🛠 PDK Dev Call Notes #702
Replies: 4 comments
-
Not implement, describe. I need to write a discussion topic. For context, OHTTP config bootstrap (for the receiver at least) normally requires TLS. Using the OHTTP relay does too, affecting both receiver and sender. Since Bitcoin Core already can use tor and connect to hidden services, if the directory and the relay are also available via hidden service then Tor can provide the encryption and authentication for this bootstrap. |
Beta Was this translation helpful? Give feedback.
-
This is not planned, it was suggested and is an open topic for the future. Please add:
|
Beta Was this translation helpful? Give feedback.
-
PDK Dev Call — May 26 UpdatesArmin
Ben
Dan
Spacebear
Artur
Zealsham
|
Beta Was this translation helpful? Give feedback.
-
-- @nothingmuch Might this be because the public key needs to ratchet for each request? If this is indeed a problem, I suppose we should move this conversation to an upstream issue. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
🛠 PDK Dev Call — May 19 Updates
The following are updates from Payjoin contributors. Contributors describes what they are currently working on and what is blocking their progress.
Armin
sketch
branch againstmaster
.Ben
Planning a branch to remove
danger_eliminate_https
flag. V2 logic is in place, but V1 handling needs clarification.Reviewing Shinghim’s PR to get the sender test suite working.
Raised a question about
short_id
: is it being removed by SEL? Was originally used to capture errors(?).pub(crate)
instead of removing it entirely.Aiming to make progress on the FFI PSBT PR — needs to upstream some custom changes into bitcoin-ffi. Getting feedback from bitcoin-ffi maintainers and Dan. No blockers on this. Note: currently payjoin-ffi refrences Ben's branch.
Dan
payjoin-cli
up to spec.payjoin-ffi
PR.Spacebear
No blockers for
payjoin-ffi
— outstanding PR descriptions question have been resolved. PR is close to mergable.Progress on Boltz integration is blocked by a bad dev environment. An issue has been opened in their repo, and the Boltz team is assisting.
Traveling next week for Bitcoin Conference. Speaking on the "Privacy Without CoinJoin" panel (Tue–Thu).
Artur
contribute_inputs
andtry_preserving_privacy
now working, but Liana GUI flags PSBTs as invalid (fails sanity checks). Need to write this issue up more clearly before others can assist.Nothingmuch
Juggling multiple small tasks and cleanup PRs (e.g., padding in spec and code).
Backporting parts of the persistence sketch branch to
master
. Three seperate PRs: receiver, sender, and multiparty flows.Concerned about potential conflicts with the FFI PRs.
Review backlog piling up.
Needs to implement Tor-based OHTTP bootstrap for Leo(?).
Adding docstrings to all SEL-sketch branch PRs. This serves as a preliminary review.
Self-blocked, mainly due to bandwidth.
In the Bitcoin OHTTP crate: identified unnecessary
mut
borrowing of context for public keys.Yashraj
Beta Was this translation helpful? Give feedback.
All reactions