Fingerprinting nodes via addr requests

This post explores a privacy vulnerability in Bitcoin’s P2P layer, where analyzing ADDR message responses can reveal nodes operating across multiple networks. We present attack findings, discuss implications, and outline possible mitigations.

Life is short, Bitcoin is forever (the talk)

What would happen to your coins if you were to die in the next three hours? Would they be lost forever? Would your relatives be able to recover them? Descriptors, timelocks, taproot. 0% custodians.