HomeTECHNICAL

TECHNICAL

Will Tether Migrate To The Bitcoin Blockchain With Advances In The Lightning Network?

Bitcoin company, Synonym, has successfully used the Lightning Network to send a Tether transaction, paving the way for stablecoins built on Bitcoin.

Implementing Reusable Payment Codes In Bitcoin Wallets To Improve User Privacy

The Bitcoin Development Kit is planning to implement BIP47 which would allow users to receive via a static payment code and interact with more privacy.

Bitcoin Improvement Proposal 21 Eases User Experience When Paying Invoices

Different Bitcoin wallets have multiple options for whether to send an on-chain or a lightning payment which can be confusing to inexperienced users.

If You Are Going To KYC, Then You Should CYA

Here’s how you can best protect yourself given the information- sharing requirements of various services.

Bitcoin Mining Pool Protocol Stratum V2 Is Making Progress

If widely adopted, this mining pool protocol could help Bitcoin become more robust and decentralized.

Fedimint – The Evolution Of Bitcoin Custody

A new kind of custody could help alleviate issues presented by third-party custody like exchanges and first-party custody like hardware wallets.

How Law Enforcement Seized 94,000 Bitcoin Stolen From Bitfinex

Federal authorities tracked down and seized more than 94,000 bitcoin allegedly stolen from Bitfinex. But how did they get their hands on the pseudonymous funds?

So You Have KYC Bitcoin — Now What?

What is KYC bitcoin, and what steps can users concerned with privacy take to address the issues presented by KYC bitcoin?

Bitcoin And Trust Are Equally Unavoidable

Why webs of trust may be unavoidable even in an optimally decentralized world.

How P2P Protocols Seek To Solve Bitcoin Mining Centralization

Bitcoin mining pools rely on centralization, but P2Pool and other protocols have sought to reduce the need for trust in third parties.

Should The Bitcoin Taproot Soft Fork Be Buried In The Code Base?

Bitcoin Core developers are considering “burying” the Taproot soft fork, to help developers when reviewing the code, but it could have unintended consequences.

How SHA256 And Mining Protect The Bitcoin Network

How is Bitcoin defended by energy? And what is a nonce? These questions and more are answered within!

Bitcoin alpha every weekday, sent straight to your inbox.

LATEST ARTICLES

Advertise with us

Amplify your brand with the world’s first and most trusted Bitcoin media company. Every year, millions of people with diverse interests depend on Bitcoin Magazine for the most reliable, accurate, timely and relevant content. We are trusted by the Bitcoin community to inform and enlighten with quality stories that meet our stringent editorial and journalistic standards.