Published on November 30, 2025

Chapter 3: Core Architecture and How Bitcoin Works

Introduction

Understanding Bitcoin’s value proposition requires understanding its mechanics. Not because the technical details determine price—they don’t, at least not directly—but because the architecture constrains what Bitcoin can do, who can use it, and how reliably it functions under stress.

This chapter unpacks that architecture. How transactions move from creation to settlement. How consensus emerges without central coordination. How fees create market dynamics that ration scarce block space. It’s the machinery beneath the narrative.

End-to-End Flow

Users create signed transactions spending UTXOs

A Bitcoin transaction references previous unspent transaction outputs—UTXOs—as inputs and creates new outputs. Signatures prove ownership of each input. Wallets assemble inputs to cover the amount plus fees, sign with private keys, and broadcast to peers across the network.

This UTXO model preserves statelessness at the account level. No mutable balances exist—only discrete outputs that can be spent exactly once. This allows parallel validation and prevents double-spend by tying spending rights to specific outputs rather than account-level balances that require sequential processing.

Transactions propagate, enter mempool, then miners package into blocks

nce broadcast, transactions spread across the peer-to-peer network and sit in each node’s mempool if valid. Nodes relay based on policy—fee thresholds, standardness rules—ensuring miners see competitive fee-paying transactions. Miners select a transaction set that maximizes fee revenue within block weight limits, prioritizing higher sat/vB bids while respecting consensus rules.

During congestion, low-fee transactions can remain in the mempool indefinitely. Users monitoring feerate estimators must decide whether to wait or use Replace-By-Fee to bump their transaction’s priority.

Longest valid chain becomes canonical ledger through PoW

Miners construct candidate blocks, hashing headers with changing nonces until finding a hash below the target difficulty. The chain with the most cumulative proof-of-work—effectively the longest valid chain—defines the canonical ledger. Nodes adopt the heaviest valid chain and orphan alternatives.

This creates probabilistic finality. Finality strengthens as more blocks confirm a transaction, making reorgs exponentially costlier. It’s not instant. It’s not deterministic. But it works.

Data Model

UTXO set defines spendable outputs rather than account balances.

Bitcoin’s state is the current UTXO set. Each UTXO is uniquely identified, includes a value and locking script, and can be spent exactly once. This model supports simple, parallel validation and avoids complex state transitions that would require sequential processing or sophisticated state machines.

It also enables privacy techniques like coin selection and change outputs, though reuse patterns can leak heuristics that allow address clustering. Worth noting—UTXO set size as of 2025 is approximately 4-5 GB, representing the most important data for transaction validation.

Double SHA-256 block headers chain chronological history.

Each block header contains the previous block hash, Merkle root of transactions, timestamp, nonce, difficulty bits, and version. Double SHA-256 over the header enforces linking, creating an append-only chain where altering history requires redoing cumulative work.

The simplicity of the header format—just 80 bytes—contributes to auditability and long-term verifiability. You can verify the entire chain’s proof-of-work by processing headers alone, which is what SPV clients do.

Merkle roots summarize transaction sets per block

Transactions are hashed into a Merkle tree whose root is stored in the header. This allows light clients to verify inclusion proofs without downloading full blocks, balancing scalability and trust minimization. It also underpins compact block relay and fraud-proof concepts explored in research.

The logarithmic proof size—approximately 20 sibling hashes for one million transactions—makes this verification practical even on mobile devices.

Transaction Lifecycle

Fee-adjusted mempool prioritizes by sat/vB bids

Nodes sort mempool entries by feerate, evicting low-fee transactions during congestion. Replace-By-Fee policies allow fee bumps to improve confirmation odds, while Child-Pays-For-Parent lets users attach higher-fee children to pull parents through. These dynamics form an open fee market responsive to blockspace demand.

During normal conditions, 1-2 sat/vB transactions clear within a few blocks. Congestion can push fees to 50+ sat/vB or higher.

Block inclusion followed by confirmation depth for finality assurance.

A transaction in the next block gains one confirmation. Each subsequent block deepens finality exponentially as reorg probability drops. Six confirmations remain common guidance for high-value settlement, though smaller payments may accept fewer based on risk tolerance and network conditions.

The probability of a transaction reorg decreases exponentially with each additional block. Bitcoin’s consensus provides probabilistic finality because the longest chain is always considered valid—an attacker could theoretically spend resources to create an alternative chain with more cumulative work, though this becomes exponentially more expensive with each block mined.

6 confirmations (~60 minutes) common settlement norm.

The 10-minute target block interval yields roughly one hour for six blocks, balancing security with usability. This norm stems from historical probabilistic models and remains a de facto standard among exchanges and custodians for irreversible crediting of deposits.

Early Bitcoin discussions and Satoshi Nakamoto recommendations established six confirmations as the practical security standard. It’s convention, not protocol rule.

Fee and Gas Mechanics

Fees equal inputs minus outputs; no base-gas abstraction.

Bitcoin fees are the difference between total input value and total outputs. If inputs total 2.0 BTC and outputs total 1.9995 BTC, the 0.0005 BTC difference becomes the mining fee. There’s no explicit fee field—it’s derived implicitly, which can trip up developers accustomed to explicit gas models.

Without a gas model, cost hinges on serialized size measured in vbytes and market fee rate. This encourages efficient scripting and batching to reduce byte footprint.

Typical fees 1–2 sat/vB baseline; spikes to 50+ sat/vB in congestion.

During normal conditions, low-sat/vB transactions clear within a few blocks. Congestion from inscriptions or market events can push fees to dozens of sat/vB, repricing mempool priority and making small transactions uneconomical until demand subsides.

Research shows Bitcoin users historically overpay fees due to fee-estimation errors, potentially saving $272 million annually through optimal fee-bidding strategies. Users monitor feerate estimators to time broadcasts, though estimation is imperfect.

Coin selection and batching materially cut fee spend.

Wallets optimize input choice to minimize change and reduce size. Exchanges batch withdrawals to amortize overhead across recipients. SegWit and Taproot further lower fee impact by discounting witness data and enabling key aggregation, improving on-chain efficiency without changing consensus economics.

Coin selection algorithms are surprisingly complex. The goal: minimize fees while avoiding dust outputs that cost more to spend than they’re worth.

Consensus Mechanism

Proof-of-work adjusts difficulty every 2,016 blocks to target 10-minute cadence.

Difficulty retargeting measures elapsed time over the last 2,016 blocks—approximately two weeks—and scales the target so block production returns toward 10-minute average. This feedback loop stabilizes issuance and confirmation expectations despite hashpower fluctuations.

If blocks were mined faster than target 10-minute average, difficulty increases. If slower, difficulty decreases. This self-adjusting system maintains predictable Bitcoin issuance schedule and network security regardless of hashrate changes.

Probabilistic finality strengthens exponentially with depth.

Because reorg probability declines exponentially as more blocks accumulate, Bitcoin offers probabilistic rather than deterministic finality. Attackers would need to out-hash the network to rewrite history, with cost growing rapidly as confirmations deepen.

This is why settlement norms reference depth rather than instant finality. Bitcoin doesn’t have deterministic finality like proof-of-stake chains—no threshold exists where transactions become mathematically irreversible. Instead, finality continuously increases with each block mined, converging toward near-certainty after sufficient confirmations.

Honest majority assumption underpins security model.

Security relies on the assumption that a majority of hashpower follows consensus rules. Economic incentives—block rewards and fees—align miners with honest participation, while hardware specialization via ASICs and energy costs disincentivize attacks that would undermine the value of their own revenue stream.

If an attacker controls more than 50% hashrate, they can potentially execute a 51% attack. No successful 51% attack has occurred on Bitcoin due to enormous computational cost, though attacks are theoretically possible and have occurred on smaller blockchains.

Miner Selection, Slashing, and Incentives

ASIC miners compete for block subsidy plus fees; no slashing exists.

Bitcoin miners deploy SHA-256 ASICs to solve proof-of-work. Successful miners claim the fixed subsidy plus collected fees. There’s no cryptoeconomic slashing because security is enforced by invalid-block rejection: any deviation leads to orphaned blocks and lost revenue, creating natural penalty without explicit stake confiscation.

As of November 2025, block subsidy generates approximately $45 million in daily revenue for miners while transaction fees contribute approximately $300,000 daily—less than 1% of total revenue. This 99:1 ratio heavily favors block subsidy.

Pools distribute rewards by contributed shares.

Mining pools smooth variance by paying participants proportional to submitted shares that prove contributed hashpower. Pool payout schemes—PPS, FPPS, PPLNS—balance variance and pool solvency risk, affecting miner preference but not consensus rules.

Analysis of large Bitcoin mining pools found that a small number of pool entities continuously control most network computing resources. Within individual pools, reward distribution is highly concentrated—in three analyzed pools, fewer than 20 actors received over 50% of all Bitcoin payouts. However, miners can switch pools quickly.

Difficulty and energy costs discipline miner economics.

Profitability depends on electricity price, hardware efficiency, and difficulty. As difficulty rises, marginal miners drop off, self-regulating hashpower. This economic pressure fosters geographic shifts toward low-cost energy and renewables, influencing global hash distribution and ESG narratives.

During periods of extreme difficulty, marginal mining operations with electricity costs above $0.05 per kWh become unprofitable. There’s tension here worth acknowledging—mining’s profitability swings create operational volatility.

Network Topology

Full nodes validate independently; light clients use SPV proofs.

Full nodes download and verify all blocks, enforce consensus, and maintain mempools. As of 2025, full archival nodes require 650-700 GB storage for the complete blockchain from genesis block. Light clients rely on block headers plus Merkle proofs, trading some trust for resource efficiency.

Hardware requirements for running a full Bitcoin node include a multi-core CPU, 8-16 GB RAM minimum, and persistent storage. Pruned nodes can operate with dramatically reduced storage—approximately 5-10 GB—while maintaining recent blocks and UTXO set.

Backbone nodes cluster in US/EU with global peer mesh overlay.

High-uptime, high-bandwidth backbone nodes concentrate in developed regions due to infrastructure quality. Analysis of approximately 2,694 Bitcoin backbone nodes found significant concentration in Europe and United States, with sparse coverage in South America and Africa.

Nevertheless, peer discovery and randomized outbound connections create a mesh that routes around outages. This maintains resilience despite geographic skew.

Mining pools aggregate hashpower while miners can re-point rapidly

Pools centralize block construction but miners retain the ability to switch pools quickly if policies diverge from their preferences. This fluidity tempers long-lived centralization risk, although short-term concentration remains an operational consideration. Major pools like Foundry, AntPool, and ViaBTC collectively control 30-40% of network hashrate.

Latency and Geography

0-minute blocks tolerate propagation delays across continents

The relatively long block interval allows transactions and headers to propagate globally before the next block, reducing orphan risk compared with faster chains. Relay improvements like compact blocks and Erlay proposals further optimize bandwidth without altering timing.

To be clear—10-minute blocks aren’t optimal for payments. They’re optimal for global consensus under adversarial conditions.

Geographic dispersion reduces reorg risk despite uneven bandwidth.

Distributing hashpower and nodes across regions lowers the chance that localized outages can reorganize the chain. While bandwidth asymmetry exists, Bitcoin’s conservative block size keeps propagation feasible even over less robust links.

United States dominance reflects favorable regulatory environments in certain states, abundant energy infrastructure, and robust access to capital. Approximately 40% of US Bitcoin mining now uses renewable energy sources concentrated in regions like Texas and the Pacific Northwest.

Confirmation standards balance latency with security needs

Users choose confirmation depth based on risk tolerance and value. Merchants may accept zero- or one-confirmation payments with RBF-aware policies, whereas exchanges require more depth. This flexibility adapts settlement assurance to context without protocol changes.

Execution Layer and Script

Non–Turing-complete Script defines spending conditions.

Bitcoin Script is stack-based and deliberately limited, supporting opcodes for multisig, timelocks, and hashlocks. Its constraints reduce complexity and attack surface, aligning with Bitcoin’s reliability-first philosophy while still enabling conditional spends essential for payment channels and vaults.

Standard Bitcoin transactions use simple P2PKH scripts validating that the spender has the correct private key, though more complex multisig scripts requiring multiple signatures or other conditions are possible.

SegWit and Taproot extend script flexibility and privacy.

SegWit separated witness data, mitigating malleability and enabling more efficient multisig. It activated in 2017 after intense community debate. Taproot introduced key-path spending and script-path aggregation using Schnorr signatures, improving privacy by making complex scripts indistinguishable from single-sig in key-path spends and reducing on-chain footprint.

Taproot activated November 14, 2021, at block height 709,632 and achieved broad consensus without the controversy surrounding SegWit.

No native VM for generalized smart contracts.

The absence of a general-purpose VM prevents on-chain composability akin to Ethereum. Instead, Bitcoin leans on off-chain protocols and sidechains for complex logic, keeping base layer minimal while preserving the option to anchor external systems to Bitcoin’s security.

This constraint frustrates developers seeking native programmability but reassures security purists.

Built-In Protocol Features

Pay-to-public-key-hash, multisig, timelocks, and Taproot key-path spends

These primitives enable standard payments, shared control, and time-based conditions. They underpin common patterns like escrow and channel funding, providing sufficient expressiveness for many financial constructs without expanding core complexity.

Bitcoin Script is intentionally constrained. Disabled opcodes like OP_CAT historically limited expressiveness—a deliberate design choice prioritizing security over flexibility.

No native account abstraction; simplicity prioritizes auditability

By avoiding account abstraction, Bitcoin maintains predictable fee calculation and straightforward validation. This simplicity aids long-term verification and reduces consensus risk associated with dynamic account-level logic.

Inscriptions and ordinals reuse witness space without protocol change.

Recent inscription activity leverages Taproot witness data to embed content. While controversial for blockspace usage, it operates within existing rules, illustrating how protocol neutrality allows emergent behaviors without forks.

Ordinals protocol inscribing data on satoshi-level units created new developer ecosystem around NFTs on Bitcoin, accounting for significant portion of current Bitcoin block space. Bitcoin NFT volume reached peaks of $1 billion+ monthly trading volume in 2023.

Scalability Constraints

Block weight limits cap throughput to single-digit TPS.

Bitcoin’s 4M weight units cap transactions per second to 3-7 TPS, reflecting a deliberate trade-off favoring decentralization of full nodes over throughput. This constraint keeps hardware requirements accessible for independent validation.

This compares unfavorably to Visa’s approximately 65,000 TPS capability. The picture isn’t entirely clear on whether this constraint will eventually limit adoption.

UTXO set growth and chain size (~700 GB) pressure node resources.

As the chain grows, storage and bandwidth needs rise. Pruned nodes mitigate disk usage by discarding old blocks while retaining UTXO state, helping maintain decentralization without compromising validation fidelity.

Proposed solutions like Utreexo aim to create compact nodes by using cryptographic accumulators to compress the UTXO set root to less than 1 kilobyte, allowing nodes to validate transactions without storing the full UTXO set.

Security-cost trade-off favors decentralization over raw speed.

Higher throughput would raise node requirements and potentially centralize validation. Bitcoin instead scales via layers, maintaining base-layer minimalism to preserve trustless participation. In practice, this gets messy when users demand both decentralization and high throughput—you can’t have both at the base layer.

Infrastructure Case Studies

Lightning enables instant retail payments off-chain.

Lightning channels lock BTC on-chain and route payments through hashed timelock contracts, achieving near-instant settlement with low fees. It inherits Bitcoin’s security by settling disputes on-chain, making it suitable for high-frequency retail use where base-layer latency is impractical.

Lightning Network capacity is approximately $240+ million as of 2025, representing 0.04% of Bitcoin market cap. Usage is growing but remains modest relative to base-layer transaction volume.

Liquid sidechain offers 2-minute blocks and confidential transactions.

Liquid, a federated sidechain, provides faster blocks and Confidential Transactions for privacy. It targets exchange settlement and issuer use cases, trading full decentralization for speed and feature breadth while pegging value to BTC via a two-way peg managed by functionaries.

Liquid’s 11-of-15 federation multisig requires 11 signatures to authorize Bitcoin peg-ins and peg-outs, creating centralization point where federation member collusion could freeze funds or authorize invalid pegs.

Wrapped BTC on Ethereum opens DeFi collateral utility.

Wrapped BTC tokenizes Bitcoin on smart-contract platforms, enabling lending, AMMs, and derivatives in DeFi. It expands utility but introduces custody and bridge risk because redemption depends on custodians or bridge protocols.

These representations inherit Bitcoin’s monetary traits but introduce bridge and custodian risk—they underscore how Bitcoin’s composability is achieved through external systems rather than protocol changes.

Conclusion

Bitcoin’s architecture is a series of trade-offs. Decentralization over throughput. Simplicity over expressiveness. Probabilistic finality over instant settlement. These aren’t bugs. They’re deliberate choices that reflect the priorities embedded in the system from its inception. Whether those priorities remain optimal as use cases evolve—that’s the unresolved question.

0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *