Bitcoin Core devs want Bitcoin governed by ‘transparent, minimal rules’
By: bitcoin ethereum news|2025/05/08 00:15:01
0
Share
This is a segment from the Supply Shock newsletter. To read full editions, subscribe. Bitcoin miners are earning more than $1.2 billion per month to secure the chain. What are they securing, exactly? At its core, the collective hash power of honest miners ensures that bad actors can’t suddenly build up and release a second, dubious chain that might usurp the current one’s claim as the longest. Together with full node operators, miners also protect the chain from non-standard transactions. But miners can only ever select transactions that full nodes (which they generally operate themselves) have already deemed to be valid. So, how do those nodes decide which transactions are valid? That’s the role of Bitcoin Core’s relay code, which enforces standardness rules that determine whether a transaction ever makes it to a miner’s mempool at all. Those standardness rules (also referred to as policy rules) secure Bitcoin in a very different way. They effectively define what Bitcoin is and isn’t, and they’re routinely up for debate. On This Day: Ordinals take Bitcoin This time around, discussion has centered on the lifting of a policy rule that capped OP_RETURN outputs at 80 bytes, limiting the amount of arbitrary information that can be posted to the network through individual transactions. Two years ago to the day, however, Bitcoin was reckoning with the sudden popularity of digital collectibles protocol Ordinals, which utilizes three other opcodes introduced under the Taproot umbrella in 2021. At the time, 425,000 transactions were sitting in the Bitcoin mempool, as represented by Jochen Hoenicke’s full node, breaking the previous record of almost 262,000 from peak bull market in December 2017. Average bitcoin transaction fees spiked to more than $31, up from $2 days earlier. Through Ordinals, files of close to 4MB (enough to fill an entire block) have been written to Bitcoin including images, videos, audio and video games without relying on OP_RETURN, thereby avoiding its 80-byte limit altogether. All this has made Bitcoin a content storage network, to some degree. Each Ordinal is, essentially, tokenized non-financial data that can be traded peer-to-peer — the type of nonsense utility that had been typically reserved for virtual machine chains like Ethereum and Solana. These days, Ordinals activity has cooled, but has its moments. Bitcoin Core developers, in lifting the 80-byte policy rule on OP_RETURN data, are hoping to reduce the incentives for further workarounds that might damage the network in unknown ways. “The change re-affirms that Bitcoin is governed by transparent, minimal rules rather than editorial preference,” Blockstream engineer Gregory Sanders wrote. “By retiring a deterrent that no longer deters, Bitcoin Core keeps the policy surface lean and lets the fee market arbitrate competing demands.” Times like these remind us that Bitcoin is not sentient, but it does evolve. For living things, it’s the biological code inside DNA that informs how they grow. On the other hand, Bitcoin’s “blind watchmaker” is the collective resolve of its active developers, even if they don’t have unanimous support for their proposed changes, as expressed through the willingness of miners, node operators and users to adopt them. Or, as Sanders put it: “Dissenting parties remain free to modify software, run stricter policy, or propose new resource limits if empirical harm emerges.” Get the news in your inbox. Explore Blockworks newsletters: Source: https://blockworks.co/news/bitcoin-op-return-ordinals-miners-chain-data
You may also like

Business Opportunities of Tokenized Stocks
In this article, we will outline the lifecycle of tokenized stocks, analyze the current market landscape, and highlight the emerging business opportunities.

In-depth research report on the Resolv protocol hacking incident, who is the final payer?
This incident reveals a fundamental weakness in Delta's stablecoin - the coupling point between the minting logic and off-chain signatures/oracles is the most vulnerable attack surface of the system. Any capital efficiency design of "1 dollar minted for 1 dollar" must be predicated on extremely rigo...

Crypto Market Sees Large Liquidations: $272 Million in Long Positions Affected
Key Takeaways In the last 24 hours, $272 million worth of contracts were liquidated across the entire crypto…

Whale Increases BTC Shorts and Bets on Crude Oil: A Strategic Crypto Move
Key Takeaways A prominent whale, known as “UnRektCapital,” has strategically escalated its short position in Bitcoin while simultaneously…

Hackers in Brazil Use Fake Google Play Store to Steal Cryptocurrency
Key Takeaways Hackers in Brazil are exploiting fake Google Play Store pages to spread Android malware. Infected devices…

Exchanging 200,000 for nearly 100 million, DeFi stablecoins face another attack
DeFi project teams cannot assume that the modules they control are necessarily secure.

The underlying business agreement of the trillion-dollar Agent economy: Understanding ERC-8183, it's not just about payments, but the future
This article systematically analyzes the technical principles and commercial value of the ERC-8183 protocol from the dimensions of technical architecture, core mechanisms, application scenarios, and ecological collaboration.

When Wall Street's ETH begins to "yield": Looking at the asset properties of Ethereum from BlackRock's ETHB
ETH is undergoing a paradigm shift from a "volatile asset" to a "yield-generating cash flow asset."

The Power of Agency: The Agentic Wallet and the Next Decade of Wallets
In 1984, Apple killed the command line with a mouse. In 2026, Agent is killing the mouse.

Understanding x402 and MPP in One Article: Two Routes for Agent Payments
x402 makes payments within the agreement, while MPP makes system-level payments.

Particle Founder: The entrepreneurial insights I have gained the most from in the past year
Stop lean startup, stop lightning entrepreneurship, and think carefully about what your product aspirations are.

Huang Renxun's latest podcast transcript: The future of Nvidia, the development of embodied intelligence and agents, the explosion of inference demand, and the public relations crisis of artificial intelligence
The competition in the future is not just about whose model is larger or whose computing power is stronger, but also about who understands the industry better, who can embed AI more deeply into real processes, and who can organize these capabilities into a runnable and scalable system.

OKX Ventures Research Report: AI Agent Economic Infrastructure Research Report (Part 1)
The existing infrastructure is hostile to the Agent economy. Agents can think and act independently at the "capability level," but at the "economic level," they are still locked into infrastructure designed for humans.

The migration of settlement rights: B18 and the institutional starting point of on-chain banks
In the traditional system, banks decide the settlement; in the on-chain system, code begins to take over this responsibility.

From Tencent and Circle: Looking at the Simple and Difficult Questions of Investment
The AI narrative continues to ferment, but the recent performance of related stocks varies, with some in the midst of summer and others as if in winter.

The second half of stablecoins no longer belongs to the crypto circle
What Coinbase doesn't want, Mastercard is eager to buy.

Cursor "Shell" Kimi Controversy Reversed: From Copyright Infringement Allegations to Authorized Collaboration, China's Open Source Model Once Again Becomes a Global AI Foundation
Cursor was accused of being based on Kimi K2.5, which sparked controversy, and was later confirmed to be compliant through Fireworks AI due diligence.

The Real Reason Tokens Don't Sell: 90% of Crypto Projects Overlook Investor Relations
Provide an Investor Relations Best Practices Guide for Crypto Projects.
Business Opportunities of Tokenized Stocks
In this article, we will outline the lifecycle of tokenized stocks, analyze the current market landscape, and highlight the emerging business opportunities.
In-depth research report on the Resolv protocol hacking incident, who is the final payer?
This incident reveals a fundamental weakness in Delta's stablecoin - the coupling point between the minting logic and off-chain signatures/oracles is the most vulnerable attack surface of the system. Any capital efficiency design of "1 dollar minted for 1 dollar" must be predicated on extremely rigo...
Crypto Market Sees Large Liquidations: $272 Million in Long Positions Affected
Key Takeaways In the last 24 hours, $272 million worth of contracts were liquidated across the entire crypto…
Whale Increases BTC Shorts and Bets on Crude Oil: A Strategic Crypto Move
Key Takeaways A prominent whale, known as “UnRektCapital,” has strategically escalated its short position in Bitcoin while simultaneously…
Hackers in Brazil Use Fake Google Play Store to Steal Cryptocurrency
Key Takeaways Hackers in Brazil are exploiting fake Google Play Store pages to spread Android malware. Infected devices…
Exchanging 200,000 for nearly 100 million, DeFi stablecoins face another attack
DeFi project teams cannot assume that the modules they control are necessarily secure.