Section VI: Bitcoin Framework
April 9, 2026
As we review these attacks, take a moment and assume an adversarial mindset and consider how an adversary can abuse weaknesses in bitcoin in unconventional ways.
Recall the basic idea: a consensus attack tries to manipulate which version of recent ledger history honest nodes accept as the valid chain, which could possibly:
inv(tx) sightings and treat the earliest one as the best source guess.sequenceDiagram participant U as User Node (Origin) participant P1 as Peer 1 participant P2 as Peer 2 (Observer) participant N as Network Monitor U->>P1: inv(tx) P1-->>P2: inv(tx) P2-->>N: timestamp(tx seen)
“First-spy” correlates earliest sightings to infer origin
74638 included a transaction that created about 184 billion BTC.Bitcoin Gold (BTG) is a 2017 Bitcoin fork that changed the mining algorithm in an effort to resist ASIC concentration, but it never approached Bitcoin’s hash rate or economic scale.
Hard fork vs. soft fork: A hard fork can split the chain if the community does not upgrade together. A soft fork tightens the rules without forcing the same kind of split. In Bitcoin, both only matter if enough miners, nodes, businesses, and users coordinate around the same rules.
Bitcoin does not implement KYC or AML in the protocol; these are obligations imposed on regulated intermediaries around Bitcoin.

Bitcoin Security and Legal Concerns — Army Cyber Institute — April 9, 2026