Research
Research Hub
Deep dives into Bitcoin protocol mechanics, security assumptions, and edge cases.
Vulnerabilities
Historical vulnerability registry with severity, year, and version filters.
Attack Models
Structured adversarial models, exploit surfaces, and mitigations.
Assumptions
Security assumptions the protocol relies on and what weakens them.
Policy vs Consensus
Explicit distinction between policy-layer behavior and consensus-critical rules.