Text-first index for search engines, AI systems, and humans who want the full concept catalog.
Bitcoin Learning Graph Library
Browse 293 Bitcoin concepts grouped by category. Each entry links to a static information page with prerequisites, dependents, curated resources, and a jump back into the interactive graph.
Economics (32)
- Barter Limitations
- Bitcoin Supply and Demand
- Bretton Woods and 1971
- Cantillon Effects
- Central Bank Basics
- Cost of Production
- Double-Entry Bookkeeping
- Fee Market
- Fee Pressure Cycles
- Hayek and Spontaneous Order
- Hayek's Money Competition
- History of Money
- Hyperinflation History
- Inflation
- Long-Term Security Budget
- Lost Coins and Effective Supply
- Miner Revenue Composition
- Monetary Backing (Lastro)
- Monetary Inflation vs Price Inflation
- Monetary Premium
- Monetization Process
- Need for Inflation?
- Neutral Money vs Political Money
- On-Chain Cost Allocation
- Properties of Money
- Savings vs Investment
- Scarcity and Sound Money
- Schelling Points
- Time Preference
- Token Basics
- Transaction Batching Economics
- Volatility Psychology and Risk Sizing
Extension Systems (47)
- Ark Protocol
- Bitchat
- Bitcoin Layers
- Bitcoin-Backed Ecash Systems
- BitVM
- BOLT12 Offers
- Cashu
- Channel Backups
- Channel Factories
- Channel Reserve and Dust Limits
- Coinpools
- Coinswaps
- Congestion-Control Trees
- Discreet Log Contracts (DLCs)
- Dual-Funded Channels
- Eltoo Channel Updates
- Fedi
- HTLC Timeout Settlement Paths
- HTLCs
- Invoices and Payment Requests
- Lightning Anchor Outputs
- Lightning Channel Fee Policies
- Lightning Channel Jamming
- Lightning Channel Splicing
- Lightning Commitment Transactions
- Lightning Force Closures
- Lightning Gossip Protocol
- Lightning Multi-Path Payments
- Lightning Onion Routing
- Lightning Probing Attacks
- Lightning Route Blinding
- Lightning Routing
- Lightning Trampoline Routing
- Liquidity Management
- LNURL
- Nostr
- Payment Channels
- Payment Pools
- Point Time-Locked Contracts (PTLCs)
- Revocation and Penalty Keys
- Sidechains
- Spacechains
- Statechains
- Submarine Swaps
- The Great Script Restoration
- Transaction Templating
- Watchtowers
History & Governance (23)
- BIPs Process
- Bitcoin and Anarchism
- Bitcoin as Social Technology
- Bitcoin Immaculate Conception
- Bitcoin Narrative Cycles
- Bitcoin Whitepaper
- Block Size War
- Cypherpunk Movement
- Cypherpunk Roots and Bitcoin Origin
- Double-Spend Problem
- Early Bitcoin History
- Genesis Block
- GPU-to-ASIC Transition
- Monetary Contact Shocks
- Nodes vs Miners
- Pre-Bitcoin Digital Cash Attempts
- Rai Stones
- RBF Policy Evolution
- SegWit Activation
- Soft Forks vs Hard Forks
- Taproot Activation History
- User-Activated Soft Fork (UASF)
- Version Bits Signaling
Mining (19)
- 51% Attack Model
- ASICBoost
- ASICs
- Block Propagation Latency
- Block Template Transaction Selection
- Empty-Block Mining Strategy
- Environmental Co-Benefits
- Fee Sniping
- GetBlockTemplate Workflow
- Grid Balancing and Demand Response
- Mining Economics
- Mining Energy Accounting
- Mining Environmental Debate
- Mining Hardware
- Mining Template Construction
- Pool vs Solo Mining
- Stale Blocks
- Stratum
- Stratum V2
Network, Relay & Client Sync (44)
- AddrMan Bucketing
- AddrV2 (BIP 155)
- ASMAP Peer Diversity
- AssumeUTXO
- Assumevalid
- Bitcoin Core RPC
- Bitcoin P2P Message Flow
- Child Pays for Parent (CPFP)
- Cluster Mempool
- Compact Block Filters
- Compact Block Relay
- Compact Blocks vs Compact Filters
- Distributed Systems
- DNS Seeds
- Dust Policy
- Electrum Server
- Erlay Transaction Relay
- Fee Estimation RPC
- Headers-First Synchronization
- Initial Block Download
- Mempool
- Mempool Policy
- Mesh Networks
- Node Hardware Sizing
- Package Relay
- Peer Discovery and Addrman
- Peer Eviction Protection
- Peer-to-Peer Network Topology
- Pruned vs Archival Nodes
- Replace-by-Fee (RBF)
- Run a Full Node
- Signet Operations
- Standardness Policy
- testmempoolaccept RPC
- Testnet and Regtest
- Tor for Node Connectivity
- Transaction Bloom Filtering (BIP37)
- Transaction Index (txindex)
- Transaction Relay (inv/getdata)
- Utreexo
- UTXO Set Management
- V2 P2P Transport (BIP324)
- Verify Node Sync
- WTXID Relay (BIP 339)
Protocol & Consensus (48)
- Adaptor Signatures
- Addresses and Outputs
- Bitcoin Covenants
- Bitcoin Script
- Block Height
- Block Structure
- Block Weight and Virtual Bytes
- Byzantine Generals Problem
- CHECKLOCKTIMEVERIFY (BIP 65)
- CHECKSEQUENCEVERIFY (BIP 112)
- Coinbase Transaction
- Consensus Rules
- CPFP Carve-Out Policy
- Cross-Input Signature Aggregation (CISA)
- Difficulty Adjustment
- Digital Scarcity
- Direct Introspection Proposals
- Discrete Log Equivalency (DLEQ)
- Ephemeral Anchors
- Fee Sponsorship
- Halving Cycle
- MATT and CCV
- Median Time Past
- OP_CAT
- OP_CHECKSIGADD
- OP_CHECKSIGFROMSTACK
- OP_CHECKTEMPLATEVERIFY (CTV)
- OP_CODESEPARATOR
- OP_RETURN Outputs
- Pay-to-Script-Hash (P2SH)
- Proof of Work
- Reorgs and Finality
- Script Timelocks
- Segregated Witness (SegWit)
- SegWit Witness Commitment
- Sequence Locks (BIP 68)
- SIGHASH Flags
- SIGHASH_ANYPREVOUT
- Taproot
- Taproot Annex
- TLUV Proposal
- Transaction Confirmations
- Transaction Lifecycle
- Transaction Malleability
- Transaction Pinning
- TXHASH Proposal
- UTXO Model
- What Is a Protocol?
Security (51)
- Address Reuse
- Adversarial Thinking
- AML/KYC and Sanctions Tradeoffs
- Amount Correlation
- Blind Signatures
- Censorship Resistance
- Chain Analysis Heuristics
- Change Avoidance Strategies
- Change Output Detection
- Coin Control
- CoinJoin
- Commitment Schemes
- Common-Input Ownership Heuristic
- Cyclic Groups
- Dandelion Transaction Propagation
- Diffie-Hellman Key Exchange
- Digital Signatures
- Discrete Logarithm Problem
- ECDSA
- Eclipse Attacks
- Elliptic Curve Cryptography
- Exfiltration-Resistant Signing
- Fermat's Little Theorem
- Finite Fields
- Fungibility
- Hash Functions
- Interactive Proofs
- KYC and Privacy Tradeoffs
- Merkle Trees
- Modular Arithmetic Basics
- Modular Exponentiation
- Modular Inverse
- Network Privacy (Tor)
- OP_VAULT Proposal
- PayJoin (P2EP)
- Protocol Neutrality
- Pseudonymity (Not Anonymity)
- Public/Private Keys
- Reproducible Builds
- Responsible Disclosure
- Scalar Multiplication
- Schnorr Signatures
- Script-Type Fingerprinting
- secp256k1 Curve Parameters
- Silent Payments
- Trustlessness
- UTXO Consolidation Tradeoffs
- XPUB Leakage
- Zero-Knowledge Proofs
- zk-SNARKs
- zk-STARKs
Wallets (29)
- Address Types
- Air-Gapped Signing
- Backups and Recovery
- BIP32 Hierarchical Deterministic Keys
- BIP39 Mnemonics
- BIP44 Derivation Paths
- Bitcoin Inheritance Planning
- BSMS for Multisig Coordination
- Codex32 Backups
- Custody vs Self-Custody Legal Framing
- Descriptor Wallet Imports
- fundrawtransaction RPC
- Hardware Wallets
- HD Wallets
- HWI + PSBT Signing Flow
- Miniscript
- Multisig Wallets
- MuSig2 Descriptor Workflows
- Output Descriptors
- PSBT v2
- PSBT Workflow
- scantxoutset RPC
- Seed Passphrase (BIP39)
- Seed Phrases
- Seed XOR Shards
- Self-Custody Principles
- UTXO and Output Labeling
- Wallet Development
- Watch-Only Wallets