Insecure Lightning Node? VLS Fixes This

Bitcoin Magazine
4 Sept 202413:59

Summary

TLDRJack Raldi introduces the Validating Lightning Signer (VLS) project, a solution to enhance security in the Lightning Network by separating private keys from nodes to a hardened signing device. VLS validates transactions against Lightning Network rules before signing, preventing unauthorized transactions even if the node is compromised. The project is open-source, with a roadmap including features like tag team signing and disaster recovery. VLS is adaptable for various use cases, from mobile devices to large merchants, ensuring user control over private keys. The script also discusses Validity, a project leveraging secure enclaves for enhanced Bitcoin signing security, with VLS as its initial application.

Takeaways

  • 🏌️ Jack Raldi challenges Donald Trump to a golf game with a $1 million charity bet for Bitcoin open source development.
  • 🔒 The Lightning Network faces custody challenges due to reliance on cloud providers and custodial apps, which pose security risks.
  • 💡 VLS (Validating Lightning Signer) aims to enhance security by separating private keys from the Lightning node to a hardened signing device.
  • 🛡 VLS validates Lightning Network rules before signing transactions, preventing unauthorized transactions even if the node is compromised.
  • 🔄 VLS is an open-source reference implementation, not a consumer product, and is designed for integration into other solutions.
  • 🔗 VLS allows for flexible policies, such as velocity control and approval flows, to manage transaction authorization.
  • 📱 VLS can be deployed on various devices, from mobile to large merchants' HSMs, ensuring user control over private keys.
  • 🔄 VLS is seeking developers and has a roadmap including features like tag team signing, disaster recovery, and enterprise focus.
  • 🔐 Validity, a new project funded by Spiral, focuses on integrating VLS with secure enclaves for enhanced security and policy enforcement.
  • 🔗 The project aims for hardware that is open-source, self-sovereign, and widely available, with an initial focus on ARM architecture.

Q & A

  • What is the main challenge addressed by the Validating Lightning Signer (VLS) project?

    -The main challenge addressed by the VLS project is the custody and security risks associated with Lightning Network nodes, where most nodes are hosted on cloud providers and users often rely on custodial apps, which can present challenges with authorities and increased risk of funds loss if compromised.

  • What is the concept of a 'blind signer' in the context of the Lightning Network?

    -A 'blind signer' is a device that is separated from the main node and is responsible for signing transactions without validating them. This can actually reduce security because it introduces another potential attack point and blindly signs whatever the node asks it to, without verifying the transaction's legitimacy.

  • How does the Validating Lightning Signer (VLS) improve upon the blind signer model?

    -VLS improves upon the blind signer model by not only separating the user's private keys from their Lightning node to a separate hardened signing device but also ensuring that this device validates all of the Lightning Network rules before signing a transaction. This prevents unauthorized or malicious transactions from being signed, even if the node is compromised.

  • What is the role of the VLS in the context of a Lightning Network node?

    -The VLS acts as a secure, separate device that holds the user's private keys and validates all Lightning Network rules before signing transactions. It ensures that only legitimate transactions are signed, thereby protecting the user's funds even if the main Lightning node is compromised.

  • What are some of the features that VLS allows for in terms of transaction policies?

    -VLS allows for flexible policies such as velocity control, which can limit the amount of funds that can be sent per day, and setting up approval flows for different transaction amounts, allowing certain individuals or roles within an organization to approve transactions above a certain threshold.

  • Can you provide an example of a device that can run the VLS?

    -Examples of devices that can run VLS include mobile devices, inexpensive consumer devices like an ESP32 or an STM32, and more expensive options like HSMs or hardened servers. This flexibility allows for a wide range of use cases from individuals to large merchants.

  • What is the significance of VLS being an open-source project?

    -Being open-source means that VLS is a reference implementation that can be freely used, modified, and improved upon by the community. It allows other commercial products to incorporate its features into their own solutions, promoting innovation and widespread adoption of secure Lightning Network practices.

  • How does VLS contribute to the user's control over their private keys?

    -VLS contributes to user control by allowing the end user to hold their private keys on a separate, secure device, even if their node is hosted by a third-party service provider. This ensures that the user maintains control over their funds and can unilaterally close channels and recover their Bitcoins without the need for third-party involvement.

  • What is the roadmap for the VLS project in terms of future development?

    -The roadmap for the VLS project includes working on disaster recovery features, focusing on enterprise solutions, integrating VLS with secure enclaves, and eventually supporting multisignature lightning transactions, which are dependent on other developments in the Bitcoin ecosystem like Taproot, Frost, and MAST.

  • What is the Validity project and how does it relate to VLS?

    -The Validity project is an ambitious initiative enabled by a Spiral Grant, aiming to leverage secure enclaves for Bitcoin signing. In its initial phase, it focuses on integrating with VLS, as the secure enclaves require policies that restrict key usage, which VLS effectively provides. The project aims to create a prototype, reference implementation, and developer kit for integrating VLS with secure enclaves.

Outlines

00:00

🏌️‍♂️ Introduction to the Validating Lightning Signer Project

Jack Raldi introduces the Validating Lightning Signer (VLS) project, challenging Donald Trump to a golf match with a charitable wager. The script discusses the custody challenges in the Lightning Network, where most nodes are hosted on cloud providers and users face risks of compromised funds. VLS aims to enhance security by separating private keys from the Lightning node to a hardened signing device, which validates transactions against the Lightning Network rules before signing. This prevents unauthorized transactions even if the node is compromised. VLS is an open-source project intended for incorporation into other products, not a consumer-facing product itself. The script also explains how VLS works, separating keys into another device and allowing for flexible policies such as velocity control and approval flows.

05:01

🛠️ VLS Use Cases and Future Developments

The script outlines various use cases for VLS, including running on mobile devices, inexpensive consumer devices, and hardened servers. It emphasizes that VLS allows end users to control their private keys, even if their node is hosted by a service provider, ensuring they can recover their funds without the service provider's involvement. The project is seeking developers and outlines its roadmap, which includes features like tag team signing, disaster recovery, and a focus on enterprise solutions. The script also introduces the Validity project, enabled by a Spiral Grant, aiming to integrate VLS with secure enclaves for enhanced security. The project's short-term goals involve creating a prototype, reference implementation, and developer kit, with a focus on ARM architecture and the Global Platform API.

10:01

🔩 Hardware and Software Integration for Secure Enclaves

The final paragraph discusses the hardware and software integration for secure enclaves, focusing on the use of the open-source OP-TEE implementation running in ARM TrustZone. The project aims to create a system where the VLS remote signer component is inside a trusted execution environment, providing greater security. The script describes the architecture, which includes a client app running in the Linux environment, communication with the global platform client API, and the enclave for signing. The project is open-source and seeks contributions from developers, with a preference for open-source hardware that is self-sovereign and widely available. The platforms initially supported are QEMU for emulation and the Rockchip 3399-based single-board computer for development. The project is actively seeking developers and community knowledge for security reviews and is available on GitHub.

Mindmap

Keywords

💡Validating Lightning Signer (VLS)

VLS refers to a project aimed at enhancing the security of Bitcoin's Lightning Network by separating a user's private keys from their lightning node to a separate hardened signing device. This device validates all of the Lightning Network rules before signing a transaction, thereby preventing unauthorized transactions even if the node is compromised. In the video, VLS is presented as a solution to the custody challenges in the Lightning Network, where most nodes are hosted on cloud providers, presenting security risks.

💡Custody Challenges

Custody challenges in the context of the Lightning Network refer to the risks associated with holding user funds, especially when most lightning nodes are hosted on cloud providers and users rely on custodial apps. This setup can be vulnerable to attacks, leading to potential loss of funds. The video discusses how VLS addresses these challenges by ensuring that even if a node is compromised, the user's funds remain secure as the VLS signer would not allow any transactions that would result in a loss.

💡Blind Signer

A blind signer is a device that signs transactions without validating the transaction details, which can reduce security by creating additional attack points. The video contrasts the blind signer with VLS, which validates transactions before signing, thus providing a higher level of security. The blind signer is mentioned as a solution that has been attempted to solve custody challenges but has its own set of issues.

💡Lightning Network

The Lightning Network is a second-layer solution built on top of the Bitcoin blockchain, designed to enable faster and cheaper transactions. It operates by creating payment channels between users, allowing for off-chain transactions. The video discusses various challenges and solutions related to the Lightning Network, particularly focusing on how VLS can improve its security.

💡Open Source

Open source refers to software whose source code is made available to the public, allowing anyone to view, use, modify, and distribute the software. VLS is described as an open-source reference implementation, meaning it is a freely available software that other developers can use and contribute to. This is significant as it allows for community involvement in the development and improvement of the software, ensuring transparency and collaborative innovation.

💡HSM (Hardware Security Module)

HSM refers to a physical device that safeguards and manages digital keys for strong authentication and provides cryptoprocessing. In the video, HSM is mentioned as a potential platform for running VLS, suggesting that it can provide a high level of security for the signing process. This is particularly relevant for large merchants or organizations that require a robust security infrastructure.

💡Disaster Recovery

Disaster recovery in the context of the video refers to the process of recovering funds in the event of a disaster or system failure. VLS is working on features that will enable users to recover their funds securely and efficiently, which is crucial for maintaining trust and reliability in the Lightning Network.

💡Secure Enclave

A secure enclave is a hardware-based security feature that provides a protected area within a device for processing sensitive data. The video discusses a project called Validity, which aims to integrate VLS within a secure enclave, enhancing the security of the signing process by ensuring that the private keys are protected within a secure, isolated environment.

💡Multisig Lightning

Multisig, or multisignature, refers to a requirement for more than one party to sign a transaction before it can be executed. In the context of the Lightning Network, multisig lightning would involve multiple signers controlling the same node, adding an extra layer of security. The video mentions this as a future feature that VLS is looking to implement, once underlying technologies like taproot, frost, and MAST are ready.

💡Zero-Conf Channels

Zero-conf channels refer to payment channels in the Lightning Network that do not require confirmations on the Bitcoin blockchain. The video discusses the development of features like 'splicing zero-conf channels,' which would allow for faster and more immediate transactions within the Lightning Network, enhancing its usability and efficiency.

Highlights

Jack Raldi introduces the Validating Lightning Signer (VLS) project.

Challenges in the Lightning Network include custody issues with most nodes hosted on cloud providers and users relying on custodial apps.

Risks associated with always-online lightning nodes are highlighted, as they essentially operate as hot wallets.

Blind signer solutions are critiqued for reducing security by creating additional attack points.

VLS aims to enhance security by separating private keys from the lightning node to a hardened signing device.

The VLS device validates all Lightning Network rules before signing transactions, preventing unauthorized fund loss.

VLS is an open-source reference implementation, not a consumer-facing product.

VLS allows for flexible policies such as velocity control and approval flows for transaction amounts.

System diagram of VLS is presented, illustrating the interaction between the lightning node and the remote signer.

Use cases for VLS range from mobile devices to large merchants, with various hardware options.

VLS ensures users maintain control over their private keys, even when nodes are hosted by LSPs.

The project is seeking developers and has a roadmap outlining upcoming features like tag team signing and disaster recovery.

VLS on secure enclaves is discussed as a new project enabled by a Spiral Grant.

The secure enclave approach prevents blind signing and requires policies that restrict key usage.

The project's short-term goals include creating a prototype, integration with VLS, and engaging with device manufacturers.

Hardware preferences for the project are outlined, emphasizing open-source, self-sovereignty, and affordability.

The project is open to developers and has resources available on GitHub and through matrix chat.

Transcripts

play00:00

everyone thanks for being here instead

play00:01

of uh lining up for Trump my name is

play00:03

Jack raldi I'm with the validating

play00:06

lightning signer

play00:09

project am I live y it's good to be here

play00:14

Donald if you're listening I challenge

play00:16

you to 18 holes of golf if you win I

play00:20

mean if I

play00:22

win you donate 1 million to bitcoin open

play00:25

source development and if you win you

play00:28

donate 1 million to bitcoin open source

play00:31

development so uh let's set the stage

play00:34

here so uh before we get into VLS let's

play00:36

talk about some of the challenges in the

play00:38

lightning Network so there's some

play00:39

custody challenges in that most

play00:41

lightning nodes are actually hosted um

play00:43

on cloud providers and most lightning

play00:46

users are using custodial apps and uh as

play00:49

I'm sure you've seen with recent news uh

play00:51

holding custody of user funds presents

play00:53

challenges um with the authorities um

play00:56

and it just like extra risk that uh you

play00:59

might not want to take as a provider uh

play01:02

on the other side there's people that

play01:03

are running their own nodes and holding

play01:05

custody of Their Own Private Keys uh but

play01:08

because lightning is uh always online

play01:10

you're essentially holding your keys in

play01:12

a hot wallet which uh as I'm sure a lot

play01:14

of you are aware is uh quite risky to do

play01:17

uh so because if the lightning node is

play01:19

compromised you're going to lose your

play01:20

funds uh to the

play01:22

attacker so what are some solutions that

play01:24

have been attempted to solve this

play01:26

problem uh there's something called a

play01:27

blind signer um where essentially

play01:30

the signer is separated from the node to

play01:32

a separate signing device um but the

play01:35

problem is like like the title implies

play01:38

it's a blind signer so whatever the node

play01:39

asks it to sign it just goes ahead and

play01:41

signs that and you've actually reduced

play01:43

security because now instead of just the

play01:45

one uh attack point at the node now you

play01:48

have two attack points the the blind

play01:49

signer and the node and you've reduced

play01:52

security uh so that's what how how VLS

play01:55

kind of came into being um the idea was

play01:57

to increase security of lightning setups

play01:59

by separating a user's private keys from

play02:02

their lightning node to a separate

play02:04

Harden signing device and this device

play02:06

would actually validate all of the

play02:07

lightning Network rules before it signs

play02:09

a transaction so that if an attacker

play02:12

were to compromise the lightning node uh

play02:14

the VLS signer would just not allow any

play02:17

transactions to be signed that uh would

play02:19

make you lose money so there's no other

play02:21

solution that provides this level of

play02:22

security and just one note uh VLS is an

play02:25

open- Source uh reference implementation

play02:28

of this software we are not a consumer

play02:29

facing um or commercial product we're

play02:32

just building software that um I guess

play02:34

other commercial products would then

play02:36

incorporate into their own

play02:38

Solutions uh so how does VLS work uh

play02:41

essentially what it like I said it

play02:42

separates your lightning Keys into uh

play02:45

another device that you can Harden as

play02:47

much as you like and the node then

play02:49

substitutes its own internal signing

play02:50

with a call to the VLS signer and what

play02:53

are some examples of things that VLS

play02:55

might sign it could be something like a

play02:58

uh justice transaction or closing a

play03:00

channel to a whit listed address and the

play03:03

other cool thing is that vs allows for

play03:05

um flexible policies such as uh I guess

play03:09

velocity control of how how much funds

play03:11

per day um or maybe setting up approval

play03:14

uh approval flows such that maybe

play03:16

somebody at uh I guess the front lines

play03:18

of an organization can send out let's

play03:21

say $1,000 in a payment or someone at

play03:24

the SE Suite maybe you can send out a

play03:26

million dollars in payment so you can

play03:27

kind of customize it that way or you can

play03:28

customize that any money that is uh your

play03:31

node is receiving is auto approved by

play03:34

VLS and any money that you're sending

play03:35

out maybe needs some approval from from

play03:37

a person with

play03:38

keys so this is a quick uh system

play03:41

diagram so you have your I guess

play03:43

lightning node here in the middle which

play03:45

has a a proxy to the VLS remote signer

play03:48

um and it's asking it to sign

play03:49

transactions um and then the node also I

play03:53

guess has some information here on the

play03:54

bottom uh so it has a utxl set and a

play03:57

Bitcoin node that VLS needs in order to

play04:00

track the um the the level layer one

play04:02

chain State and there's also a state

play04:04

storage uh just to make sure that let's

play04:07

say your node goes down or your VLS

play04:09

remote signer goes down that you don't

play04:11

lose uh your lightning State because if

play04:13

you do uh you're going to lose your

play04:15

funds uh because you you kind of lost

play04:16

where you're

play04:18

at uh so what are some use cases for VLS

play04:21

uh so it can be something like URI

play04:24

running VLS on our mobile device and

play04:26

this actually already exists today if

play04:28

you guys have heard of green light uh

play04:29

they're being used by Breeze and Breeze

play04:32

is offering the VLS service to their

play04:34

customers such as Rel uh that are

play04:37

running VLS on a mobile device um it

play04:40

could be also small Merchants that uh

play04:42

are using inexpensive consumer devices

play04:44

such as an esp32 or an stm32 those are

play04:47

like the sp32 is 20 bucks the stm32 is

play04:50

100 bucks uh you can just set it up and

play04:52

have it run VLS or it could be like a

play04:54

large Merchant that's running um VLS on

play04:57

an HSM or hardened server so like all

play04:59

the way from the cheapest devices all

play05:00

the way to the the most expensive uh VLS

play05:03

can run on all of them uh and the the

play05:06

cool thing is like on all of those use

play05:07

cases the end user whether it's like URI

play05:10

I or um a merchant um or an organization

play05:13

like the end user controls their private

play05:16

Keys um even if their node is hosted on

play05:18

something like an LSP so if uh the LSP

play05:22

is misbehaving or whatever the user can

play05:24

unilaterally close their channels and

play05:25

recover their Bitcoins without any

play05:28

involvement from the LSP so

play05:30

you keep control of your keys it's your

play05:32

keys and it's your

play05:34

coins uh so BLS is looking for devs and

play05:36

I just wanted to show you guys the road

play05:38

map of what we're working on um upcoming

play05:40

in case there's some interested devs

play05:42

that that want to join and contribute so

play05:44

we just finished tag team signing which

play05:46

is a feature that allows multiple nodes

play05:48

or sorry multiple signers to control the

play05:50

same node uh we're going to be working

play05:52

on Disaster Recovery in case of disaster

play05:54

like how do you recover your funds uh up

play05:57

next and then we have some features

play05:59

planned such as splicing zero conf

play06:00

channels um another version of the State

play06:03

Storage some routing B 12 uh we're going

play06:06

to do a heavy focus on Enterprise

play06:08

because we we've kind of focused on

play06:09

small signers now we're going to focus

play06:10

on big ones uh in a minute Sean's going

play06:13

to talk to you about uh VLS on secure

play06:15

enclaves which I'm really excited about

play06:17

and finally um off in the future we have

play06:20

uh multisig lightning uh which is not

play06:23

ready it depends on tap rot uh Frost and

play06:26

M 2 to be ready for use by by lightning

play06:29

which as I understand it will be in the

play06:31

future but not quite n yet uh so yeah if

play06:33

you want to take VLS for a spin um all

play06:36

these links are on our website vs. te um

play06:38

we have a matrix chat uh we have a

play06:40

gitlab repo where you can submit a

play06:41

feature request or take a look around uh

play06:44

we also have uh core lightning and uh

play06:46

LDK sample nodes running VLS uh that you

play06:49

can uh I guess spin up in Docker if you

play06:51

want to give them a shot and uh yeah and

play06:54

over to Sean for validity so validity is

play06:57

a new project um enabled by a spiral

play06:59

Grant thanks spiral um it's it's a

play07:03

pretty ambitious uh I mean my my

play07:06

long-term plans are pretty ambitious I'd

play07:08

like to see you know all kinds of things

play07:10

going on with secure enclaves and

play07:13

Bitcoin signing but in this initial uh

play07:16

phase we're going to really focus on vs

play07:19

because it's a really good match when

play07:21

you put Keys into a secure onclave um

play07:24

you can't have blind signing you need

play07:26

policies that can restrict when they're

play07:29

used and V does such a nice job of doing

play07:32

that as Jack told you that that's going

play07:34

to be our our initial uh

play07:38

application so this is a a simple

play07:41

diagram uh when you see the no it's

play07:44

basically the the VLS remote signer

play07:47

component itself uh is in inside the The

play07:51

Trusted execution environment or the

play07:52

secure onclave and then the other

play07:54

components are outside there's sort of

play07:57

two ways you can deploy this one is on a

play07:59

single device where you get the benefits

play08:02

of the of of the te running in the same

play08:05

node or you can deploy it on a separate

play08:08

device which can be even more secure

play08:10

because you have greater isolation there

play08:13

also um are some implementations of uh

play08:17

arm trust Zone that include integrated

play08:20

um Hardware that provides tamper

play08:26

resistance um that we're building this

play08:28

on top of something called opt the open

play08:31

portable trusted execution environment

play08:33

which is an enclave implementation

play08:35

that's been open source for about 10

play08:37

years now and it's a it's a pretty uh

play08:39

well supported project and a lot of uh

play08:42

commercial implementations are based on

play08:44

this reference implementation it runs in

play08:47

arm trust Zone and it integrates with

play08:50

the the Linux OS for the um the insecure

play08:54

or the rich execution environment it's

play08:56

loaded by trusted firmware a and it has

play08:59

been ported to other architectures like

play09:01

Risk 5 but for this phase of the project

play09:04

we're going to focus on arm which is

play09:06

sort of the dominant processor in uh in

play09:10

Mobile and and and becoming uh so for

play09:13

desktops and and laptops as

play09:16

well um the global platform uh is is an

play09:21

API that opt uses and that this project

play09:24

will use um it's an international

play09:27

standard uh organization and they

play09:30

provide two apis the T cant API and the

play09:33

T internal core API and by using those

play09:36

apis the software should be portable to

play09:39

some commercial uh commercial cell phone

play09:43

implementations obviously we'd have to

play09:45

partner with those companies and get

play09:47

whitelisted but that's is a long-term

play09:49

goal for the

play09:51

project uh our short-term goals are to

play09:54

put together a prototype a reference

play09:56

implementation and a developer kit um to

play09:59

do the integration with

play10:01

v um to begin talking to device

play10:05

manufacturers you can come find me if

play10:08

you're making a device um to get uh some

play10:11

more contributors and to start begin

play10:13

collecting Community knowledge security

play10:15

reviewers uh fuzzers come come get us

play10:18

well give me a couple months to get

play10:20

further with the software but we'll

play10:22

we'll be looking forward to uh

play10:24

constructive criticism in that

play10:27

area um we we in terms of Hardware you

play10:31

know what we'd like to see like the Holy

play10:33

Grail is Hardware that's open source has

play10:37

no uh no blobs or large binaries in the

play10:41

um either the bootloader or the device

play10:43

drivers Etc that you can develop with

play10:45

without signing a non-disclosure

play10:47

agreement that allows the hardware that

play10:51

you deploy to be self- Sovereign meaning

play10:53

you control the bootloader um and to be

play10:56

affordable and widely available we're

play10:58

going to have to make some compromises

play11:00

on this um there the current prototype

play11:03

that we're doing I believe there's one

play11:04

blob in the in the in the bootloader but

play11:08

um we want to begin the process of

play11:11

driving things more towards an open-

play11:13

Source uh

play11:15

ecosystem so the platforms that we're

play11:18

supporting in this initial phase are

play11:20

cumu which is a software emulator which

play11:22

allows us to develop on you know an x86

play11:26

PC or an arm I I use an arm Mac um and

play11:31

we're using this uh

play11:33

Raja Rock four single board computer

play11:36

which has a Rockchip

play11:38

3399 which has a full uh trust Zone

play11:41

implementation and support for secure

play11:43

boot it's uh you can get them for as

play11:46

little as like 60 bucks I

play11:49

think this is a a diagram of the

play11:52

architecture I'm going to go through

play11:54

this really quick but there's a client

play11:56

app that runs in the Linux World um that

play11:59

would be the um the the validating

play12:01

lightning signer component that talks

play12:03

via seral or tcpip to to the node um or

play12:08

maybe even a Unix socket and then it

play12:11

talks to the global platform client API

play12:13

goes down through the kernel through the

play12:15

firmware into the enclave and then the

play12:18

signing occurs up here and then the the

play12:20

sign messages will come back

play12:24

out um you can find uh the project on

play12:27

GitHub um it'll eventually have its own

play12:29

domain but for now it's just under my

play12:31

account and we have a uh a matrix chat

play12:35

room inside of the uh it doesn't say it

play12:39

but it's it's it's it's part of the V

play12:42

project the

play12:43

V uh what's it called yeah the VLS uh

play12:46

group VLS

play12:49

group so yeah like I mentioned we're

play12:51

looking for devs so if you're uh

play12:53

interested in helping open source um

play12:55

come come talk to us uh after the

play12:57

presentation and uh uh yeah thank you

play13:01

very much uh for for checking us out uh

play13:04

we have some links down here if you want

play13:05

to if you want to learn more um yeah

play13:07

thanks for everyone for the attention

play13:11

[Applause]

play13:16

[Music]

play13:26

[Music]

play13:29

a

play13:31

[Music]

Rate This

5.0 / 5 (0 votes)

Связанные теги
Bitcoin SecurityLightning NetworkVLS ProjectCustody ChallengesBlind SignerOpen SourceTransaction ValidationSecure EnclavesGolf ChallengeBitcoin Development
Вам нужно краткое изложение на английском?