STAGE 8 • SovStack Integration
Module: Bitcoin • Cryptoeconomics • Protocol Incentives Thermodynamic constitution — maintenance, attack, capture, defense

Bitcoin as a Thermodynamic Constitution
and the Incentive War Over Its Future

Bitcoin is not “crypto.” It is a rule-set enforced by energy, math, and incentives instead of committees. This lecture models how the constitution is maintained, attacked, co-opted, and defended—across PoW, consensus, mining, fees, time, Lightning, sidechains, and Chaumian mints.

Axis: PoW → consensus → incentives → fees → time → L2/L3 Sovereign attractor: self-custody • neutrality • exit Synthetic attractor: KYC chokepoints • hub capture • policy censorship

0. Telos: Bitcoin as Sovereign Cryptoeconomic Engine

Two attractors pull on the same substrate. The protocol can remain mathematically strict while the lived system becomes socially captured.

Two attractors

  • Sovereign Stack: final settlement nobody can rewrite; property nobody can seize by decree; privacy and payment tools that respect self-custody and local trust; incentives that make decentralization profitable and control expensive.
  • Synthetic Stack: Bitcoin as regulated base layer for banks, states, and AI-run finance; most people touch it only through KYC custodians, regulated Lightning hubs, corporate sidechains, and “privacy” products that log everything.
Core question
Under what conditions does the stack remain a sovereignty engine, and under what conditions does it degrade into infrastructure for the Synthetic Stack?
Genesis + orientation (primary spec + historical intent) Primary

Satoshi (2008) — Bitcoin: A Peer-to-Peer Electronic Cash System (PDF)

Spec
PoWConsensusDifficulty
Open ↗

Satoshi Nakamoto Institute — The Complete Satoshi

Archive
EmailsPostsIncentives
Open ↗

Der Gigi — “Bitcoin Is Time”

Essay
Time-chainFinality
Open ↗

Narayanan et al. — Bitcoin and Cryptocurrency Technologies (book PDF)

Text
ConsensusAttacksMechanics
Open ↗

1. Proof-of-Work: Energy as Constitutional Collateral

1.1 The problem Satoshi had to solve R01 Whitepaper

  • Anyone can join (no permission).
  • No central identity registry.
  • Must resist Sybil attacks (millions of fake “participants”).
  • Must avoid trusting any institution to order transactions.
Design move
Tie block production power to irreversible physical cost. The cost acts like collateral—enforced by physics and full nodes, not courts.

1.2 How PoW actually breathes

  • Miners assemble a block candidate from mempool transactions.
  • They vary a nonce and hash the header repeatedly.
  • They search for a hash below the target.
  • Difficulty adjusts every 2016 blocks (roughly two weeks): if blocks were too fast → difficulty rises; too slow → difficulty falls.

1.3 “Waste” as the security budget

PoW looks “wasteful” in isolation. But that spend is the security budget: the more energy embedded into history, the more energy must be spent to rewrite it. Cheap consensus is cheap tyranny.

1.4 Real-world adversaries

  • Nation-states: can attack at a net financial loss to censor, delay, and undermine trust.
  • Derivatives-backed attackers: can short BTC and profit from chaos even if mining loses.
  • Hardware/energy capture: ASIC manufacture and grid access are politically shaped.
PoW ancestry + energy debate (spec → security budget) Primary

Adam Back (2002) — Hashcash (PDF)

Paper
PoW ancestorAnti-spam
Open ↗

Parker Lewis — “Bitcoin Does Not Waste Energy” (SNI)

Essay
Security spendRebuttal
Open ↗

CaseBitcoin — Critique #4: “Bitcoin Wastes Energy” (rebuttal hub)

Hub
FUD mapCounters
Open ↗

This Machine Greens — mining/energy documentary (site)

Film
MiningGridNarrative
Open ↗
Security model framing (how incentives make history costly) Research

Jameson Lopp — “Bitcoin’s Security Model: A Deep Dive”

Model
Attack costsAssumptions
Open ↗

Bitcoin Audible — “Read_762: Bitcoin’s Security Model Deep Dive”

Audio
RepetitionInternalization
Open ↗

Drew Armstrong & AJ Scalia — “Bitcoin Mining and the Case for More Energy”

Essay
Energy thesisCivilizational frame
Open ↗

David Chaum — “Computer Systems… by Mutually Suspicious Groups” (SNI)

Classic
Replicated logSuspicion model
Open ↗

2. Consensus: “Most Work Among Valid Chains”

2.1 The rule

Nodes follow: among all chains obeying consensus rules, choose the valid chain with the most accumulated proof-of-work.

  • Validity: signatures, script rules, monetary cap, no invalid subsidy, no double-spends. Invalid blocks are rejected regardless of work.
  • Work: among valid chains, the one with the greatest cumulative work is canonical.

2.2 Nodes, miners, pools, economic majority

  • Full nodes: enforce rules locally; verify everything; don’t “trust” miners.
  • Miners: invest capital to win subsidy+fees; extend the chain for profit.
  • Pools: coordinate hashpower; often build block templates (tx inclusion/ordering policies).
  • Economic majority: exchanges, merchants, custodians, large holders—decide which chain has value in practice.
Consensus is two-layer
Technically: “most-work valid chain.” Practically: “most-work valid chain that the economic majority actually uses.”

2.3 Consensus rules vs policy rules

  • Consensus rules: what must be true for blocks to be accepted; changing risks chain splits.
  • Policy rules (mempool/relay): what your node chooses to relay/accept for mempool (fee floors, RBF policy, dust, etc.). Policy can become soft-censorship without changing consensus.

2.4 Governance: soft forks and power balances

Soft forks tighten validity rules (SegWit, Taproot). Activation is political-economy: developers propose, nodes adopt/refuse, miners risk revenue, economic actors price the outcome.

  • BIP9 miner signaling: miners can stall/veto.
  • UASF: nodes enforce at a date; miners follow or orphan blocks.
Consensus mechanics + adversarial incentive edges Research

Coursera (Princeton) — Bitcoin and Cryptocurrency Technologies

Course
ForksAttacksPoW security
Open ↗

Princeton course videos (YouTube channel)

Video
11 lecturesMechanics
Open ↗

Bonneau — “Why Buy When You Can Rent? Bribery Attacks…” (PDF)

Adversarial
Rented hashBribery
Open ↗

Gervais et al. — “Tampering with the Delivery of Blocks…” (Scaling Bitcoin PDF)

Adversarial
Network-layer gamesPropagation
Open ↗

3. Mining Incentives and MEV

3.1 Where miner revenue comes from

  • Block subsidy: newly minted BTC (halves roughly every 4 years).
  • Transaction fees: sum of fees from included transactions.

3.2 Time preference diversity

  • Short-term miners: optimize fiat ROI; may accept systemic risk for quarterly earnings.
  • Long-term aligned miners: hold BTC treasury; more protective of network trust.

3.3 Orphan rate, latency, and centralization pressure

Faster propagation wins ties. Better connectivity and colocated infrastructure accrue advantage. This pressures mining toward scale and concentration.

3.4 MEV: Miner Extractable Value (even in Bitcoin land)

  • Prioritization for cross-exchange arbitrage.
  • Timing games (pegs, liquidations), and RBF-driven replacements.
  • Coordination with exchanges/derivatives desks to profit from ordering or soft-censorship.

3.5 Subsidies and strategic hash

Mining can be subsidized (energy policy, tax regimes, “friendly” jurisdictions). That breaks naive “pure market miner” assumptions and adds a geopolitical incentive layer.

Incentives under adversarial pressure (where theory hits reality) Audit

Bitcoin Optech — Newsletter #295 Recap (podcast)

Podcast
Relay attacksFee estimation
Open ↗

SLP177 — Mark “Murch” Erhardt on coin selection & fees

Podcast
Wallet behaviorFeesUTXO mgmt
Open ↗

Lopp — Security model deep dive (re-use)

Model
Miner assumptionsAttack surface
Open ↗

Gervais et al. — block/tx delivery tampering (re-use)

Adversarial
Latency edgeCentralization pressure
Open ↗

4. Fee Markets and the Security Budget

4.1 Scarce blockspace

Bitcoin fixes block interval (~10 minutes) and an approximate block weight limit. Blockspace is a scarce commodity auctioned every block: demand low → cheap fees; demand high → bidding wars.

4.2 The long-term security budget problem

Subsidy trends toward zero; fees must cover a growing share of miner revenue. The question is whether global settlement demand will sustain robust PoW over long horizons.

4.3 Fee-based economic DoS

An adversary can spam high-fee transactions to force baseline fees upward. Result: smaller users get priced out of L1 and pushed into custodians and KYC rails—an economic denial of sovereignty without changing consensus.

4.4 Tail-fee world and miner cartels

In subsidy-light futures, miners may form off-chain agreements and accept side payments to prioritize or soft-censor transaction classes. Consensus can remain neutral while the economic surface becomes permissioned.

Fee market + fee-only regime (core models + adversarial critique) Audit

Lopp — A Treatise on Bitcoin Block Space Economics

Model
CongestionSecurity budget
Open ↗

Rizun — “A Transaction Fee Market Exists Without a Block Size Limit” (PDF)

Paper
Supply/demandMiner selection
Open ↗

Carlsten et al. — “Instability Without the Block Reward” (PDF)

Adversarial
Fee snipingFork incentives
Open ↗

Budish — “The Economic Limits of Bitcoin and the Blockchain” (SSRN)

Skeptical
Game theorySecurity bound
Open ↗
Mempool & relay policy (where fee markets become control surfaces) Research

Bitcoin Optech — “Waiting for confirmation” (mempool/relay series)

Series
Policy layerRelay rules
Open ↗

Bitcoin Optech — “Waiting for confirmation” (podcast special)

Podcast
MempoolPinningL2 safety
Open ↗

Delving Bitcoin — “v3 transaction policy for anti-pinning”

Thread
Anti-pinningPolicy
Open ↗

SLP511 — v3 Transactions & Package Relay (glozow)

Podcast
Package relayPolicy vs consensus
Open ↗

5. Time-Chain: Economic Time, Difficulty, and Reorg Cascades

5.1 Time as “energy spent” R09 Bitcoin is Time

Bitcoin time is not clock time. It is the cumulative irreversible work on top of a history. Each block adds a layer of cost that must be repeated to rewrite beneath it.

5.2 Difficulty retargeting

  • Every 2016 blocks, the protocol compares actual time to the 10-minute target.
  • Difficulty adjusts up if too fast, down if too slow.
  • Attack windows and confirmation expectations are therefore dynamic, not fixed.

5.3 Partitions and deep reorgs

Partitions can produce two chains. When reconnected, the most-work chain wins and the other becomes a deep reorg. Higher layers (Lightning, pegs, contracts) inherit this risk and must design margins accordingly.

Time-chain framing (finality = economic insanity) Research

Der Gigi — “Bitcoin Is Time” (re-use)

Essay
ClockOrdering
Open ↗

Satoshi — Bitcoin whitepaper (difficulty + time ordering)

Spec
RetargetChain selection
Open ↗

Hal Finney — “Bitcoin and Me” (Bitcointalk post)

History
Early contextLived incentives
Open ↗

Finney — RPOW (Reusable Proofs of Work)

Precursor
PoW tokensBridge
Open ↗

6. Lightning Network: High-Velocity Mesh on Top of a Slow Court

Lightning turns the base layer into a slow, incorruptible court of settlement, and uses that court to enforce a high-speed overlay of payment channels.

6.1 Channels, HTLCs, and penalties R32 LN paper

  1. Open a channel: an on-chain 2-of-2 multisig funding output.
  2. Exchange off-chain states describing balances if closed “now.” Old states are revoked.
  3. Multi-hop payments via HTLCs: hashed time-locked contracts route a secret backward through hops.

Cheating (broadcasting an old state) is punished: the honest party can claim all funds, but only if they see it in time → watchtowers exist.

6.2 Liquidity and routing incentives

Routing nodes lock capital and earn tiny forwarding fees. Well-connected, well-capitalized nodes see more flow. This naturally forms a hub-and-spoke tendency unless countered by culture, tooling, and topology choices.

6.3 Privacy model and limits

  • Improves privacy vs on-chain (most activity is off-chain).
  • Onion routing hides full path, but hubs can learn metadata.
  • Probing and timing/amount correlation remain real attacks.

6.4 Watchtowers and centralization risk

Watchtowers monitor the chain for cheating attempts and broadcast penalty transactions. Popular watchtowers can become regulatory choke points and metadata vantage points.

6.5 Custodial Lightning vs sovereign Lightning

  • Custodial: provider holds channels and keys; user has a database balance; full surveillance/freeze.
  • Sovereign: user runs node/channels or uses minimal-trust community infra with explicit boundaries.
Lightning fork point
The same word (“Lightning”) can mean a sovereign mesh or an account-based KYC hub system. Incentives + UX pressure will push toward custody unless actively resisted.
Lightning protocol + topology (spec → operational incentives → attacks) Research

Poon & Dryja — The Bitcoin Lightning Network (PDF)

Spec
HTLCRevocationPenalties
Open ↗

Mastering the Lightning Network (open book, GitHub)

Book
RoutingOpsFees
Open ↗

Christian Decker — “History of the Lightning Network” (Chaincode talk)

Video
HistoryDesign constraints
Open ↗

Tikhomirov et al. — LN security/anonymity/scalability analysis (PDF)

Adversarial
JammingAnonymity leaks
Open ↗
Liquidity, routing, and policy dependencies Research

Blockstream — “Setting up Liquidity Ads in c-lightning” (Lisa Neigut)

Blog
Liquidity adsIncentives
Open ↗

SLP307 — “Becoming a Lightning Routing Node Operator”

Podcast
OpsFeesChannel strategy
Open ↗

Pickhardt (Chaincode) — “Path Finding in the Lightning Network” (transcript)

Transcript
RoutingGraph optimization
Open ↗

Pickhardt (2026) — A Mathematical Theory of Payment Channel Networks (arXiv PDF)

Paper
Formal modelLiquidity states
Open ↗
Mempools & pinning (Lightning depends on relay/policy) Research

Citadel Dispatch e0.0.9 — “Bitcoin Transactions, Mempools, and Self Hosting”

Video
MempoolSelf-hosting
Open ↗

Delving Bitcoin — v3 anti-pinning policy (re-use)

Thread
Anti-pinningPolicy
Open ↗

SLP511 — v3 + package relay (re-use)

Podcast
Package relayL2 safety
Open ↗

Optech — “Waiting for confirmation” series (re-use)

Series
Relay policyMempool
Open ↗

7. Sidechains: Specialized Jurisdictions with Bitcoin Collateral

7.1 Basic pattern

  • Lock BTC on main chain (script or federation-controlled custody).
  • Represent BTC 1:1 on a sidechain.
  • Transact with different trade-offs (speed, privacy, features).
  • Redeem back to L1 via peg-out mechanism.

7.2 Peg types and trust models

  • Federated pegs: known entities control a multisig; trust federation not to collude/comply with seizures.
  • Merged-mined sidechains: reuse miner hashpower; trust miners not to collude against the sidechain.
  • Drivechain-style pegs: more automated via miner voting/SPV; still depends on incentives and miner honesty.

7.3 Systemic risk and capture

If a sidechain becomes a “docking port” holding a large fraction of total BTC, its governance becomes systemically important. Captured federations become seizure/freeze layers around BTC without changing L1 rules.

Sidechains + federations + drivechains (spec + critique) Audit

Back et al. — Enabling Blockchain Innovations with Pegged Sidechains (PDF)

Spec
Two-way pegDesign
Open ↗

Dilley et al. — “Strong Federations…” (arXiv)

Paper
Federation trustLiquid model
Open ↗

Drivechain — BIP-300 (Bitcoin Wiki)

BIP
Hashrate escrowsPeg mechanism
Open ↗

BitMEX Research — Drivechains analysis (BIP-300/301)

Critique
IncentivesAttack surface
Open ↗
Drivechain ecosystem (primary references) Reference

Drivechain — BIP-301 (Bitcoin Wiki)

BIP
Blind merged miningSidechain blocks
Open ↗

Truthcoin — “Blind Merged Mining” (blog)

Blog
MechanismProposal
Open ↗

Drivechain — official site (overview)

Site
BIP-300/301Docs
Open ↗

Rootstock — “Sidechains, Drivechains, and RSK 2-Way Peg Design”

Blog
Peg comparisonsEngineering
Open ↗

8. Chaumian Mints: Bitcoin-Backed eCash and Local Privacy

Chaumian eCash uses blind signatures so a mint can verify tokens without knowing which tokens belong to whom. Modern Bitcoin-backed mints turn that primitive into a privacy/custody layer sitting “above” Lightning and Bitcoin.

8.1 Modern Bitcoin-backed mints

  • A federation holds BTC in multisig.
  • Users deposit (on-chain or LN) and receive blind-signed eCash tokens.
  • Tokens circulate inside the mint; redemption returns BTC (on-chain or LN).
  • Mint can validate tokens without reliably linking issuance ↔ spend ↔ redemption.

8.2 Privacy strengths and metadata traps

  • Strong unlinkability is real—but denominations and timing can leak identity via patterns.
  • Ingress/egress (LN channels, on-chain UTXOs) can reintroduce correlation.

8.3 Federation governance and failure modes

  • Threshold collusion can steal backing BTC.
  • Jurisdictional capture can force KYC/logging/blacklists.
  • Internal betrayal can add secret logs and metadata capture.

8.4 Mega-mints vs community mints

Mega-mints optimize UX and liquidity but become obvious regulatory chokepoints. Community mints trade liquidity for local trust and reduced capture surface.

eCash fork point
Cryptography can be strong while the perimeter becomes total surveillance. The decisive layer is governance, federation composition, and ingress/egress patterns.
Chaumian foundations + Bitcoin-native mint stacks Primary

Chaum — “Blind Signatures for Untraceable Payments” (PDF)

Paper
Blind signatureseCash
Open ↗

Fedimint — “Getting Started” / Intro docs

Docs
FederationseCashBitcoin/LN
Open ↗

Cashu — documentation (docs.cashu.space)

Docs
NUTsProtocol
Open ↗

Awesome Cashu (GitHub) — curated resources

Repo
ImplementationsEcosystem
Open ↗
Fedimint / mints in the wild (design rationale + long-form) Research

Bitcoin Magazine — “Chaumian mints distribute trust among bitcoin users”

Article
Distributed trustCustody tradeoffs
Open ↗

Bitcoin Magazine — “Discussing Federated Chaumian Mints on Lightning”

Article
ScalingLightning integration
Open ↗

SLP331 — Eric Sirion on federated mints (MiniMint/Fedimint)

Podcast
Trade-offsLightningPrivacy
Open ↗

Bitcoin.Review Podcast — BR031 (Cashu & Fedimint) (Apple)

Podcast
LayeringDenominationsFederations
Open ↗
Mobile LN scaling + hosted channels (real UX pressure) Contested

Fedimint blog — “Citadel Dispatch 45: the future of mobile lightning wallets”

Link
Hosted channelseCash UX
Open ↗

Citadel Dispatch E45 video (YouTube)

Video
Mobile walletsScaling
Open ↗

Fedimint technical docs (reference)

Docs
Client/serverConsensus
Open ↗

Cashu — project site (overview)

Site
eCashWallets
Open ↗

9. The Builders and Their Lineages

9.1 Satoshi Nakamoto

  • Combined Hashcash-style PoW, Szabo-style scarcity, P2P networking, difficulty adjustment, incentives, and scripting into a coherent system.
  • Encoded 21M cap and the halving schedule; default parameters still anchor monetary and temporal structure.

9.2 Nick Szabo

  • “Bit gold,” smart contracts, and trust-minimization logic: property and contracts as protocol objects.

9.3 Hal Finney

  • RPOW and early operational reality; first non-Satoshi node; first transaction recipient.

9.4 Adam Back

  • Hashcash lineage: anti-spam PoW → monetary PoW.

9.5 Maxwell / Poelstra / Wuille / Lightning & mint builders

One common pattern across the serious builders: minimize trust, keep the base layer conservative, and push complexity to edges that remain anchored in Bitcoin’s security model.

Builder references (anchors, not biographies) Reference

SNI — Adam Back (author page)

Index
HashcashLineage
Open ↗

SNI — Nick Szabo (author page)

Index
Bit goldTrust minimization
Open ↗

SNI — Hal Finney (author page)

Index
RPOWEarly Bitcoin
Open ↗

Gregory Maxwell (GitHub profile)

Profile
PrivacyConsensus conservatism
Open ↗

Andrew Poelstra (GitHub profile)

Profile
Crypto designReview culture
Open ↗

Pieter Wuille (GitHub profile)

Profile
SegWitTaprootWallet infra
Open ↗

Thaddeus (Tadge) Dryja (GitHub profile)

Profile
LightningResearch
Open ↗

Szabo — “Trusted Third Parties Are Security Holes” (SNI)

Core
Trust minimizationThreat model
Open ↗

Szabo — “bit gold” (SNI)

Precursor
Chained workScarcity
Open ↗

Szabo — “Shelling Out: The Origins of Money” (SNI)

Context
Costly signalMoney origins
Open ↗

10. The Two Attractors: Sovereign Stack vs Synthetic Stack

10.1 Sovereign Stack attractor

  • L1: many individuals/community nodes; neutral policy; upgrades slow and user-driven.
  • Lightning: mix of individual nodes and small community hubs; diverse watchtowers; custody exists but doesn’t dominate.
  • Sidechains: used selectively; no single peg holds a massive fraction of BTC.
  • Chaumian mints: local/community scale; federations are accountable people under social (not corporate) control.
  • Interfaces: default to self-custody; expose real choices; make node-running and key ownership accessible.

10.2 Synthetic Stack attractor

  • L1: mining concentrated in regulated pools; exchanges/custodians define acceptable transactions.
  • Lightning: a handful of mega hubs + custodial providers route most payments under KYC/AML.
  • Sidechains: corporate/state sanctioned layers with freeze and programmability.
  • Chaumian mints: “privacy” mega-mints with full monitoring at ingress/egress.
  • Interfaces: wallet/AI assistants default to custodians and behave like compliance agents.
Capture can be social
L1 rules can remain strict while the lived system becomes permissioned by custody, policy censorship, and UX funnels.
Hardening Bitcoin (contrast frames) Audit

Poelstra — “A Treatise on Altcoins” (PDF)

Critique
Incentive failuresCrypto design
Open ↗

Bitcoin Audible — “Read_541: A Treatise on Altcoins” (episode)

Audio
RepetitionInternalization
Open ↗

Bonneau — bribery attacks (re-use)

Adversarial
Rented consensusBribery
Open ↗

Lopp — blockspace economics (re-use)

Model
FeesCongestion
Open ↗

11. Closing: Protocol Incentives as Civilizational Law

Proof-of-work converts energy into tamper-resistant history. Consensus coordinates on that history without identity or central authority. Mining incentives and fee markets pay for defense out of economic use. Lightning, sidechains, and mints extend the stack—while opening new trust and capture surfaces.

Closing fork
If miners, users, and builders chase only convenience and short-term profit, the system slides into the Synthetic Stack. If a critical mass runs nodes, holds keys, and stays adversarial about capture vectors, the same mechanisms remain a sovereignty engine.
Compression stack (re-read loop) Loop

Complete Satoshi (re-read incentives + scaling discussions)

Archive
IntentTrade-offs
Open ↗

Lopp — security model deep dive (re-read)

Model
AssumptionsCosts
Open ↗

Optech — mempool/relay series (policy layer)

Series
L2 safetyCensorship surface
Open ↗

Lightning paper (re-read: incentives + penalties)

Spec
HTLCWatchtowers
Open ↗

Resource Index

IDs below match the in-lecture reference chips (e.g., R01).