{"id":7102,"date":"2026-03-01T22:24:47","date_gmt":"2026-03-01T22:24:47","guid":{"rendered":"https:\/\/cryptonews.uk.com\/?p=7102"},"modified":"2026-03-01T22:24:47","modified_gmt":"2026-03-01T22:24:47","slug":"bitcoin-developer-hides-a-66kb-image-in-a-transaction-to-expose-a-governance-blind-spot-vulnerable-to-spam","status":"publish","type":"post","link":"https:\/\/cryptonews.uk.com\/?p=7102","title":{"rendered":"Bitcoin developer hides a 66KB image in a transaction to expose a governance blind spot vulnerable to spam"},"content":{"rendered":"<p><\/p>\n<div>\n<p>A Bitcoin developer embedded a 66-kilobyte image inside a single transaction without using OP_RETURN or Taproot.<\/p>\n<p>The transaction followed consensus rules. Anyone can verify the bytes using standard node software. Martin Habov\u0161tiak didn&#8217;t do this to make art, but to prove that closing one data doorway doesn&#8217;t remove the capability, it just changes where bytes hide.<\/p>\n<p>The demonstration lands amid Bitcoin&#8217;s most contentious governance fight in years. One faction wants stricter filters to keep \u201cspam\u201d off the blockchain.<\/p>\n<p>Another argues that harsh restrictions push people into worse behaviors and advantage large miners. Habov\u0161tiak&#8217;s experiment provides evidence for the second position: filtering redirects rather than preventing them.<\/p>\n<h2>What actually happened<\/h2>\n<p>Habov\u0161tiak&#8217;s write-up includes a transaction ID and verification method.<\/p>\n<p>Users can run bitcoin-cli getrawtransaction, then xxd -r -p to reconstruct the file. The construction avoids the two pathways most cited in data storage debates: the OP_RETURN field that Bitcoin Core recently relaxed, and Taproot&#8217;s witness structure that enabled many inscriptions.<\/p>\n<p>Bitcoin transactions are bytes. Nodes enforce that bytes follow structural rules, such as valid signatures, proper formatting, and legitimate spending conditions.<\/p>\n<p>They don&#8217;t enforce that bytes \u201cmean money only.\u201d If someone constructs valid transaction bytes that also form a valid image file, the network stores and relays them.<\/p>\n<p>Bitcoin can discourage certain data patterns through software defaults. It cannot prevent them without directly confronting miners&#8217; economic incentives.<\/p>\n<h2>The distinction nobody explains<\/h2>\n<p>Bitcoin operates with two layers of rules. Consensus rules determine what blocks are valid. Policy rules determine what transactions individual nodes relay and what miners typically accept into mempools by default.<\/p>\n<table>\n<thead>\n<tr>\n<th>Rule layer<\/th>\n<th>What it controls (plain English)<\/th>\n<th>What it can\u2019t guarantee<\/th>\n<th>Why it matters here<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>Consensus rules<\/td>\n<td>What makes blocks\/tx valid<\/td>\n<td>Can\u2019t enforce \u201cmoney-only meaning\u201d<\/td>\n<td>If it\u2019s valid, it can be mined<\/td>\n<\/tr>\n<tr>\n<td>Policy \/ standardness<\/td>\n<td>What nodes relay \/ mempools accept by default<\/td>\n<td>Can be bypassed<\/td>\n<td>Filters add friction, not certainty<\/td>\n<\/tr>\n<tr>\n<td>Miners\u2019 inclusion<\/td>\n<td>What gets into blocks<\/td>\n<td>Incentives override preferences<\/td>\n<td>Fees can \u201cbuy\u201d inclusion<\/td>\n<\/tr>\n<tr>\n<td>Direct submission pipelines<\/td>\n<td>Bypasses relay network<\/td>\n<td>Concentrates access<\/td>\n<td>\u201cPay-to-play\u201d risk (Slipstream-type routes)<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Policy can slow behavior, raise friction, and impose costs. It cannot guarantee prevention if a transaction remains consensus-valid and pays sufficient fees.<\/p>\n<p>Miners can include any consensus-valid transaction, especially when it reaches them through paths that bypass regular node relay.<\/p>\n<p>OP_RETURN size limits have always been policy choices, not consensus walls. Bitcoin Core has historically treated these as standardness nudges, with developers arguing that harsh limits push people into worse encodings, such as stuffing data into outputs that appear spendable, bloating the UTXO set that every node must maintain.<\/p>\n<p>Habov\u0161tiak&#8217;s demonstration makes this abstract argument concrete. Cap one method, and engineering effort flows toward another.<\/p>\n<h2>The pay-to-play problem<\/h2>\n<p>Even when many nodes refuse to relay \u201cnon-standard\u201d transactions, economic incentives create workarounds. Mining pools accept transactions directly, bypassing the relay network. Services explicitly launched for this already exist.<\/p>\n<p>MARA&#8217;s Slipstream operates as a direct submission pipeline for \u201clarge or non-standard\u201d transactions that nodes often exclude from mempools even when they follow consensus rules. The service routes around defaults rather than breaking rules.<\/p>\n<p>This creates a centralization vector that stricter filters may amplify. When regular nodes won&#8217;t relay certain transaction types, only miners and specialized services can reliably land them in blocks.<\/p>\n<p>At 10 satoshis per virtual byte, one megabyte of blockspace costs approximately 0.1 BTC. At 50 satoshis per byte, roughly 0.5 BTC. The \u201cban\u201d question becomes \u201cwhat will people pay?\u201d<\/p>\n<figure id=\"attachment_521548\" aria-describedby=\"caption-attachment-521548\" style=\"width: 1673px\" class=\"wp-caption aligncenter\"><img fetchpriority=\"high\" fetchpriority=\"high\" decoding=\"async\" class=\"wp-image-521548 size-full\" src=\"https:\/\/cryptoslate.com\/wp-content\/uploads\/2026\/02\/Photos_NSaSnXEsYf.jpg\" alt=\"The ban question\" width=\"1673\" height=\"936\" srcset=\"https:\/\/cryptoslate.com\/wp-content\/uploads\/2026\/02\/Photos_NSaSnXEsYf.jpg 1673w, https:\/\/cryptoslate.com\/wp-content\/uploads\/2026\/02\/Photos_NSaSnXEsYf-300x168.jpg 300w, https:\/\/cryptoslate.com\/wp-content\/uploads\/2026\/02\/Photos_NSaSnXEsYf-1024x573.jpg 1024w, https:\/\/cryptoslate.com\/wp-content\/uploads\/2026\/02\/Photos_NSaSnXEsYf-768x430.jpg 768w, https:\/\/cryptoslate.com\/wp-content\/uploads\/2026\/02\/Photos_NSaSnXEsYf-1536x859.jpg 1536w\" sizes=\"(max-width: 1673px) 100vw, 1673px\"\/><figcaption id=\"caption-attachment-521548\" class=\"wp-caption-text\">Chart shows the cost to occupy one megabyte of Bitcoin blockspace ranges from 0.10 BTC at 10 sat\/vB to 1.00 BTC at 100 sat\/vB.<\/figcaption><\/figure>\n<h2>BIP-110 and the governance battlefield<\/h2>\n<p>The demonstration arrives as Bitcoin debates BIP-110, a proposal to temporarily restrict data-carrying transaction fields at the consensus level for approximately one year.<\/p>\n<table>\n<thead>\n<tr>\n<th>Field \/ area<\/th>\n<th>What BIP-110 proposes (plain English)<\/th>\n<th>What it\u2019s trying to prevent<\/th>\n<th>Main tradeoff \/ risk<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>New output scripts<\/td>\n<td>New scriptPubKeys &gt; <strong>34 bytes<\/strong> invalid (except OP_RETURN allowance)<\/td>\n<td>Data stuffed into outputs<\/td>\n<td>Risk of pushing data elsewhere<\/td>\n<\/tr>\n<tr>\n<td>OP_RETURN exception<\/td>\n<td>OP_RETURN allowed up to <strong>83 bytes<\/strong><\/td>\n<td>Small provable notes<\/td>\n<td>Critics: still doesn\u2019t \u201cban data\u201d<\/td>\n<\/tr>\n<tr>\n<td>Payload limits<\/td>\n<td>Caps certain pushed data elements (general <strong>256-byte<\/strong> ceiling with exceptions)<\/td>\n<td>Large embedded blobs<\/td>\n<td>Workarounds may emerge<\/td>\n<\/tr>\n<tr>\n<td>Witness stack elements<\/td>\n<td>Limits witness element sizes (general <strong>256 bytes<\/strong>)<\/td>\n<td>Inscription-style payloads<\/td>\n<td>Might redirect to worse encodings<\/td>\n<\/tr>\n<tr>\n<td>Duration framing<\/td>\n<td>Temporary (~<strong>1 year<\/strong>)<\/td>\n<td>Tactical slowdown<\/td>\n<td>Implies \u201cno clean permanent fix\u201d<\/td>\n<\/tr>\n<tr>\n<td>Second-order effect<\/td>\n<td>If data shifts into UTXO-like outputs<\/td>\n<td>Avoid long-term node burden<\/td>\n<td>Backfire risk: <strong>UTXO bloat<\/strong> increases<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>The draft would make new output scripts exceeding 34 bytes invalid, except for OP_RETURN outputs, which can be up to 83 bytes. It also proposes limits on payload sizes and witness stack elements, generally capping them at 256 bytes with narrow exceptions.<\/p>\n<p>Supporters frame BIP-110 as a measure that protects node operators from runaway storage costs.<\/p>\n<p>Critics warn about side effects and implementation risks. The proposal represents an escalation from policy-level filtering to consensus-level restriction, a shift carrying governance implications beyond the immediate technical question.<\/p>\n<p>Habov\u0161tiak&#8217;s experiment feeds directly into this debate. It demonstrates that even consensus restrictions face pressure to adapt. He notes BIP-110 could invalidate his specific construction, but also that he could produce alternatives using different encodings.<\/p>\n<p>The underlying dynamic persists: squeeze one pattern, and incentives plus ingenuity push data elsewhere.<\/p>\n<p>The temporary framing, one year rather than permanent, acknowledges this reality implicitly. A permanent change would require confronting harder questions about the sustainability of enforcement.<\/p>\n<p>A temporary measure admits the problem may lack a clean technical solution, only tactical management with a limited shelf life.<\/p>\n<h2>The worst-behavior problem<\/h2>\n<p>Restricting popular data pathways can backfire by pushing usage toward encodings that impose higher network costs.<\/p>\n<p>When developers create outputs that look spendable to carry arbitrary data, they increase the UTXO set, which is the database of unspent outputs every full node must maintain in accessible storage.<\/p>\n<p>UTXO growth represents a more persistent burden than witness data or OP_RETURN payloads, which can be pruned. An output that encodes an image file remains in the UTXO set until someone spends it, potentially indefinitely.<\/p>\n<div id=\"cs-inline-newsletter-69a4a7fba1b34\" class=\"cs-inline-newsletter\" data-inline-newsletter=\"\">\n<div class=\"cs-inline-newsletter__inner\">\n<div class=\"cs-inline-newsletter__content\"> <span class=\"cs-inline-newsletter__eyebrow\">CryptoSlate Daily Brief<\/span><\/p>\n<h3 class=\"cs-inline-newsletter__title\">Daily signals, zero noise.<\/h3>\n<p class=\"cs-inline-newsletter__copy\">Market-moving headlines and context delivered every morning in one tight read.<\/p>\n<p> <span><i class=\"fa-regular fa-bolt\" aria-hidden=\"true\"\/> 5-minute digest<\/span> <span><i class=\"fa-regular fa-star\" aria-hidden=\"true\"\/> 100k+ readers<\/span><\/p>\n<\/div>\n<div class=\"cs-inline-newsletter__form-shell\">\n<p class=\"cs-inline-newsletter__privacy\">Free. No spam. Unsubscribe any time.<\/p>\n<p> <i class=\"fa-regular fa-circle-xmark\" aria-hidden=\"true\"\/> <span>Whoops, looks like there was a problem. Please try again.<\/span><\/p>\n<p> <i class=\"fa-regular fa-circle-check\" aria-hidden=\"true\"\/> <span>You\u2019re subscribed. Welcome aboard.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<p>The node cost accumulates rather than aging away.<\/p>\n<p>This explains Bitcoin Core&#8217;s historical reluctance to impose harsh limits on OP_RETURN. The alternative isn&#8217;t necessarily better. Filters that seem protective can increase long-term operating costs for nodes, undermining the decentralization goal they aim to preserve.<\/p>\n<h2>Three paths forward<\/h2>\n<p>The enforcement economics suggest three scenarios.<\/p>\n<p>The first path maintains the status quo: price it, don&#8217;t ban it. Arbitrary data persists, governed primarily by fee markets. When blockspace becomes scarce, data-heavy transactions are naturally priced out. The lever becomes economic rather than technical.<\/p>\n<p>The second path tightens policy filters while leaving consensus unchanged. Data shifts toward harder-to-filter encodings and direct-to-miner submission. Centralization risk rises because only miners and specialized pipelines can reliably confirm these transactions.<\/p>\n<p>The third path implements consensus restrictions, such as those outlined in BIP-110. Popular patterns may temporarily decline, but adaptation continues as new encodings emerge. Collateral damage increases if limits push data into outputs that bloat the UTXO set.<\/p>\n<p>Governance risk escalates as contentious consensus changes raise coordination challenges and the potential for network splits.<\/p>\n<h2>What decides the outcome<\/h2>\n<p>Three indicators signal which scenario materializes.<\/p>\n<p>First, miner behavior. Do mining pools continue accepting non-standard transactions through direct channels? Services like Slipstream exist specifically for this, as their sustained operation reveals miner priorities.<\/p>\n<p>Second, governance trajectory. Does BIP-110 gather meaningful adoption beyond debate? The proposal requires coordinated activation across a decentralized network, making political viability as important as technical merit.<\/p>\n<p>Third, second-order effects. Do restrictions push more data into encodings that increase node burden? UTXO growth rates during policy tightening periods would provide empirical evidence.<\/p>\n<h2>The uncomfortable reality<\/h2>\n<p>If you oppose on-chain data storage beyond financial transactions, Habov\u0161tiak&#8217;s demonstration delivers an uncomfortable message: you probably can&#8217;t ban it.<\/p>\n<p>You can price it through fee markets. You can discourage it through policy defaults. You can raise friction through implementation complexity.<\/p>\n<p>But full prevention requires either accepting economic constraints you cannot control or implementing consensus restrictions that carry their own risks.<\/p>\n<p>Bitcoin validates transaction structure, not meaning. The protocol doesn&#8217;t distinguish between \u201cmoney transactions\u201d and \u201cdata transactions\u201d because that distinction requires interpretation that the network cannot perform.<\/p>\n<p>The real debate isn&#8217;t whether Bitcoin can technically prevent arbitrary data, as the demonstrated answer is \u201cnot easily, and perhaps not at all.\u201d<\/p>\n<p>The debate is which tradeoffs the network accepts: centralization toward miners who bypass filters, governance risk from contentious consensus changes, or higher long-term costs from worse encoding choices.<\/p>\n<p>Habov\u0161tiak&#8217;s image proves the filters don&#8217;t work as advertised. What comes next depends on whether Bitcoin&#8217;s users and developers accept that reality or continue pursuing technical solutions to what increasingly appears to be an economic and governance problem.<\/p>\n<\/div>\n<p>Featured,Mining,Technology#Bitcoin #developer #hides #66KB #image #transaction #expose #governance #blind #spot #vulnerable #spam1772403887<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A Bitcoin developer embedded a 66-kilobyte image inside a single transaction without using OP_RETURN or Taproot. The transaction followed consensus rules. Anyone can verify the bytes using standard node software. Martin Habov\u0161tiak didn&#8217;t do this to make art, but to prove that closing one data doorway doesn&#8217;t remove the capability, it just changes where bytes<\/p>\n","protected":false},"author":1,"featured_media":7103,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[2938,91,2941,1639,379,437,96,2939,2943,943,2940,2942],"class_list":{"0":"post-7102","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ethereum","8":"tag-66kb","9":"tag-bitcoin","10":"tag-blind","11":"tag-developer","12":"tag-expose","13":"tag-governance","14":"tag-hides","15":"tag-image","16":"tag-spam","17":"tag-spot","18":"tag-transaction","19":"tag-vulnerable"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v26.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Bitcoin developer hides a 66KB image in a transaction to expose a governance blind spot vulnerable to spam - Crypto News: Latest Cryptocurrency News and Analysis<\/title>\n<meta name=\"description\" content=\"Martin Habov\u0161tiak avoided OP_RETURN and Taproot, and anyone can verify the bytes with standard node commands.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cryptonews.uk.com\/?p=7102\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Bitcoin developer hides a 66KB image in a transaction to expose a governance blind spot vulnerable to spam\" \/>\n<meta property=\"og:description\" content=\"Martin Habov\u0161tiak avoided OP_RETURN and Taproot, and anyone can verify the bytes with standard node commands.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cryptonews.uk.com\/?p=7102\" \/>\n<meta property=\"og:site_name\" content=\"Crypto News: Latest Cryptocurrency News and Analysis\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-01T22:24:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cryptonews.uk.com\/wp-content\/uploads\/2026\/03\/bitcoin-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"\u884c\u653f\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\u884c\u653f\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cryptonews.uk.com\/?p=7102\",\"url\":\"https:\/\/cryptonews.uk.com\/?p=7102\",\"name\":\"Bitcoin developer hides a 66KB image in a transaction to expose a governance blind spot vulnerable to spam - Crypto News: Latest Cryptocurrency News and Analysis\",\"isPartOf\":{\"@id\":\"https:\/\/cryptonews.uk.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cryptonews.uk.com\/?p=7102#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cryptonews.uk.com\/?p=7102#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cryptonews.uk.com\/wp-content\/uploads\/2026\/03\/bitcoin-image.jpg\",\"datePublished\":\"2026-03-01T22:24:47+00:00\",\"author\":{\"@id\":\"https:\/\/cryptonews.uk.com\/#\/schema\/person\/822778c5844e0d16d43dce6630f4f1bf\"},\"description\":\"Martin Habov\u0161tiak avoided OP_RETURN and Taproot, and anyone can verify the bytes with standard node commands.\",\"breadcrumb\":{\"@id\":\"https:\/\/cryptonews.uk.com\/?p=7102#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cryptonews.uk.com\/?p=7102\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cryptonews.uk.com\/?p=7102#primaryimage\",\"url\":\"https:\/\/cryptonews.uk.com\/wp-content\/uploads\/2026\/03\/bitcoin-image.jpg\",\"contentUrl\":\"https:\/\/cryptonews.uk.com\/wp-content\/uploads\/2026\/03\/bitcoin-image.jpg\",\"width\":1200,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cryptonews.uk.com\/?p=7102#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cryptonews.uk.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Bitcoin developer hides a 66KB image in a transaction to expose a governance blind spot vulnerable to spam\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cryptonews.uk.com\/#website\",\"url\":\"https:\/\/cryptonews.uk.com\/\",\"name\":\"Crypto News: Latest Cryptocurrency News and Analysis\",\"description\":\"Latest Crypto &amp; Bitcoin News\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cryptonews.uk.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/cryptonews.uk.com\/#\/schema\/person\/822778c5844e0d16d43dce6630f4f1bf\",\"name\":\"\u884c\u653f\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cryptonews.uk.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e4c2d23409b09e004cef3facbe677e95c5401f9e29680f3a311e0130c5748089?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e4c2d23409b09e004cef3facbe677e95c5401f9e29680f3a311e0130c5748089?s=96&d=mm&r=g\",\"caption\":\"\u884c\u653f\"},\"sameAs\":[\"http:\/\/demo3.aiwalls.com\/coinbase\"],\"url\":\"https:\/\/cryptonews.uk.com\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Bitcoin developer hides a 66KB image in a transaction to expose a governance blind spot vulnerable to spam - Crypto News: Latest Cryptocurrency News and Analysis","description":"Martin Habov\u0161tiak avoided OP_RETURN and Taproot, and anyone can verify the bytes with standard node commands.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cryptonews.uk.com\/?p=7102","og_locale":"en_US","og_type":"article","og_title":"Bitcoin developer hides a 66KB image in a transaction to expose a governance blind spot vulnerable to spam","og_description":"Martin Habov\u0161tiak avoided OP_RETURN and Taproot, and anyone can verify the bytes with standard node commands.","og_url":"https:\/\/cryptonews.uk.com\/?p=7102","og_site_name":"Crypto News: Latest Cryptocurrency News and Analysis","article_published_time":"2026-03-01T22:24:47+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/cryptonews.uk.com\/wp-content\/uploads\/2026\/03\/bitcoin-image.jpg","type":"image\/jpeg"}],"author":"\u884c\u653f","twitter_card":"summary_large_image","twitter_misc":{"Written by":"\u884c\u653f","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cryptonews.uk.com\/?p=7102","url":"https:\/\/cryptonews.uk.com\/?p=7102","name":"Bitcoin developer hides a 66KB image in a transaction to expose a governance blind spot vulnerable to spam - Crypto News: Latest Cryptocurrency News and Analysis","isPartOf":{"@id":"https:\/\/cryptonews.uk.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cryptonews.uk.com\/?p=7102#primaryimage"},"image":{"@id":"https:\/\/cryptonews.uk.com\/?p=7102#primaryimage"},"thumbnailUrl":"https:\/\/cryptonews.uk.com\/wp-content\/uploads\/2026\/03\/bitcoin-image.jpg","datePublished":"2026-03-01T22:24:47+00:00","author":{"@id":"https:\/\/cryptonews.uk.com\/#\/schema\/person\/822778c5844e0d16d43dce6630f4f1bf"},"description":"Martin Habov\u0161tiak avoided OP_RETURN and Taproot, and anyone can verify the bytes with standard node commands.","breadcrumb":{"@id":"https:\/\/cryptonews.uk.com\/?p=7102#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cryptonews.uk.com\/?p=7102"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cryptonews.uk.com\/?p=7102#primaryimage","url":"https:\/\/cryptonews.uk.com\/wp-content\/uploads\/2026\/03\/bitcoin-image.jpg","contentUrl":"https:\/\/cryptonews.uk.com\/wp-content\/uploads\/2026\/03\/bitcoin-image.jpg","width":1200,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/cryptonews.uk.com\/?p=7102#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cryptonews.uk.com\/"},{"@type":"ListItem","position":2,"name":"Bitcoin developer hides a 66KB image in a transaction to expose a governance blind spot vulnerable to spam"}]},{"@type":"WebSite","@id":"https:\/\/cryptonews.uk.com\/#website","url":"https:\/\/cryptonews.uk.com\/","name":"Crypto News: Latest Cryptocurrency News and Analysis","description":"Latest Crypto &amp; Bitcoin News","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cryptonews.uk.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/cryptonews.uk.com\/#\/schema\/person\/822778c5844e0d16d43dce6630f4f1bf","name":"\u884c\u653f","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cryptonews.uk.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e4c2d23409b09e004cef3facbe677e95c5401f9e29680f3a311e0130c5748089?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e4c2d23409b09e004cef3facbe677e95c5401f9e29680f3a311e0130c5748089?s=96&d=mm&r=g","caption":"\u884c\u653f"},"sameAs":["http:\/\/demo3.aiwalls.com\/coinbase"],"url":"https:\/\/cryptonews.uk.com\/?author=1"}]}},"_links":{"self":[{"href":"https:\/\/cryptonews.uk.com\/index.php?rest_route=\/wp\/v2\/posts\/7102","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cryptonews.uk.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cryptonews.uk.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cryptonews.uk.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cryptonews.uk.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=7102"}],"version-history":[{"count":0,"href":"https:\/\/cryptonews.uk.com\/index.php?rest_route=\/wp\/v2\/posts\/7102\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cryptonews.uk.com\/index.php?rest_route=\/wp\/v2\/media\/7103"}],"wp:attachment":[{"href":"https:\/\/cryptonews.uk.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=7102"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cryptonews.uk.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=7102"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cryptonews.uk.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=7102"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}