You are reading an excerpt from our free but shortened abridged report! While still packed with incredible research and data, for just $20/month you can upgrade to our FULL library of 50+ reports (including this one) and complete industry-leading analysis on the top crypto assets.
Becoming a Premium member means enjoying all the perks of a Basic membership PLUS:
- Full-length CORE Reports: More technical, in-depth research, actionable insights, and potential market alpha for serious crypto users
- Early access to future CORE ratings: Being early is sometimes just as important as being right!
- Premium Member CORE+ Reports: Coverage on the top issues pertaining to crypto users like bridge security, layer two solutions, DeFi plays, and more
- CORE report Audio playback: Don’t want to read? No problem! Listen on the go.
BitVM
Recent developments in Bitcoin’s technological landscape in October have marked a significant stride towards its functional expansion. One of the key introductions is the BitVM, an innovative Virtual Machine designed to enable complex computational processes off the main Bitcoin blockchain. This approach, which conducts application execution off-chain while ensuring verification on-chain, is similar to Ethereum’s smart contract rollups, such as Arbitrum and Optimism. By adopting this methodology, BitVM offers a gateway to more advanced applications while preserving Bitcoin's core code and mitigating the expenses associated with Bitcoin's blockspace. However, this leap forward does not come without its hurdles; the management of large volumes of off-chain data and the increased need for data communication present challenges that need addressing for BitVM to realize its full potential.
Stacks
Stacks is another smart contract protocol built on top of the Bitcoin base layer. Previously known as Blockstack, Stacks was designed and created by Muneed Ali. Through VC money, the project was transformed into Stacks, and after raising millions in the first-ever SEC-qualified coin offering, the project upgraded to Stacks 2.0 (which rolled out a slew of new features and updates).
In late 2023, Stacks plans to unveil sBTC, a synthetic BTC asset with a 1:1 peg to BTC maintained through economic incentives involving the STX token. STX stackers are responsible for signing peg-out transactions and maintaining the BTC:sBTC peg in return for the BTC yield they receive from Stacks miners. In this arrangement, miners have the motivation to follow the canonical Stacks chain for STX block rewards and transaction fees.
In October, Stacks’ unveiled sBTC on testnet. sBTC is instrumental in augmenting the programmability of Bitcoin and enhancing the scalability of recent developments such as Ordinals and BRC20 tokens, all while maintaining the integrity of Bitcoin’s underlying code.
Taproot
Moreover, the launch of the Taproot Asset Daemon's mainnet alpha by Lightning Labs is a testament to the continuous evolution of Bitcoin. This initiative leverages the capabilities introduced by the 2021 Taproot upgrade, setting the stage for asset issuance and management over the Lightning Network. Such an advancement transitions Bitcoin towards a multi-asset payment network that supports transactions across a spectrum of currencies, including but not limited to stablecoins and various real-world assets. Despite the past two years’ waning interest in Bitcoin and a challenging market environment, the Lightning Network has experienced notable adoption, particularly with a significant portion of its transactions being micropayments within the domains of gaming and streaming services. These insights underscore Bitcoin’s versatility and reinforce its standing not only as a store of value but also as a viable medium of exchange. Nonetheless, for the Lightning Network to achieve widespread adoption, addressing security concerns, such as the recently identified Replacement Cycling Attack, remains critical.
Lightning
A significant vulnerability in the Lightning Network (LN), Bitcoin's Layer-2 scaling solution, has been uncovered by Antoine Riard, a security researcher and key developer of LN. The discovery has reignited debates about security protocols in blockchain structures that oversee substantial funds.
Riard's disclosure pertains to a vulnerability he labels as “replacement cycling attacks.” This kind of attack targets the Hash Time Lock Contracts (HTLC), which are instrumental in the operational mechanics of the LN. Essentially, these attacks tamper with the HTLC state, potentially impacting the shared funds in channels.
In response to the identified threat, Riard rolled out a set of mitigations on October 16. However, he expressed reservations regarding their efficacy against potential malefactors, noting that while they might deter rudimentary attack attempts, adept attackers could potentially sidestep these safeguards.
After shedding light on the vulnerability, Riard declared his intention to disengage from LN development endeavors, particularly those focusing on protocol-level security issues. Riard's apprehensions about the identified vulnerability are profound. He contends that this discovery should prompt introspection about the prevailing development procedures, especially for blockchain architectures responsible for substantial capital.
Several developers have floated potential strategies to mitigate this attack vector. However, the complexity of the issue is underscored by Bitcoin developer Matt Corallo. He emphasized that rectifying this in the Bitcoin Core system would be far from straightforward. The inherent challenge lies in maintaining sufficient history to address the attack without causing the Bitcoin Core to demand unlimited memory.
Corallo attempted to allay concerns within the Bitcoin community. While he conceded that the LN had challenges to address, he negated the notion that it was inherently compromised. He noted, “Lightning is (currently) for channel counterparties you trust not to do a ton of work to build novel software to attack you.”
In summation, the revelation of this vulnerability in the Lightning Network brings to the fore critical questions about security measures, development protocols, and the evolving nature of blockchain infrastructures. As the discourse unfolds, it will be imperative to strike a balance between innovation and security in this rapidly evolving space.