Bitcoin as a Thermodynamic Constitution
and the Incentive War Over Its Future
Bitcoin is not “crypto.” It is a rule-set enforced by energy, math, and incentives instead of committees. This lecture models how the constitution is maintained, attacked, co-opted, and defended—across PoW, consensus, mining, fees, time, Lightning, sidechains, and Chaumian mints.
0. Telos: Bitcoin as Sovereign Cryptoeconomic Engine
Two attractors pull on the same substrate. The protocol can remain mathematically strict while the lived system becomes socially captured.
Two attractors
- Sovereign Stack: final settlement nobody can rewrite; property nobody can seize by decree; privacy and payment tools that respect self-custody and local trust; incentives that make decentralization profitable and control expensive.
- Synthetic Stack: Bitcoin as regulated base layer for banks, states, and AI-run finance; most people touch it only through KYC custodians, regulated Lightning hubs, corporate sidechains, and “privacy” products that log everything.
1. Proof-of-Work: Energy as Constitutional Collateral
1.1 The problem Satoshi had to solve R01 Whitepaper
- Anyone can join (no permission).
- No central identity registry.
- Must resist Sybil attacks (millions of fake “participants”).
- Must avoid trusting any institution to order transactions.
1.2 How PoW actually breathes
- Miners assemble a block candidate from mempool transactions.
- They vary a nonce and hash the header repeatedly.
- They search for a hash below the target.
- Difficulty adjusts every 2016 blocks (roughly two weeks): if blocks were too fast → difficulty rises; too slow → difficulty falls.
1.3 “Waste” as the security budget
PoW looks “wasteful” in isolation. But that spend is the security budget: the more energy embedded into history, the more energy must be spent to rewrite it. Cheap consensus is cheap tyranny.
1.4 Real-world adversaries
- Nation-states: can attack at a net financial loss to censor, delay, and undermine trust.
- Derivatives-backed attackers: can short BTC and profit from chaos even if mining loses.
- Hardware/energy capture: ASIC manufacture and grid access are politically shaped.
Jameson Lopp — “Bitcoin’s Security Model: A Deep Dive”
ModelBitcoin Audible — “Read_762: Bitcoin’s Security Model Deep Dive”
AudioDrew Armstrong & AJ Scalia — “Bitcoin Mining and the Case for More Energy”
EssayDavid Chaum — “Computer Systems… by Mutually Suspicious Groups” (SNI)
Classic2. Consensus: “Most Work Among Valid Chains”
2.1 The rule
Nodes follow: among all chains obeying consensus rules, choose the valid chain with the most accumulated proof-of-work.
- Validity: signatures, script rules, monetary cap, no invalid subsidy, no double-spends. Invalid blocks are rejected regardless of work.
- Work: among valid chains, the one with the greatest cumulative work is canonical.
2.2 Nodes, miners, pools, economic majority
- Full nodes: enforce rules locally; verify everything; don’t “trust” miners.
- Miners: invest capital to win subsidy+fees; extend the chain for profit.
- Pools: coordinate hashpower; often build block templates (tx inclusion/ordering policies).
- Economic majority: exchanges, merchants, custodians, large holders—decide which chain has value in practice.
2.3 Consensus rules vs policy rules
- Consensus rules: what must be true for blocks to be accepted; changing risks chain splits.
- Policy rules (mempool/relay): what your node chooses to relay/accept for mempool (fee floors, RBF policy, dust, etc.). Policy can become soft-censorship without changing consensus.
2.4 Governance: soft forks and power balances
Soft forks tighten validity rules (SegWit, Taproot). Activation is political-economy: developers propose, nodes adopt/refuse, miners risk revenue, economic actors price the outcome.
- BIP9 miner signaling: miners can stall/veto.
- UASF: nodes enforce at a date; miners follow or orphan blocks.
Coursera (Princeton) — Bitcoin and Cryptocurrency Technologies
CoursePrinceton course videos (YouTube channel)
VideoBonneau — “Why Buy When You Can Rent? Bribery Attacks…” (PDF)
AdversarialGervais et al. — “Tampering with the Delivery of Blocks…” (Scaling Bitcoin PDF)
Adversarial3. Mining Incentives and MEV
3.1 Where miner revenue comes from
- Block subsidy: newly minted BTC (halves roughly every 4 years).
- Transaction fees: sum of fees from included transactions.
3.2 Time preference diversity
- Short-term miners: optimize fiat ROI; may accept systemic risk for quarterly earnings.
- Long-term aligned miners: hold BTC treasury; more protective of network trust.
3.3 Orphan rate, latency, and centralization pressure
Faster propagation wins ties. Better connectivity and colocated infrastructure accrue advantage. This pressures mining toward scale and concentration.
3.4 MEV: Miner Extractable Value (even in Bitcoin land)
- Prioritization for cross-exchange arbitrage.
- Timing games (pegs, liquidations), and RBF-driven replacements.
- Coordination with exchanges/derivatives desks to profit from ordering or soft-censorship.
3.5 Subsidies and strategic hash
Mining can be subsidized (energy policy, tax regimes, “friendly” jurisdictions). That breaks naive “pure market miner” assumptions and adds a geopolitical incentive layer.
4. Fee Markets and the Security Budget
4.1 Scarce blockspace
Bitcoin fixes block interval (~10 minutes) and an approximate block weight limit. Blockspace is a scarce commodity auctioned every block: demand low → cheap fees; demand high → bidding wars.
4.2 The long-term security budget problem
Subsidy trends toward zero; fees must cover a growing share of miner revenue. The question is whether global settlement demand will sustain robust PoW over long horizons.
4.3 Fee-based economic DoS
An adversary can spam high-fee transactions to force baseline fees upward. Result: smaller users get priced out of L1 and pushed into custodians and KYC rails—an economic denial of sovereignty without changing consensus.
4.4 Tail-fee world and miner cartels
In subsidy-light futures, miners may form off-chain agreements and accept side payments to prioritize or soft-censor transaction classes. Consensus can remain neutral while the economic surface becomes permissioned.
Lopp — A Treatise on Bitcoin Block Space Economics
ModelRizun — “A Transaction Fee Market Exists Without a Block Size Limit” (PDF)
PaperCarlsten et al. — “Instability Without the Block Reward” (PDF)
AdversarialBudish — “The Economic Limits of Bitcoin and the Blockchain” (SSRN)
Skeptical5. Time-Chain: Economic Time, Difficulty, and Reorg Cascades
5.1 Time as “energy spent” R09 Bitcoin is Time
Bitcoin time is not clock time. It is the cumulative irreversible work on top of a history. Each block adds a layer of cost that must be repeated to rewrite beneath it.
5.2 Difficulty retargeting
- Every 2016 blocks, the protocol compares actual time to the 10-minute target.
- Difficulty adjusts up if too fast, down if too slow.
- Attack windows and confirmation expectations are therefore dynamic, not fixed.
5.3 Partitions and deep reorgs
Partitions can produce two chains. When reconnected, the most-work chain wins and the other becomes a deep reorg. Higher layers (Lightning, pegs, contracts) inherit this risk and must design margins accordingly.
6. Lightning Network: High-Velocity Mesh on Top of a Slow Court
Lightning turns the base layer into a slow, incorruptible court of settlement, and uses that court to enforce a high-speed overlay of payment channels.
6.1 Channels, HTLCs, and penalties R32 LN paper
- Open a channel: an on-chain 2-of-2 multisig funding output.
- Exchange off-chain states describing balances if closed “now.” Old states are revoked.
- Multi-hop payments via HTLCs: hashed time-locked contracts route a secret backward through hops.
Cheating (broadcasting an old state) is punished: the honest party can claim all funds, but only if they see it in time → watchtowers exist.
6.2 Liquidity and routing incentives
Routing nodes lock capital and earn tiny forwarding fees. Well-connected, well-capitalized nodes see more flow. This naturally forms a hub-and-spoke tendency unless countered by culture, tooling, and topology choices.
6.3 Privacy model and limits
- Improves privacy vs on-chain (most activity is off-chain).
- Onion routing hides full path, but hubs can learn metadata.
- Probing and timing/amount correlation remain real attacks.
6.4 Watchtowers and centralization risk
Watchtowers monitor the chain for cheating attempts and broadcast penalty transactions. Popular watchtowers can become regulatory choke points and metadata vantage points.
6.5 Custodial Lightning vs sovereign Lightning
- Custodial: provider holds channels and keys; user has a database balance; full surveillance/freeze.
- Sovereign: user runs node/channels or uses minimal-trust community infra with explicit boundaries.
Blockstream — “Setting up Liquidity Ads in c-lightning” (Lisa Neigut)
BlogSLP307 — “Becoming a Lightning Routing Node Operator”
PodcastPickhardt (Chaincode) — “Path Finding in the Lightning Network” (transcript)
TranscriptPickhardt (2026) — A Mathematical Theory of Payment Channel Networks (arXiv PDF)
Paper7. Sidechains: Specialized Jurisdictions with Bitcoin Collateral
7.1 Basic pattern
- Lock BTC on main chain (script or federation-controlled custody).
- Represent BTC 1:1 on a sidechain.
- Transact with different trade-offs (speed, privacy, features).
- Redeem back to L1 via peg-out mechanism.
7.2 Peg types and trust models
- Federated pegs: known entities control a multisig; trust federation not to collude/comply with seizures.
- Merged-mined sidechains: reuse miner hashpower; trust miners not to collude against the sidechain.
- Drivechain-style pegs: more automated via miner voting/SPV; still depends on incentives and miner honesty.
7.3 Systemic risk and capture
If a sidechain becomes a “docking port” holding a large fraction of total BTC, its governance becomes systemically important. Captured federations become seizure/freeze layers around BTC without changing L1 rules.
8. Chaumian Mints: Bitcoin-Backed eCash and Local Privacy
Chaumian eCash uses blind signatures so a mint can verify tokens without knowing which tokens belong to whom. Modern Bitcoin-backed mints turn that primitive into a privacy/custody layer sitting “above” Lightning and Bitcoin.
8.1 Modern Bitcoin-backed mints
- A federation holds BTC in multisig.
- Users deposit (on-chain or LN) and receive blind-signed eCash tokens.
- Tokens circulate inside the mint; redemption returns BTC (on-chain or LN).
- Mint can validate tokens without reliably linking issuance ↔ spend ↔ redemption.
8.2 Privacy strengths and metadata traps
- Strong unlinkability is real—but denominations and timing can leak identity via patterns.
- Ingress/egress (LN channels, on-chain UTXOs) can reintroduce correlation.
8.3 Federation governance and failure modes
- Threshold collusion can steal backing BTC.
- Jurisdictional capture can force KYC/logging/blacklists.
- Internal betrayal can add secret logs and metadata capture.
8.4 Mega-mints vs community mints
Mega-mints optimize UX and liquidity but become obvious regulatory chokepoints. Community mints trade liquidity for local trust and reduced capture surface.
Bitcoin Magazine — “Chaumian mints distribute trust among bitcoin users”
ArticleBitcoin Magazine — “Discussing Federated Chaumian Mints on Lightning”
ArticleSLP331 — Eric Sirion on federated mints (MiniMint/Fedimint)
PodcastBitcoin.Review Podcast — BR031 (Cashu & Fedimint) (Apple)
Podcast9. The Builders and Their Lineages
9.1 Satoshi Nakamoto
- Combined Hashcash-style PoW, Szabo-style scarcity, P2P networking, difficulty adjustment, incentives, and scripting into a coherent system.
- Encoded 21M cap and the halving schedule; default parameters still anchor monetary and temporal structure.
9.2 Nick Szabo
- “Bit gold,” smart contracts, and trust-minimization logic: property and contracts as protocol objects.
9.3 Hal Finney
- RPOW and early operational reality; first non-Satoshi node; first transaction recipient.
9.4 Adam Back
- Hashcash lineage: anti-spam PoW → monetary PoW.
9.5 Maxwell / Poelstra / Wuille / Lightning & mint builders
One common pattern across the serious builders: minimize trust, keep the base layer conservative, and push complexity to edges that remain anchored in Bitcoin’s security model.
SNI — Adam Back (author page)
IndexSNI — Nick Szabo (author page)
IndexSNI — Hal Finney (author page)
IndexGregory Maxwell (GitHub profile)
ProfileAndrew Poelstra (GitHub profile)
ProfilePieter Wuille (GitHub profile)
ProfileThaddeus (Tadge) Dryja (GitHub profile)
ProfileSzabo — “Trusted Third Parties Are Security Holes” (SNI)
CoreSzabo — “bit gold” (SNI)
PrecursorSzabo — “Shelling Out: The Origins of Money” (SNI)
Context10. The Two Attractors: Sovereign Stack vs Synthetic Stack
10.1 Sovereign Stack attractor
- L1: many individuals/community nodes; neutral policy; upgrades slow and user-driven.
- Lightning: mix of individual nodes and small community hubs; diverse watchtowers; custody exists but doesn’t dominate.
- Sidechains: used selectively; no single peg holds a massive fraction of BTC.
- Chaumian mints: local/community scale; federations are accountable people under social (not corporate) control.
- Interfaces: default to self-custody; expose real choices; make node-running and key ownership accessible.
10.2 Synthetic Stack attractor
- L1: mining concentrated in regulated pools; exchanges/custodians define acceptable transactions.
- Lightning: a handful of mega hubs + custodial providers route most payments under KYC/AML.
- Sidechains: corporate/state sanctioned layers with freeze and programmability.
- Chaumian mints: “privacy” mega-mints with full monitoring at ingress/egress.
- Interfaces: wallet/AI assistants default to custodians and behave like compliance agents.
11. Closing: Protocol Incentives as Civilizational Law
Proof-of-work converts energy into tamper-resistant history. Consensus coordinates on that history without identity or central authority. Mining incentives and fee markets pay for defense out of economic use. Lightning, sidechains, and mints extend the stack—while opening new trust and capture surfaces.
Resource Index
IDs below match the in-lecture reference chips (e.g., R01).
- R01 Bitcoin whitepaper (Satoshi) ↗
- R02 The Complete Satoshi (SNI) ↗
- R03 Hashcash (Adam Back) PDF ↗
- R04 RPOW (Hal Finney) ↗
- R05 bit gold (Nick Szabo) ↗
- R06 Trusted Third Parties Are Security Holes (Szabo) ↗
- R07 Shelling Out (Szabo) ↗
- R08 Chaum — mutually suspicious groups (SNI) ↗
- R09 Der Gigi — Bitcoin Is Time ↗
- R10 Hal Finney — “Bitcoin and Me” (Bitcointalk) ↗
- R11 Narayanan et al. — Princeton book PDF ↗
- R12 Princeton (Coursera) — Bitcoin & Cryptocurrency Technologies ↗
- R13 Princeton course videos (YouTube) ↗
- R14 Lopp — Security Model: Deep Dive ↗
- R15 Lopp — Block Space Economics ↗
- R16 Rizun — Fee market paper (PDF) ↗
- R17 Carlsten et al. — Instability without block reward (PDF) ↗
- R18 Budish — Economic Limits (SSRN) ↗
- R19 Bonneau — Bribery attacks (PDF) ↗
- R20 Gervais et al. — Delivery tampering (PDF) ↗
- R21 Optech — Newsletter #295 recap ↗
- R24 SLP177 — Murch on coin selection & fees ↗
- R25 Bitcoin Audible — Read_762 ↗
- R32 Lightning paper (Poon & Dryja) ↗
- R33 Mastering the Lightning Network (GitHub) ↗
- R34 Decker — History of LN (YouTube) ↗
- R36 Pickhardt — Mathematical Theory of PCNs (arXiv PDF) ↗
- R37 Tikhomirov et al. — LN analysis (PDF) ↗
- R38 Pickhardt — Path finding transcript ↗
- R39 Blockstream — liquidity ads ↗
- R40 SLP307 — routing node operator ↗
- R41 Citadel Dispatch e0.0.9 — mempools & self-hosting ↗
- R50 Chaum — blind signatures (PDF) ↗
- R51 Fedimint docs — intro ↗
- R52 Fedimint technical reference docs ↗
- R53 Bitcoin Magazine — distribute trust ↗
- R54 Bitcoin Magazine — mints on Lightning ↗
- R55 Cashu docs ↗
- R56 Cashu site ↗
- R57 Awesome Cashu ↗
- R58 SLP331 — Eric Sirion ↗
- R59 Bitcoin.Review BR031 (Apple) ↗
- R60 Fedimint — Citadel Dispatch 45 ↗
- R61 Citadel Dispatch E45 (YouTube) ↗