. Satoshi decided to interpret the block hash as a little-endian integer. The more zeroes there are on the right side, the smaller the (little-endian) integer. Since most modern CPUs are little-endian, bitcoin uses it to optimize performance. However, network protocols typically use big-endian, creating a mismatch ๐Ÿ™€ Big-endian is used for network communication (network byte order). Little-endian is used for bitcoinโ€™s internal storage. This duality requires developers to frequently, and sometimes frustratingly, convert between the two formats when working with bitcoin data. Have you been the victim of an endianness oversight when writing bitcoin code? It's a common source of pain for developers new to bitcoin (and even the seasoned ones!) As covered by the transaction ID example earlier, byte order confusion can be common. image Another gotcha is length specification. When converting to little-endian, always specify the correct byte length: image Hope you learned something new about endianness today. If you enjoyed this, share it with a friend and donโ€™t forget to follow us, @Bitcoin Dev Project ! This material is from Decoding Bitcoin, your go-to resource for understanding #bitcoin, privacy, and decentralization. Visit for the full lesson, and more free, interactive content. Thanks for reading!
There is an oft-repeated sentiment in the community that bitcoin does not need you. While bitcoin is designed to be resilient, we ๐‘‘๐‘œ need you. Bitcoin needs all the talent and energy it can gather to solve some of the most difficult technical problems of our time. Bitcoin in your hands changes everything. image