Bitcoin Explainers

Visual guides and interactive explanations to help you understand Bitcoin concepts through carefully crafted slides and diagrams.

Explore Topics (16)

CPFP Child Pays For Parent introduction
12 slides

CPFP - Child Pays For Parent

Understanding how child transactions can accelerate parent transactions through higher fees

TransactionsIntermediate
#cpfp#fees#mempool
BIP-158 Compact Block Filters introduction
10 slides

BIP-158: Compact Block Filters

Understanding Bitcoin's compact block filters for lightweight client privacy and efficiency

BIPsAdvanced
#bip-158#compact-filters#privacy
CISA Cross-Input Signature Aggregation introduction
12 slides

CISA: Cross-Input Signature Aggregation

Understanding how CISA can improve Bitcoin transaction efficiency and privacy through signature aggregation

CryptographyAdvanced
#cisa#signature-aggregation#efficiency
Commit-delay-reveal protocol introduction
20 slides

Commit-Delay-Reveal Protocol

Understanding commitment schemes and reveal protocols in cryptographic systems

CryptographyAdvanced
#commit-reveal#cryptography#protocols
Common input ownership heuristic introduction
18 slides

Common Input Ownership Heuristic

Understanding how blockchain analysis uses input clustering to trace Bitcoin transactions

PrivacyIntermediate
#privacy#blockchain-analysis#heuristics
Steal-burn dilemma introduction
14 slides

Steal-Burn Dilemma

Understanding the economic security dilemma in cryptocurrency systems

SecurityAdvanced
#security#economics#game-theory
Lamport signatures introduction
16 slides

Lamport Signatures

Understanding one-time quantum-resistant digital signature schemes

CryptographyAdvanced
#lamport#signatures#quantum-resistant
Quantum computing introduction
15 slides

Quantum Computer Threats

Understanding how quantum computing poses threats to current cryptographic systems

SecurityAdvanced
#quantum-computing#cryptography#threats
SPHINCS+ post-quantum signatures introduction
10 slides

SPHINCS+

Understanding the SPHINCS+ post-quantum digital signature scheme

CryptographyAdvanced
#sphincs#post-quantum#signatures
Long and short range attacks introduction
19 slides

Long & Short Range Attacks

Understanding long-range and short-range attacks on blockchain networks

SecurityAdvanced
#attacks#consensus#security
Wormhole attack introduction with A to E node diagram
4 slides

Wormhole Attack

How two colluding nodes in the Lightning Network can steal routing fees by bypassing intermediate nodes using the HTLC pre-image

Lightning NetworkIntermediate
#lightning#htlc#routing
CoinJoin introduction slide
4 slides

CoinJoin

How CoinJoin combines multiple Bitcoin transactions into one to enhance privacy by obscuring the link between inputs and outputs

PrivacyBeginner
#coinjoin#privacy#mixing
Full node introduction
5 slides

Full Node

What a Bitcoin full node is, why it matters, and how it enforces the rules of the Bitcoin network without trusting anyone

Bitcoin BasicsBeginner
#full-node#validation#consensus
SHA256 overview
9 slides

SHA256 Message Schedule

A deep dive into the SHA256 message schedule — how the 16 input words are expanded into 64 words used in the compression function

CryptographyAdvanced
#sha256#hashing#cryptography
SHA256 padding introduction
6 slides

SHA256 Padding

How SHA256 pads messages to a multiple of 512 bits before hashing, including the length encoding

CryptographyAdvanced
#sha256#hashing#cryptography
Transaction pinning introduction
4 slides

Transaction Pinning

How transaction pinning attacks exploit mempool rules to prevent fee bumping, and why this matters for Lightning Network security

SecurityAdvanced
#tx-pinning#mempool#lightning