Delivery-date: Sat, 30 Nov 2024 09:21:45 -0800 Received: from mail-yb1-f187.google.com ([209.85.219.187]) by mail.fairlystable.org with esmtps (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (Exim 4.94.2) (envelope-from ) id 1tHRA9-0005BF-0y for bitcoindev@gnusha.org; Sat, 30 Nov 2024 09:21:45 -0800 Received: by mail-yb1-f187.google.com with SMTP id 3f1490d57ef6-e39826ac9d1sf3776788276.1 for ; Sat, 30 Nov 2024 09:21:44 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=googlegroups.com; s=20230601; t=1732987299; x=1733592099; darn=gnusha.org; h=list-unsubscribe:list-subscribe:list-archive:list-help:list-post :list-id:mailing-list:precedence:x-original-sender:mime-version :subject:references:in-reply-to:message-id:to:from:date:sender:from :to:cc:subject:date:message-id:reply-to; bh=Hm+Q+tMMpEDio6ZkLsAi8bveUzc3AlIEvULooLfsuSc=; b=NOJoFpcWHekHoe6ki993NoqDr+fnit/GDg0mm0X0QAKwM1Awa5dlvwZAwSKQuMAgHj Rr/K25IA7ctTONgkozPcsdv+yFH6Ex7Kky5DWn+K7rli2hXPdVBf8Jzgers/DZJVjEJ6 h6i0SjfQOBessMu36c5jvK88NnmsQGnGunewdOy9X5HZoTRP3oz4jN4KIJlyZUm7iK0d +FA9a9MxT83vM3gs4r7lk+NGVs3fKz9uK8CJ0GAiQ507P+y6RYfPLs+LMVZQa/MskUej aPuXDzqI5Oez8KhwEX+o6NRPcYqPqFORf9G63u3fsD9AWCmU84FPYtQ2ZjolI4+h+CKs 5kJw== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1732987299; x=1733592099; darn=gnusha.org; h=list-unsubscribe:list-subscribe:list-archive:list-help:list-post :list-id:mailing-list:precedence:x-original-sender:mime-version :subject:references:in-reply-to:message-id:to:from:date:from:to:cc :subject:date:message-id:reply-to; bh=Hm+Q+tMMpEDio6ZkLsAi8bveUzc3AlIEvULooLfsuSc=; b=AoBAB+Hxk/qRyet5SbbnXECEV4njYuKW4/3iSlkZ9aXKf6t812zm6AMn6A+62NRaj5 uCme7T6O6WlG5xVTmQGyJk2qJvzwA02lbzamY5FjEG7pIGb7ChytmkwOy5VYiJtRJF79 4yS/TZxCiqjOWGY36sNnwmRGU7+YYQIg/7DMzy42r8dpr1loiytufzNohc2uitsWS+4w ayK/MMQEy7esluLt4wnK4xn7UTXSx/AR/ofJFonmhQshFrcQDwFPp/dMKx59/6LoUh9w jTMjcPL42txVGcQ2Jax0KaOv8/MfrbcHCLaY1rSXv5FrGocD5wTCmo82hD+tmh67Bm0h a0eA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1732987299; x=1733592099; h=list-unsubscribe:list-subscribe:list-archive:list-help:list-post :list-id:mailing-list:precedence:x-original-sender:mime-version :subject:references:in-reply-to:message-id:to:from:date:x-beenthere :x-gm-message-state:sender:from:to:cc:subject:date:message-id :reply-to; bh=Hm+Q+tMMpEDio6ZkLsAi8bveUzc3AlIEvULooLfsuSc=; b=Abbi4L2wc9cf1gqjWnclHpILpeY3CLqPMd7S6ko52/q7eYLc+GX5B/DL2+i9BlgE2q 4WknxxJ/qHMS2uNpVIACnxFIDMPhzSRjp7Wj1AKEpjxhs21Fbd4pZOpPOYnVWye0S390 iI1kdeFzKYC5SyWctU06LnC3fY4vz3E3Wcgy+w/0ovF4F66EsvPV7Xg8aaXOZPpcqQPS xSlrqBGBfrcM9LiY5qnot+KsHP9lbKozb/xVW+uHkMXFXazJNPu57k9Yl6YD0ecDW8hy ZmlxA2GOatea3r3cMyyBz7qMR+kjmImKOOq7oWXgk+HtsTCd1HRPpB3zYzNHYL1g/jnV 1xgQ== Sender: bitcoindev@googlegroups.com X-Forwarded-Encrypted: i=1; AJvYcCVGEDcO3L+3NTzlgZeDWQaJG2mzaLhxs98vtlp35xpS6iNpjUR57IyTpqpplHq01yarAbMAQmIZ5Du2@gnusha.org X-Gm-Message-State: AOJu0YxJwIqsa/CJ6WVq5AAnDl0NRJTbOEH1j+Ra5pFw/CVtjZCCG0DH TDTmmSfue9TPkZd09WCKk+Wag0p8jWyekH0VhFYjJ0wYWNUHuaOK X-Google-Smtp-Source: AGHT+IGlhkkK1STxh9+ApL9SnvHFS4dn2NrWQmOB7sGqwxmMJ5HfnobfgK3lavHTOc3BEmPI+hxdqg== X-Received: by 2002:a05:6902:310b:b0:e33:1096:f2e1 with SMTP id 3f1490d57ef6-e395b936b9bmr12603200276.40.1732987298498; Sat, 30 Nov 2024 09:21:38 -0800 (PST) X-BeenThere: bitcoindev@googlegroups.com Received: by 2002:a25:d04a:0:b0:e38:94e3:87e with SMTP id 3f1490d57ef6-e3970dccfa5ls480808276.0.-pod-prod-07-us; Sat, 30 Nov 2024 09:21:35 -0800 (PST) X-Received: by 2002:a05:690c:6e0c:b0:6ee:b83b:88ff with SMTP id 00721157ae682-6ef37231546mr187193887b3.24.1732987295489; Sat, 30 Nov 2024 09:21:35 -0800 (PST) Received: by 2002:a05:690c:6184:b0:6dd:f386:13dc with SMTP id 00721157ae682-6ef3678b4a4ms7b3; Sat, 30 Nov 2024 09:19:09 -0800 (PST) X-Received: by 2002:a05:690c:6208:b0:6ef:7640:e18a with SMTP id 00721157ae682-6ef7640e549mr16975177b3.31.1732987148646; Sat, 30 Nov 2024 09:19:08 -0800 (PST) Date: Sat, 30 Nov 2024 09:19:08 -0800 (PST) From: Erik Aronesty To: Bitcoin Development Mailing List Message-Id: <65f9c15a-c2cb-4831-a3dd-00bbbfb465e8n@googlegroups.com> In-Reply-To: <30440182-3d70-48c5-a01d-fad3c1e8048en@googlegroups.com> References: <30440182-3d70-48c5-a01d-fad3c1e8048en@googlegroups.com> Subject: =?UTF-8?Q?=5Bbitcoindev=5D_Re=3A_Un=2DFE=E2=80=99d_Covenants=3A_Char=2Dting_a_ne?= =?UTF-8?Q?w_path_to_Emulated_Covenants_via_BitVM_Integrity_Checks?= MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="----=_Part_293622_781025926.1732987148316" X-Original-Sender: earonesty@gmail.com Precedence: list Mailing-list: list bitcoindev@googlegroups.com; contact bitcoindev+owners@googlegroups.com List-ID: X-Google-Group-Id: 786775582512 List-Post: , List-Help: , List-Archive: , List-Unsubscribe: , X-Spam-Score: -0.5 (/) ------=_Part_293622_781025926.1732987148316 Content-Type: multipart/alternative; boundary="----=_Part_293623_1027010153.1732987148316" ------=_Part_293623_1027010153.1732987148316 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable like all other "incentive-driven honesty" proposals, it only works if the= =20 value locked in the bonds is greater than thevalue locked in the=20 covenants. but that's a reasonable restriction for many "l2" use cases,= =20 where the purpose of l2 is to enable low-valued "vtxo's" that allow an=20 emulated self custody of small amounts that would otherwise be too=20 expensive to move on-chain some analysis of the relationship between the bond lock value and the=20 maximum "incentive-safe" covenant value, and the fees the oracles are paid= =20 vs the loss of liquidy needs to be done in order to drive the incentives=20 home both for would-be oracles and would-be users. this is unlikely, for example, to be valueable for any vault-ing use case,= =20 but should be possible to enable ark2, enigma-network and other protocols= =20 designed to falicitate small-value-transactions-at-scale =20 On Tuesday, November 26, 2024 at 7:21:03=E2=80=AFPM UTC-8 jeremy wrote: Esteemed Bitcoin Developers, Sharing below an approach to implementing Bitcoin covenants without=20 requiring native protocol changes. The approach uses covenant emulators=20 signing servers. Unlike approaches to date for covenant emulation, the oracle signers put up= =20 bonds to BitVM auditors subject to a BITVM style fraud proof, whereby their= =20 funds can be stolen if the emulator oracle ever signs a transaction in=20 violation of the covenant rules. you can find the paper here:=20 https://rubin.io/bitcoin/2024/11/26/unfed-covenants/ Regards, Jeremy --=20 You received this message because you are subscribed to the Google Groups "= Bitcoin Development Mailing List" group. To unsubscribe from this group and stop receiving emails from it, send an e= mail to bitcoindev+unsubscribe@googlegroups.com. To view this discussion visit https://groups.google.com/d/msgid/bitcoindev/= 65f9c15a-c2cb-4831-a3dd-00bbbfb465e8n%40googlegroups.com. ------=_Part_293623_1027010153.1732987148316 Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable like all other "incentive-driven honesty" proposals, it only works if the v= alue locked in the bonds is greater than thevalue locked in the covenants.= =C2=A0 =C2=A0but that's a reasonable restriction for many "l2" use cases, w= here the purpose of l2 is to enable low-valued "vtxo's"=C2=A0 that allow an= emulated self custody of small amounts that would otherwise be too expensi= ve to move on-chain

some analysis of the relationship between the= bond lock value and the maximum "incentive-safe"=C2=A0 covenant value, and= the fees the oracles are paid vs the loss of liquidy needs to be done in o= rder to drive the incentives home both for would-be oracles and would-be us= ers.

this is unlikely, for example, to be valuea= ble for any vault-ing use case, but should be possible to enable ark2, enig= ma-network and other protocols designed to falicitate small-value-transacti= ons-at-scale=C2=A0=C2=A0

On Tuesday= , November 26, 2024 at 7:21:03=E2=80=AFPM UTC-8 jeremy wrote:
Esteemed Bitcoin Developers,

Sharing below an approach to implementing Bitcoin covenants wit= hout requiring native protocol changes. The approach uses covenant emulator= s signing servers.

Unlike approaches t= o date for covenant emulation, the oracle signers put up bonds to BitVM aud= itors subject to a BITVM style fraud proof, whereby their funds can be stol= en if the emulator oracle ever signs a transaction in violation of the cove= nant rules.

you can find the paper here: = https://rubin.io/bitcoin/2024/11/26/unfed-covenants/

Regards,

Jeremy

--
You received this message because you are subscribed to the Google Groups &= quot;Bitcoin Development Mailing List" group.
To unsubscribe from this group and stop receiving emails from it, send an e= mail to bitcoind= ev+unsubscribe@googlegroups.com.
To view this discussion visit https://groups.google.com/d/msgid/bitcoind= ev/65f9c15a-c2cb-4831-a3dd-00bbbfb465e8n%40googlegroups.com.
------=_Part_293623_1027010153.1732987148316-- ------=_Part_293622_781025926.1732987148316--