Bitcoin Core Censorship Could Trigger Fork: Ordinals Leader


0

Unlock the Secrets of Ethical Hacking!
Ready to dive into the world of offensive security? This course gives you the Black Hat hacker’s perspective, teaching you attack techniques to defend against malicious activity. Learn to hack Android and Windows systems, create undetectable malware and ransomware, and even master spoofing techniques. Start your first hack in just one hour!
Enroll now and gain industry-standard knowledge: Enroll Now!
Trusted Editorial content, reviewed by leading industry experts and seasoned editors. Ad Disclosure

A leading figure in the Bitcoin Ordinals movement has threatened to bankroll an alternative version of the reference Bitcoin software if Bitcoin Core tightens default relay policy to the detriment of Ordinals and Runes transactions. In an “open letter to Bitcoin Core” posted on September 6, Leonidas — host of The Ordinal Show and a prominent organizer in the inscriptions ecosystem — warned that “any serious attempt by Bitcoin Core to tighten policy rules or censor Ordinals and Runes transactions will be met with decisive action.”

He said that, if necessary, “the DOG Army will fund the development and maintenance of an open source fork of Bitcoin Core that strips out nearly all policy rules,” adding that thousands would run it “to make it abundantly clear that Bitcoin is and must always remain censorship resistant.”

Leonidas framed the dispute as one over the base-layer neutrality. He argued that the Ordinals/Runes economy is not freeloading, claiming it has “contributed over half a billion dollars in transaction fees to strengthen Bitcoin’s security,” and asserted he has spoken “directly with miners and mining pools representing more than 50% of Bitcoin’s total hash rate,” who, he said, will accept any consensus-valid transactions with competitive fees if the process is straightforward.

Bitcoin Core Vs. Knots

The post lands amid intensifying debate over mempool policy vs. consensus and ahead of Bitcoin Core’s next major release. The pushback from “monetary-maximalist” voices has been equally blunt.

Blockstream CEO Adam Back reiterated that “Bitcoin is owned by humanity, the protocol developers are stewards, and need consensus from users to change it materially,” adding that “bitcoin is about money, spam has no place in the timechain,” and that the Core client’s defaults therefore matter. In parallel comments, Back has questioned whether peer-to-peer filters even work in practice to curb the activity inscriptions critics call “spam.”

Luke Dashjr, maintainer of the Knots implementation and a lead advocate of stricter default policy, insists the posture is not censorship. “No, filters are not censorship,” he wrote in a fresh exchange — a line consistent with his years-long position that nodes may, and often should, apply relay filters, while miners remain free to include any consensus-valid transaction that pays sufficient fees. Dashjr has continued to argue for stronger default limits and has encouraged operators who prefer stricter policy to run Knots.

At the center of the dispute is Bitcoin Core v30, scheduled for October, and specifically a set of policy changes merged in June that widen the “standardness” aperture for data-carrying transactions.

Core v30 will remove the long-standing default 80-byte cap on OP_RETURN payloads (making the effective cap the block size limit) and, crucially, will begin relaying transactions with multiple OP_RETURN outputs by default — changes to mempool relay policy, not to consensus rules. Proponents say aligning policy with what miners actually include improves fee estimation, reduces reliance on out-of-band submission, and corrects perverse incentives that pushed data into the UTXO set; critics see it as normalizing non-monetary use of block space.

Core developers have publicly articulated where they draw the line. In a June 6 statement, signatories including Pieter Wuille, Gloria Zhao, Greg Sanders and others wrote that Core aims to “make our software work as efficiently and reliably as possible” for validating and relaying transactions and blocks, and that transaction-relay policy should not “block … transactions that have sustained economic demand and reliably make it into blocks.”

They warned that knowingly refusing to relay such transactions pushes users into alternative submission channels and undermines decentralization — while stressing this is not an endorsement of non-financial data, merely an acceptance that a censorship-resistant system will be used for things “not everyone agrees on.”

Leonidas, for his part, rejected any normalization of content-based filtering: “There is no meaningful difference between normalizing the censorship of JPEG or memecoin transactions and normalizing the censorship of certain monetary transactions by nation-states. Both would set very dangerous precedents.” He also claimed that “over twenty Bitcoin startups that operate economically relevant nodes … would welcome the expanded design space” if nodes were required only to follow consensus rules rather than “arbitrary policy restrictions.”

The governance backdrop matters. Bitcoin Core is not Bitcoin, and users choose which software to run — a point both sides invoke. In practical terms, the market is already voting with its node software: according to Coin.Dance, Knots has gained huge momentum and now accounts for 4,373 of 23,729 publicly reachable nodes — just over 18% — up sharply in recent months as the relay-policy fight has intensified.

At press time, BTC traded at $112,009.

Bitcoin price
BTC reclaims $112,000, 1-day chart | Source: BTCUSDT on TradingView.com

Featured image created with DALL.E, chart from TradingView.com

Editorial Process for bitcoinist is centered on delivering thoroughly researched, accurate, and unbiased content. We uphold strict sourcing standards, and each page undergoes diligent review by our team of top technology experts and seasoned editors. This process ensures the integrity, relevance, and value of our content for our readers.



Unlock the Secrets of Ethical Hacking!
Ready to dive into the world of offensive security? This course gives you the Black Hat hacker’s perspective, teaching you attack techniques to defend against malicious activity. Learn to hack Android and Windows systems, create undetectable malware and ransomware, and even master spoofing techniques. Start your first hack in just one hour!
Enroll now and gain industry-standard knowledge: Enroll Now!

Don’t miss the Buzz!

We don’t spam! Read our privacy policy for more info.

🤞 Don’t miss the Buzz!

We don’t spam! Read more in our privacy policy


Like it? Share with your friends!

0

0 Comments

Your email address will not be published. Required fields are marked *