Hardtalk
Part One: The Infiltration Operations
Simon Dixon opens his analysis with a provocative thesis: Bitcoin itself began as a hijack. He argues the project appropriated earlier work on DigiCash, the privacy-focused digital currency developed by David Chaum. When legacy banking regulations forced DigiCash's shutdown, Dixon believes the intellectual lineage continued through Len Sassamon—a student of Chaum's in the Netherlands—whom Dixon identifies as the most likely candidate behind the Satoshi Nakamoto pseudonym. The first Bitcoin transaction went to Hal Finney, with Gavin Andresen becoming the first lead developer after Satoshi's disappearance.

The genius of Bitcoin's architecture, Dixon explains, lies in its three-part governance structure that distributes power across developers, miners, and nodes. Developers maintain the open-source code and review improvement proposals. Miners compete every ten minutes to add blocks to the chain, earning rewards and transaction fees. Nodes—anyone running the full blockchain history—verify and accept blocks, providing a critical check on miner power. Initially, these roles overlapped among a small group of enthusiasts, but the system was designed to grow more decentralized over time.
Dixon documents multiple infiltration attempts targeting each pillar:
Developer infiltration progressed through several stages. Initially, community members funded developers via QR codes. Then BitPay, a payment processor, began paying developers—raising concerns about corporate influence. The Bitcoin Foundation emerged as a more decentralized funding structure but was itself compromised when figures like Brock Pierce joined its board. Later, Blockstream, Chaincode Labs, and MIT's Digital Currency Initiative became funding sources. Most explosively, Dixon reveals that Jeffrey Epstein attempted to identify and cultivate relationships with key Bitcoin developers as early as 2011. Epstein met with Adam Back and Austin Hill of Blockstream in 2014. Reed Hoffman, LinkedIn's founder, led Blockstream's seed round while maintaining Epstein connections. Peter Thiel communicated with Epstein about destabilizing Bitcoin through manufactured internal conflict between "digital gold" and "digital cash" factions.
The divide-and-conquer operation (2015-2017) exploited the scaling debate to fracture the community. The central question—should Bitcoin prioritize being a store of value with limited block sizes, or a medium of exchange with larger blocks?—became an ideological battleground. Dixon believes this conflict was deliberately stoked. When SegWit2X, a compromise agreement supported by miners and major companies, failed after Core developers refused to implement the hard fork portion, Bitcoin Cash emerged as an alternative chain with larger blocks.
The Craig Wright operation represents one of the most bizarre infiltration attempts. Dixon recounts how Brock Pierce spent three hours trying to convince him to publicly support Wright's claim to be Satoshi. Gavin Andresen initially vouched for Wright after a cryptographic signing ceremony—but later admitted the demonstration used a laptop provided by Wright's team, raising questions about whether he was deceived. John Matonis introduced Wright as Satoshi at events. Wright subsequently aligned with the Bitcoin Cash community while refusing to explicitly endorse it, creating confusion and division. Dixon views this as a classic intelligence-style operation designed to fracture the big-block faction.
Wall Street infiltration accelerated through ETFs and custody services. The approval of spot Bitcoin ETFs transformed Bitcoin into an institutional asset held by BlackRock, Fidelity, and others—creating a parallel system of paper Bitcoin that Dixon warns could mirror gold's capture through derivative markets.
Government and intelligence infiltration included Operation Choke Point 2.0, which Dixon describes as a coordinated effort to debank crypto companies. He alleges connections between intelligence agencies and failed platforms like Celsius and FTX. The proposed Clarity Act and Genius Act, in his view, would integrate stablecoins into the regulatory apparatus, advancing central bank digital currency infrastructure under the guise of innovation.
Dixon's conclusion: Bitcoin was never successfully hijacked, but it faces continuous attempts. The architecture of checks and balances—where no single group can impose changes without consensus—has so far prevented capture.
Part Two: The Debate Over Hijacking
The dialogue between Dixon and Steve Patterson, co-author of "Hijacking Bitcoin" with Roger Ver, reveals fundamental disagreements about Bitcoin's trajectory while exposing surprising areas of consensus.
Both men agree that Epstein-connected networks infiltrated Bitcoin's development ecosystem. They concur that Blockstream's funding from Epstein-affiliated entities like Digital Garage represents a serious compromise that demands explanation. They agree that Brock Pierce—a figure who moved from child acting through tech startups tinged with scandal to cryptocurrency—exemplifies the suspicious actors drawn to Bitcoin's early days. And both identify Peter Todd as a problematic figure; Todd has proposed mechanisms that could alter Bitcoin's 21-million-coin cap, and his relationship with former Core maintainer Gloria Zhao raised questions about covert influence.
The debate crystallizes around competing interpretations of key events:
The Gavin Andresen question divides them sharply. Patterson argues Andresen was pushed aside when MIT changed his title from lead developer to "chief scientist," effectively removing his authority after he supported bigger blocks. The Craig Wright incident, in Patterson's view, shows Andresen was either deceived or compromised—but either way, his credibility was destroyed, clearing the path for small-block proponents to consolidate control. Dixon acknowledges the suspicious timing but questions whether the laptop explanation represents genuine deception or convenient plausible deniability. He notes that Andresen declined Epstein's meeting requests, suggesting resilience against compromise.
The centralization debate exposes their deepest philosophical divide. Patterson contends that Bitcoin Core developers effectively control the protocol because they hold commit access to the repository. When 80% of miners signaled support for block size increases during the scaling wars yet the change never happened, Patterson sees proof that a small group can override economic consensus. The Hong Kong agreement—where miners and companies pledged to implement SegWit followed by a 2MB hard fork—collapsed because Core developers simply refused to code the hard fork portion. To Patterson, this demonstrates that Bitcoin is far more centralized than advocates claim.
Dixon counters that governance involves multiple power centers. When Core developers proposed changes miners opposed, user-activated soft forks emerged as a tool for node operators to resist. When exchanges listed Bitcoin Cash futures, they created market signals that influenced miner decisions. The system isn't perfect—pockets of centralization exist—but the interplay between developers, miners, nodes, exchanges, and market forces creates checks and balances absent in any other cryptocurrency.
The custody question reveals an unexpected point of agreement. Both acknowledge that holding Bitcoin through custodians—whether exchanges, ETFs, or services like PayPal—fundamentally undermines Bitcoin's value proposition. The creation of paper claims exceeding actual Bitcoin mirrors the gold market's capture. Where they differ: Patterson sees small blocks forcing users toward custodial lightning networks as evidence of successful capture, while Dixon views self-custody as the exit hatch that remains available to those who choose it.
The Tether connection emerges as significant new evidence. Patterson notes that Tether/Bitfinex—companies sharing ownership—invested in Blockstream, suggesting financial entanglement between the stablecoin issuer and the development team that opposed block size increases. Brock Pierce founded what became Tether before selling it to Bitfinex. The integration of stablecoins into regulatory frameworks through legislation like the Clarity Act, in Patterson's view, advances the "financial prison" vision Roger Ver has warned about.
Perhaps most striking is their agreement on bad actors. Both explicitly identify Adam Back, Brock Pierce, Craig Wright, and Peter Todd as compromised or problematic figures. This consensus from opposing sides of the Bitcoin/Bitcoin Cash divide lends weight to concerns about specific individuals while validating Dixon's broader thesis that infiltration touched multiple factions.
The debate concludes with a fundamental divergence: Patterson has exited cryptocurrency entirely, believing the industry captured by forces building digital surveillance infrastructure. Dixon maintains that self-custodied Bitcoin remains the best available tool for financial sovereignty—even as he acknowledges that institutional custody and regulatory integration create a parallel system of control.
Part Three: The Current Governance War
Dixon brings the analysis to the present day, examining the conflict between Bitcoin Knots and Bitcoin Core that has emerged around Core v30 and BIP 110. This represents Bitcoin's most significant governance debate since the block size wars, though with important differences.
The Taproot catalyst set the stage. The 2021 upgrade, which enhanced Bitcoin's scripting capabilities, inadvertently enabled new uses like Ordinals—non-fungible tokens inscribed on the Bitcoin blockchain—and BRC-20 tokens. Critics dubbed this "spam" that bloats blocks and drives up fees for monetary transactions. A single transaction fee spiked significantly during peak congestion in 2023.
Two competing solutions emerged. Bitcoin Core's approach raised the OP_RETURN limit—essentially creating a larger "trash can" for non-financial data—while keeping policy neutral. Their reasoning: if legitimate demand exists for this data, better to keep it visible and fee-market-driven rather than pushing it into covert channels where miners might cut private deals. Bitcoin Knots, an alternative implementation maintained by long-time developer Luke Dash Jr., implemented aggressive spam filtering by default. BIP 110 would codify such filtering as a network-wide consensus rule through a user-activated soft fork.
The arguments reveal philosophical fault lines.
Proponents of BIP 110, including Matthew Kratter of Bitcoin University, argue that Bitcoin should optimize for money, not data storage. They cite technical burdens—bandwidth, CPU, synchronization times—and economic harm from fee spikes. The 55% miner activation threshold, they note, is lower than previous soft forks, and a user-activated fallback exists if miners don't signal support. Miners follow the rules nodes enforce; if nodes reject blocks containing "spam," miners must comply or lose revenue.
Opponents, including developer Vortex and commentator Tone Vays, contend that BIP 110 threatens technical innovation (potentially breaking miniscript, lightning improvements, and BitVM), creates dangerous precedent for transaction censorship, and risks chain splits. They argue Core's approach maintains Bitcoin's neutrality—validating transactions based on form, not content—while encouraging non-monetary data to use visible, fee-bearing methods rather than covert workarounds.
Historical parallels and divergences prove illuminating. The 2017 user-activated soft fork enforced SegWit, a change Core developers had already coded. The current proposal would override Core's policy decision—a fundamentally different dynamic. Yet both involve minorities attempting to shift network rules.
Dixon synthesizes these perspectives through Jimmy Song's framework: the conflict, while messy, represents Bitcoin's governance working as intended. A decentralized system has no CEO; rules emerge through contention. The process tests whether a 55% miner threshold can be reached, whether a user-activated soft fork can succeed without that threshold, and how economic actors—exchanges, treasury companies like MicroStrategy, mining pools, and sovereign miners—respond.
What Dixon is doing: He will run Knots to support competing implementations, believing Core v30 drifted from optimal policy. But he won't actively campaign for BIP 110, preferring to observe whether the activation thresholds are met. The process itself—the discovery of network consensus through structured conflict—matters more than any specific outcome.
The resolution mechanisms remain uncertain. If miners signal 55% support, BIP 110 activates. If not, users can attempt activation around September 2026. Core supporters might respond with a "user-rejected soft fork"—an unprecedented countermeasure. The interaction between ETF providers, treasury companies, mining pools, and sovereign actors will reveal much about Bitcoin's current power dynamics.
Dixon's ultimate conclusion reinforces his central thesis: everyone always tries to hijack Bitcoin. Intelligence agencies, venture capitalists, governments, and corporations all attempt influence. But Bitcoin's architecture—requiring consensus across developers, miners, and nodes—has so far prevented any single group from capturing the protocol. The current "spam war" represents not failure but antifragility: each conflict strengthens the system by revealing attack vectors and forcing transparent resolution.
The evidence supports a measured view. While infiltration attempts clearly occurred—the Epstein connections to Blockstream developers, the deliberate stoking of factional conflict, the capture of custody infrastructure—Bitcoin itself continues operating as designed. The 21-million-coin cap remains. Self-custody remains possible. Transactions continue settling every ten minutes. Governance continues evolving through contention rather than capture.
Significant and Surprising Points
Intelligence and Compromise Networks
- Jeffrey Epstein's Bitcoin connections extended beyond passive interest to active cultivation of developers. He attempted to meet Gavin Andresen (who declined), funded MIT's Digital Currency Initiative, and hosted Blockstream co-founders Adam Back and Austin Hill on his island in 2014—connections Blockstream confirmed while claiming they later divested Epstein-affiliated investments.
- Peter Thiel discussed a "destabilization campaign" with Epstein regarding Bitcoin, according to email evidence. The strategy exploited divisions between "digital gold" and "digital cash" narratives—a fault line that defined years of community conflict.
- Brock Pierce, who founded what became Tether, transitioned from child acting through allegations of misconduct with minors (settled without admission of guilt) to cryptocurrency prominence. He attempted to convince Dixon to publicly endorse Craig Wright as Satoshi.
The Craig Wright Operation
- Gavin Andresen's endorsement of Wright hinged on a cryptographic signing ceremony using a laptop Wright's team provided—a detail Andresen acknowledged could indicate deception. Whether genuine trickery or convenient cover story remains debated.
- The operation created maximum confusion: Wright claimed to be Satoshi while refusing to explicitly endorse Bitcoin Cash, yet privately told Dixon he favored it. The net effect fractured the big-block community.
Development Funding and Influence
- Tether/Bitfinex invested in Blockstream, creating financial ties between the largest stablecoin issuer and the development team that opposed block size increases.
- Gloria Zhao, a former Core maintainer, revoked her PGP signing key amid questions about her relationship with Peter Todd and ideological alignment with Ethereum—suggesting community pressure can remove potentially compromised developers.
The Custody Capture
- Institutional treasury companies like MicroStrategy now hold massive Bitcoin positions, creating significant influence on network governance discourse despite not holding direct voting power.
- ETFs create paper Bitcoin claims that could exceed actual Bitcoin, mirroring the gold market's capture through derivatives—a systemic risk Dixon emphasizes.
The Current Governance War
- BIP 110's 55% activation threshold is lower than typical soft fork requirements, reflecting its contentious nature.
- A "user-rejected soft fork" could emerge as a countermeasure—an entirely novel governance mechanism that has never been deployed.
- The dispute centers on whether policy should be neutral (Core's position: accept any valid transaction) or restrictive (Knots/BIP 110: filter non-monetary data)—a question with no clear right answer.
Areas of Unexpected Consensus
Despite their fundamental disagreements, Dixon and Patterson agreed that Adam Back, Brock Pierce, Craig Wright, and Peter Todd are compromised or problematic actors—a striking convergence from opposite sides of the Bitcoin/Bitcoin Cash divide.