PrevNext

Learning Journey

Guided Lesson 1/8: What is Bitcoin?

Path scope: 8 lessons โ€ข 12 concepts

0% completeResume

Start

๐Ÿ Home

Explorer

๐ŸŒŠMempool๐ŸŒNetwork๐Ÿ“ฆBlocks๐Ÿ”Decoder๐ŸณRich List๐Ÿ’ธFeesโ›๏ธMiners๐ŸฉบVitals๐Ÿ”ฌUTXO Set

Learn

โš—๏ธScript๐ŸŒฑTaproot๐Ÿ—๏ธKeys๐Ÿ”จHashingโš™๏ธConsensus๐ŸงชMempool Sim

Analysis

๐Ÿ•ต๏ธโ€โ™‚๏ธForensics๐Ÿ“ˆEvolutionโš–๏ธD-Index๐ŸŽจGraffiti

Simulations

๐ŸงฑMempool Tetrisโ›๏ธMining SimulatorโšกLightning Simulator

Knowledge

๐Ÿ’ปNode Terminal๐Ÿ›ก๏ธOperationsโ„น๏ธAbout๐ŸŽ“Academy๐Ÿ“šResearch
๐Ÿ›ก๏ธVulnerabilities๐ŸŽฏAttack Models๐Ÿ“ŒAssumptionsโš–๏ธPolicy vs Cons.

Research

Research Hub

Deep dives into Bitcoin protocol mechanics, security assumptions, and edge cases.

Vulnerabilities

Historical vulnerability registry with severity, year, and version filters.

Attack Models

Structured adversarial models, exploit surfaces, and mitigations.

Assumptions

Security assumptions the protocol relies on and what weakens them.

Policy vs Consensus

Explicit distinction between policy-layer behavior and consensus-critical rules.

ยฉ 2026 Raw Block. All rights reserved.

Mainnet Connected
About & TrustGitHubTwitterLinkedIn