Trust Revolution
Trust Revolution

Trust Revolution

Shawn Yeager

Overview
Episodes

Details

Unfiltered conversations with builders, thinkers, and operators in Bitcoin and beyond. Exploring the systems we trust, why they work (or don't), and what comes next.

Recent Episodes

Self-Custody for You and Your AI | Roland Bewick
MAR 6, 2026
Self-Custody for You and Your AI | Roland Bewick
<p>“With 12 words, you can travel the world. Your money arrives in the country before you do. It cannot be taken from you.” Roland Bewick builds the software that makes that sentence true—and just taught an AI agent to do the same thing.</p> <p><strong>Episode Summary</strong></p> <p>Most Bitcoin wallets promise self-custody but keep offering the easy custodial shortcut. Alby killed theirs. In January 2025, the team shut down a custodial wallet processing over a million transactions a month and told users, Run your own node or leave. Roland Bewick, the developer who built Alby Hub to make that transition possible, walks through what happened when principle met user expectations—the complaints, the creative excuses, and why the team chose sovereignty over growth. The conversation then moves into new territory: AI agents that hold their own Bitcoin wallets, pay for their own infrastructure, and even spawn child agents without a human touching a credit card. Roland details his autonomous agent onboarding project, where an OpenClaw agent rented a server, funded a child agent, and purchased AI credits using Lightning—all without KYC, all without permission. The result is a blueprint for self-sovereign AI operating on self-sovereign money, and a challenge to anyone still giving their agent their credit card number.</p> <p><strong>About the Guest</strong></p> <p>Roland Bewick is a core developer at Alby, where he leads development of Alby Hub—an open-source, self-custodial Lightning node that lets users connect to any application through Nostr Wallet Connect. Originally from New Zealand and currently based in Thailand, Roland started at Alby in early 2023 after winning the Legends of Lightning hackathon with Lightsats, a Bitcoin onboarding tool. He also created Bitcoin Connect and recently built the first documented autonomous agent onboarding system using Bitcoin Lightning for machine-to-machine payments.</p> <ul> <li>X/Twitter: <a href="https://twitter.com/rolznz">https://twitter.com/rolznz</a></li> <li>Nostr: npub1zk6u7mxlflguqteghn8q7xtu47hyerruv6379c36l8lxzzr4x90q0gl6ef</li> <li>GitHub: <a href="https://github.com/rolznz">https://github.com/rolznz</a></li> <li>Alby: <a href="https://getalby.com">https://getalby.com</a></li> </ul> <p><strong>Key Quotes</strong></p> <p>“We all want to be self-sovereign. We hold our own Bitcoin, right? We hold our own keys. That's what we believe in. We build this software for ourselves.” — Roland Bewick</p> <p>“If all your activity and your agent's activity is tied to your own name, I think there are going to be really big problems.” — Roland Bewick</p> <p>“A lot of the other crypto projects are doing it for the marketing, for the big noise, but we are actually trying to solve the problem.” — Roland Bewick</p> <p><strong>Key Takeaways</strong></p> <ul> <li><strong>Self-custody is a choice companies can make, not just users</strong>: Alby deliberately shut down a revenue-generating custodial product rather than pursue KYC licensing. Regulation forced a fork in the road, and the team chose the harder path back to the self-sovereign values they started with.</li> <li><strong>Nostr Wallet Connect turned a Nostr experiment into payment infrastructure</strong>: What began as a way to make zaps easier became an open protocol that abstracts away the differences between Lightning implementations. It lets any app talk to any wallet—the USB-C of Lightning payments.</li> <li><strong>AI agents need separate economic identities</strong>: Giving your agent your credit card ties its activity to your name and your limits. An agent with its own Lightning wallet, Nostr key pair, and AI token account operates independently—with whatever autonomy you grant it.</li> <li><strong>KYC-free services are the infrastructure layer agents actually need</strong>: The difference between Bitcoin-native services like LNVPS and PayPerQ versus traditional providers isn't ideology—it's that agents can't fill out captchas, upload IDs, or wait for email verification. Permissionless access is a practical requirement for autonomous operation.</li> </ul> <p><strong>Timestamps</strong></p> <p>[00:01] Why Alby killed a custodial wallet processing a million transactions a month </p> <p>[04:30] How Nostr Wallet Connect emerged from a simple zap experiment </p> <p>[08:07] NWC as the USB-C of Lightning—one protocol for every wallet and app </p> <p>[11:03] Why Alby didn't just offer both custodial and self-custodial options </p> <p>[16:41] What Alby Hub gives users that custodial wallets can't—and what breaks without it </p> <p>[25:35] The real UX gap between self-custody and Cash App </p> <p>[32:07] Why AI agents should use Bitcoin instead of giving them your credit card </p> <p>[36:04] Roland's autonomous agent onboarding project—an AI spawning its own child agent </p> <p>[46:20] How Bitcoin fits into the AI disruption and why permissionless rails matter </p> <p>[54:01] First steps: taking Bitcoin off exchanges and becoming an AI builder, not just a consumer </p> <p>[59:16] Alby's NWC Faucet—play money for agents that lets them test real payment flows</p> <p><strong>Resources & Links</strong></p> <p><strong>Mentioned in Episode</strong>:</p> <ul> <li><a href="https://github.com/getAlby/hub">Alby Hub</a> - Open-source self-custodial Lightning node</li> <li><a href="https://getalby.com/">Alby Go</a> - Mobile app that acts as a remote control for your Lightning node via NWC</li> <li><a href="https://getalby.com/ai">Alby AI Tools</a> - Skills and MCP server for giving AI agents Bitcoin payment capability</li> <li><a href="https://lnvps.net/">LNVPS</a> - Bitcoin Lightning-powered VPS hosting, no KYC required</li> <li><a href="https://ppq.ai/">PayPerQ</a> - Pay-per-use AI model access via Bitcoin, no account required</li> <li><a href="https://nwc.dev/">Nostr Wallet Connect</a> - Open protocol connecting Lightning wallets to any application</li> <li><a href="https://github.com/openclaw/openclaw">OpenClaw</a> - Open-source local-first AI agent runtime</li> </ul> <p><strong>Podcast</strong>:</p> <ul> <li>Subscribe: <a href="https://podcast.trustrevolution.co">https://podcast.trustrevolution.co</a></li> <li>Music: More Ghost Than Man</li> </ul>
play-circle icon
58 MIN
Your Data's Already Gone. Now What? | James Lee
FEB 26, 2026
Your Data's Already Gone. Now What? | James Lee
<p>“You cannot have data compromised that you do not have.” James Lee has spent two decades watching breach transparency collapse—from near-total disclosure in 2020 to just 30 percent today. The president of the nation's leading identity crime nonprofit breaks down why your Social Security number is worthless on the black market. Why your driver's license isn't and what individuals can actually do when the system designed to protect them has already failed.</p> <p><strong>Episode Summary</strong></p> <p>James Lee has seen the identity crisis from both sides. He was a senior executive at ChoicePoint when a 2005 data breach triggered the first wave of breach notification laws in the United States. He now leads the Identity Theft Resource Center, the nation's only nonprofit providing free identity crime victim assistance. The ITRC's 20th annual data breach report, released weeks before this conversation, tracked a record 3,322 compromises in 2025—a 79 percent jump over five years—while 70 percent of breach notices failed to disclose how the attack happened.</p> <p>Lee walks through the real economics of stolen identity: Social Security numbers carry zero resale value because the market is so flooded, while driver's license numbers command $150 to $2,000 depending on the state, a direct consequence of pandemic-era digital verification expanding their use far beyond the DMV. The conversation moves through the limits of KYC, the case for data minimization over data hoarding, and why the ITRC advocates for more friction in financial transactions. What it means is that breached data from years ago is being recycled into new attacks. Lee makes the case that individuals, organizations, and government all need to act—and none can solve identity crime alone.</p> <p><strong>About the Guest</strong></p> <p>James E. Lee is president of the Identity Theft Resource Center (ITRC), the nation's leading nonprofit dedicated to supporting victims of identity crime at no cost. Before joining ITRC's staff in 2020 as COO, Lee served over a decade on its board of directors, including three years as chairman. His career spans senior leadership at ChoicePoint (now LexisNexis), where he navigated the landmark 2005 data breach, and Irish cybersecurity firm Waratek. He chaired two ANSI working groups on identity management and privacy and has testified before the Senate Commerce Committee on identity crime trends. Lee holds credentials from the University of Texas Center for Identity, the Wharton School, and the University of Arkansas.</p> <ul> <li>LinkedIn: <a href="https://linkedin.com/in/jeverettlee">James E. Lee</a></li> <li>ITRC: <a href="http://idtheftcenter.org">idtheftcenter.org</a></li> <li>ITRC on X: <a href="https://twitter.com/IDTheftCenter">IDTheftCenter</a></li> </ul> <p><strong>Key Quotes</strong></p> <ul> <li>“You cannot have data compromised that you do not have. So data breaches go down right there. Data breaches go down, victims go down. Data breaches go down, cybersecurity attacks go down.” — James Lee</li> <li>“That one percent of revenue put a hundred percent of the enterprise at risk.” — James Lee</li> <li>“Your driver's license has become the de facto social security number because the social security number is so compromised.” — James Lee</li> </ul> <p><strong>Key Takeaways</strong></p> <ul> <li><strong>Breach transparency is collapsing, and it's by design</strong>: In 2020, nearly 100 percent of organizations disclosed root cause details in breach notices. By 2025, only 30 percent did—leaving individuals unable to assess their own risk or take informed action.</li> <li><strong>Your Social Security number is worthless, but your driver's license isn't</strong>: SSNs are so widely compromised they're given away free in stolen data bundles. Driver's license numbers, newly valuable because of pandemic-era digital verification, sell for $150 to $2,000 on criminal marketplaces.</li> <li><strong>Data minimization beats data security</strong>: The most effective defense against breaches isn't better encryption—it's collecting less data in the first place. If you don't need it, don't collect it. If the purpose is fulfilled, delete it.</li> <li><strong>Freeze your credit and adopt passkeys today</strong>: Credit freezes are free, take minutes, and are the single most effective step individuals can take. Passkeys eliminate the credential-reuse problem that fuels most account takeovers.</li> </ul> <p><strong>Timestamps</strong></p> <ul> <li>[00:04] The ChoicePoint breach: what a 2005 data disaster taught James Lee about institutional accountability</li> <li>[09:26] Are data brokers a net positive? The uncomfortable tradeoff between utility and risk</li> <li>[12:07] Breach notice fatigue: when data breach letters become a humiliation ritual</li> <li>[15:24] From ChoicePoint to ITRC: how James Lee ended up on the other side of the table</li> <li>[18:42] Breach transparency on the decline: better legal cover, worse consumer protection</li> <li>[23:33] The golden age of identity crime: what ITRC advisors hear from victims today</li> <li>[28:27] Recycled stolen data: old breaches fueling new attacks at scale</li> <li>[30:21] Why your driver's license is now worth more than your Social Security number</li> <li>[33:42] KYC under pressure: app-based identity verification getting duped by stolen credentials</li> <li>[38:13] The case for friction: why instant payments make fraud easier</li> <li>[44:44] Government data sharing: DOGE, SSA, and the fight over federal databases</li> <li>[48:18] Data minimization: should anyone be holding this much data in the first place?</li> <li>[53:19] Credit freezes, passkeys, and individual control over identity</li> <li>[57:33] Redesigning identity from scratch: ITRC's new vision</li> <li>[1:01:06] Three things to do today if you've been breached</li> </ul> <p><strong>Mentioned in Episode</strong>:</p> <ul> <li><a href="https://www.idtheftcenter.org/publication/2025-data-breach-report/">ITRC 2025 Annual Data Breach Report</a> — ITRC's 20th edition tracking record 3,322 compromises in 2025</li> <li><a href="https://www.idtheftcenter.org">Identity Theft Resource Center</a> — Free victim assistance via phone, text, or live chat: 888.400.5530</li> </ul> <p><strong>Podcast</strong>:</p> <ul> <li>Subscribe: <a href="https://podcast.trustrevolution.co">https://podcast.trustrevolution.co</a></li> <li>Music: More Ghost Than Man</li> </ul>
play-circle icon
71 MIN
Your Money, Your Data, Your Mind | Jesse Posner
FEB 19, 2026
Your Money, Your Data, Your Mind | Jesse Posner
<p>“If somebody gets control over your personal AI — all your health data, all your financial data, all your emails, everything you've thought about — they own you.” Jesse Posner built FROST threshold signatures and shipped BitKey at Block. Now he's building Vora because he realized individual self-custody is still a LARP — and the stakes are about to get much higher.</p> <p><strong>Episode Summary</strong></p> <p>Most people think a hardware wallet means they've solved self-custody. Jesse Posner spent years at Coinbase and Block learning exactly why that's wrong. Without a full node, your wallet leaks your balance and IP address to third-party servers. Without physical security integration, your keys are one wrench attack away from worthless. Without verifiable hardware, your entire setup might be compromised from the factory floor.</p> <p>Vora is building the integrated answer: a sovereign device combining a full Bitcoin node, air-gapped hardware wallet, tamper detection, and emergency response — all designed so that attacking a Bitcoiner becomes more expensive than it's worth.</p> <p>But Posner isn't stopping at money. He argues the next frontier of self-custody is your mind. As personal AI agents accumulate our most intimate data — health records, financial decisions, private thoughts — whoever controls that AI controls the person. Vora's “guardian AI” architecture uses hardware-backed isolation to guarantee that no prompt injection can reach your most trusted model, while still letting you harness frontier cloud models for non-sensitive tasks. The same cypherpunk principles that protect Bitcoin keys now protect the most valuable asset of all: your autonomy.</p> <p><strong>About the Guest</strong></p> <p>Jesse Posner is CEO and co-founder of Vora, a startup building Bitcoin-grade self-custody for both digital assets and AI. A trained lawyer turned cryptographic engineer, Posner spent over four years at Coinbase on key management, then helped build BitKey at Block. He created the first BIP-340 compatible implementation of FROST (Flexible Round-Optimized Schnorr Threshold Signatures), supported by a Brink grant. His work sits at the intersection of cryptography, constitutional law, and physical security — bringing an unusually broad lens to the question of individual sovereignty in the digital age.</p> <ul> <li>X/Twitter: <a href="https://twitter.com/jesseposner">jesseposner</a></li> <li>Nostr: <a href="https://primal.net/jesseposner">jesseposner on Primal</a></li> <li>LinkedIn: <a href="https://linkedin.com/in/jesseposner">Jesse Posner</a></li> <li>GitHub: <a href="https://github.com/jesseposner">jesseposner</a></li> <li>Company: <a href="https://vora.io/">Vora</a></li> </ul> <p><strong>Key Quotes</strong></p> <ul> <li>“We wanted to make self-sovereignty real — where you can control your Bitcoin, maintain your privacy, protect yourself from physical attacks, and resist government seizure.” — Jesse Posne</li> <li>“If somebody gets control over your personal AI, they own you. You could literally lose control of your identity.” — Jesse Posner</li> <li>“The nation-state system is like a dead man walking — the ground has already shifted and we're just seeing the slow collapse.” — Jesse Posner</li> </ul> <p><strong>Key Takeaways</strong></p> <ul> <li><strong>A hardware wallet without a full node is a privacy leak</strong>: Every time your wallet checks your balance through a third-party server, it reveals your UTXOs and IP address — giving attackers a map to your Bitcoin and your front door.</li> <li><strong>Self-custody must include physical security, not just key management</strong>: Vora integrates tamper detection, time-delayed spending, and emergency dispatch into the custody system itself, making the economics of attacking a Bitcoiner unprofitable.</li> <li><strong>FROST threshold signatures eliminate the privacy and cost penalties of multi-sig</strong>: Traditional multi-sig reveals your entire key setup on-chain. FROST produces a single signature indistinguishable from a solo signer, with the ability to refresh, revoke, and add key shares without moving Bitcoin.</li> <li><strong>Your personal AI is the next self-custody frontier</strong>: As AI agents accumulate intimate personal data and gain the ability to act on your behalf, controlling that AI becomes as critical as controlling your keys — and the same cypherpunk architecture applies.</li> </ul> <p><strong>Timestamps</strong></p> <ul> <li>[00:00] Introduction and Jesse's background at Coinbase and Block</li> <li>[03:16] How institutional vs. individual self-custody differs</li> <li>[06:30] Executive Order 6102 and constitutional resistance to government seizure</li> <li>[09:05] Physical security: integrating alarms, tamper detection, and emergency response</li> <li>[14:31] The $5 wrench attack problem and why it gets worse as Bitcoin appreciates</li> <li>[17:53] Why a full node matters for privacy — your wallet is leaking data</li> <li>[22:48] Supply chain attacks and the case for verifiable hardware</li> <li>[27:23] Trusted execution environments: powerful but not impervious</li> <li>[32:40] How FROST threshold signatures work and why they matter</li> <li>[39:29] Proactive security: refreshing key shares without moving Bitcoin</li> <li>[44:37] Self-custody of AI: why controlling your mind is the next frontier</li> <li>[48:58] Prompt injection attacks and the “lethal trifecta”</li> <li>[52:47] Guardian AI architecture: hardware-isolated models that can't be corrupted</li> <li>[54:57] Fiduciary AI: confidentiality and undivided loyalty in a single concept</li> <li>[1:06:02] Vora's product roadmap: AI product this year, Vora Vault next year</li> <li>[1:09:34] Why the modern state has already collapsed — topos and nomos</li> <li>[1:14:24] Five-year vision: sovereign hardware, personal drones, and a renaissance of human flourishing</li> </ul> <p><strong>Resources & Links</strong></p> <ul> <li><a href="https://vora.io/">Vora</a> — Bitcoin-grade self-custody for digital assets and AI</li> <li><a href="https://github.com/BlockstreamResearch/secp256k1-zkp/pull/278">FROST Implementation</a> — Jesse's BIP-340 compatible FROST in secp256k1-zkp</li> <li><a href="https://brink.dev/">Brink</a> — Open-source Bitcoin development funding (supported Jesse's FROST work)</li> <li><a href="https://www.bunniestudios.com/">Bunny's hardware verification research</a> — Non-destructive chip imaging for verifiable hardware</li> <li><a href="https://distrust.co/">Distrust / Enclave OS</a> — Security contractors building the isolation OS for Vora</li> </ul> <p><strong>Podcast</strong></p> <ul> <li>Subscribe: <a href="https://podcast.trustrevolution.co">https://podcast.trustrevolution.co</a></li> <li>Music: More Ghost Than Man</li> </ul>
play-circle icon
81 MIN
S03E04 John Robb — Total Surveillance Is One Switch Away
FEB 13, 2026
S03E04 John Robb — Total Surveillance Is One Switch Away
<p>“All it takes is the political will or the political mistake to turn it on. And it's there.” John Robb maps the path from post-national identity collapse to automated totalitarian surveillance—and explains why most of the tools people are counting on won't stop it.</p> <p><strong>Episode Summary</strong></p> <p>The systems holding society together are breaking down faster than most people realize. John Robb returns to Trust Revolution to connect two accelerating forces: the collapse of shared national identity that made trust and governance possible and the rise of autonomous AI that makes population-scale surveillance trivially cheap. </p> <p>When common identity dissolves, everyone treats the state as a system to loot—and those benefiting from the looting need tools to maintain control. That tool is what Robb calls “the long night”: AI assigned to every individual, building profiles, manipulating behavior, punishing dissent, all automated by a small group with network access. Musk buying Twitter delayed but didn't prevent it. Asked whether Bitcoin, encryption, or decentralized networks can counter state-level AI surveillance, Robb is blunt: probably not. </p> <p>What individuals can do is leverage AI aggressively for personal economic advantage, build persistent AI agents they actually control, and resist the emotional manipulation that makes authoritarian lockdown feel necessary. Robb gives the window at roughly ten years before the economic singularity separates those who paired with AI from those who didn't.</p> <p><strong>About the Guest</strong></p> <p>John Robb is the editor of the Global Guerrillas Report on Substack and Patreon, where he publishes predictive frameworks at the intersection of war, technology, and politics. A former USAF special operations pilot who flew Tier 1 missions with Delta and SEAL Team 6, Robb later earned his MPPM from Yale, became Forrester Research's first internet analyst, and co-founded Gomez Advisors (sold to Compuware for $295 million). He is the author of <em>Brave New War</em>, a military strategy classic on open-source warfare. His work focuses on how networked systems create both unprecedented fragility and opportunity for individuals navigating institutional collapse.</p> <ul> <li>X/Twitter: <a href="https://twitter.com/johnrobb">https://twitter.com/johnrobb</a></li> <li>Substack: <a href="https://johnrobb.substack.com">https://johnrobb.substack.com</a></li> <li>Patreon: <a href="https://www.patreon.com/johnrobb">https://www.patreon.com/johnrobb</a></li> <li>LinkedIn: <a href="https://www.linkedin.com/in/john-robb-97518/">https://www.linkedin.com/in/john-robb-97518/</a></li> </ul> <p><strong>Key Quotes</strong></p> <ul> <li>“We don't trust each other anymore. Everything anyone else says, you treat it like an attack.” — John Robb</li> <li>“If you find yourself being enraged—absolutely anything, even if you think it's justified—walk away. You are being played.” — John Robb</li> <li>“Every investment [of data] you make is going to be siphoned off to the cloud and used by them to compete against you.” — John Robb</li> </ul> <p><strong>Key Takeaways</strong></p> <ul> <li><strong>The surveillance state doesn't require a conspiracy — just a switch</strong>: Corporations already built every component of totalitarian AI surveillance through normal product development. Automated, individualized manipulation at population scale is now a matter of political will, not technical capability.</li> <li><strong>Bitcoin and encryption probably won't stop the long night</strong>: Robb is direct — decentralized tools can't match the degree of control a fully deployed AI surveillance system would exert. The political and social dynamics driving demand for that control are stronger than the technical countermeasures available.</li> <li><strong>AI leverage is the individual's economic lifeline</strong>: The gap between those who pair with persistent AI agents and those who don't will widen into an unbridgeable economic divide within a decade. The priority is building AI tools you control locally — centralized services siphon your intelligence and use it to compete against you.</li> <li><strong>Empathy triggers are weaponized at network speed</strong>: Viral content manufactures tribal identity in days — what took nation-states years of propaganda. Recognizing when you're being conscripted into an emotional swarm is a core survival skill for anyone navigating algorithmic media.</li> </ul> <p><strong>Timestamps</strong></p> <ul> <li>[00:28] Why post-nationalism and AI autonomy are the two forces reshaping everything</li> <li>[03:19] What autonomous AI actually means — and why current systems fall apart after eight hours</li> <li>[07:58] The long night: what a modern totalitarian surveillance state looks like</li> <li>[14:58] Why Musk buying Twitter only delayed the surveillance threat</li> <li>[17:08] How the end of the Cold War began the structural replacement of the middle class</li> <li>[20:44] Surveillance as a service — what job it does for the cosmopolitan elite</li> <li>[28:31] Why Bitcoin and encryption probably can't counter state-level AI surveillance</li> <li>[29:17] Data ownership as the missed opportunity — sharecroppers on your own land</li> <li>[38:25] Building persistent AI agents as personal economic leverage</li> <li>[45:21] Top 10% now drive half of consumer spending — what that means for technology development</li> <li>[54:13] Empathy swarms: how viral content manufactures tribal identity in days</li> <li>[1:01:10] Staying connected, staying skeptical, and screening your family's AI exposure</li> <li>[1:07:14] Expanding the Dunbar number through AI trust proxies</li> </ul> <p><strong>Resources & Links</strong></p> <p><strong>Mentioned in Episode</strong>:</p> <ul> <li><a href="https://johnrobb.substack.com/">Global Guerrillas Report</a> — Robb's Substack with frameworks on war, technology, and politics</li> <li><a href="https://www.amazon.com/Brave-New-War-Terrorism-Globalization/dp/0471780790">Brave New War</a> — Robb's book on open-source warfare and decentralized conflict</li> <li><a href="http://www.lightspeedmagazine.com/fiction/maneki-neko/">Maneki Neko by Bruce Sterling</a> — Short story about an AI-mediated gifting economy that displaces traditional markets</li> <li><a href="https://www.marthawells.com/murderbot.htm">Murderbot Diaries by Martha Wells</a> — Science fiction series exploring autonomous AI and corporate security</li> </ul> <p><strong>Podcast</strong>:</p> <ul> <li>Subscribe: <a href="https://podcast.trustrevolution.co">https://podcast.trustrevolution.co</a></li> <li>Music: More Ghost Than Man</li> </ul>
play-circle icon
70 MIN
S03E03 Aaron van Wirdum – Bitcoin's Origin Story and the Unfinished Fight
FEB 6, 2026
S03E03 Aaron van Wirdum – Bitcoin's Origin Story and the Unfinished Fight
<p>“The cypherpunks who tried to build digital cash before Bitcoin might one day be remembered like America's founding fathers.” Aaron van Wirdum spent five years writing The Genesis Book—and warns the fight for money outside of government control isn't over.</p> <p><strong>EPISODE SUMMARY</strong></p> <p>Bitcoin didn't appear from nowhere. For decades before Satoshi, a scrappy band of cryptographers, privacy activists, and heterodox economists tried to build digital cash that could operate outside government control. They all failed—until one anonymous inventor synthesized their ideas into a system that actually worked. Aaron van Wirdum, author of <em>The Genesis Book</em> and former editor-in-chief of Bitcoin Magazine, traces this lineage from David Chaum's DigiCash in the early 90s through Nick Szabo's Bit Gold to Satoshi's breakthrough: using proof of work for consensus rather than as currency itself.</p> <p>But the origin story doesn't end with invention. Van Wirdum covered the 2015-2017 block size wars in real time—when miners, exchanges, and venture-backed startups controlling 80% of economic activity tried to change Bitcoin's rules and lost to anonymous node runners in basements. Today, the threat has shifted. Mining is concentrated, privacy developers face prison, and incremental regulation slowly suffocates self-custody. The question isn't whether Bitcoin can survive a 51% attack. It's whether it can survive becoming as monitored and controlled as email.</p> <p><strong>ABOUT THE GUEST</strong></p> <p>Aaron van Wirdum is the author of <em>The Genesis Book: The Story of the People and Projects That Inspired Bitcoin</em> and former editor-in-chief of Bitcoin Magazine's print edition. He discovered Bitcoin in 2013 and spent over a decade documenting its technical evolution and governance battles, including real-time coverage of the block size wars. Based in the Netherlands, van Wirdum studied journalism and the historical influence of technology on social structures at Utrecht University. He left X/Twitter and is now active on Nostr.</p> <ul> <li>Nostr: <a href="https://primal.net/AaronvanW">https://primal.net/AaronvanW</a></li> <li>Book: <a href="https://thegenesisbook.com">https://thegenesisbook.com</a></li> </ul> <p><strong>KEY QUOTES</strong></p> <p>“The market decides what is Bitcoin. That is ultimately what it comes down to.” — Aaron van Wirdum</p> <p>“The big concern is sort of the emailification of Bitcoin—where the protocol is still out there, but no one's actually interacting with it directly because everything is happening through [custodial solutions and regulated entities.]” — Aaron van Wirdum</p> <p>“Bitcoin is the best form of money ever invented, if it all keeps working as intended.” — Aaron van Wirdum</p> <p><strong>KEY TAKEAWAYS</strong></p> <ul> <li><strong>Bitcoin is an evolutionary step, not a lucky accident</strong>: Satoshi synthesized decades of failed attempts—Hashcash's proof of work, DigiCash's privacy, Bit Gold's decentralized registry—into a system where the pieces finally fit together. The difficulty adjustment algorithm and using proof of work for consensus (rather than as currency) were the crucial breakthroughs.</li> <li><strong>The block size wars proved Bitcoin's immune system works</strong>: When 50 companies representing 80% of economic activity tried to change the rules in 2017, fork futures markets revealed the market valued the conservative version. The users—not the miners or corporations—ultimately decide what Bitcoin is.</li> <li><strong>Individual miners refusing transactions is annoying, not existential</strong>: F2Pool censoring OFAC-sanctioned transactions means slightly longer confirmation times. The real threat is miners refusing to build on blocks that include those transactions—that's when censorship becomes enforced.</li> <li><strong>Regulatory suffocation is the most plausible failure mode</strong>: Not a protocol attack, but incremental KYC/AML rules that make self-custody harder, privacy tools illegal, and Bitcoin's actual use as digital cash impossible while ETFs and “institutional allocators” hold a version that's no different from any other financial asset.</li> </ul> <p><strong>TIMESTAMPS</strong></p> <ul> <li>[00:01] Introduction and the cypherpunk vision of building money outside government control</li> <li>[03:44] Tim May's radical vision: the internet as a new frontier for institutions</li> <li>[11:26] David Chaum and DigiCash: how the first working digital cash almost became a banking standard</li> <li>[17:15] Nick Szabo's Bit Gold: inching toward Bitcoin and why it couldn't quite work</li> <li>[21:07] Bitcoin's known weakness: the 51% attack and mining centralization today</li> <li>[25:27] The block size wars: how close Bitcoin came to capture or destruction in 2017</li> <li>[33:58] Transaction censorship: when it matters and when it doesn't</li> <li>[38:25] The OP_RETURN debate: harm reduction versus fighting spam</li> <li>[47:54] Why Aaron's still here after 13 years: “What is more important than money?”</li> <li>[54:46] The dimming torch: privacy as Bitcoin's underemphasized origin story</li> <li>[56:15] The most plausible failure mode: incremental regulation and the emailification of Bitcoin</li> <li>[60:54] Practical advice: get a wallet, get some Bitcoin, just try it</li> </ul> <p><strong>RESOURCES & LINKS</strong></p> <p><strong>Mentioned in Episode</strong>:</p> <ul> <li><a href="https://bitcoinmagazine.com/authors/aaron-van-wirdum">Bitcoin Magazine - Aaron van Wirdum's articles</a> - His coverage of Bitcoin over the past decade</li> <li><a href="https://en.bitcoin.it/wiki/New_York_Agreement">New York Agreement (Bitcoin Wiki)</a> - The 2017 scaling proposal that 50+ companies tried to force through</li> <li><a href="https://bitcoinmagazine.com/culture/genesis-files-how-david-chaums-ecash-spawned-cypherpunk-dream">How David Chaum's eCash Spawned a Cypherpunk Dream</a> - Van Wirdum's deep dive on DigiCash history</li> <li><a href="https://en.wikipedia.org/wiki/DigiCash">DigiCash (Wikipedia)</a> - Background on the first digital cash system</li> </ul> <p><strong>Podcast</strong>:</p> <ul> <li>Subscribe: <a href="https://podcast.trustrevolution.co">https://podcast.trustrevolution.co</a></li> <li>Music: More Ghost Than Man</li> </ul>
play-circle icon
64 MIN