🏗️

Unlock Bitcoin Mastery

8 advanced modules covering cryptography, protocol scripting, node operation, monetary theory, and building on Bitcoin.

$39 USD

One-time · Lifetime access · No subscription · All prices in USD

🔒 30-day money-back guarantee

Module 01

Elliptic Curve Cryptography

At the heart of every Bitcoin transaction is elliptic curve cryptography (ECC). Bitcoin uses a specific curve called secp256k1, defined by the equation y² = x³ + 7 over a finite field. This mathematical structure makes it easy to compute a public key from a private key, but computationally infeasible to reverse the process.

Your private key is simply a random 256-bit number — one of roughly 10⁷⁷ possible values (more than the number of atoms in the observable universe). Your public key is derived by multiplying the private key by the curve's generator point G using elliptic curve point multiplication.

💡 The Trapdoor Function

ECC is a "trapdoor function" — easy in one direction, virtually impossible in reverse. Given private key k, computing public key K = k × G takes microseconds. But given K and G, finding k would take longer than the age of the universe with current computing. This asymmetry is the foundation of all Bitcoin security.

From public key to address: Bitcoin doesn't directly use the raw public key as an address. Instead, it applies SHA-256 hashing followed by RIPEMD-160 (collectively called Hash160), then adds a version byte and checksum to create a Base58Check-encoded address. This additional hashing provides a second layer of protection — even if ECC were somehow broken, your funds would still be protected by the hash functions.

📌 Quantum Resistance

Shor's algorithm running on a sufficiently powerful quantum computer could theoretically break ECC. However, Bitcoin addresses that have never spent (only received) are protected by the hash layer — an attacker would need to break both ECC and SHA-256. The Bitcoin community is actively researching post-quantum signature schemes for future soft-fork integration.

Module 02

Bitcoin Script & Transaction Types

Bitcoin transactions aren't just "send X to Y." They're programmable using Bitcoin Script — a stack-based, Forth-like language that defines the conditions under which Bitcoin can be spent. Every UTXO is locked with a script (scriptPubKey), and spending it requires providing a matching script (scriptSig).

Script is intentionally limited: it's not Turing-complete (no loops), which prevents infinite execution and makes transaction validation predictable and safe. This is a deliberate design choice — security over flexibility.

Transaction TypeScriptUse Case
P2PKHPay-to-Public-Key-HashClassic Bitcoin addresses (1...)
P2SHPay-to-Script-HashMultiSig, complex conditions (3...)
P2WPKHPay-to-Witness-PKH (SegWit)Native SegWit (bc1q...)
P2WSHPay-to-Witness-Script-HashSegWit script hashes
P2TRPay-to-TaprootTaproot addresses (bc1p...)
💡 How Script Executes

When you spend Bitcoin, the network combines your scriptSig (the "key") with the UTXO's scriptPubKey (the "lock") and executes them on a stack machine. If the final result is TRUE, the spend is valid. For a simple P2PKH transaction, this means: push your signature, push your public key, duplicate it, hash it, compare to the stored hash, verify the signature. Six opcodes, bulletproof security.

Module 03

Running & Configuring a Full Node

A full node is the ultimate expression of Bitcoin sovereignty. When you run a full node, you independently validate every transaction and every block against the consensus rules — you trust no one. You become an equal peer in the Bitcoin network.

What a full node does: it downloads and verifies the entire blockchain (~600GB as of 2026), validates every transaction against the consensus rules, relays valid transactions and blocks to other nodes, and rejects anything that violates the rules — regardless of who sent it or how much hash power supports it.

✅ Hardware Requirements

Minimum: Any modern computer with 2GB RAM, 1TB storage (SSD recommended), and a stable internet connection. A Raspberry Pi 4 with an external SSD is a popular low-cost option (~$150 total). Software: Bitcoin Core is the reference implementation. Download from bitcoincore.org, verify the PGP signatures, and let it sync (initial sync takes 1-3 days depending on hardware and bandwidth).

Why it matters for the network: Every full node is a vote for the consensus rules. During the 2017 block size wars, it was the full nodes — not the miners — that ultimately decided which chain was "Bitcoin." Miners proposed SegWit2x (larger blocks), but the economic majority of nodes rejected it. The chain with the most hash power lost to the chain with the most nodes. This was proof that Bitcoin's governance is decentralised.

💡 Pruned vs Archival

If storage is a concern, you can run a "pruned" node that only keeps the most recent blocks (as little as 5GB) while still fully validating everything. You lose the ability to serve historical blocks to other nodes, but you gain the same security guarantees as an archival node. There's no excuse not to run one.

Module 04

Multi-Sig & Timelock Contracts

Bitcoin Script enables programmable money far beyond simple transfers. Two of the most powerful primitives are multi-signature (multisig) transactions and timelocks — and combining them unlocks sophisticated financial arrangements without intermediaries.

Multisig requires M-of-N signatures to spend. A 2-of-3 multisig means three keys exist, and any two must sign to authorise a transaction. This eliminates single points of failure — no single lost or stolen key can compromise your funds.

2-of-3 MultiSig Architecture
🔑Key 1
Hardware wallet
(your home)
🔑Key 2
Hardware wallet
(bank vault)
🔑Key 3
Backup on steel
(separate location)

Any 2 of these 3 keys can authorise a spend. Lose one? You still have access. One stolen? Attacker can't spend.

Timelocks add a time dimension to Bitcoin Script. CLTV (CheckLockTimeVerify) prevents a UTXO from being spent before a specific block height or timestamp. CSV (CheckSequenceVerify) enforces a relative delay from when the UTXO was created. Together, these enable inheritance planning (coins unlock after X years of inactivity), escrow arrangements, payment channels (the foundation of Lightning), and vesting schedules for organisational treasuries.

💡 Real-World Application

Consider a Bitcoin inheritance plan: you create a 2-of-3 multisig where Key 1 is yours, Key 2 is your heir's, and Key 3 is a time-locked recovery key that activates after 1 year of inactivity. Normally, only you can spend (Key 1 + Key 2 with your cooperation). But if something happens to you, after one year your heir can use Key 2 + the now-unlocked Key 3. No lawyers, no probate, no trust required.

Module 05

Taproot, Schnorr & Future Upgrades

The Taproot upgrade (activated November 2021) was Bitcoin's most significant protocol change since SegWit. It introduced Schnorr signatures, Merkelized Alternative Script Trees (MAST), and a new address format (P2TR / bc1p...) — collectively enhancing privacy, efficiency, and smart contract capability.

Schnorr signatures replace ECDSA for Taproot transactions. They're mathematically simpler, provably secure, and critically support key aggregation: multiple public keys can be combined into a single key, and multiple signatures into a single signature. A 10-of-10 multisig becomes indistinguishable from a single-key spend on-chain — same size, same cost, complete privacy.

MAST (Merkelized Alternative Script Trees) allows complex spending conditions to be organised in a Merkle tree. Only the branch actually used is revealed on-chain. If you have a contract with 10 possible spending conditions, the blockchain only ever sees the one that was executed — the other 9 remain hidden. This dramatically improves both privacy and efficiency for complex scripts.

💡 Key/Script Path Duality

Every Taproot output has two spending paths: a key path (simple Schnorr signature, looks like any normal transaction) and a script path (reveals a MAST branch for complex conditions). In the cooperative case, parties use the key path — fast, cheap, and private. The script path is the fallback — used only if cooperation fails. This "optimistic execution" model means the common case is always the most efficient.

Future upgrades being researched: OP_CTV (covenant-style restrictions on how coins can be spent), cross-input signature aggregation (further reducing transaction sizes), and SIGHASH_ANYPREVOUT (enabling Eltoo, a next-generation Lightning channel design). Bitcoin development is slow and deliberate by design — each change undergoes years of peer review.

Module 06

Austrian Economics & Bitcoin

Bitcoin didn't emerge from a vacuum. Its design philosophy is deeply rooted in Austrian economics — a school of economic thought that emphasises individual action, subjective value, sound money, and skepticism of central planning. Understanding this intellectual foundation explains why Bitcoin works the way it does.

Sound money theory argues that money should be difficult to produce (scarcity), resistant to debasement (hard cap), and chosen freely by the market rather than imposed by decree. Gold served this role for millennia. Fiat currency abandoned these principles entirely. Bitcoin re-implements them digitally.

The Cantillon Effect: When new money is created (printed), those closest to the source (governments, banks, large institutions) benefit first by spending it before prices adjust. By the time new money reaches ordinary people, prices have already risen. This systematic wealth transfer from savers to those closest to the money printer is invisible but devastating over decades. Bitcoin's fixed supply eliminates this entirely.

💡 Time Preference

Austrian economics emphasises time preference — the degree to which people value present consumption over future consumption. Sound money (which holds or increases in value) encourages low time preference: saving, investing, thinking long-term. Inflationary money encourages high time preference: spending now because your money loses value tomorrow. Bitcoin, as a deflationary asset, structurally incentivises low time preference — arguably one of its most profound societal effects.

Hayek's denationalisation of money: In 1976, economist Friedrich Hayek proposed allowing private currencies to compete with government money, arguing competition would produce superior monetary systems. Bitcoin is the most successful implementation of this idea — a non-state money competing purely on its merits in a global market.

Module 07

Game Theory of Decentralised Systems

Bitcoin doesn't rely on anyone being honest — it creates conditions where acting honestly is the most profitable strategy. This is mechanism design: engineering the rules of a game so that self-interested behaviour produces a desired collective outcome.

Miner incentives: Miners spend enormous amounts on hardware and electricity. Their only way to recoup costs is by finding valid blocks. An invalid block is rejected by nodes and earns nothing — wasting all that energy. Therefore, rational miners always produce valid blocks. The more they invest, the more they have to lose by cheating. This is Nakamoto Consensus: security through economic incentive.

The 51% attack paradox: An entity controlling >50% of hash power could theoretically double-spend. But doing so would instantly devalue Bitcoin, destroying the value of the attacker's own massive hardware investment and mining rewards. The cost of attack rises with Bitcoin's value, while the incentive to attack falls. It's a self-reinforcing security model.

💡 Schelling Points

Bitcoin's 21 million supply cap is a Schelling point — a focal point that participants converge on without explicit coordination. Everyone expects it, so everyone enforces it. Changing it would require convincing the majority to abandon the very property that gives Bitcoin value. This social consensus is arguably stronger than any cryptographic guarantee — it's a Nash Equilibrium where no individual benefits from deviating.

Node game theory: Full nodes enforce rules for free (no block reward). Why do they run? Because node operators are typically Bitcoin holders whose wealth depends on the network's integrity. Running a node is rational self-interest disguised as altruism — you verify to protect your own assets. This aligns incentives without explicit rewards.

📌 The Byzantines Finally Agree

The Byzantine Generals Problem — how can distributed participants reach consensus when some may be dishonest? — was considered unsolvable for decades. Bitcoin's Proof of Work provides a practical solution: generals (miners) prove their commitment by expending real resources (energy), making dishonesty prohibitively expensive. Satoshi didn't just create a currency — he solved a 40-year-old computer science problem.

Module 08

Building on Bitcoin: Developer Introduction

You don't need to be a protocol developer to build on Bitcoin. A growing ecosystem of tools, libraries, and APIs makes it increasingly accessible to create applications that leverage Bitcoin's infrastructure.

Bitcoin Core RPC: The reference client exposes a JSON-RPC interface that lets you query blockchain data, create transactions, manage wallets, and interact with the network programmatically. This is the lowest-level interface — powerful but complex.

Development libraries by language:

LanguageLibraryBest For
Pythonpython-bitcoinlib, bdk-pythonScripting, prototyping, data analysis
JavaScriptbitcoinjs-lib, bdk-wasmWeb apps, browser wallets
Rustrust-bitcoin, BDKPerformance-critical apps, wallets
Gobtcd, btcutilInfrastructure, node implementations

The Lightning Development Kit (LDK) lets you embed Lightning Network functionality into any application. Rather than running a full Lightning node, LDK provides modular components you can integrate into mobile apps, web services, or IoT devices.

✅ Where to Start

Beginner: Start with Mempool.space's API — query blocks, transactions, and fee data via simple HTTP. Build a transaction explorer or fee estimator. Intermediate: Use bitcoinjs-lib or python-bitcoinlib to construct and sign transactions programmatically. Advanced: Set up Bitcoin Core in regtest mode (local test network), create custom scripts, and experiment with Taproot outputs. The Learning Bitcoin from the Command Line guide by BlockchainCommons is excellent.

💡 The Builder's Mindset

Bitcoin is open-source, permissionless infrastructure. Anyone can build on it without asking permission. The most impactful Bitcoin companies — exchanges, wallet providers, Lightning services, mining operations — were all started by people who learned the protocol and saw opportunities. Understanding Bitcoin at the level you've reached in this course puts you in a small percentage of the global population. The question isn't whether you can build — it's what you'll choose to build.

Mastery Quiz

15 questions. Score 70% to earn your Advanced Certificate.

Question 1 of 15
Score

Correct
Incorrect
Bitcoin Academy
Certificate of Completion
This is to certify that
Your Name Here

has successfully completed all lessons and passed the final assessment for the following course at Bitcoin Academy

Bitcoin Mastery — Advanced Course