Transcript
1
00:00:50,489 --> 00:00:53,419
Jameson, welcome to the
Bitcoin Infinity Show.
2
00:00:53,429 --> 00:00:54,249
Thank you for joining us.
3
00:00:54,709 --> 00:00:55,319
Great to be here.
4
00:00:56,289 --> 00:00:56,609
Yeah.
5
00:00:56,649 --> 00:00:57,149
Welcome.
6
00:00:57,319 --> 00:01:04,179
Um, we just saw a panel about, uh, Bitcoin
security, um, moderated by Luke and, uh,
7
00:01:04,199 --> 00:01:06,209
with you and two, two other guys there.
8
00:01:06,309 --> 00:01:11,059
And I was sitting there listening
to it, trying to, uh, my, my
9
00:01:11,059 --> 00:01:12,929
inner Bitcoiner was screaming.
10
00:01:13,399 --> 00:01:13,589
Yeah.
11
00:01:13,859 --> 00:01:15,809
It's just information for fuck's sake.
12
00:01:15,849 --> 00:01:18,739
Like you're, you can't
really own these things.
13
00:01:18,769 --> 00:01:19,959
They're, they're information.
14
00:01:20,289 --> 00:01:26,799
So, uh, But, what's your take on,
like, what do people misunderstand
15
00:01:26,809 --> 00:01:28,179
about Bitcoin the most?
16
00:01:28,964 --> 00:01:35,394
Oh dear, uh, you know, this is a tough
one because, um, you know, Bitcoin
17
00:01:35,404 --> 00:01:37,264
is kind of like a mirror, right?
18
00:01:37,294 --> 00:01:42,704
It's like you, you, you gaze upon
Bitcoin and it tends to reflect back
19
00:01:42,734 --> 00:01:49,354
upon you what your own biases and skills
and personal life and perspective are.
20
00:01:49,574 --> 00:01:52,264
So, you know, it varies from
person to person, right?
21
00:01:52,334 --> 00:01:53,314
If, if you're.
22
00:01:53,819 --> 00:01:58,159
More on the, like, Austrian
economics side, then you're gonna
23
00:01:58,169 --> 00:02:00,159
see more of the economics stuff.
24
00:02:00,179 --> 00:02:04,839
If you're a computer scientist like
me, you're gonna see a neat protocol
25
00:02:04,879 --> 00:02:10,089
and data store and decentralized
peer to peer network that you
26
00:02:10,089 --> 00:02:11,409
can do all kinds of stuff with.
27
00:02:11,841 --> 00:02:16,311
So it, you know, it really
comes down to each person.
28
00:02:16,311 --> 00:02:19,251
Uh, I would say though, we're at the
point now where, you know, Bitcoin
29
00:02:19,251 --> 00:02:22,271
is so mainstream that most people
only look at it as an investment.
30
00:02:22,281 --> 00:02:27,111
So I think that the average person
misses out on a lot of the cypherpunk
31
00:02:27,161 --> 00:02:32,091
ideals, the history of the struggles
that led us to where we are today.
32
00:02:32,131 --> 00:02:37,131
And to most people, they probably think
that Bitcoin just appeared out of thin
33
00:02:37,131 --> 00:02:40,751
air and it's this, you know, magic
internet money that will make you rich.
34
00:02:41,539 --> 00:02:44,919
This is one of the biggest challenges,
I think, to bridge these worlds
35
00:02:44,949 --> 00:02:48,819
between the computer nerds and
the Austrian economics nerds.
36
00:02:49,089 --> 00:02:52,029
Because the computer nerds need
to tell the Austrian economics
37
00:02:52,029 --> 00:02:54,349
nerds how the thing actually works.
38
00:02:54,549 --> 00:02:59,489
But the Austrian economics nerds need
to tell the computer nerds why money
39
00:02:59,529 --> 00:03:03,029
has a very important function and
other shit doesn't in the same way.
40
00:03:03,029 --> 00:03:07,499
And why, why we need to, why we should
view this thing in a certain way.
41
00:03:08,034 --> 00:03:13,144
Uh, to, to understand the, uh, economic
incentives that drive people's behavior.
42
00:03:14,299 --> 00:03:16,249
And so how do we bridge the two worlds?
43
00:03:16,978 --> 00:03:20,568
Well, this is why I think that the
most important thing that we can do to
44
00:03:20,578 --> 00:03:22,938
help Bitcoin is to talk about Bitcoin.
45
00:03:23,228 --> 00:03:29,888
Uh, you know, we, if, so I view
Bitcoin as an open source project.
46
00:03:30,268 --> 00:03:34,838
This is like one of the initial reasons
why I got so interested in it so long ago.
47
00:03:35,288 --> 00:03:41,258
was not because I knew anything about
money, uh, but rather that I thought
48
00:03:41,288 --> 00:03:46,338
it was a fascinating idea to take
this concept of money, which for
49
00:03:46,478 --> 00:03:50,758
many generations now has been, you
know, controlled by small elitist
50
00:03:50,768 --> 00:03:56,378
groups, and instead open it to the
world as a collaborative project.
51
00:03:56,388 --> 00:04:02,188
You know, the idea around open source
being that The more people that you have
52
00:04:02,198 --> 00:04:07,558
looking at a problem and trying to find
a solution, the more likely it is that
53
00:04:07,578 --> 00:04:10,798
because you're attacking it from so many
different perspectives, it's just going
54
00:04:10,798 --> 00:04:13,638
to end up being more robust, you know.
55
00:04:13,638 --> 00:04:17,688
It's, uh, it is various,
innumerous, you know, strength.
56
00:04:17,773 --> 00:04:21,693
A strength in numbers, a strength
in diversity of perspectives and
57
00:04:21,693 --> 00:04:26,863
skill sets to be able to find the
flaws that other people may miss.
58
00:04:27,093 --> 00:04:32,813
So, talking about Bitcoin is how we
continue to improve it, how we find
59
00:04:32,813 --> 00:04:36,453
the weaknesses in it, and hopefully
continue to progress forward.
60
00:04:37,083 --> 00:04:38,043
Yeah, absolutely.
61
00:04:39,233 --> 00:04:43,973
This was one of the interesting
things you said on stage.
62
00:04:43,973 --> 00:04:49,833
It's about like how Casa has, uh, So for
those of you that don't know, you were
63
00:04:49,853 --> 00:04:51,908
the co founder of Casa, a bitcoin company.
64
00:04:52,148 --> 00:04:52,458
Uh,
65
00:04:52,593 --> 00:04:53,283
Oh, yeah, I forgot to
66
00:04:53,528 --> 00:04:55,318
yeah, yeah, we forgot to
introduce, everyone knows
67
00:04:55,403 --> 00:04:56,093
introduction
68
00:04:56,108 --> 00:04:58,258
yeah, yeah, it goes
straight into the action.
69
00:04:58,578 --> 00:05:03,368
So, Casa, I may or may not have
called you a shitcoin apologist
70
00:05:03,368 --> 00:05:06,728
in Prague, and you answered that,
well, Casa was never a bitcoin
71
00:05:06,728 --> 00:05:08,618
company, it's a key storage company.
72
00:05:08,868 --> 00:05:12,351
And that is something you alluded
to on stage here, that, what Casa is
73
00:05:12,351 --> 00:05:16,721
doing is not really a financial thing,
it's, it's, uh, it's just helping
74
00:05:16,721 --> 00:05:19,131
people store this valuable information.
75
00:05:19,656 --> 00:05:22,446
So, can you go deeper into that than
76
00:05:23,406 --> 00:05:25,726
so I mean, it's, it's about
self sovereignty, right?
77
00:05:25,726 --> 00:05:31,166
It's like our really long term
mission and hope for Casa is that
78
00:05:31,166 --> 00:05:35,396
we will help people to be able to
secure a variety of different things.
79
00:05:36,301 --> 00:05:37,951
Non monetary things.
80
00:05:38,481 --> 00:05:44,261
The idea being that fundamentally,
cryptography is this incredibly powerful
81
00:05:44,261 --> 00:05:49,931
tool for the individual because it gives
you this asymmetric defensive capability.
82
00:05:50,301 --> 00:05:56,061
It's just, you know, the power of large
numbers that makes it, um, orders of
83
00:05:56,061 --> 00:06:01,261
magnitude more costly for someone to
attack than for you to defend against.
84
00:06:01,271 --> 00:06:06,841
And so Uh, you know, we, from from
that perspective, I think, uh, the,
85
00:06:07,031 --> 00:06:12,271
the crypto, the, the cryptography
space has been progressing a bit slower
86
00:06:12,271 --> 00:06:17,211
than we would like, but, you know,
we, we do hope that things like, you
87
00:06:17,211 --> 00:06:20,811
know, even identity, and you could,
you can make an argument Nostr is,
88
00:06:20,911 --> 00:06:23,171
is one, uh, potential path forward.
89
00:06:23,171 --> 00:06:26,321
There's a number of different, you know,
decentralized identity projects out there.
90
00:06:26,641 --> 00:06:29,311
Um, but we expect that, you know,
identity is going to be a key
91
00:06:29,311 --> 00:06:31,201
part of that because reputation.
92
00:06:31,541 --> 00:06:36,751
It's a key part of just the economy
of doing business with people.
93
00:06:36,781 --> 00:06:42,241
So, you know, how do you solve the
problem of having true peer to peer
94
00:06:42,511 --> 00:06:46,691
commerce if you don't have some sort
of reputation system, preferably
95
00:06:46,691 --> 00:06:48,671
a standard reputation system?
96
00:06:48,671 --> 00:06:52,096
And how do you have a reputation
system if you don't An identity system
97
00:06:52,096 --> 00:06:53,386
that you can attach reputation to.
98
00:06:53,386 --> 00:06:56,766
So there's a lot of different
moving pieces here, but just many
99
00:06:56,766 --> 00:07:01,396
different aspects of our lives that
we believe can be vastly improved
100
00:07:01,446 --> 00:07:03,446
with the use of applied cryptography.
101
00:07:04,076 --> 00:07:04,616
absolutely.
102
00:07:04,666 --> 00:07:08,556
And, uh, is multisig possible on Nostr?
103
00:07:08,816 --> 00:07:10,256
Excuse the ignorance, but,
104
00:07:10,572 --> 00:07:16,633
Uh, not, I'm not aware of
any true multisig system.
105
00:07:16,643 --> 00:07:19,693
There may be someone
working on a NIP for that,
106
00:07:19,723 --> 00:07:25,953
but I think the closest that I've seen
is some sort of account delegation.
107
00:07:26,393 --> 00:07:27,963
Nips, where you can, like, you can
108
00:07:27,963 --> 00:07:33,163
have a master key, and then you
can, you give, uh, a subkey that
109
00:07:33,173 --> 00:07:37,903
has, like, an expiration on it, um,
but it's, it's not quite perfect.
110
00:07:37,913 --> 00:07:40,253
Otherwise, you might be able
to do some sort of, you know,
111
00:07:40,293 --> 00:07:42,173
Shamir secret sharing, but
112
00:07:42,778 --> 00:07:48,588
Okay, so that's, that's my, uh, uh,
mission for all you 180 IQ, uh, uh,
113
00:07:49,048 --> 00:07:52,268
computer geeks that don't, don't
understand economics yet because
114
00:07:52,268 --> 00:07:57,548
you're too young, like go work on that
multi sig Nostr BIP or NIP instead of,
115
00:07:57,743 --> 00:07:57,983
Yes.
116
00:07:57,983 --> 00:07:58,283
Nips.
117
00:07:58,283 --> 00:07:59,603
NIPS is so much better than bips.
118
00:07:59,758 --> 00:08:04,098
Yeah, so go work on a NIP instead
of creating shitcoins and all that
119
00:08:04,223 --> 00:08:09,143
Yeah, and I think, you know, multisig
is important, of course, for security,
120
00:08:09,153 --> 00:08:13,873
but Especially in the case of Nostr
and identity, I think the ability to
121
00:08:13,883 --> 00:08:16,253
have key rotation is very important.
122
00:08:16,903 --> 00:08:17,360
So, you
123
00:08:17,360 --> 00:08:20,593
know, you don't want there to be a
single point of failure in your identity.
124
00:08:21,093 --> 00:08:25,773
You also don't want your identity to be
permanently attached to just one static
125
00:08:25,773 --> 00:08:27,793
set of keys, because things can go wrong.
126
00:08:28,278 --> 00:08:31,038
No, because, uh, for instance,
you might have a company and that
127
00:08:31,038 --> 00:08:33,188
company might have, uh, an account.
128
00:08:33,643 --> 00:08:36,823
Uh, that you want to, if you sell
the company, you want to give this,
129
00:08:36,873 --> 00:08:40,163
the access to someone else, and
that's, that's always, I know how
130
00:08:40,173 --> 00:08:44,953
hard that can be, uh, with legacy
accounts, like, uh, it's a tough thing.
131
00:08:46,283 --> 00:08:46,463
yeah.
132
00:08:46,463 --> 00:08:50,063
The, the, the key rotation thing,
actually, this definitely is, is
133
00:08:50,118 --> 00:08:53,633
a, a major thing that needs to be
solved for, I think Nora to work.
134
00:08:53,783 --> 00:08:57,353
But I, I also wonder, is this something in
the, in the Bitcoin space generally, let's
135
00:08:57,353 --> 00:08:58,793
just generalize this whole thing out.
136
00:08:58,973 --> 00:09:00,923
Like what if one key gets compromised?
137
00:09:00,923 --> 00:09:02,033
How can you actually.
138
00:09:02,268 --> 00:09:05,428
Say, what is the next key
to be the private key?
139
00:09:05,428 --> 00:09:05,998
Something like that.
140
00:09:05,998 --> 00:09:08,068
And how can you do this
in a, in a secure way?
141
00:09:08,398 --> 00:09:11,628
Uh, is that, is this something you've,
you've thought about or have any,
142
00:09:11,638 --> 00:09:13,338
any, uh, thoughts on, on this one?
143
00:09:14,071 --> 00:09:17,241
I mean, the only thing that really makes
sense to me is you have multiple keys and
144
00:09:17,241 --> 00:09:19,581
you have a threshold that is signing off.
145
00:09:19,771 --> 00:09:23,171
To say, you know, this key, for
whatever reason, we're no longer
146
00:09:23,171 --> 00:09:26,721
going to be using, you know, it's
been compromised, lost, whatever.
147
00:09:27,851 --> 00:09:31,951
Yeah, and I mean, the complexity there
turns into that if you have any sort of
148
00:09:31,961 --> 00:09:36,421
system that's based on public private
key cryptography, you really have to
149
00:09:36,541 --> 00:09:41,521
secure your private key, basically,
because any of the, uh, sort of trade
150
00:09:41,521 --> 00:09:46,231
offs, I suppose, that, I mean, that
doesn't sound, uh, very good, right?
151
00:09:46,241 --> 00:09:50,471
Like, uh, at least not, it's not a system
that works in any kind of automated way.
152
00:09:50,841 --> 00:09:55,241
Uh, you really, it gets back to the root
of the conversation we were having before.
153
00:09:55,241 --> 00:09:57,996
It's, it's, security is in Your hands.
154
00:09:58,376 --> 00:10:03,296
And so what, what do you see as,
cause with, with Casa and everything
155
00:10:03,296 --> 00:10:05,976
else that you're involved with, what,
what do you see as being the big
156
00:10:06,046 --> 00:10:10,696
pain points for individuals right now
in the Bitcoin space for security?
157
00:10:11,805 --> 00:10:17,895
It's, I think, an overwhelming
concept for most people.
158
00:10:17,955 --> 00:10:24,495
Um, the root of this is actually
just in how we have architected our
159
00:10:24,495 --> 00:10:27,075
society over the past millennia.
160
00:10:27,485 --> 00:10:36,165
Um, we have greatly improved our
Efficiency and productivity through
161
00:10:36,165 --> 00:10:39,015
specialization of tasks and skills.
162
00:10:39,305 --> 00:10:44,265
And so, this is great for the
individual in the sense that you
163
00:10:44,295 --> 00:10:48,725
can spend many years training to be
very good at one thing and then get
164
00:10:48,725 --> 00:10:50,995
paid very well to do that one thing.
165
00:10:51,325 --> 00:10:55,325
And the result is that you get paid
well enough that you can then pay
166
00:10:55,325 --> 00:10:58,915
many other people to do whatever
their specialized tasks are.
167
00:10:58,915 --> 00:11:03,895
So, now We don't have to worry about
growing our own food, for example.
168
00:11:04,445 --> 00:11:06,755
That was something that took
up a lot of people's time for
169
00:11:06,765 --> 00:11:08,185
most of human civilization.
170
00:11:08,595 --> 00:11:13,525
Um, so, it's great for efficiency
and productivity, but the downside
171
00:11:13,545 --> 00:11:17,505
is that it introduces a great deal
of fragility and systemic risk.
172
00:11:17,535 --> 00:11:19,395
And, and, you know, what
does that really mean?
173
00:11:19,395 --> 00:11:24,875
Well, it means you're now outsourcing
wide swaths of your life, things
174
00:11:24,875 --> 00:11:27,880
that you're literally dependent
upon for survival, you know?
175
00:11:28,300 --> 00:11:30,420
Um, to trusted third parties.
176
00:11:30,630 --> 00:11:35,460
So, for example, uh, if the supply
chains break down, if your grocery
177
00:11:35,460 --> 00:11:40,740
store shelves get emptied out, uh,
you're gonna have a really tough time,
178
00:11:40,750 --> 00:11:42,390
you know, getting past that hurdle.
179
00:11:42,790 --> 00:11:47,665
And so, I think, you know, we, we see
some of that, uh, mindset happening
180
00:11:47,665 --> 00:11:51,980
in the Bitcoin space where people are
taking this, you know, idea of self
181
00:11:51,980 --> 00:11:59,080
sovereignty and, uh, self sufficiency
Back to its roots to say, okay, now
182
00:11:59,110 --> 00:12:04,670
Bitcoin has done so well for me and I've
imbued a sense of personal responsibility
183
00:12:04,670 --> 00:12:06,600
for the financial aspects of my life.
184
00:12:06,600 --> 00:12:11,940
Why don't I apply that to other aspects
of my life so that I and my family and
185
00:12:11,940 --> 00:12:14,590
more resilient against black swans?
186
00:12:15,465 --> 00:12:20,575
Well, here, here's the devil's advocate
argument against, against doomsday
187
00:12:20,575 --> 00:12:24,525
prepping, I guess, not, not exactly
against what you said, but, like, if
188
00:12:24,525 --> 00:12:29,200
you have, Instead of doomsday prepping,
instead of stacking water and whatever,
189
00:12:29,520 --> 00:12:33,030
well water is kind of essential, it's
stacking toilet paper, let's say.
190
00:12:33,490 --> 00:12:38,340
Uh, if you stack bitcoin instead,
you can trade that for all the
191
00:12:38,340 --> 00:12:40,010
other shit that other people stack.
192
00:12:40,330 --> 00:12:45,650
So, uh, there's an argument to be made
for the bitcoin being more important.
193
00:12:45,710 --> 00:12:50,110
And that's an argument I made
before on a panel that, like,
194
00:12:50,290 --> 00:12:52,375
about KYC and why it matters.
195
00:12:53,145 --> 00:12:57,195
And someone asked me if there are
any good reasons for KYC, and I
196
00:12:57,195 --> 00:13:02,345
simply said no, because I don't
understand what it's good for.
197
00:13:02,345 --> 00:13:06,125
Like, money was invented to
enable trade between people
198
00:13:06,125 --> 00:13:09,075
who didn't know one another, so
that's the whole point of money.
199
00:13:09,615 --> 00:13:13,715
And, uh, which is why I think,
sure, buy bitcoins on an exchange
200
00:13:13,715 --> 00:13:17,245
if you want to, but keep that stack
separated from bitcoins you earn.
201
00:13:17,525 --> 00:13:20,215
And this is something you said on
stage two, like, you earn your bitcoin.
202
00:13:20,465 --> 00:13:20,705
Like.
203
00:13:21,350 --> 00:13:22,770
Accept them for your goods and services.
204
00:13:22,770 --> 00:13:26,390
And this is what I say to everyone
always, that that's the proper way.
205
00:13:26,610 --> 00:13:29,300
That's how you keep, that's
how you get a non KYC stack.
206
00:13:29,300 --> 00:13:34,380
So if you need to flee the, uh, people's
Republic of Europe in the future and fuck
207
00:13:34,380 --> 00:13:38,740
off to El Salvador, you can, they can
take your fucking toothpaste and you can
208
00:13:38,740 --> 00:13:40,890
keep your 12 words and, and just do that.
209
00:13:40,910 --> 00:13:41,970
And part of my French.
210
00:13:42,030 --> 00:13:46,240
yeah, I mean, this is true both at the
individual and corporate level, um,
211
00:13:46,240 --> 00:13:51,060
you know, we, we have our own corporate
treasury at Casa, we have accepted Bitcoin
212
00:13:51,080 --> 00:13:57,080
from day one, um, and we've also been
debanked several times, and thankfully
213
00:13:57,080 --> 00:14:01,210
we've always been able to find other bank
accounts, but in the sort of worst case
214
00:14:01,220 --> 00:14:06,350
scenario, Hopefully we can start paying
at least some, uh, of our providers,
215
00:14:06,350 --> 00:14:08,560
employees, whatever, uh, in Bitcoin.
216
00:14:08,570 --> 00:14:11,330
You know, we have that, that
separate, you know, sovereign
217
00:14:11,330 --> 00:14:12,760
runway that we can tap into.
218
00:14:13,250 --> 00:14:13,410
Yeah.
219
00:14:13,430 --> 00:14:18,820
I think this, this is the dilemma
this generation lives, we're going
220
00:14:18,820 --> 00:14:20,290
through this transition right now.
221
00:14:21,045 --> 00:14:22,995
Where we need one foot in each world.
222
00:14:23,025 --> 00:14:26,635
We need a foot in the old fiat world,
because if we don't have any foot there,
223
00:14:26,635 --> 00:14:28,305
they'll probably come after you somehow.
224
00:14:28,545 --> 00:14:31,145
And we need a foot in the
bitcoin world just to be secure.
225
00:14:32,435 --> 00:14:34,905
But there's this balancing act
all the time, and everyone's
226
00:14:34,915 --> 00:14:35,975
situation is different.
227
00:14:36,465 --> 00:14:37,935
But you definitely need both.
228
00:14:38,005 --> 00:14:43,935
And KYC Bitcoin, or paper Bitcoin
if you will, is the legacy world.
229
00:14:43,965 --> 00:14:46,525
The new world is doing it for real.
230
00:14:47,484 --> 00:14:51,594
Yeah, and I mean, I think one of the
difficulties here, and we heard about
231
00:14:51,594 --> 00:14:56,984
this in the previous discussion, this
kind of lever, I suppose, between
232
00:14:57,514 --> 00:15:03,634
regulations that force KYC, but it
also gets people in to use these
233
00:15:03,634 --> 00:15:06,004
services, like people do use KYC.
234
00:15:06,159 --> 00:15:11,949
Centralized exchanges vastly more
than hold their own UTXOs who, or
235
00:15:11,949 --> 00:15:14,749
even, or even just come in through a
lightning wallet or something like this.
236
00:15:14,819 --> 00:15:19,229
And so, I mean, KYC really just seems like
this, this necessary evil at this point.
237
00:15:19,949 --> 00:15:24,419
But, avoiding it is kind of
the, uh, the idea that, uh,
238
00:15:24,659 --> 00:15:26,199
really is the, the de risker.
239
00:15:26,339 --> 00:15:28,489
It, it's the only thing
that, that takes away.
240
00:15:28,864 --> 00:15:33,494
All of the possibility of someone
coming after you with KYC, and so I
241
00:15:33,494 --> 00:15:39,114
mean, what are your thoughts on that
point generally, like, what is the,
242
00:15:39,384 --> 00:15:42,424
uh, is this really a binary thing,
243
00:15:42,697 --> 00:15:44,897
So I think the big problem
is that, you know, we're not
244
00:15:44,897 --> 00:15:46,107
on the Bitcoin standard yet.
245
00:15:46,217 --> 00:15:50,657
Uh, it's true both in my personal
life and the business life is
246
00:15:50,677 --> 00:15:56,857
that a lot of providers that
we pay don't accept Bitcoin.
247
00:15:57,037 --> 00:16:03,447
And, uh, we're not going to try to
force them to accept Bitcoin, um, but
248
00:16:04,042 --> 00:16:06,362
Hopefully this will change over time.
249
00:16:06,572 --> 00:16:11,842
Um, as it, as it stands right now,
though, uh, we still, we're using
250
00:16:11,842 --> 00:16:13,782
the dollar as our unit of account.
251
00:16:13,822 --> 00:16:18,862
And, uh, uh, I mean, we
don't spend our Bitcoin.
252
00:16:18,942 --> 00:16:23,262
Um, it is, it's really, it's
the emergency savings account.
253
00:16:23,412 --> 00:16:26,572
It's how we look at it, you know, both
at the corporate level and that's how
254
00:16:26,572 --> 00:16:27,642
I look at it at the personal level,
255
00:16:28,927 --> 00:16:33,407
how, um, how is there
a KYC process for Casa?
256
00:16:33,984 --> 00:16:35,164
Not for our clients.
257
00:16:35,234 --> 00:16:35,802
for your clients?
258
00:16:35,919 --> 00:16:35,939
No.
259
00:18:05,118 --> 00:18:06,638
so, um, what do you do?
260
00:18:06,868 --> 00:18:09,428
Explain, give the TLDR on how Casa works,
261
00:18:09,623 --> 00:18:10,173
right.
262
00:18:10,253 --> 00:18:15,973
Uh, so, you know, because We
are a software wallet provider,
263
00:18:15,993 --> 00:18:19,373
but that, I would say, is not
our most valuable service.
264
00:18:19,383 --> 00:18:23,033
Really, uh, I think it makes
the most sense to think of us as
265
00:18:23,043 --> 00:18:25,423
a security consulting service.
266
00:18:25,453 --> 00:18:29,113
That's where our kind of
unique value proposition lies.
267
00:18:29,393 --> 00:18:31,193
And that's more at our higher tiers.
268
00:18:31,323 --> 00:18:34,503
Like, that's why our more expensive
plans are more expensive, is because
269
00:18:34,503 --> 00:18:38,343
what you're doing is you're paying for a
personal advisor that you can literally,
270
00:18:38,413 --> 00:18:41,833
you know, get on a call with and talk
about whatever you want to talk about.
271
00:18:42,283 --> 00:18:44,923
Um, so, you know, what do we do?
272
00:18:45,083 --> 00:18:50,773
Uh, well, we do provide, you know, native
mobile apps, and these are really designed
273
00:18:50,853 --> 00:18:59,363
to guide you in as simple a fashion as
possible down the path of building what
274
00:18:59,363 --> 00:19:05,073
we believe is a incredibly strong and
robust architecture for self custody.
275
00:19:05,373 --> 00:19:09,943
The short version is of how we think
about architecting it is the goal is
276
00:19:09,943 --> 00:19:11,723
to eliminate single points of failure.
277
00:19:12,728 --> 00:19:16,588
So that basically means whenever you
have a moving part, you know, something
278
00:19:16,588 --> 00:19:20,628
that could go wrong, there needs
to be some sort of backup mechanism
279
00:19:20,628 --> 00:19:25,508
so that when and if that thing
fails, you can use something else.
280
00:19:25,518 --> 00:19:29,048
So that's why the main
aspect of it is multisig.
281
00:19:29,598 --> 00:19:31,478
Which basically means multiple keys.
282
00:19:31,758 --> 00:19:37,848
So, most of our users are either in
a 2 of 3 setup or a 3 of 5 setup.
283
00:19:38,288 --> 00:19:43,398
And these keys are going to be
distributed in a number of different ways.
284
00:19:43,778 --> 00:19:48,428
Um, usually you'll have one
that is stored, um, actually
285
00:19:48,428 --> 00:19:49,818
on the mobile phone itself.
286
00:19:49,818 --> 00:19:52,608
You know, secured with the
secure element and whatever.
287
00:19:52,973 --> 00:19:59,443
The operating system on that device,
uh, supports, um, and the, the nice
288
00:19:59,443 --> 00:20:02,893
thing about that key, even though it
is weaker, it is a hot key, it's on an
289
00:20:02,903 --> 00:20:08,393
internet connected device, uh, that gives
you, uh, additional level of resiliency
290
00:20:08,443 --> 00:20:13,483
against loss, because that key gets
automatically encrypted and backed up.
291
00:20:14,043 --> 00:20:20,003
Uh, so it, it's almost impossible to
lose your mobile key, uh, in that setup.
292
00:20:20,013 --> 00:20:24,158
Not completely impossible, but Uh,
very, very difficult unless you start
293
00:20:24,158 --> 00:20:27,888
mucking around under the hood, you
know, in your cloud, uh, backups.
294
00:20:28,468 --> 00:20:33,218
Uh, so then, you know, you're
going to have either one or three
295
00:20:33,328 --> 00:20:37,688
other keys, and those are going to
be on dedicated hardware devices.
296
00:20:37,708 --> 00:20:42,098
We support, um, you know,
Ledger, Trezor, Coldcard.
297
00:20:42,443 --> 00:20:47,983
Um, Passport, several others, really the
most popular ones that are well vetted.
298
00:20:48,333 --> 00:20:52,913
And the idea being there that
you actually use a diversity
299
00:20:52,913 --> 00:20:54,323
of different manufacturers.
300
00:20:54,613 --> 00:20:58,693
And this is to protect you against
edge cases like supply chain risk.
301
00:20:58,733 --> 00:21:03,653
Which has happened from time to
time, and uh, we expect will probably
302
00:21:03,653 --> 00:21:07,263
happen More frequently in the future
if, you know, the space continues
303
00:21:07,563 --> 00:21:10,243
getting bigger and, uh, worth more.
304
00:21:10,243 --> 00:21:11,673
So, um,
305
00:21:12,418 --> 00:21:15,198
I don't know if we're necessarily
going to get exploding hardware
306
00:21:15,198 --> 00:21:16,248
wallets anytime soon though.
307
00:21:16,578 --> 00:21:19,208
Well, keep key sort of exploded.
308
00:21:20,378 --> 00:21:23,838
I was meaning literally,
but, uh, sorry, continue.
309
00:21:24,293 --> 00:21:29,053
But so then, uh, the idea is
that you physically distribute
310
00:21:29,093 --> 00:21:31,233
these keys geographically.
311
00:21:31,423 --> 00:21:35,733
And, you know, that gives you an
additional level of protection against
312
00:21:35,743 --> 00:21:43,773
both physical attackers and against, uh,
just extreme Edge cases, house burning
313
00:21:43,773 --> 00:21:46,433
down, natural disasters, whatever.
314
00:21:46,723 --> 00:21:50,113
Um, and, and this is where
things get complicated.
315
00:21:50,143 --> 00:21:53,253
And, you know, to be clear, you know,
multi signature setup has more moving
316
00:21:53,253 --> 00:21:54,943
pieces than a single signature setup.
317
00:21:55,253 --> 00:21:59,333
So, uh, going into multi sig
doesn't automatically make
318
00:21:59,333 --> 00:22:00,743
you safer than single sig.
319
00:22:00,763 --> 00:22:04,513
It's only if you go down the right
path of architecting your multi
320
00:22:04,513 --> 00:22:05,873
sig and distributing the keys.
321
00:22:06,243 --> 00:22:09,923
So, um, you know, that's why I think
the consulting aspect of this is fairly
322
00:22:09,923 --> 00:22:13,053
important because you can still shoot
yourself in the foot and, you know,
323
00:22:13,083 --> 00:22:16,543
put all three of your multi sig devices
in your house, for example, and you
324
00:22:16,543 --> 00:22:18,123
create a single point of failure.
325
00:22:18,543 --> 00:22:26,203
So, um, yeah, the, the idea is that
you have a great deal of flexibility
326
00:22:26,363 --> 00:22:29,863
and decisions that you can make
and how you distribute those keys.
327
00:22:29,873 --> 00:22:34,553
So you can distribute them amongst
semi trusted friends and family.
328
00:22:35,893 --> 00:22:39,763
At the extreme end, we have
people who are most concerned
329
00:22:39,763 --> 00:22:41,473
about nation state resistance.
330
00:22:41,523 --> 00:22:46,023
So if you really want to Then you
can make, you know, pretty much all
331
00:22:46,023 --> 00:22:49,863
of these decisions are trade offs
between convenience, uh, and security.
332
00:22:50,183 --> 00:22:54,653
And so the extreme end of security, with
very, very low convenience, is that we
333
00:22:54,653 --> 00:22:59,553
have some clients who literally distribute
their keys in different countries, you
334
00:22:59,553 --> 00:23:03,648
know, preferably different countries
Aren't on very good terms with each other.
335
00:23:04,008 --> 00:23:07,608
Uh, so you, you, you essentially have
that, uh, jurisdictional arbitrage.
336
00:23:07,878 --> 00:23:10,818
But of course the downside is,
uh, you know, some of our clients
337
00:23:11,028 --> 00:23:14,718
literally have to get on a plane or
a boat or, or what have you, uh, in
338
00:23:14,718 --> 00:23:18,738
order to reach a sufficient quorum
of their keys, uh, to sign with them.
339
00:23:19,088 --> 00:23:22,908
And then finally, uh, the
last key is, uh, Casa.
340
00:23:23,238 --> 00:23:27,398
Emergency recovery key that's
held offline, incredibly
341
00:23:27,458 --> 00:23:29,578
difficult to get access to.
342
00:23:29,578 --> 00:23:34,468
You basically have to request a
signature from CASA and then depending
343
00:23:34,468 --> 00:23:38,708
upon what your tier is, you have
different levels of authentication.
344
00:23:38,708 --> 00:23:42,508
At our higher level tiers, we can do
some extreme customization of what
345
00:23:42,508 --> 00:23:44,518
your authentication parameters are.
346
00:23:44,928 --> 00:23:48,478
And does this involve calling a
very special phone number and asking
347
00:23:48,478 --> 00:23:50,178
for a very special vacuum cleaner?
348
00:23:51,658 --> 00:23:58,518
you know, we, we, we can in fact set up,
uh, For example, instructions of like,
349
00:23:58,528 --> 00:24:04,248
you know, if you request a key, then we
call or reach out to some other contact.
350
00:24:04,558 --> 00:24:10,078
Um, you know, we also have, um, on the
higher tiers, uh, emergency lockdown,
351
00:24:10,258 --> 00:24:15,948
uh, mechanisms where Um, you can specify
ahead of time what actions we should
352
00:24:15,958 --> 00:24:19,158
take if you hit the big red button
to do an emergency lockdown on your
353
00:24:20,445 --> 00:24:27,805
Yeah, well, so, and on a practical level,
the main thing here is that in a 2 or 3
354
00:24:27,815 --> 00:24:32,035
setup, if I'm counting correctly, this
means it's one physical key, one mobile
355
00:24:32,035 --> 00:24:33,985
key, and one emergency key, right?
356
00:24:34,045 --> 00:24:38,605
Yeah, we also support two physical keys if
you want that, because there is a little
357
00:24:38,635 --> 00:24:43,405
bit of trust, like, if you don't want to
trust that Casa isn't, you know, stealing
358
00:24:43,405 --> 00:24:44,885
the mobile key out of the app, then
359
00:24:44,885 --> 00:24:46,855
you can use two hardware devices.
360
00:24:46,995 --> 00:24:50,350
Like I said, the downside there
is that you More responsibility,
361
00:24:50,710 --> 00:24:53,470
uh, falls onto your shoulders to
make sure you have good backups.
362
00:24:53,785 --> 00:24:56,505
So to clarify that, that's
still a three out of five
363
00:24:56,995 --> 00:24:59,175
multisig, but you own two keys.
364
00:24:59,810 --> 00:25:00,980
And Cass Owens too.
365
00:25:01,130 --> 00:25:03,030
uh, well that was the two of three.
366
00:25:03,320 --> 00:25:04,510
The two of three setup.
367
00:25:04,650 --> 00:25:07,780
Okay, okay, so, alright,
I'm already lost here.
368
00:25:08,015 --> 00:25:11,695
So you can do a 2 or 3 with, uh,
would you take out the mobile app, or
369
00:25:11,695 --> 00:25:13,325
would you take out the emergency key?
370
00:25:13,400 --> 00:25:14,040
the mobile app.
371
00:25:14,360 --> 00:25:16,050
Yeah, there's always the emergency key.
372
00:25:16,140 --> 00:25:16,740
Alright, alright.
373
00:25:16,865 --> 00:25:16,975
yeah.
374
00:25:17,735 --> 00:25:18,715
I didn't know about that, actually.
375
00:25:18,715 --> 00:25:19,505
That's an interesting one.
376
00:25:19,505 --> 00:25:22,625
And then I guess the 305
is a whole other level.
377
00:25:22,625 --> 00:25:24,375
Yeah, we'll just keep Knut
378
00:25:24,400 --> 00:25:27,260
But it's, it's, yeah, yeah, you're
the organized one and all that.
379
00:25:27,260 --> 00:25:33,060
But like, what I'm seeing is like, uh,
uh, is this a setup, uh, a three out
380
00:25:33,060 --> 00:25:37,900
of five where, where Casa owns two of
the keys and, uh, you own two of them.
381
00:25:38,360 --> 00:25:40,030
Like, or is that,
382
00:25:40,560 --> 00:25:42,700
It depends on what you think of as own.
383
00:25:42,700 --> 00:25:44,030
Uh, if you're, if you're
384
00:25:44,050 --> 00:25:44,250
being
385
00:25:44,260 --> 00:25:46,190
yeah, You can't really own a key at all.
386
00:25:46,280 --> 00:25:47,920
It's all you can do is memorize it.
387
00:25:47,920 --> 00:25:48,170
So,
388
00:25:48,340 --> 00:25:54,345
uh, well from, from Casa's perspective,
we don't have We don't touch your mobile
389
00:25:54,345 --> 00:25:58,635
key, you know, like, it stays on your
device, uh, the encrypted, the way the
390
00:25:58,635 --> 00:26:05,995
encrypted backup works is that, um, a, an
encryption key is generated on your device
391
00:26:05,995 --> 00:26:08,925
that encrypts your mobile key seed phrase.
392
00:26:09,305 --> 00:26:13,965
The encrypted blob then gets stored
onto your cloud storage, so even if
393
00:26:13,965 --> 00:26:17,955
your cloud storage gets compromised
by Apple or Google, they can't do
394
00:26:17,955 --> 00:26:19,615
anything with it because it's encrypted.
395
00:26:20,015 --> 00:26:25,935
The decryption key then gets sent to
Casa and secured by an HSM that Casa
396
00:26:25,955 --> 00:26:30,965
controls, so it's kind of like a two
of two setup, so, you know, if you lose
397
00:26:30,965 --> 00:26:35,670
your phone, if you get a new phone, What
happens is you have to log into your
398
00:26:35,670 --> 00:26:40,750
Casa app and have to log into your cloud
account and then what it does is it pulls
399
00:26:40,770 --> 00:26:46,160
both of those, the encrypted blob and
the decryption key together onto your
400
00:26:46,160 --> 00:26:47,820
device to be able to reconstitute it.
401
00:26:49,585 --> 00:26:53,955
So it semi literally is that
your phone is another hardware
402
00:26:53,955 --> 00:26:55,105
wallet with a fancy screen.
403
00:26:55,265 --> 00:26:55,575
Semi
404
00:26:55,780 --> 00:26:59,550
Yeah, yeah, yeah, it uses the hardware,
the secure element that's built into
405
00:26:59,550 --> 00:27:04,180
your smartphone and like, that's
another Another one of our major theses,
406
00:27:04,240 --> 00:27:10,320
uh, you know, going forward is, um,
that secure elements on phones are
407
00:27:10,340 --> 00:27:16,050
going to make, you know, application
of cryptography more practical.
408
00:27:16,680 --> 00:27:21,780
Um, this is something where, you
know, when, um, when smartphones
409
00:27:21,810 --> 00:27:27,785
came out, And they made, uh, GPS
available to the average person.
410
00:27:27,825 --> 00:27:31,005
You know, that's when a lot of apps
like ride sharing actually became
411
00:27:31,165 --> 00:27:35,565
practical and a whole new sort of
economy, uh, bloomed from that.
412
00:27:35,845 --> 00:27:41,315
And we think that the proliferation
of secure elements on smartphones
413
00:27:41,375 --> 00:27:46,045
is gonna enable, uh, another sort
of blossoming of new applications.
414
00:27:46,340 --> 00:27:50,950
Okay, let's take a, like, a little
dip into this particular rabbit hole.
415
00:27:50,950 --> 00:27:53,840
What is a secure element
and why are they prolifer
416
00:27:55,389 --> 00:28:01,569
Yeah, so, I mean, it's basically, uh,
you know, a A chip, a piece of silicon
417
00:28:01,629 --> 00:28:07,279
that is in your device that is dedicated
to really doing nothing more than
418
00:28:07,669 --> 00:28:10,089
keeping small pieces of data secure.
419
00:28:10,869 --> 00:28:16,199
Basically, keeping the data in that chip
and not allowing it to be extracted.
420
00:28:16,579 --> 00:28:20,929
And then, you know, at the sort
of application programming layer,
421
00:28:20,929 --> 00:28:23,579
you know, the operating system
can interface with that chip.
422
00:28:24,144 --> 00:28:28,584
It provides APIs to higher level
applications that can then request
423
00:28:28,614 --> 00:28:31,804
to interact with the chip, but
there's no way for them to request
424
00:28:31,814 --> 00:28:34,074
to actually extract the data.
425
00:28:34,084 --> 00:28:38,344
You can only, you know, send
requests to, uh, to actually make
426
00:28:38,354 --> 00:28:40,014
use of whatever is in that chip.
427
00:28:40,444 --> 00:28:47,374
So, um, I don't know the detailed history
of how this came about being, but I
428
00:28:47,374 --> 00:28:52,444
suspect it was probably just related
to, uh, The fact that, um, phones
429
00:28:52,674 --> 00:28:57,304
need to have some ability to do secure
operations, whether that's like the
430
00:28:57,304 --> 00:29:03,044
biometrics of unlocking the phone itself,
or, um, you know, commonly with the,
431
00:29:03,064 --> 00:29:07,114
the key rings, uh, password management
at the operating system level, they're
432
00:29:07,114 --> 00:29:08,584
going to make use of secure elements.
433
00:29:08,824 --> 00:29:12,824
So, it's just, um, you know,
it's a, you can think of it as
434
00:29:12,864 --> 00:29:17,902
a, um, hardware security device
that's just built into the phone.
435
00:29:18,612 --> 00:29:22,812
So does every phone on the market today
have a secure element or like almost
436
00:29:22,882 --> 00:29:25,772
I think some of the cheaper
Android phones do not.
437
00:29:26,222 --> 00:29:32,352
Uh, pretty much all of the iPhones
should, uh, any of the, uh, Android
438
00:29:32,352 --> 00:29:35,642
phones that are like more than a few
hundred dollars should have secure
439
00:29:35,692 --> 00:29:42,319
Yeah, so, so, Samsung, Google, what
about something like Xiaomi, isn't
440
00:29:42,319 --> 00:29:44,249
that the cheap Chinese version of
441
00:29:44,399 --> 00:29:44,659
Yeah,
442
00:29:44,659 --> 00:29:44,759
I
443
00:29:44,769 --> 00:29:48,419
don't know, off the top of my
head, I know that we have, Um
444
00:29:48,491 --> 00:29:49,454
fun staying poor.
445
00:29:49,984 --> 00:29:55,884
We have, you know, specific things that
we require to be, you know, enabled
446
00:29:55,894 --> 00:29:59,694
at the hardware and operating system
level on Android phones in order
447
00:29:59,694 --> 00:30:02,014
for the Casa app to actually run.
448
00:30:02,569 --> 00:30:06,899
Is this, uh, that you can't even
install it if your phone doesn't
449
00:30:06,899 --> 00:30:09,739
have these capabilities or you just
don't get the mobile key option?
450
00:30:11,164 --> 00:30:14,184
Uh, I think the app probably
refuses to run at all.
451
00:30:14,254 --> 00:30:17,374
Uh, it's, but it's not even an issue
that I think we've ever had come
452
00:30:17,374 --> 00:30:20,114
up because it's only really the
cheapest and cheapest of phones.
453
00:30:20,374 --> 00:30:22,814
So I think that the people that are using
those phones probably wouldn't be able
454
00:30:22,814 --> 00:30:24,424
to afford our service in the first place.
455
00:30:25,551 --> 00:30:26,461
Okay, um,
456
00:30:28,631 --> 00:30:30,521
yeah, that's what I was going
at, you executed better.
457
00:30:30,801 --> 00:30:35,091
Um, the, the, returning back
a little bit to something else
458
00:30:35,091 --> 00:30:36,161
you mentioned was backups.
459
00:30:36,461 --> 00:30:40,511
And a system like multisig generally,
but I think slightly more like
460
00:30:40,511 --> 00:30:44,151
CASA specifically, uh, one of the
features that I understand about this
461
00:30:44,161 --> 00:30:47,351
is that you don't really actually
need to backup your seed phrase.
462
00:30:47,571 --> 00:30:52,611
It's, the idea is you lose a key,
well, then you just reconstitute your
463
00:30:52,691 --> 00:30:55,474
multisig Is that, is that the solution?
464
00:30:55,504 --> 00:30:56,524
Am I, am I getting that right?
465
00:30:57,280 --> 00:31:01,430
Yeah, so part of it is due to the
nature of the automatic backups, right?
466
00:31:01,430 --> 00:31:03,990
So if you're using the mobile key,
that's automatically backed up.
467
00:31:04,010 --> 00:31:07,360
The CASA key, of course, has
multiple redundant backups.
468
00:31:07,640 --> 00:31:11,200
And so then the question is, what's
the state of your other keys?
469
00:31:11,470 --> 00:31:16,860
Now, in a 3 of 5, you do probably want
to back up one of the hardware devices so
470
00:31:16,860 --> 00:31:19,905
that you have That threshold, uh, setup.
471
00:31:20,155 --> 00:31:24,495
So basically because the, uh, the
extreme edge case failure scenario in
472
00:31:24,495 --> 00:31:27,935
a 3 of 5 is like some Carrington event.
473
00:31:28,195 --> 00:31:33,095
Just wipes out all of your electronics and
wipes out all of your hardware devices.
474
00:31:33,105 --> 00:31:36,705
So if you didn't have some sort
of offline backup, then you would
475
00:31:37,335 --> 00:31:40,275
be down to two keys, which is
problematic when you need three.
476
00:31:40,455 --> 00:31:46,935
Um, so, um, you know, it's still, it's
It's always preferable, I think, to
477
00:31:46,935 --> 00:31:51,945
have backups, but this is what it comes
down to, this, you know, convenience
478
00:31:52,005 --> 00:31:57,215
trade off of what are people willing to
do, because especially creating steel
479
00:31:57,225 --> 00:32:01,155
backups can be a pain, uh, especially
if you're doing the stamping type of
480
00:32:01,165 --> 00:32:02,895
backups, I really hate doing those.
481
00:32:03,285 --> 00:32:03,695
But,
482
00:32:03,885 --> 00:32:04,875
You need a good hammer.
483
00:32:05,445 --> 00:32:11,535
the nice thing, though, about having, uh,
like, metal backups that are part of a
484
00:32:11,535 --> 00:32:17,830
multi sig wallet, So, Is that you don't
have to worry about a physical, like an
485
00:32:17,840 --> 00:32:21,780
evil maid attack, or a physical attacker
getting a hold of one of those backups.
486
00:32:21,780 --> 00:32:25,220
As long as they're geographically
distributed, because if they
487
00:32:25,220 --> 00:32:27,710
get one of your seed phrases,
they can't actually do anything.
488
00:32:28,275 --> 00:32:33,335
This is, those metal plates, uh, I think
there's around 70 companies making them.
489
00:32:33,540 --> 00:32:33,690
At
490
00:32:33,935 --> 00:32:41,255
And, and, um, uh, so, so disclaimer, we're
we're sponsored by one of them, So anyway,
491
00:32:41,615 --> 00:32:48,495
uh, the, the, the whole thing, I, I think
that paradigm is, I'm not entirely sure
492
00:32:48,495 --> 00:32:53,145
that it will be the same way in a hundred
years from now because it's such a while.
493
00:32:53,145 --> 00:32:56,325
It, it provides you with
another level of security.
494
00:32:56,325 --> 00:33:00,245
It also, it also provides you with an
extra attack vector because once you've.
495
00:33:00,715 --> 00:33:02,315
Put the seed on the plate.
496
00:33:02,325 --> 00:33:03,845
It's kind of hard to destroy the plate.
497
00:33:03,855 --> 00:33:04,745
That's the whole point.
498
00:33:04,775 --> 00:33:05,895
Like a piece of,
499
00:33:06,250 --> 00:33:07,200
about that recently.
500
00:33:07,365 --> 00:33:08,235
Oh, Oh, you did.
501
00:33:08,475 --> 00:33:08,785
Okay.
502
00:33:08,785 --> 00:33:09,615
Can you go into that?
503
00:33:09,945 --> 00:33:13,355
Like, that's a reason to
prefer a piece of paper with,
504
00:33:13,720 --> 00:33:15,430
Um, no, not necessarily.
505
00:33:15,430 --> 00:33:16,910
Not if you choose the right backup.
506
00:33:17,170 --> 00:33:21,640
Um, so the short version, the takeaway
from my presentation, because as you
507
00:33:21,640 --> 00:33:25,050
know, one of my many projects was,
like, destroying all of these metal
508
00:33:25,355 --> 00:33:25,685
Oh yeah.
509
00:33:25,685 --> 00:33:26,005
Yeah.
510
00:33:26,095 --> 00:33:26,765
Remember that?
511
00:33:26,895 --> 00:33:27,915
How robust are they?
512
00:33:28,625 --> 00:33:34,045
Um, and so, uh, recently, like in the
past year, I had a situation where
513
00:33:34,045 --> 00:33:36,395
I needed to destroy a metal backup.
514
00:33:36,515 --> 00:33:40,705
Um, because, uh, I wanted to split it.
515
00:33:40,845 --> 00:33:43,635
I wanted to split it and, you
know, seedsore it, basically,
516
00:33:43,715 --> 00:33:45,010
into multiple, uh, pieces.
517
00:33:45,170 --> 00:33:50,480
Backups, so that there was no single point
of failure, um, and what I determined
518
00:33:50,560 --> 00:33:57,350
was that, uh, that actually, like, my,
my general advice on backups, which is to
519
00:33:57,350 --> 00:34:01,990
use, like, a single steel plate with the
center punch, the, the divot mechanism,
520
00:34:02,470 --> 00:34:06,690
um, it turns out those are actually the
best, not only for creating, but also for
521
00:34:06,690 --> 00:34:12,220
destroying, because, um, I had, uh, I had
both a stamped, you know, letter stamped
522
00:34:12,240 --> 00:34:15,740
backup, and I had an etched backup.
523
00:34:16,390 --> 00:34:20,600
And when I went to destroy
them, I mean, you can't actually
524
00:34:20,600 --> 00:34:23,040
destroy the media that it's on.
525
00:34:23,290 --> 00:34:27,230
Um, you know, you'd probably have
to have like a furnace that does 5,
526
00:34:27,230 --> 00:34:30,240
000 or 10, 000 degrees or something
in order to be able to melt it.
527
00:34:30,610 --> 00:34:32,430
Uh, and, and, you know,
destroy the whole thing.
528
00:34:32,640 --> 00:34:37,140
So instead, what you end up doing
is, uh, you know, trying to overwrite
529
00:34:37,160 --> 00:34:39,510
or erase or you make it illegible.
530
00:34:39,840 --> 00:34:42,370
And so on the stamp one, I'd have
to like, you know, hit, uh, I had
531
00:34:42,370 --> 00:34:45,710
to put 50 different stamps in the
same spot so that like each letter
532
00:34:45,710 --> 00:34:48,140
was just completely, uh, illegible.
533
00:34:48,480 --> 00:34:53,610
Uh, and then, you know, with the etched
one, I had to, you know, put on my, uh,
534
00:34:54,430 --> 00:34:59,210
my ear protection and get out the Dremel
and just sit there for like an hour, back
535
00:34:59,210 --> 00:35:01,040
and forth, back and forth, back and forth.
536
00:35:01,250 --> 00:35:04,970
It was extremely unpleasant
to go through both of these.
537
00:35:05,240 --> 00:35:09,550
And then I realized, well, if you
have the grid with the straight
538
00:35:09,550 --> 00:35:13,940
punches on them, You just punch every
other, you know, part of the grid.
539
00:35:13,940 --> 00:35:17,120
It takes, like, two or three
minutes, and you're done.
540
00:35:17,190 --> 00:35:21,410
It's, it's become similarly illegible
because you can't tell the difference
541
00:35:21,420 --> 00:35:24,230
between, like, what the original divots
were and what the new divots are.
542
00:35:24,570 --> 00:35:30,980
And there's no, like, carbon 14
method of, of, of, like, figuring
543
00:35:30,980 --> 00:35:32,940
out the age of each punch, I guess.
544
00:35:33,050 --> 00:35:33,960
I doubt it.
545
00:35:34,050 --> 00:35:37,770
I mean, maybe a nation state
attacker might be able to
546
00:35:37,770 --> 00:35:39,175
do something on that level.
547
00:35:39,175 --> 00:35:40,000
But, yeah, I'm a Bitcoin
548
00:35:40,365 --> 00:35:43,735
Yeah, because it's funny that you
mentioned, well not funny, but you
549
00:35:43,735 --> 00:35:46,505
mentioned nation state attacker,
because one of the concepts in cyber
550
00:35:46,505 --> 00:35:51,235
security basically is that somebody with
unlimited resources and unlimited time
551
00:35:51,575 --> 00:35:57,105
will actually defeat you, will actually
defeat you, and so it's really about
552
00:35:57,185 --> 00:36:00,625
putting up as much, as many barriers
as possible, but also not putting up
553
00:36:01,220 --> 00:36:02,870
Being a target, not becoming a target.
554
00:36:03,140 --> 00:36:06,050
And so this is, yeah, well
maybe we'll get back to some of
555
00:36:06,050 --> 00:36:07,490
these other, uh, points here.
556
00:36:07,490 --> 00:36:09,440
But this is a whole other
rabbit hole, basically.
557
00:36:09,770 --> 00:36:14,300
The, uh, the whole thing of, of OPSEC
in, uh, in the physical security world,
558
00:36:14,300 --> 00:36:18,230
basically for, for Bitcoiners these days,
I mean, literally everyone who is a public
559
00:36:18,380 --> 00:36:23,330
bitcoiners is now a target to some degree,
as in they probably have some Bitcoin.
560
00:36:23,720 --> 00:36:25,670
Uh, now, I mean, who knows?
561
00:36:25,670 --> 00:36:28,790
Maybe, maybe, maybe Newton and I, uh,
really have zero Satoshis between the
562
00:36:28,790 --> 00:36:30,050
two of us, and we're just, I don't know.
563
00:36:30,310 --> 00:36:31,020
Of course we don't,
564
00:36:31,540 --> 00:36:34,770
And neither does Jameson, the
most famous Bitcoin privacy
565
00:36:35,035 --> 00:36:38,515
you, you, you only have a Bitcoin
test, net Bitcoin, but, uh, right.
566
00:36:38,780 --> 00:36:40,460
testnet whale.
567
00:36:40,625 --> 00:36:40,775
yeah.
568
00:36:40,775 --> 00:36:41,015
Yes.
569
00:36:41,042 --> 00:36:41,435
Very good.
570
00:36:41,435 --> 00:36:41,825
Very good.
571
00:36:41,825 --> 00:36:42,275
There you go.
572
00:36:42,395 --> 00:36:42,725
There you go.
573
00:36:42,725 --> 00:36:43,535
That's good to, yeah.
574
00:36:43,805 --> 00:36:47,195
Uh, but, but, uh, so, so the thing is,
what, what are the, what are the concerns
575
00:36:47,195 --> 00:36:51,395
about, uh, opsec basically, and what are
some of the ways that, that an individual
576
00:36:51,395 --> 00:36:55,265
can, can, uh, increase their privacy?
577
00:36:55,655 --> 00:36:56,495
Um, what is it?
578
00:36:56,495 --> 00:36:57,755
Minimize their privacy footprint.
579
00:36:57,755 --> 00:36:59,255
I'm trying to footprint something
580
00:36:59,330 --> 00:37:00,040
Oh yeah, yeah,
581
00:37:00,430 --> 00:37:00,740
yeah.
582
00:37:00,970 --> 00:37:02,150
Decrease their
583
00:37:02,415 --> 00:37:03,735
decrease your privacy
584
00:37:04,040 --> 00:37:07,790
Not your privacy, privacy footprint
is sort of an oxymoron, isn't
585
00:37:07,830 --> 00:37:08,880
It's something like that.
586
00:37:09,215 --> 00:37:10,315
Yeah, just your footprint in
587
00:37:10,315 --> 00:37:13,865
general, whether it's online or meatspace.
588
00:37:17,945 --> 00:37:22,435
The right way to approach it
is to not make the mistake that
589
00:37:22,435 --> 00:37:26,035
we've all made, which is to use
our real names and faces, uh,
590
00:37:26,045 --> 00:37:27,935
when you're talking about Bitcoin.
591
00:37:28,305 --> 00:37:31,405
Uh, so, you know, the best way to
do it is really to take the Satoshi
592
00:37:31,415 --> 00:37:35,225
method of, like, if you really want
to engage in the space, then just use
593
00:37:35,225 --> 00:37:40,520
a nym and, you know, don't reveal Uh,
personal identifiable information.
594
00:37:41,050 --> 00:37:45,820
Uh, but if you do start to reveal
aspects of yourself, then you have to
595
00:37:45,820 --> 00:37:49,780
understand that they probably can and
will be used against you at some point.
596
00:37:50,120 --> 00:37:54,950
So now you have to start thinking more
adversarially about how might it be used
597
00:37:54,950 --> 00:38:01,130
against you, and, uh, what what types
of attacks might people use against you,
598
00:38:01,130 --> 00:38:06,530
how, How difficult is it to find you
on a day to day basis when you might
599
00:38:06,890 --> 00:38:08,880
have your guard down and be vulnerable?
600
00:38:08,920 --> 00:38:13,610
Um, you know, just a couple of days
ago, the CEO of a company in Toronto
601
00:38:13,850 --> 00:38:17,630
got kidnapped in broad daylight,
probably as he was, like, leaving
602
00:38:17,640 --> 00:38:22,020
his company headquarters, um, and was
held ransom for a million dollars.
603
00:38:22,480 --> 00:38:23,430
Oh, yeah, yeah.
604
00:38:24,330 --> 00:38:25,960
There's a flip side to that coin, though.
605
00:38:26,030 --> 00:38:29,170
They can be used against you, but
they can also be used for you.
606
00:38:29,280 --> 00:38:33,300
Like, there's a point
to being public, too.
607
00:38:33,330 --> 00:38:37,035
Like, there's a security, even a
security point to it, because you have
608
00:38:37,695 --> 00:38:42,395
The more powerful friends you are,
the more protected you are by them.
609
00:38:42,465 --> 00:38:45,805
Or say if you run into
legal trouble, you have a
610
00:38:45,850 --> 00:38:48,590
Yeah, reputation, Reputation
is a form of currency,
611
00:38:48,675 --> 00:38:49,155
it is.
612
00:38:50,135 --> 00:38:52,715
And I think that's important
going into the future too.
613
00:38:52,715 --> 00:38:57,515
Like, reputational capital is like
the only, that is the second best.
614
00:38:57,535 --> 00:39:01,295
Like, there is a second best, and
it's your reputational capital, I
615
00:39:01,350 --> 00:39:01,790
Fair.
616
00:39:02,920 --> 00:39:07,950
So, are there any other practical
things that people can do other than
617
00:39:08,590 --> 00:39:10,750
trying to not use their real identity?
618
00:39:10,750 --> 00:39:14,490
Like, what if somebody has made
this mistake, like all of us?
619
00:39:15,600 --> 00:39:21,420
Uh, yeah, so If you're worried
about wrench attacks, then you
620
00:39:21,470 --> 00:39:26,640
need to look into how difficult
it is to find where you live.
621
00:39:26,950 --> 00:39:30,270
Because that's where most people
are going to get targeted.
622
00:39:30,700 --> 00:39:32,630
People tend to feel safe in their home.
623
00:39:33,280 --> 00:39:36,700
And so then, if it's easy to
find where you live, and this is
624
00:39:36,700 --> 00:39:41,160
going to vary depending on if you
own publicly registered property
625
00:39:41,170 --> 00:39:45,820
versus renting, it's going to vary
from jurisdiction to jurisdiction
626
00:39:45,830 --> 00:39:50,280
depending upon the laws there, like,
don't live in Sweden, for example.
627
00:39:50,805 --> 00:39:53,145
I took that security measure.
628
00:39:53,215 --> 00:39:53,565
Yeah.
629
00:39:54,380 --> 00:39:57,660
because they require you to publish
everything, is my understanding.
630
00:39:57,670 --> 00:40:03,650
And so Um, you know, if, if you're going
to choose to live in a place where you
631
00:40:03,650 --> 00:40:08,210
can't have privacy, then hopefully you
can have stronger physical security.
632
00:40:08,660 --> 00:40:15,880
Um, but I think a lot of people in
this space have not properly prepared
633
00:40:15,880 --> 00:40:19,980
their physical security commensurate
to their risk profile, especially
634
00:40:20,050 --> 00:40:21,850
those of us who are higher profile.
635
00:40:22,030 --> 00:40:27,740
Like, Look, Michael Saylor, he
has a correct level of security.
636
00:40:27,820 --> 00:40:34,130
I have seen it with my own eyes, but I
think a lot of other of us who aren't
637
00:40:34,130 --> 00:40:39,370
quite at that level do not have the right
level of security, and that's why I think
638
00:40:39,370 --> 00:40:43,540
that we're going to keep seeing these
physical attacks happening and actually
639
00:40:43,540 --> 00:40:45,760
accelerate along with the exchange rates.
640
00:40:46,230 --> 00:40:51,560
Because, this is the nature of security,
you know, as, as the, the value of
641
00:40:51,600 --> 00:40:55,380
targets continues to increase, then
it's going to attract more attention
642
00:40:55,380 --> 00:40:59,560
from the criminal element who are going
to want to test the waters and figure
643
00:40:59,560 --> 00:41:04,450
out what is the return on investment
of, uh, trying out these new attacks.
644
00:41:05,075 --> 00:41:05,315
Yeah.
645
00:41:05,865 --> 00:41:07,285
So two things there.
646
00:41:07,305 --> 00:41:12,455
First of all, inflation fixes the,
the, uh, uh, 5 wrench attack because
647
00:41:12,455 --> 00:41:14,315
no one can afford a 5 wrench anymore.
648
00:41:14,715 --> 00:41:18,045
Uh, but the other thing that I want to
double click on is the Sweden thing.
649
00:41:18,545 --> 00:41:22,835
Uh, the whole thing that lead led
up to that you having to reveal
650
00:41:22,945 --> 00:41:26,305
basically everything in Sweden is
something called Offentlighetsprincipen
651
00:41:26,615 --> 00:41:28,425
which is like comes from.
652
00:41:29,320 --> 00:41:32,210
The fact that the country
hasn't been at war for like
653
00:41:32,220 --> 00:41:34,340
300 years, officially at least.
654
00:41:35,610 --> 00:41:42,135
And so this has led to an extremely
high trust in institution, but also In
655
00:41:42,135 --> 00:41:47,975
the institutions trusting the people
to a large extent, so the whole point
656
00:41:47,985 --> 00:41:51,915
of that law is to make everything
transparent, including all the government
657
00:41:51,925 --> 00:41:54,095
stuff, which is the good part about it.
658
00:41:54,465 --> 00:41:59,325
What they leave out is like,
in the internet age, it's super
659
00:41:59,325 --> 00:42:03,465
dangerous, because all the data is
there, you can see exactly how much
660
00:42:03,515 --> 00:42:04,965
people own and where they live.
661
00:42:05,410 --> 00:42:09,130
And you can, and now when
crime rates are skyrocketing in
662
00:42:09,130 --> 00:42:11,270
Sweden, it's, it's extra bad.
663
00:42:11,280 --> 00:42:15,000
And there, there are some cases
of, of, of people having been
664
00:42:15,000 --> 00:42:16,760
attacked and it's been quite nasty.
665
00:42:17,260 --> 00:42:20,920
So, uh, it's not a recommended practice.
666
00:42:21,253 --> 00:42:26,738
Yeah, so unfortunately, like, you have
to get adversarial and, uh, Preferably,
667
00:42:26,738 --> 00:42:32,668
you know, find someone like a private
investigator, someone who is, uh, used
668
00:42:32,668 --> 00:42:37,788
to tracking people down for a living and
figure out like how hard is it to track
669
00:42:37,798 --> 00:42:42,738
you down because if someone, I would
say in the United States, for example,
670
00:42:42,748 --> 00:42:46,928
you can track most people down for 50
bucks and that's just due to the level
671
00:42:46,938 --> 00:42:51,378
of corporate surveillance that happens
in America, uh, with data brokers, uh,
672
00:42:51,738 --> 00:42:56,178
Uh, you know, you, you pay 50 bucks
to any of these data brokers and you
673
00:42:56,178 --> 00:43:00,958
can find almost anybody who is like
living a default American lifestyle.
674
00:43:02,703 --> 00:43:03,403
That was scary.
675
00:43:03,483 --> 00:43:08,143
Is there anything that can be done
on the Bitcoin layer to solve this?
676
00:43:08,503 --> 00:43:14,973
Anything that would minimize the effects
of one of these 5 wrench attacks?
677
00:43:16,168 --> 00:43:23,148
Well, yes, uh, though, uh, some people
get a little bit confused because I think
678
00:43:23,148 --> 00:43:25,878
they conflate two separate problems.
679
00:43:26,208 --> 00:43:29,878
There is the problem of
securing your Bitcoin.
680
00:43:30,318 --> 00:43:32,168
And then there's the problem
of securing your Bitcoin.
681
00:43:32,418 --> 00:43:33,498
Your physical body.
682
00:43:34,298 --> 00:43:38,468
Uh, so, um, you know, this is one
of the big pushbacks that I get, uh,
683
00:43:38,478 --> 00:43:42,398
when I, I talk to people like about
multisig and about Casa and they're
684
00:43:42,418 --> 00:43:46,928
like, well, but they can, even if I
have my keys geographically distributed,
685
00:43:46,938 --> 00:43:50,858
you know, they can torture me or,
uh, they can take my child hostage
686
00:43:50,868 --> 00:43:54,218
and hold them ransom and, and then I
have to go around and I'm like, yes.
687
00:43:54,608 --> 00:43:55,948
Like we, we cannot.
688
00:43:56,523 --> 00:43:59,063
We can't protect you against
the single point of failure
689
00:43:59,063 --> 00:44:00,943
that is our physical forms.
690
00:44:01,033 --> 00:44:04,313
Maybe in a hundred years we'll
be able to have, you know, some
691
00:44:04,323 --> 00:44:07,168
sort of Transhumanism stuff,
692
00:44:07,278 --> 00:44:11,908
yeah, but as of today, yeah, single
point of failure in your body, and
693
00:44:11,908 --> 00:44:17,708
so that is a very different type of
security that has, you know, different
694
00:44:17,708 --> 00:44:22,148
solutions that you should put into place
in addition to securing your bitcoin.
695
00:44:22,958 --> 00:44:25,528
So, you know, the short version
is how do you protect against
696
00:44:25,568 --> 00:44:27,148
a five dollar wrench attack?
697
00:44:27,188 --> 00:44:32,378
Well, the only way to do that,
when you're focused on your Bitcoin
698
00:44:32,388 --> 00:44:36,378
security, is to understand that your
body is a single point of failure.
699
00:44:36,848 --> 00:44:43,063
And so, if you can be coerced,
into sending your bitcoin because
700
00:44:43,063 --> 00:44:46,903
you're being tortured or whatever,
then that's going to happen.
701
00:44:47,383 --> 00:44:51,923
Uh, so, that's why it's important,
if you want to be protected against
702
00:44:51,923 --> 00:44:55,873
this, is to put your keys, like,
sufficiently far enough away and in
703
00:44:55,873 --> 00:44:59,983
different physical security setups
that it's just not feasible for an
704
00:45:00,043 --> 00:45:02,023
attacker to coerce you into doing that.
705
00:45:02,333 --> 00:45:06,593
Because they would literally have to take
you hostage and keep you for a long time.
706
00:45:06,593 --> 00:45:08,813
And like attackers don't
want to have to do that.
707
00:45:08,813 --> 00:45:09,823
They want to be in and out as
708
00:45:09,903 --> 00:45:13,093
No, no, taking you hostage and
then putting you on a plane and
709
00:45:13,093 --> 00:45:14,673
sitting next to you is kind of hard.
710
00:45:14,863 --> 00:45:19,403
We're having to get through like security
to get into a safety deposit box at a
711
00:45:19,403 --> 00:45:24,293
bank or some sort of other high security
institution where you might keep one key.
712
00:45:24,573 --> 00:45:32,433
Um, but yeah, so the, the flip side of
that, of course, is that, um, if it's,
713
00:45:32,493 --> 00:45:37,453
if it's a loved one who has been taken
hostage, then, uh, you are perfectly
714
00:45:37,453 --> 00:45:41,533
capable of going around and doing those
things, and so that's why, you know,
715
00:45:41,533 --> 00:45:46,283
you need a different set of privacy
and security for your family to prevent
716
00:45:46,283 --> 00:45:47,703
this from happening in the first place.
717
00:45:47,783 --> 00:45:49,493
Or, or just don't love anyone.
718
00:45:49,493 --> 00:45:50,923
Yes.
719
00:45:51,623 --> 00:45:53,033
I definitely recommend that option.
720
00:45:55,153 --> 00:45:59,843
It's an interesting thing, and I
really wonder how this is going
721
00:45:59,843 --> 00:46:01,053
to play out into the future.
722
00:46:01,053 --> 00:46:06,613
Do you have any thoughts on this as
basically number go up towards, I don't
723
00:46:06,903 --> 00:46:10,803
know if you have a price target lately
or something, but you know, we're at
724
00:46:10,803 --> 00:46:15,193
all time high at time of recording,
literally, like it happened last night.
725
00:46:15,573 --> 00:46:19,583
So, I mean, if this thing keeps
doing what it's going to do, uh,
726
00:46:19,593 --> 00:46:22,588
do you see these risks as only
increasing as well when numbers go up?
727
00:46:23,313 --> 00:46:32,705
Yes, uh, because, it's almost like a,
a herd inoculation mindset, and, and
728
00:46:32,705 --> 00:46:39,785
what I mean by that is, As more and
more bitcoiners successfully wrench
729
00:46:39,785 --> 00:46:45,915
attacked, that teaches the criminal
element that this is a good return on
730
00:46:45,915 --> 00:46:50,295
investment, and therefore they're going
to invest more into those attacks.
731
00:46:50,675 --> 00:46:54,925
Um, I do not foresee wrench
attacks decelerating.
732
00:46:56,805 --> 00:46:59,125
Until more of them start failing.
733
00:46:59,640 --> 00:47:03,870
Including governments, they, they
are the wrench attackers, like, uh,
734
00:47:03,960 --> 00:47:07,770
and if they're successful and you're
giving up parts of your Bitcoin to
735
00:47:07,770 --> 00:47:13,920
them, then that, that tells them that
that was a, an attack worth doing.
736
00:47:14,845 --> 00:47:20,825
Yeah, so as of today, um, I
have 171 physical attacks that
737
00:47:20,975 --> 00:47:23,495
are cataloged on my project.
738
00:47:23,795 --> 00:47:26,735
There have been a lot more than that,
because I suspect actually that the
739
00:47:26,735 --> 00:47:31,715
majority of attacks never get publicized,
because the victims are too afraid to
740
00:47:31,715 --> 00:47:37,130
talk about it, and they're afraid that
talking about it will make them And there
741
00:47:37,130 --> 00:47:41,420
is a legitimate fear there, because there
have been people who have been attacked
742
00:47:41,470 --> 00:47:48,330
multiple times, but, um, you know, until
we see more failures, and we've only,
743
00:47:48,330 --> 00:47:56,360
I think, seen two successful defenses
out of that 171, um, and I think both
744
00:47:56,370 --> 00:48:00,220
of those, I think both of those were in,
no, no, one was in Florida and one was
745
00:48:00,220 --> 00:48:06,230
in California, and both of those were
because The, um, the victims had guns and
746
00:48:06,230 --> 00:48:09,020
they started shooting at the attackers.
747
00:48:09,760 --> 00:48:15,070
Um, yeah, that's not, maybe not the
most preferable scenario to end up in.
748
00:48:15,540 --> 00:48:18,380
And so, so, um, okay.
749
00:48:18,390 --> 00:48:23,760
So yeah, I've, I've written a lot
about like how, how Bitcoin Reduces the
750
00:48:23,930 --> 00:48:30,460
profitability motive of, uh, aggressive
behavior from a very certain perspective.
751
00:48:30,530 --> 00:48:35,290
And that is that, uh, you cannot
know how much bitcoins, uh, or
752
00:48:35,290 --> 00:48:39,960
how many Satoshis rather another
Bitcoin, uh, another person owns.
753
00:48:40,030 --> 00:48:41,570
And that's true for everyone on earth.
754
00:48:41,780 --> 00:48:45,270
You can make an educated guess,
but you cannot absolutely know it.
755
00:48:45,690 --> 00:48:48,450
So you can have, you can give
up parts of your Bitcoin.
756
00:48:48,450 --> 00:48:50,430
You can have dummy wallets
and stuff like that.
757
00:48:51,005 --> 00:48:57,795
But the attacker can't really prove that
he got all the bitcoins out of the, the
758
00:48:57,795 --> 00:49:00,015
victim or all the SATs outta the victim.
759
00:49:00,595 --> 00:49:05,995
So, so, uh, and from those attacks I know
of in Sweden, they've, they've attacked,
760
00:49:06,115 --> 00:49:10,585
uh, not Bitcoiners, but like crypto people
and simply pointed a gun at their heads
761
00:49:10,585 --> 00:49:13,135
and, and, and use the password for your.
762
00:49:14,620 --> 00:49:16,410
Take the coins off the exchange.
763
00:49:16,710 --> 00:49:21,210
So like the first step, like always,
like not your keys, not your coins.
764
00:49:21,250 --> 00:49:24,040
Like that, that's, that's
the, that's the easy one
765
00:49:24,170 --> 00:49:31,873
Yeah, and we've seen, um, for example,
um, there are certain types of organized
766
00:49:31,883 --> 00:49:34,693
crime that are getting into this.
767
00:49:34,713 --> 00:49:39,753
Um, and so, for example, in South America,
uh, this has happened for a while.
768
00:49:39,753 --> 00:49:45,548
There are types of organized crime
that Basically, employ women to go on
769
00:49:45,548 --> 00:49:51,178
dating apps and, you know, date the
gringos that are visiting and slip
770
00:49:51,178 --> 00:49:54,078
them drugs that make them compliant.
771
00:49:54,408 --> 00:49:58,508
And traditionally, they would
just, you know, steal all of your
772
00:49:58,518 --> 00:50:01,838
valuables that you had on you.
773
00:50:02,048 --> 00:50:08,618
But those gangs have started learning,
oh, Get him to open up his, uh, app
774
00:50:08,618 --> 00:50:12,728
on his phone, open up, look for all
of his exchange accounts and, you
775
00:50:12,728 --> 00:50:16,018
know, drain all of those exchange
accounts and, and possibly any, you
776
00:50:16,018 --> 00:50:19,438
know, single SIG hot wallets that
are on the phone while you're at it.
777
00:50:19,868 --> 00:50:25,198
Um, we've, I think we've also seen
some organized activity mostly
778
00:50:25,308 --> 00:50:30,548
in the, like, Philippines area
where it seems to be Russian.
779
00:50:30,818 --> 00:50:35,958
Mafia that is going down there
and targeting, uh, like expats.
780
00:50:36,038 --> 00:50:37,168
Uh, so,
781
00:50:37,833 --> 00:50:38,743
using girls,
782
00:50:39,237 --> 00:50:45,627
uh, no, in those cases, it seems like
they somehow just have information
783
00:50:45,637 --> 00:50:49,127
about Russians who have left the
country because they're crypto
784
00:50:49,137 --> 00:50:49,547
rich
785
00:50:49,592 --> 00:50:50,812
it's not from Russia with the
786
00:50:50,847 --> 00:50:51,247
country.
787
00:50:51,297 --> 00:50:51,587
Yeah.
788
00:50:51,587 --> 00:50:51,807
Yeah.
789
00:50:52,652 --> 00:50:53,782
the don't love anyone.
790
00:50:53,792 --> 00:50:55,192
It's still a thesis still holds.
791
00:50:55,192 --> 00:50:56,566
Yeah.
792
00:50:56,642 --> 00:50:57,542
Yeah, something like that.
793
00:52:03,906 --> 00:52:06,936
I don't want this, I don't want that to
be the actual takeaway from this episode.
794
00:52:06,936 --> 00:52:10,606
So, um, uh, maybe we can turn
this around a little bit.
795
00:52:10,606 --> 00:52:13,636
What, what are you excited
about in Bitcoin these days?
796
00:52:13,636 --> 00:52:14,886
What's making you optimistic?
797
00:52:16,996 --> 00:52:17,786
Hopefully not nothing.
798
00:52:18,791 --> 00:52:19,931
Not nothing.
799
00:52:20,011 --> 00:52:23,101
Um, I mean, you know, I'm a technologist.
800
00:52:23,111 --> 00:52:23,601
I.
801
00:52:23,901 --> 00:52:28,851
I do like that we seem to be having
more innovation happening, more
802
00:52:28,851 --> 00:52:30,501
proposals happening within Bitcoin.
803
00:52:30,501 --> 00:52:33,421
You know, there's the whole
Layer 2 explosion, which is
804
00:52:33,461 --> 00:52:35,091
a whole other rabbit hole.
805
00:52:36,291 --> 00:52:42,541
But, um, the past few years, I think,
have been pretty good for Bitcoin.
806
00:52:42,821 --> 00:52:49,231
Um, but I also see a lot of
problems, long term future problems,
807
00:52:49,231 --> 00:52:50,981
that I'm starting to talk about.
808
00:52:51,416 --> 00:52:57,106
Uh, because I think there's still a ton
of room of, for improvement, that, uh,
809
00:52:57,546 --> 00:53:02,166
I'm, I'm worried about complacency, um,
I'm worried about us resting upon our
810
00:53:02,166 --> 00:53:06,356
laurels because we have succeeded so
much, um, and of course there's many
811
00:53:06,356 --> 00:53:12,206
different issues here, um, but, you know,
the, the ETFs and the institutions and
812
00:53:12,206 --> 00:53:14,356
stuff, It's really a double edged sword.
813
00:53:14,636 --> 00:53:20,746
Great for Bitcoin price, uh, great for
getting, uh, you know, new big names
814
00:53:20,946 --> 00:53:27,011
and proponents in, um, I mean, it's
There's, you know, no small number
815
00:53:27,011 --> 00:53:31,841
of people now who are, like, direct
advisors to the next president of the
816
00:53:31,841 --> 00:53:34,621
United States that are orange pilled.
817
00:53:35,081 --> 00:53:38,331
And so, even though, you know,
I don't believe that Trump
818
00:53:38,351 --> 00:53:42,691
really understands Bitcoin, it's
not, it's not really about him.
819
00:53:42,701 --> 00:53:46,261
It's about all the people whispering
in his ear, and how that is gonna
820
00:53:46,321 --> 00:53:47,551
affect the future trajectory.
821
00:53:47,551 --> 00:53:52,266
And so that's, you know, that's good in
a sense, but But it's also bad because
822
00:53:52,266 --> 00:53:55,846
there's a lot of centralization pressure,
I think, that comes with the institutions
823
00:53:55,846 --> 00:54:02,306
and the ETFs and that can have long term
consequences to like the governance and
824
00:54:02,306 --> 00:54:07,326
and the future evolution of Bitcoin as a
protocol and as how people use Bitcoin.
825
00:54:08,166 --> 00:54:11,766
Yeah, like, what I'm going to talk
about tomorrow in my talk is, is
826
00:54:11,816 --> 00:54:16,516
we can't know that Bitcoin is going
to succeed in its current form.
827
00:54:16,746 --> 00:54:18,086
Basically, it might.
828
00:54:18,296 --> 00:54:23,466
There's people who are all like, if
Bitcoin is actually anti fragile, it's
829
00:54:23,466 --> 00:54:27,876
just going to work, but that doesn't
necessarily play out, especially if
830
00:54:27,876 --> 00:54:32,516
you actually know about the technology
and the protocols, so yeah, I certainly
831
00:54:32,516 --> 00:54:36,256
echo the vigilance side of this, yeah.
832
00:54:36,676 --> 00:54:36,946
Yeah.
833
00:54:36,946 --> 00:54:43,926
And complacency is The main villain here,
I think, like my view on this is, uh,
834
00:54:44,736 --> 00:54:48,826
like people will have to understand that
Bitcoin is not really backed by energy.
835
00:54:48,826 --> 00:54:52,056
It's backed by human action
and human incentives.
836
00:54:52,066 --> 00:54:53,686
It's not a wall of encrypted energy.
837
00:54:54,061 --> 00:54:55,911
no, it's not a wall of encrypted energy.
838
00:54:56,311 --> 00:55:02,341
Uh, there's a wall of encrypted energy
somewhere, maybe if you have a wild
839
00:55:02,341 --> 00:55:06,901
imagination, but, but that is only there
because people acted in a certain way.
840
00:55:07,381 --> 00:55:10,961
So, so, and the, I think that
these misconceptions are the
841
00:55:10,961 --> 00:55:15,301
widespread, like the, everything is
in Bitcoin is probabilistic, right?
842
00:55:15,331 --> 00:55:16,831
And, and holding a key.
843
00:55:17,146 --> 00:55:20,806
It's not owning something or even
possessing something, it's just having a,
844
00:55:21,016 --> 00:55:23,116
it's access to a string of information.
845
00:55:23,726 --> 00:55:28,626
And the reason you trust, you,
you, you, you view that as owning
846
00:55:28,626 --> 00:55:32,676
a Bitcoin, is that, you know
how, how in infinitesimally.
847
00:55:33,006 --> 00:55:34,026
Is that the word?
848
00:55:34,326 --> 00:55:35,316
Uh, small.
849
00:55:35,556 --> 00:55:39,966
The odds are that someone else owns the
same string of information, and same
850
00:55:39,966 --> 00:55:45,246
with the 21 million finite cap and all
the, the rule set and the block size.
851
00:55:45,246 --> 00:55:50,206
Even, you know that the, the odds
that this is ever going to change
852
00:55:50,236 --> 00:55:52,846
are also infinitesimally small.
853
00:55:53,266 --> 00:55:56,176
So that's why you believe in
this rule set and that's why you
854
00:55:56,176 --> 00:56:00,586
believe that this thing, uh, is
robust enough to last forever or.
855
00:56:01,701 --> 00:56:03,011
Trending towards forever.
856
00:56:03,361 --> 00:56:08,121
So, uh, so I think that there's a lot of
confusion there, uh, especially when you
857
00:56:08,121 --> 00:56:13,261
get these boomer institutions in, into
the space, like the ETFs and whatnot.
858
00:56:14,470 --> 00:56:20,690
What do you think is the biggest
upcoming issue that needs
859
00:56:20,690 --> 00:56:22,100
to be solved or dealt with?
860
00:56:22,100 --> 00:56:22,360
for listening.
861
00:56:23,255 --> 00:56:29,375
Uh, well, I'm a technologist, so for me,
it's, um, it's seeing people wanting to
862
00:56:29,375 --> 00:56:33,855
do more permissionless innovation and
it being just really difficult, right?
863
00:56:33,970 --> 00:56:35,110
Isn't that the point though?
864
00:56:36,015 --> 00:56:39,885
yeah, I mean, it's supposed to be
difficult to change Bitcoin, um, but
865
00:56:40,790 --> 00:56:46,310
For the past 10 years, we've been
talking about, oh, you know, we just
866
00:56:46,320 --> 00:56:48,200
build other layers on top of Bitcoin.
867
00:56:48,790 --> 00:56:53,770
And I think what has been missed by
a lot of people is that sometimes
868
00:56:53,770 --> 00:56:56,980
in order to build other layers,
you, you need the basic building
869
00:56:56,980 --> 00:56:58,870
blocks on the base protocol.
870
00:56:59,080 --> 00:57:00,450
That's what Segwit was.
871
00:57:00,500 --> 00:57:00,760
Yeah.
872
00:57:00,900 --> 00:57:04,310
yeah, well, you know, we enabled,
we did three different soft forks
873
00:57:04,310 --> 00:57:05,290
to enable lightning networks.
874
00:57:06,285 --> 00:57:07,785
Um, and,
875
00:57:07,830 --> 00:57:08,490
no hard fork.
876
00:57:08,675 --> 00:57:13,095
yeah, yeah, um, and, uh, so, kind of,
to get back to your question of, like,
877
00:57:13,095 --> 00:57:17,805
things that I really like, um, I'm, I'm
pretty bullish on Rusty's great script
878
00:57:17,835 --> 00:57:21,605
restoration project, I think there's a
lot of potential there, I think that could
879
00:57:21,615 --> 00:57:25,735
also boost, uh, permissionless innovation,
make it easier for people to actually
880
00:57:25,735 --> 00:57:29,345
build second layers, because you, you look
at a lot of the second layers that are
881
00:57:29,355 --> 00:57:33,295
being built right now, and they're just
making, you know, Really weird trade-offs.
882
00:57:33,415 --> 00:57:39,235
Either they're like a federation
or like fully custodial, um, or
883
00:57:39,265 --> 00:57:42,895
they're doing, they're having
to do like crazy game theory.
884
00:57:43,135 --> 00:57:46,315
I don't know if you saw the paper that
came out yesterday for how, how to enable
885
00:57:46,315 --> 00:57:48,265
covenants on Bitcoin without a soft fork.
886
00:57:48,920 --> 00:57:52,190
And essentially it has to do with
hash collisions, and having to expend
887
00:57:52,200 --> 00:57:55,790
millions of dollars worth of energy
to collide hashes together, like,
888
00:57:56,010 --> 00:57:56,280
these
889
00:57:56,310 --> 00:57:59,150
But is that really categorized
as a layer two though?
890
00:57:59,150 --> 00:58:00,340
Like, uh, Bitcoin.
891
00:58:01,145 --> 00:58:04,655
Bitcoin being used for other use
cases than the monetary use case.
892
00:58:04,715 --> 00:58:06,675
I wouldn't, I wouldn't
call that a layer 2.
893
00:58:06,725 --> 00:58:09,655
I would call that a, an offside project,
894
00:58:09,950 --> 00:58:14,970
Yeah, no, no, Covenants itself, uh, well,
that itself is not a Layer 2, but you
895
00:58:15,020 --> 00:58:19,810
could use Covenants, I think, to build
Layer 2s, though that specific type of
896
00:58:19,810 --> 00:58:24,740
Covenant I think is way too Impractical
and expensive to actually make use of,
897
00:58:25,160 --> 00:58:30,350
uh, but, uh, so, you know, look at,
I think BitVM is a very interesting
898
00:58:30,350 --> 00:58:34,190
example of this, of like, how do we
enable more generalized computation
899
00:58:34,200 --> 00:58:37,940
without changing the Bitcoin protocol,
and it, it gets really complicated.
900
00:58:38,065 --> 00:58:38,765
But why?
901
00:58:39,125 --> 00:58:40,795
Because builders want to build.
902
00:58:40,835 --> 00:58:40,895
I
903
00:58:40,905 --> 00:58:41,205
mean, that's
904
00:58:41,205 --> 00:58:43,295
but builders could build on Nostr instead.
905
00:58:43,305 --> 00:58:45,245
They've got Nostr to nerd out on now.
906
00:58:46,408 --> 00:58:46,778
Uh,
907
00:58:47,728 --> 00:58:48,848
it's two different things.
908
00:58:48,938 --> 00:58:53,458
Um, or, or, you know, one that I
like because, uh, there's actually
909
00:58:53,458 --> 00:58:57,028
several former Casa employees
working their, uh, botanics, uh,
910
00:58:57,068 --> 00:58:58,878
and their spider chain concepts.
911
00:58:59,198 --> 00:59:04,498
Uh, basically, they were trying to
figure out a, a way to, to do a,
912
00:59:04,538 --> 00:59:06,788
um, a permissionless two way peg.
913
00:59:07,338 --> 00:59:09,078
Between Bitcoin and sidechains.
914
00:59:09,448 --> 00:59:13,208
And it's a very interesting
idea that's complicated as hell.
915
00:59:13,418 --> 00:59:15,908
I did a whole write up
on it like a year ago.
916
00:59:16,198 --> 00:59:22,678
Um, and it's gonna take a lot of work
to kind of fine tune all of the economic
917
00:59:22,708 --> 00:59:24,458
and game theory parameters around it.
918
00:59:24,458 --> 00:59:28,833
Because the short version is the
spider chain is like It's almost
919
00:59:28,833 --> 00:59:30,923
like a blockchain of multisigs.
920
00:59:30,953 --> 00:59:36,753
It's like a series of connected multisigs
where you have many different people
921
00:59:36,763 --> 00:59:41,733
who are signers on different overlapping
multisigs and it's like, it's way
922
00:59:41,733 --> 00:59:43,303
too complicated to try to explain it.
923
00:59:43,608 --> 00:59:49,678
Uh, in, in a short period of time, but,
like, that's the type of gymnastics
924
00:59:49,698 --> 00:59:53,078
that developers are having to go through
in order to try to build better layer
925
00:59:53,088 --> 00:59:57,008
But what is the real world
problem that spiderchain solves?
926
00:59:57,428 --> 01:00:01,168
Uh, well, so, the, the problem is
that people want to be able to do
927
01:00:01,198 --> 01:00:03,608
decentralized finance, whatever you call
928
01:00:03,803 --> 01:00:05,213
Yeah, no, no, no, yes.
929
01:00:05,273 --> 01:00:07,433
But how is that solving
a real world problem?
930
01:00:08,161 --> 01:00:11,061
I mean, you could argue about
whether or not people need it, right?
931
01:00:11,121 --> 01:00:18,789
Uh, so, the question is, Is the,
like, decentralized finance world
932
01:00:18,819 --> 01:00:22,529
and applications that people are
doing on other networks, like
933
01:00:22,539 --> 01:00:26,589
Ethereum, Solana, whatever,
should we be able to do that in
934
01:00:26,589 --> 01:00:28,669
a more Bitcoin native fashion?
935
01:00:29,014 --> 01:00:29,404
Yes.
936
01:00:29,429 --> 01:00:33,249
So, should we be able to have pegged
sidechains with that functionality,
937
01:00:33,309 --> 01:00:34,869
but without changing Bitcoin itself?
938
01:00:35,744 --> 01:00:35,974
Yeah.
939
01:00:36,004 --> 01:00:38,244
And, uh, my answer would be no.
940
01:00:38,524 --> 01:00:39,444
But I know that,
941
01:00:39,501 --> 01:00:39,654
uh,
942
01:00:39,769 --> 01:00:40,689
is market demand
943
01:00:40,694 --> 01:00:43,924
yeah, yeah, there are differences
of opinion here and I don't decide
944
01:00:43,924 --> 01:00:45,904
and no one else decides either.
945
01:00:46,184 --> 01:00:48,994
But, but, and there might
be a market demand for it.
946
01:00:49,474 --> 01:00:54,694
Uh, I think though, the, the, the danger
in going, going down those rabbit holes
947
01:00:54,694 --> 01:00:57,774
is that Anything you do that takes away.
948
01:00:57,844 --> 01:01:04,414
So just like the gold being used
for jewelry or being used for
949
01:01:04,414 --> 01:01:08,654
industrial use cases, that sort of
chips away at gold's functionality
950
01:01:08,654 --> 01:01:10,824
as a store value or as money.
951
01:01:11,204 --> 01:01:12,744
And I think the same is true for Bitcoin.
952
01:01:12,774 --> 01:01:17,934
If you mess with incentives, you might
mess with Bitcoin's function as money.
953
01:01:18,114 --> 01:01:22,474
And Bitcoin's function as money
is so crucial to the whole system.
954
01:01:22,784 --> 01:01:26,624
That's what the whole system is built
upon, that the satoshi is worth something.
955
01:01:27,124 --> 01:01:30,424
And that anything else is, like,
the whole system is built around
956
01:01:30,674 --> 01:01:32,154
the scarcity of the satoshi.
957
01:01:32,584 --> 01:01:35,024
Not, not the function,
not the other stuff.
958
01:01:35,584 --> 01:01:39,604
So that's why I argue for all
of these things being, you
959
01:01:39,604 --> 01:01:40,814
know, red herrings at best.
960
01:01:41,329 --> 01:01:47,659
I guess, I mean, I think one counterpoint
to that would be that if you're doing,
961
01:01:47,699 --> 01:01:52,599
like, actual native pegging of satoshis
from base chain into other chains,
962
01:01:52,599 --> 01:01:54,419
then that scarcity is preserved.
963
01:01:54,949 --> 01:01:58,449
Like, the problem that I have right now
is that, you know, everybody's using
964
01:01:58,449 --> 01:02:00,699
wrapped bitcoin on these other networks.
965
01:02:00,709 --> 01:02:04,159
So they're just putting all of the
satoshis into a single custodian.
966
01:02:04,484 --> 01:02:08,744
Who could be, you know, issuing
more IOUs than they actually
967
01:02:08,944 --> 01:02:11,514
Yeah, so you're saying the
incentives are already being messed
968
01:02:11,574 --> 01:02:12,054
Oh yeah.
969
01:02:12,054 --> 01:02:12,234
yeah.
970
01:02:12,304 --> 01:02:12,484
Yeah,
971
01:02:12,484 --> 01:02:14,584
I'll, I'll take, I'll take
the devil devil's advocate.
972
01:02:14,584 --> 01:02:17,914
Point on, on this one, and, and actually
I, I kind of, sort of believe this one
973
01:02:17,914 --> 01:02:22,504
is that, is that people are going to do
these things if they want to do it, and I
974
01:02:22,504 --> 01:02:26,314
would rather that they just fuck off and
go to the other chains and, and do that.
975
01:02:26,314 --> 01:02:29,254
And so, and, and so, so I don't
actually mind the idea of a wrap
976
01:02:29,254 --> 01:02:30,634
Bitcoin or, or something else.
977
01:02:30,634 --> 01:02:34,204
If someone wants to do that and they send
their Bitcoin to some other place and then
978
01:02:34,204 --> 01:02:35,824
they go shit coin as much as they want.
979
01:02:35,944 --> 01:02:36,244
Okay.
980
01:02:36,244 --> 01:02:37,474
They're, they're free to do that.
981
01:02:37,564 --> 01:02:39,994
And I don't think, and I, I
think what the key point that.
982
01:02:40,189 --> 01:02:43,289
What I agree with is if it doesn't
change Bitcoin, if we're not doing
983
01:02:43,289 --> 01:02:47,179
anything to enable this, and it doesn't
increase the transaction volume,
984
01:02:47,389 --> 01:02:52,869
it doesn't bloat the UTXO set, it
doesn't add dickbutts onto everyone's
985
01:02:52,869 --> 01:02:55,309
nodes, then I actually don't see a
986
01:02:55,399 --> 01:02:57,049
problem is where you draw the line.
987
01:02:57,109 --> 01:03:00,379
What, what, what do you
categorize as changing Bitcoin?
988
01:03:00,589 --> 01:03:05,059
Because if the incentive structure
around it is changed, it is changed
989
01:03:05,059 --> 01:03:10,149
in a very indirect way, but, but it's
still changed, which is what I thought.
990
01:03:10,149 --> 01:03:12,729
Think we, we've seen with
the spam and stuff like
991
01:03:12,869 --> 01:03:17,339
But if somebody just has, literally,
you send A-U-T-X-O to another UTXO and
992
01:03:17,369 --> 01:03:20,579
through that you get the ability to
do your shit coining somewhere else.
993
01:03:20,579 --> 01:03:22,679
I, I don't, I don't think
there's anything there.
994
01:03:22,679 --> 01:03:23,789
Like, I'm not gonna do it.
995
01:03:24,479 --> 01:03:26,849
And I mean, there is an actual,
there is an actual thing here.
996
01:03:26,849 --> 01:03:30,089
Like for example, if someone's
using opera turn for this right?
997
01:03:30,089 --> 01:03:33,719
To, to, to have some data to,
to track what's going on here.
998
01:03:33,779 --> 01:03:34,259
Well.
999
01:03:34,559 --> 01:03:38,669
That could be filtered out by
something like the zero data template
1000
01:03:38,719 --> 01:03:41,569
that Ocean just has out now, or
Datum, or something like that.
1001
01:03:41,739 --> 01:03:44,089
That's actually, that's actually
possible, and I think that's where
1002
01:03:44,249 --> 01:03:47,489
we can have a debate, but I, I
don't actually see a problem.
1003
01:03:48,239 --> 01:03:50,599
Unfortunately, taking the
devil's advocate a little
1004
01:03:50,629 --> 01:03:50,834
hard
1005
01:03:50,834 --> 01:03:51,044
here, I, I, I,
1006
01:03:51,304 --> 01:03:54,504
of just sending one UTXO to another UTXO.
1007
01:03:54,524 --> 01:03:57,884
That, that's, people, if people
are going to do it anyway, right?
1008
01:03:58,029 --> 01:03:58,259
So.
1009
01:03:58,429 --> 01:04:03,119
the whole issue of changing Bitcoin,
I think, is a pretty touchy topic.
1010
01:04:03,149 --> 01:04:03,409
Like,
1011
01:04:04,229 --> 01:04:09,639
I, well, so I get triggered, uh,
actually, as a part of the ossification
1012
01:04:09,669 --> 01:04:13,799
debate with, you know, if we
ossify the protocol, then Bitcoin
1013
01:04:13,809 --> 01:04:15,249
doesn't change, it's gonna be safe.
1014
01:04:15,964 --> 01:04:20,494
Uh, but the problem is the rest of
the world does not ossify, and so
1015
01:04:20,494 --> 01:04:24,134
we've already seen this happening,
both in Bitcoin and with other network
1016
01:04:24,134 --> 01:04:29,664
protocols, that the protocol itself may
not change, but the nature of how people
1017
01:04:29,684 --> 01:04:33,374
interact with the protocol changes, and
so my favorite example, of course, is
1018
01:04:33,434 --> 01:04:41,584
SMTP, the email protocol, where, let's
ask ourselves, is email a success?
1019
01:04:43,114 --> 01:04:46,264
I would say no because it,
it got super centralized.
1020
01:04:47,464 --> 01:04:47,734
Yeah.
1021
01:04:47,794 --> 01:04:48,544
But see.
1022
01:04:49,014 --> 01:04:51,804
We have a very nuanced,
sophisticated view of this.
1023
01:04:51,984 --> 01:04:52,474
You ask.
1024
01:04:52,514 --> 01:04:53,624
the man on the street, and
1025
01:04:53,624 --> 01:04:54,994
they'll say, Oh, I use email every
1026
01:04:54,994 --> 01:04:55,234
day.
1027
01:04:55,234 --> 01:04:55,784
It's great.
1028
01:04:56,014 --> 01:04:57,964
They don't even know
that they're not using
1029
01:04:58,194 --> 01:04:58,974
no, no.
1030
01:04:59,134 --> 01:05:00,424
That can totally happen to
1031
01:05:00,424 --> 01:05:07,194
And TCP IP, TCP IP four that they've been
trying to upgrade to the version six.
1032
01:05:07,194 --> 01:05:11,374
Isn't that a thing also like never happens
because people are used to the old shit.
1033
01:05:11,984 --> 01:05:14,294
Yeah, no, there are arguments to be made.
1034
01:05:14,294 --> 01:05:18,144
I mean, ossification is an
interesting word because.
1035
01:05:18,869 --> 01:05:23,709
I'm for it when, when we're done
and we're done at some point.
1036
01:05:23,709 --> 01:05:27,109
I don't know when the point is and I
don't think anyone else does either.
1037
01:05:27,109 --> 01:05:31,679
And the whole point of having Bitcoin
being hard to change is that sort of
1038
01:05:31,689 --> 01:05:33,379
nature will tell us when we're done.
1039
01:05:33,819 --> 01:05:35,799
And if we fucked up, we fucked up.
1040
01:05:36,484 --> 01:05:38,904
I think it's pretty obvious that
Bitcoin is already very hard to
1041
01:05:38,904 --> 01:05:43,024
change, and it's entirely possible
that we have already ossified.
1042
01:05:43,034 --> 01:05:44,554
We won't really know for sure for a while.
1043
01:05:44,649 --> 01:05:47,779
No, and that may or may
not be a good thing.
1044
01:05:47,999 --> 01:05:52,769
It's, it's definitely going to be a
problem in what's the year, like 2094 or
1045
01:05:52,769 --> 01:05:54,609
something where it's predicted that this.
1046
01:05:54,614 --> 01:05:58,194
Yeah, the timestamp issue, though, I
really think that quantum computing
1047
01:05:58,204 --> 01:05:59,634
is going to be an issue before that.
1048
01:06:00,244 --> 01:06:01,924
Oh, the quantum computing fund.
1049
01:06:02,044 --> 01:06:02,884
Let's save this for
1050
01:06:02,884 --> 01:06:03,104
next
1051
01:06:03,124 --> 01:06:03,214
time.
1052
01:06:03,214 --> 01:06:03,999
Yes, exactly.
1053
01:06:04,029 --> 01:06:04,519
Exactly.
1054
01:06:04,654 --> 01:06:07,954
That's a let's go into compute,
uh, quantum computing next time.
1055
01:06:08,242 --> 01:06:09,004
Jameson, thank you
1056
01:06:09,224 --> 01:06:10,014
Yeah, you bet.
1057
01:06:10,774 --> 01:06:13,864
great conversation and, uh,
enjoy the rest of the conference.
1058
01:06:13,969 --> 01:06:14,959
Yeah, thanks a lot, Jameson.
1059
01:06:14,959 --> 01:06:16,479
This has been a great conversation.
1060
01:06:16,479 --> 01:06:20,419
I'll add slightly more words to the outro
than this, but yeah, really great to
1061
01:06:20,419 --> 01:06:22,439
have your perspectives on the security.
1062
01:06:22,439 --> 01:06:27,439
I don't think we've had like a security
person like quite so hard in a really long
1063
01:06:27,594 --> 01:06:29,124
Well, you are a security
person, aren't you?
1064
01:06:29,124 --> 01:06:29,394
Oh yeah, Well,
1065
01:06:29,849 --> 01:06:30,219
well we haven't,
1066
01:06:30,489 --> 01:06:33,969
not a guest, but no, but this has been
awesome, so thanks a lot for this.
1067
01:06:34,369 --> 01:06:37,349
We'd love to do it again and continue
having these deep conversations,
1068
01:06:37,349 --> 01:06:38,819
so thank you again, Jameson.
1069
01:06:39,204 --> 01:06:39,654
Anyway.
1070
01:06:39,834 --> 01:06:42,714
You want to send our
listeners like casa, I guess
1071
01:06:43,074 --> 01:06:44,924
Uh, well yeah, you can check out CASA.
1072
01:06:44,954 --> 01:06:47,774
It's C A S A dot I O.
1073
01:06:48,134 --> 01:06:50,224
Uh, check out my resources at bitcoin.
1074
01:06:50,894 --> 01:06:51,524
page.
1075
01:06:52,214 --> 01:06:52,904
Bitcoin page.
1076
01:06:53,474 --> 01:06:53,804
Alright.
1077
01:06:54,919 --> 01:06:56,429
This has been the Bitcoin Infinity Show.
1078
01:06:56,439 --> 01:06:57,269
Thank you for listening.