That is an inescapable technological actuality. Cash itself is just a ledger, a file of who has what. Even bodily money is just distributing that “database” in the actual world. You now not need to test towards some central ledger to confirm something as a result of the straightforward act of handing it to you is that strategy of verification. The “entries” in that ledger are handed round disconnected from some central file. Bitcoin is just a digital database trying to copy an important property of that bodily one often known as money: not needing a database operator’s permission to spend your cash.
Think about the futility of making an attempt to cease individuals from defacing greenback payments. What number of of you will have stamped “Purchase Bitcoin” onto fiat foreign money? Defacing a banknote in the USA is a federal crime. You may spend 6 months in jail for it. Does that cease anybody?
Do you significantly assume that may very well be enforced anyplace? Do you bear in mind The place Is George? Folks would stamp an internet site on greenback payments so individuals might enter serial numbers after they obtained them and monitor the place money notes had been circulating geographically.
Artists do innate murals and collages on cashnotes. You actually can’t cease it.
Why is there a pressure of magical considering that believes that is attainable just because the database is digital?
By its very nature Bitcoin requires supporting the inclusion of arbitrary information (learn: information that it’s not possible to know or outline forward of time) with a purpose to enable customers to transact. You don’t know forward of time how a lot cash you’ll ship (the satoshi area in outputs), the place you’ll ship it (the script area), what blockheight you may want to spend it at (the nLocktime area in a transaction, or the nSequence area in a transaction enter).
With out permitting for these items of arbitrary information, it isn’t attainable for Bitcoin to exist as a system.
Metaprotocols
A Bitcoin metaprotocol is a protocol layered on prime of the bottom protocol, Bitcoin, that interprets the information and actions of the underlying protocol by way of the lens of extra guidelines that don’t exist on that base protocol.
A historic instance of this could be the Counterparty (XCP) protocol. Utilizing OP_RETURN, an opcode in Bitcoin script that merely pushes arbitrary information to the stack creating an unspendable output that may be ignored by the UTXO set, XCP embeds its personal metaprotocol messages.
These messages facilitate the issuance of recent tokens, the switch of tokens by defining how a lot is being despatched and the place, in addition to different messages that allow on-chain trustless exchanges between XCP itself and another tokens issued utilizing the protocol.
The Bitcoin protocol itself doesn’t perceive, or care, about any of those messages. They’re interpreted by additional software program run on prime of Bitcoin. It’s utterly attainable for anybody utilizing Bitcoin to craft completely invalid XCP messages and get them confirmed on-chain, however XCP software program is not going to acknowledge it as legitimate. The particular person crafting these invalid messages is just losing their very own cash creating pointless transactions.
Completely nothing can cease individuals from decoding legitimate information on Bitcoin by way of the lens of additional guidelines exterior to the Bitcoin protocol on this method.
Ordinals perform in a really related means. Customers assign a singular ‘serial quantity’ to each single satoshi that’s mined, and have created their very own accounting system to interpret the enter and output ordering in a transaction to comply with the place “particular person satoshis” are despatched in the middle of transacting.
The Bitcoin protocol itself is totally unaware of this exterior protocol, and nothing in any respect might be executed to cease customers from decoding legitimate Bitcoin transactions on this method. Anybody can interpret the information printed on the blockchain nevertheless they need, making use of no matter extra constraints they select that don’t battle with the bottom Bitcoin protocol guidelines.
Nothing stops individuals from crafting invalid or malicious metaprotocol messages, and confirming these within the blockchain, however customers working metaprotocol purchasers will merely ignore them as invalid. That is the important thing distinction between the Bitcoin protocol itself, and metaprotocols. Bitcoin consensus guidelines stop protocol invalid messages from ever being included within the blockchain, metaprotocols don’t (or relatively can’t).
Information Embedding
The distinction between the 2 metaprotocols above is that one requires embedding additional information on-chain with a purpose to perform (XCP), and the opposite doesn’t (Ordinals). So that you is likely to be assuming which you can merely stop protocols that require embedding additional information by merely stopping that information from being embedded within the first place.
Whereas it’s true that particular mechanisms of information embedding may very well be prevented by softforking that individual mechanism out of the protocol, i.e. rendering transactions that make use of that mechanism invalid, you can’t stop information from being embedded normally.
Take for example the “Inscription envelope.” That is merely a selected methodology for guaranteeing that the information embedded in a spending witness isn’t truly executed. That is executed through the use of OP_FALSE, which pushes a 0 (or False worth that can fail verification) onto the stack earlier than the OP_PUSHes that truly embed the information. This causes the script interpreter to easily skip verifying the information after the OP_FALSE. The important thing performance required is placing a 0 on the stack.
In the event you invalidate by consensus the usage of this particular script format, there are different methods to place a 0 on the stack, or to make sure the script interpreter scripts the verification and execution of subsequent chunks of scripts. Simply making an attempt to cease this particular class of information embedding, and by that I imply the usage of OP_FALSE normally, itself turns into a recreation of cat and mouse with many different choices customers can flip to.
Disabling every of them requires the deployment of a softfork, a huge coordination effort throughout the whole ecosystem, and proper after succeeding customers can trivially modify their software program to make use of one other methodology. Metaprotocols can adapt a lot quicker than Bitcoin. Thoughts you, that is solely coping with this one class of how to embed information.
Let’s entertain the hypothetical actuality the place all mechanisms utilizing OP_FALSE have been restricted (ignoring each the complication in figuring out all of them and coordinating the fork, in addition to the potential for unintentionally proscribing different use circumstances of Bitcoin), customers can merely create pretend public keys. There’s nothing within the Bitcoin protocol that verifies a public key’s a legitimate public key, it’s merely a random arbitrary string included in an output’s locking script.
Now think about a world the place Bitcoin did embrace a mechanism that pressured validation of a public key earlier than permitting cash to be despatched to it. That will clear up that downside proper?
Improper.
You may embed the information not directly utilizing the personal key. However personal keys don’t ever truly get put on-chain proper? No they don’t, however a signature nonce is. A nonce is a random worth used within the building of a cryptographic signature. That is required to guard your personal key, as a result of with out utilizing one a cryptographic signature is insecure, and may leak your personal key to an attacker. Even utilizing a poorly chosen, or weak, nonce can enable that to occur.
Folks can deliberately use a weak nonce, and really use the arbitrary information itself as a non-public key. The one means this may be prevented is a centralized authority whitelisting personal keys, i.e. utterly centralizing the power to make use of Bitcoin behind a gated authority.
These examples should not even complete, there are lots of different strategies I can consider to embed arbitrary information within the blockchain, and I’m sure many extra that I can’t.
Making an attempt to play whackamole with all of them merely wastes the time and assets of the whole ecosystem making an attempt to coordinate softforks to deal with every of them, a massively advanced and expensive effort, and on the finish of the day there are nonetheless strategies that aren’t attainable to forestall in any respect with out utterly breaking the core Bitcoin protocol itself.
Why Person Will Proceed Doing This
I’m certain loads of individuals studying this are considering “we simply have to do that a couple of instances and folks will cease making an attempt, they received’t undergo all the additional effort.” That angle is totally disconnected from actuality for a number of causes.
I would like you to consider the 2 causes that individuals would have interaction in this sort of habits within the first place. Both it’s offering actual utilitarian advantages to them, i.e. serving an actual goal of their lives that gives worth not purely rooted in hypothesis, or it’s pure hypothesis.
Let’s take a look at the primary case. There’s some significant utility worth offered, that can not be offered in another means, or at the least to not the identical extent, or identical safety ensures, and so on. Why would these customers not hold adapting their protocol to route round no matter restrictions are put in place to forestall their use case on the consensus stage?
This hypothetical protocol is an actual factor to those individuals, one thing offering some vital or helpful performance to them. All of them have an incentive to adapt the protocol to work round no matter new restrictions are added.
Now let’s take a look at the second case, it’s purely a speculative use case, i.e. NFTs or some type of collectible or token. Some of these issues are fueled by pure speculative mania, huge quantities of cash are thrown at them in a recreation of musical chairs with everybody enjoying to get out the door with revenue as a result of the mania dissipates and collapses on itself.
These items are at all times cyclical, by no means persistently maintained, and are available and go. What makes you assume that proscribing one type of creating such belongings will disincentivize individuals from making new ones? I’ll remind you at this level that the “switch of possession” with these items on Bitcoin happens by way of Ordinals. That specific metaprotocol is actually not possible to dam or stop by any means in any respect.
Nothing about proscribing particular mechanisms to embed information on-chain prevents the switch or resale of belongings beforehand created utilizing that mechanism, so nothing might be executed to forestall these belongings that already existed from being traded.
Individuals who have interaction in these actions are degenerates, they blindly chase no matter alternative they will discover for a fast buck. Do you assume stopping them from making new belongings of a sure sort will cease them? Forcing them to make use of new mechanisms will in all probability actively drive demand for these new kinds of belongings. It received’t be a disincentive, it is going to be a proactive incentive.
The brand new mechanism will grow to be fascinating to them due to the controversy worth. That is merely a dropping recreation, which as I demonstrated within the part above ends with the usage of mechanisms which are actually not attainable to forestall.
The Rational Course of Motion
It’s not possible to cease the embedding of arbitrary information normally in Bitcoin. It’s attainable to cease some particular strategies of embedding information, however not the observe normally. So why are we preventing these items?
All we will do on the finish of the day is hold pushing these use circumstances into extra inefficient strategies that trigger a big damaging impression on the community as a complete. Leaving the at present supported means, which within the grand scheme of issues are very environment friendly by way of community useful resource use, is the rational transfer to make.
Making an attempt to expunge the observe of embedding information in Bitcoin is each not possible, however making an attempt is in the end self damaging. It leads us down a path that in the end constrains and limits Bitcoin’s use as cash, and nonetheless ultimately in the end fails.
It’s merely slicing your nostril off to spite your face.
That is an inescapable technological actuality. Cash itself is just a ledger, a file of who has what. Even bodily money is just distributing that “database” in the actual world. You now not need to test towards some central ledger to confirm something as a result of the straightforward act of handing it to you is that strategy of verification. The “entries” in that ledger are handed round disconnected from some central file. Bitcoin is just a digital database trying to copy an important property of that bodily one often known as money: not needing a database operator’s permission to spend your cash.
Think about the futility of making an attempt to cease individuals from defacing greenback payments. What number of of you will have stamped “Purchase Bitcoin” onto fiat foreign money? Defacing a banknote in the USA is a federal crime. You may spend 6 months in jail for it. Does that cease anybody?
Do you significantly assume that may very well be enforced anyplace? Do you bear in mind The place Is George? Folks would stamp an internet site on greenback payments so individuals might enter serial numbers after they obtained them and monitor the place money notes had been circulating geographically.
Artists do innate murals and collages on cashnotes. You actually can’t cease it.
Why is there a pressure of magical considering that believes that is attainable just because the database is digital?
By its very nature Bitcoin requires supporting the inclusion of arbitrary information (learn: information that it’s not possible to know or outline forward of time) with a purpose to enable customers to transact. You don’t know forward of time how a lot cash you’ll ship (the satoshi area in outputs), the place you’ll ship it (the script area), what blockheight you may want to spend it at (the nLocktime area in a transaction, or the nSequence area in a transaction enter).
With out permitting for these items of arbitrary information, it isn’t attainable for Bitcoin to exist as a system.
Metaprotocols
A Bitcoin metaprotocol is a protocol layered on prime of the bottom protocol, Bitcoin, that interprets the information and actions of the underlying protocol by way of the lens of extra guidelines that don’t exist on that base protocol.
A historic instance of this could be the Counterparty (XCP) protocol. Utilizing OP_RETURN, an opcode in Bitcoin script that merely pushes arbitrary information to the stack creating an unspendable output that may be ignored by the UTXO set, XCP embeds its personal metaprotocol messages.
These messages facilitate the issuance of recent tokens, the switch of tokens by defining how a lot is being despatched and the place, in addition to different messages that allow on-chain trustless exchanges between XCP itself and another tokens issued utilizing the protocol.
The Bitcoin protocol itself doesn’t perceive, or care, about any of those messages. They’re interpreted by additional software program run on prime of Bitcoin. It’s utterly attainable for anybody utilizing Bitcoin to craft completely invalid XCP messages and get them confirmed on-chain, however XCP software program is not going to acknowledge it as legitimate. The particular person crafting these invalid messages is just losing their very own cash creating pointless transactions.
Completely nothing can cease individuals from decoding legitimate information on Bitcoin by way of the lens of additional guidelines exterior to the Bitcoin protocol on this method.
Ordinals perform in a really related means. Customers assign a singular ‘serial quantity’ to each single satoshi that’s mined, and have created their very own accounting system to interpret the enter and output ordering in a transaction to comply with the place “particular person satoshis” are despatched in the middle of transacting.
The Bitcoin protocol itself is totally unaware of this exterior protocol, and nothing in any respect might be executed to cease customers from decoding legitimate Bitcoin transactions on this method. Anybody can interpret the information printed on the blockchain nevertheless they need, making use of no matter extra constraints they select that don’t battle with the bottom Bitcoin protocol guidelines.
Nothing stops individuals from crafting invalid or malicious metaprotocol messages, and confirming these within the blockchain, however customers working metaprotocol purchasers will merely ignore them as invalid. That is the important thing distinction between the Bitcoin protocol itself, and metaprotocols. Bitcoin consensus guidelines stop protocol invalid messages from ever being included within the blockchain, metaprotocols don’t (or relatively can’t).
Information Embedding
The distinction between the 2 metaprotocols above is that one requires embedding additional information on-chain with a purpose to perform (XCP), and the opposite doesn’t (Ordinals). So that you is likely to be assuming which you can merely stop protocols that require embedding additional information by merely stopping that information from being embedded within the first place.
Whereas it’s true that particular mechanisms of information embedding may very well be prevented by softforking that individual mechanism out of the protocol, i.e. rendering transactions that make use of that mechanism invalid, you can’t stop information from being embedded normally.
Take for example the “Inscription envelope.” That is merely a selected methodology for guaranteeing that the information embedded in a spending witness isn’t truly executed. That is executed through the use of OP_FALSE, which pushes a 0 (or False worth that can fail verification) onto the stack earlier than the OP_PUSHes that truly embed the information. This causes the script interpreter to easily skip verifying the information after the OP_FALSE. The important thing performance required is placing a 0 on the stack.
In the event you invalidate by consensus the usage of this particular script format, there are different methods to place a 0 on the stack, or to make sure the script interpreter scripts the verification and execution of subsequent chunks of scripts. Simply making an attempt to cease this particular class of information embedding, and by that I imply the usage of OP_FALSE normally, itself turns into a recreation of cat and mouse with many different choices customers can flip to.
Disabling every of them requires the deployment of a softfork, a huge coordination effort throughout the whole ecosystem, and proper after succeeding customers can trivially modify their software program to make use of one other methodology. Metaprotocols can adapt a lot quicker than Bitcoin. Thoughts you, that is solely coping with this one class of how to embed information.
Let’s entertain the hypothetical actuality the place all mechanisms utilizing OP_FALSE have been restricted (ignoring each the complication in figuring out all of them and coordinating the fork, in addition to the potential for unintentionally proscribing different use circumstances of Bitcoin), customers can merely create pretend public keys. There’s nothing within the Bitcoin protocol that verifies a public key’s a legitimate public key, it’s merely a random arbitrary string included in an output’s locking script.
Now think about a world the place Bitcoin did embrace a mechanism that pressured validation of a public key earlier than permitting cash to be despatched to it. That will clear up that downside proper?
Improper.
You may embed the information not directly utilizing the personal key. However personal keys don’t ever truly get put on-chain proper? No they don’t, however a signature nonce is. A nonce is a random worth used within the building of a cryptographic signature. That is required to guard your personal key, as a result of with out utilizing one a cryptographic signature is insecure, and may leak your personal key to an attacker. Even utilizing a poorly chosen, or weak, nonce can enable that to occur.
Folks can deliberately use a weak nonce, and really use the arbitrary information itself as a non-public key. The one means this may be prevented is a centralized authority whitelisting personal keys, i.e. utterly centralizing the power to make use of Bitcoin behind a gated authority.
These examples should not even complete, there are lots of different strategies I can consider to embed arbitrary information within the blockchain, and I’m sure many extra that I can’t.
Making an attempt to play whackamole with all of them merely wastes the time and assets of the whole ecosystem making an attempt to coordinate softforks to deal with every of them, a massively advanced and expensive effort, and on the finish of the day there are nonetheless strategies that aren’t attainable to forestall in any respect with out utterly breaking the core Bitcoin protocol itself.
Why Person Will Proceed Doing This
I’m certain loads of individuals studying this are considering “we simply have to do that a couple of instances and folks will cease making an attempt, they received’t undergo all the additional effort.” That angle is totally disconnected from actuality for a number of causes.
I would like you to consider the 2 causes that individuals would have interaction in this sort of habits within the first place. Both it’s offering actual utilitarian advantages to them, i.e. serving an actual goal of their lives that gives worth not purely rooted in hypothesis, or it’s pure hypothesis.
Let’s take a look at the primary case. There’s some significant utility worth offered, that can not be offered in another means, or at the least to not the identical extent, or identical safety ensures, and so on. Why would these customers not hold adapting their protocol to route round no matter restrictions are put in place to forestall their use case on the consensus stage?
This hypothetical protocol is an actual factor to those individuals, one thing offering some vital or helpful performance to them. All of them have an incentive to adapt the protocol to work round no matter new restrictions are added.
Now let’s take a look at the second case, it’s purely a speculative use case, i.e. NFTs or some type of collectible or token. Some of these issues are fueled by pure speculative mania, huge quantities of cash are thrown at them in a recreation of musical chairs with everybody enjoying to get out the door with revenue as a result of the mania dissipates and collapses on itself.
These items are at all times cyclical, by no means persistently maintained, and are available and go. What makes you assume that proscribing one type of creating such belongings will disincentivize individuals from making new ones? I’ll remind you at this level that the “switch of possession” with these items on Bitcoin happens by way of Ordinals. That specific metaprotocol is actually not possible to dam or stop by any means in any respect.
Nothing about proscribing particular mechanisms to embed information on-chain prevents the switch or resale of belongings beforehand created utilizing that mechanism, so nothing might be executed to forestall these belongings that already existed from being traded.
Individuals who have interaction in these actions are degenerates, they blindly chase no matter alternative they will discover for a fast buck. Do you assume stopping them from making new belongings of a sure sort will cease them? Forcing them to make use of new mechanisms will in all probability actively drive demand for these new kinds of belongings. It received’t be a disincentive, it is going to be a proactive incentive.
The brand new mechanism will grow to be fascinating to them due to the controversy worth. That is merely a dropping recreation, which as I demonstrated within the part above ends with the usage of mechanisms which are actually not attainable to forestall.
The Rational Course of Motion
It’s not possible to cease the embedding of arbitrary information normally in Bitcoin. It’s attainable to cease some particular strategies of embedding information, however not the observe normally. So why are we preventing these items?
All we will do on the finish of the day is hold pushing these use circumstances into extra inefficient strategies that trigger a big damaging impression on the community as a complete. Leaving the at present supported means, which within the grand scheme of issues are very environment friendly by way of community useful resource use, is the rational transfer to make.
Making an attempt to expunge the observe of embedding information in Bitcoin is each not possible, however making an attempt is in the end self damaging. It leads us down a path that in the end constrains and limits Bitcoin’s use as cash, and nonetheless ultimately in the end fails.
It’s merely slicing your nostril off to spite your face.

















