Engraving in Stone: Encoding Images in Bitcoin (or BTC) Transactions

2025-09-08 · 5,634 words · Singular Grit Substack · View on Substack

Designing Persistence Beyond Permission

Thesis:

Bitcoin is not a polite request for approval. It is a protocol that, by design, allows information to be bound to proof. An image can be carved into it — not by consensus, not by permission, but by engineering. Whether one uses fake addresses, multisig payloads, or arbitrary script fields, the chain is stone; what is written remains. The true question is not “should it be done” but “how to do it efficiently and verifiably.”

Keywords:

Bitcoin, data embedding, addresses, multisig, image encoding, Merkle proofs, permanence, dust outputs, engineering design.


I. Introduction

People have always wanted to write on stone. The first caveman who dragged a lump of charcoal across a wall was doing the same thing the child with the spray-paint can does on the train siding today. And the instinct didn’t vanish when the medium shifted. When Bitcoin was new, people immediately began doodling in its blocks—ASCII art, signatures, little hidden poems—because the impulse to carve something into permanence is older than law. This is not an accident, nor an aberration. It is the natural extension of what a blockchain is: a record you cannot easily erase, the wall you cannot simply paint over when the mood shifts. The question was never “should” people write into it; the question has always been “how.”

Too many pretend otherwise. They treat permanence as though it were permission, as if one needed to genuflect before a committee of technocrats to scratch a mark into digital granite. But permanence has nothing to do with consensus. Consensus is about which version of the ledger survives, not about what bytes may live within it. Once you know the fields, once you know the rules, you can engineer your message into permanence without asking anyone’s blessing. It may be dust in an output, or a string in a multisig key, or a root hash tied into a Taproot leaf. The method doesn’t matter. The permanence comes from the structure itself. And structure, unlike men, does not waver with fashion.

There is something faintly comic about the spectacle of people arguing “this is spam” or “that is misuse.” As though the laws of mathematics bend to etiquette. Encoding data into Bitcoin is not a debate, it is a fact: if a field accepts bytes, those bytes can be chosen, and whatever they represent is now carved into stone. One can sneer about whether it is noble or ignoble, useful or frivolous, but sneers do not erase bytes. The chain does not blush, it does not take sides, it simply endures.

And so the problem before us is not moral but technical. How do we do this most effectively? How do we distinguish childish graffiti from verifiable archive? A face scrawled in ASCII is amusing; a contract, a signature, or an image embedded and proven through cryptographic structure is civilisation. Permanence is not about the whim of what is written, but the certainty that what was written can be proven tomorrow, or ten years from now, against the stone of the headers. That is the difference between law and vandalism, between engineering and noise.

The irony is that all the constructions are open to us. The P2PKH address, with its 20-byte payload, can be anything we like, a canvas disguised as a key hash. A multisig script can hold multiple thirty-three-byte chunks dressed up as public keys. OP_RETURN fields openly announce themselves as payloads of arbitrary bytes. Even Taproot, the darling of committees, conceals within its leaves an invitation to write. The primitives were never closed; it is only the imaginations of men that shut them.

Thus the thesis is plain. Permanence in Bitcoin is not consensus, not etiquette, not ideology. It is encoding. The challenge is not whether it is permitted—because it already is—but how to design systems of efficiency and verifiability. Graffiti or archive, joke or judgment, the chain does not care. It is permanence itself. The only question is what we choose to write upon it, and how carefully we choose to bind those marks to evidence, so that what is carved is not only indelible but undeniable.


II. The Mechanics of Embedding

The mythology of Bitcoin would have you believe that its transaction structure is sacrosanct, that each field exists for a single, noble purpose ordained at birth. The truth is far more sardonic: every field that accepts arbitrary bytes is a blank page, and the only limit is imagination. Whether those bytes stand for a public key, an address hash, or a flag saying “return nothing,” the chain does not discriminate. The chain is dumb, and dumbness is its virtue. It writes, it preserves, it forgets nothing. Men argue; bytes endure.

Start with the simplest case: the address. A so-called pay-to-pubkey-hash (P2PKH) looks, to the untrained eye, like a number conjured from the void. But anatomically it is just 20 bytes of payload wrapped in checksum and Base58 perfume. Any 20 bytes can be made to masquerade as a “valid” address. The chain doesn’t know that no private key exists. It doesn’t care. If you can generate the checksum, you can convince the system to accept your payload as though it were the fingerprint of a public key. In other words: every “address” is a Trojan horse, and inside it may ride ASCII, hashes of images, contract fragments—anything that fits in 20 bytes. Dust coins sacrificed to these fake addresses are no different from paint splashed across a cave wall: the data is written, permanence achieved, and no one has the key to wash it off.

Move a step higher and the mischief grows. A multisig script demands multiple public keys, each 33 bytes long. But a “public key” is just an elliptic-curve point expressed as a byte string. Nothing prevents you from taking any arbitrary 33-byte string and calling it a “public key.” The script will compile. The chain will store it. The permanence will last long after the supposed quorum has forgotten it. One “address” thus becomes a palette of multiple slots, each holding a slice of some greater image, file, or proof. The arithmeticians call it misuse; the poets call it encoding. The chain calls it nothing at all.

Then comes OP_RETURN, the most honest of them all. No pretence here. This opcode says plainly: “burn these bytes, they are not spendable, they are only for record.” By design, it is the chalkboard of Bitcoin. The committees tried to shackle it with limits—80 bytes, then 40, then perhaps none at all, depending on the year and the fashion—but the principle stands. OP_RETURN is the one field that admits its duplicity. You are not meant to redeem it; you are meant to read it. In its brevity lies its joke: a system built to transmit money has a little alcove where you can scrawl a note, a signature, a root hash. The censors tut, but the bytes remain.

Even the sanctified temple of Taproot is, in truth, a book of hidden leaves. Each script leaf is a door through which arbitrary data can be pushed. Today’s committees advertise it as a feature for privacy or flexibility, but the underlying mechanism is the same: if a field accepts bytes, it can carry meaning. Dress it as a leaf, or a pubkey, or a hash—it makes no difference. The stone does not blush.

And here lies the great irony. The high priests argue endlessly over whether encoding data is noble or perverse, whether it pollutes or enriches. But whether you disguise your payload as “an address” or as “a key,” the result is indistinguishable. The ledger does not care what label you attach; it writes the bytes forever. The arguments are human theatre; the permanence is mathematical fact.

What unifies these mechanics is not their intended use but their indifference. The protocol is not a parliament; it does not vote on what is worthy. It is a scribe without imagination. Any byte that enters is a byte preserved. You may call it graffiti, or you may call it notarisation; you may call it pollution, or you may call it preservation. The ledger does not call it anything at all. It records, and by recording, it grants permanence.

Thus, the anatomy of embedding is simple: every 20-byte payload slot, every 32-byte pubkey, every OP_RETURN field, every Taproot leaf, is a canvas. Some canvases are small, some large, some honest, some in disguise. But they are canvases all the same. The only question is what one chooses to inscribe upon them—and whether one has the wit to make the inscription efficient, verifiable, and meaningful, rather than just another adolescent scrawl on a permanent wall.


III. Image Preparation and Chunking

Begin with the raw file, denoted as B — an image, a document, a sound, whatever you please. Bitcoin does not care what it is; the system knows only bytes. Yet to write it into the stone of the ledger, order must be imposed upon chaos. A file is not one thing, but a sequence, and the chain rewards those who are meticulous with their carving.

The first step is optional but wise: compression. Why spend more when less will do? The file B can be passed through a compressor — zstd, gzip, or any other scheme — yielding a smaller B′. Whether one does this or not is immaterial to permanence, but crucial to efficiency. Every byte that goes into the chain costs something, and so the prudent scribe trims his excess.

Once B′ exists, the next act is chunking. No matter which embedding mechanism you choose, you are never dealing with infinite fields. The slots are fixed, and so the file must be sliced to fit them. If the payload hides inside an “address,” it accepts 20 bytes. If it is disguised as a “public key” in a multisig script, it allows 33 bytes. If the mask is OP_RETURN, then 80 bytes is the usual canvas, bounded more by policy than by protocol. And so the file is carved into pieces, each precisely the size that the canvas demands, save perhaps the last, which may be shorter.

This slicing has a consequence: order must be preserved. An image rearranged is no longer an image, but noise. Thus each chunk is labelled, indexed, and prepared for later reassembly. To guard against corruption, each chunk is hashed:

hᵢ = H(Cᵢ)

where Cᵢ is the i-th chunk, and H is SHA-256 (or any digest one prefers). These hashes become the guardians of integrity, proofs that the chunks are not merely similar but exact.

But individual proofs are not enough. They must be woven into a single whole, a structure that summarises without bloating. This is the role of the Merkle tree. All the per-chunk hashes are combined pairwise until a single root emerges — the Merkle root. This root is the fingerprint of the entire file. One can hold it in a few dozen bytes and yet, with the right branches, reconstruct the certainty of gigabytes.

Finally, there is the matter of the manifest. Without a manifest, the collection of chunks is mere rubble, indistinguishable from any other. The manifest is the architect’s plan. It records:-

The file size in bytes, to ensure truncation or padding is detected.

-

The chunk count, so reconstruction knows where it ends.

-

The Merkle root, the ultimate proof of integrity.

-

Optionally, metadata: MIME type, compression flag, even a human-readable name.

The manifest itself must be encoded just as the data is. It too is sliced, hashed, and embedded. And because all later reconstruction depends on it, it becomes the cornerstone. A chunk may be missing, but if the manifest survives, the file’s skeleton remains.

Thus the preparation of an image for permanence is not unlike the preparation of a body for burial. It is embalmed (compressed), dismembered (chunked), tagged and labelled (hashed), and finally wrapped in a shroud (the manifest). From there it is entombed in the rock of the blockchain, awaiting resurrection by any who possess both the fragments and the plan. Without this ritual, permanence would be an illusion — bits scattered into dust, without form or meaning.

In short: the image is compressed, chunked into fixed slots, verified by per-chunk hashes, unified under a Merkle root, and documented in a manifest. This is the discipline that makes permanence possible, the discipline that separates engineering from graffiti.


IV. Encoding Variants

The work of permanence in Bitcoin is always the same: turn arbitrary bytes into fields the protocol will accept and miners will record. Once there, they are immortalised, whether miners like it or not. Yet the disguises vary. What follows are the three canonical masks: addresses, multisig scripts, and OP_RETURN. Each serves the same master, permanence, though each dresses the bytes differently.


Address Payloads

The most familiar mask is the address itself. A pay-to-pubkey-hash (P2PKH) address expects a 20-byte digest, the so-called hash160. Normally this is the product of SHA-256 and RIPEMD-160 over a public key, a ritualised transformation of elliptic curve point into a compact identifier. But nothing in the field demands it be honest. The slot is twenty bytes wide, and anything that fits may be placed inside.

So the scribe takes his chunk of data, twenty bytes long, and sets it as the payload. He calculates the checksum, wraps it with the version byte, and Base58Check-encodes it. Outwardly, it looks no different from an ordinary address. Inwardly, it carries meaning known only to those who can decode it. A transaction output is made, dust is sent to this “address,” and the stone of the blockchain records those twenty bytes forever.

This is the most granular and expensive approach: twenty bytes per output. But it is also the most direct. To write is to burn dust, to pay for the engraving. One could call it waste; others call it rent. Either way, the permanence is achieved.


Multisig Scripts

The next mask is subtler. A multisig script expects public keys — elliptic curve points, normally compressed into 33 bytes. But just as with the hash160, the system does not check whether a given 33-byte string is a legitimate curve point. It merely accepts the field. And so the payload may be anything at all, as long as it is 33 bytes long.

Now the efficiency emerges. Each multisig script can contain several such keys, meaning several slices of 33 bytes packed into one output. If a bare address is a single note scribbled in the margin, a multisig script is a whole paragraph. The cost in dust is higher per output, but the density makes up for it.

And for the scribe, the disguise is stronger. To the casual eye, these are just keys in a script. To the initiated, they are fragments of an image, a contract, a file. The irony is sharp: a system meant to enforce cooperation among signers becomes a vehicle for permanence, a choir of false voices singing the hymn of data.


OP_RETURN Anchoring

Finally, there is the official canvas: OP_RETURN. Here the protocol itself admits the possibility of data. Place arbitrary bytes after OP_RETURN, up to eighty or so, and they will be recorded but marked as provably unspendable. No miner can deny that the space exists; whether they include such transactions is a matter of policy, not of consensus.

This is the most efficient of all the masks, for it was designed for precisely this sort of graffiti. A single OP_RETURN can carry a decent-sized slice of payload without the overhead of fake checksums or constructed addresses. But efficiency comes with fragility. Some miners will censor, others will not; some policies will allow, others will refuse. And so those who seek permanence must remember: OP_RETURN is not guaranteed. It is tolerated, sometimes grudgingly, sometimes not at all.


The Unifying Principle

Strip away the masks and the truth emerges. Whether the bytes are disguised as addresses, masquerading as public keys, or paraded openly after OP_RETURN, the act is the same: the ledger records them. Once written, they cannot be erased. The difference lies only in the style of the inscription — a letter here, a paragraph there, a whole verse if policy permits.

The sardonic irony is that battles have been fought over which of these is “legitimate,” as though the stone cares what costume the chisel wears. Miners may prefer one, developers another, bureaucrats a third. But permanence is agnostic. The bytes do not blush at their disguise. They simply endure.

And so the choice is not about whether the act can be done — it can. The choice is about efficiency, cost, and verifiability. Do you carve with tiny strokes, twenty bytes at a time? Do you scrawl in bold, thirty-three bytes per key, many keys per output? Or do you gamble with OP_RETURN, hoping the censor is asleep?

The lesson is as blunt as it is inescapable: permanence is not granted by consensus, nor by approval, nor by some committee of ideologues. Permanence is granted by encoding. Whatever field accepts arbitrary bytes is a canvas, and the only question is how cleverly one uses it. The rest is mere theatre.


V. Manifest and Ordering

V. Manifest and Ordering

The permanence of raw bytes alone is a child’s scrawl on a wall: colourful perhaps, but meaningless without a key. What turns that scrawl into record, into archive, into something capable of surviving both time and scrutiny, is order. Order requires a map. And in Bitcoin, that map is the manifest.

The manifest is not optional. To scatter chunks of a file across transactions without a manifest is to guarantee chaos. One might as well dump a box of torn book pages into the wind and hope posterity enjoys the puzzle. With a manifest, however, every fragment has its place. The TXIDs are not random; they are anchored. The slices are not ambiguous; they are ordered. The file is no longer noise. It is a structured whole.

The contents of the manifest are simple but uncompromising. At its core lies the file_id, a compact fingerprint of the entire artefact. The file size, the chunk count, the hash of each chunk, and above all the Merkle root — these are the bones. They ensure that what is reconstructed is not a forgery but the precise body that was written. To this are added the TXIDs themselves, or a compressed list of them, and the order in which outputs are to be read. Each piece of data recorded in the chain becomes a coordinate in the manifest’s map.

The manifest itself need not be a special case. It is carved using the same chisels as the rest: fake addresses, multisig keys, or OP_RETURN. The irony is delicious: the very tool that carries the payload also carries the key to its arrangement. In the absence of such a manifest, what you have is graffiti — whimsical, perhaps aesthetic, but useless to any serious claim. With it, you have an archive, something that can be reconstructed deterministically by any reader, in any future age, with only the headers and the rules of the protocol as guide.

The comparison to early ASCII art is instructive. In 2010, Bitcoin’s ledger was littered with pictures, jokes, signatures, the sort of idle play that delights but fades. None of it had order beyond sequence. None of it had a manifest. It could not have pretended to permanence. It was graffiti, entertaining but unserious. The manifest is the adult’s correction to this adolescent urge. It imposes structure where there was none, transforming scribbles into documents.

There is a further reason order matters: law. A judge, a jury, a historian — none will take your word for what you meant. They will demand evidence. Evidence requires the ability to show, without ambiguity, that a given byte string was recorded, when it was recorded, and in what sequence. The manifest supplies this. It links TXIDs to their intended role in the whole. It removes the possibility of arbitrary rearrangement. It elevates permanence from mere physical immutability to logical determinism.

In practice, the manifest is the first thing one writes. Before carving the file into slices, before dispatching them into outputs, the manifest is prepared. It is hashed, it is compacted, it is sliced, and it too is written. The system is recursive: the manifest contains the Merkle root of the file’s chunks, and the manifest itself can be committed with its own hash root, giving turtles all the way down.

What distinguishes this from graffiti is not technical novelty — the same address slots and pubkey fields are used. What distinguishes it is discipline. Graffiti says, “Look at me.” Archive says, “Here is proof.” One is vanity, the other is permanence. And permanence, in a system designed for evidence, is the only thing that matters.

Thus the lesson: the manifest is the hinge on which permanence swings. Without it, your bytes are noise, forgotten as soon as they are noticed. With it, your bytes become testimony. They can be reconstructed without ambiguity. They can be verified without trust. They can stand in court, in history, in science. The difference between graffiti and archive is a single word: manifest.


VI. Verification and Reconstruction

VI. Verification and Reconstruction

The act of embedding data is only half the game. Without the ability to retrieve, to reconstruct, and to prove, the exercise collapses into the same adolescent scribbling that plagued Bitcoin’s earliest days. Permanence without verification is nothing. Reconstruction without determinism is fraud by omission. Thus, the design demands not only a way to write but a way to read, a method by which any recipient can take the scattered fragments and assemble them into a whole, provably identical to the one the sender intended.

The process begins with collection. The recipient gathers the TXIDs associated with the file. These identifiers, listed or implied in the manifest, are the handles by which the blockchain can be interrogated. Each TXID points to a transaction, each transaction to its outputs, and within those outputs lie the payload slices: 20-byte address hashes, 33-byte fake pubkeys, or the raw data tucked into OP_RETURN. The canvas may differ, but the brush strokes are the same.

Once decoded, the slices must be reassembled. This is no random pastiche: the manifest dictates order. Output indices within transactions, and the sequence of TXIDs across the file, combine to create the linear stream. Concatenation here is not guesswork but discipline. The compressed file emerges byte by byte, from the carefully ordered slices, like an ancient manuscript reconstructed from shards of papyrus.

Proof of authenticity is delivered not by assertion but by mathematics. The reconstructed file is hashed — a simple SHA-256 suffices, or the stronger Merkle tree of its chunk hashes. The result is compared to the H_image or Merkle root embedded in the manifest. Agreement is categorical: either the data matches or it does not. There is no debate, no shades of opinion. A single flipped bit will collapse the illusion, as it should.

The blockchain itself provides the temporal and structural guarantees. Block headers supply the timestamp: the file, or more precisely its proof, existed at or before the time the block was mined. The headers also provide immutability: the Merkle roots recorded within them and the cumulative weight of proof-of-work establish that these TXIDs were fixed at height H. No later revisionism can erase that fact. One may argue about meaning, but not about existence.

Thus, the final result is not merely a file. It is a file chained to history. It is a file that can stand in court and declare: I existed at time T, and here is the cryptographic evidence, irrefutable and public. No authority need be trusted, no archive can be tampered with, no private ledger smuggled in. The permanence comes not from the bytes themselves but from their anchoring in the immutable structure of the chain.

This is the distinction that separates permanence from parody. ASCII art sprayed across early outputs is amusing, but unprovable. Without a manifest, without a hash root, without ordered reconstruction, it is a curiosity, not evidence. But when the manifest governs, when reconstruction follows deterministic rules, when the final hash matches the committed root, the result transcends play. It becomes proof.

The recipient, then, is not merely a consumer of data but a verifier of truth. The reconstruction is not blind assembly but a ritual of confirmation. The file is recovered, the hash checked, the Merkle root confirmed, the headers consulted. At the end stands certainty: this file, these bytes, existed, immutable, unaltered, and provably bound to a block in Bitcoin. That is permanence in its only meaningful form.


VII. Economics and Scale

VII. Economics and Scale

The brute-force approach is simple: take an image, chop it into 20-byte chunks, and embed each slice directly into Bitcoin outputs. Simple, yes. Elegant, no. Each slice consumes an output, each output consumes space, and each space carries cost. Every 20-byte fragment is tied to a dust output, a sliver of Bitcoin sacrificed, not to transfer value but to enshrine data. This is permanence purchased at a price, and the bill grows quickly.

Consider the arithmetic. A modest 100-kilobyte file demands five thousand outputs. A one-megabyte file, fifty thousand. At that scale, you are not painting a picture on stone; you are carpeting the ledger with gravel. Each output is an entry that nodes must maintain, bandwidth that must be relayed, storage that must be borne forever. It is permanence, but permanence by bloat. The image may live, but it lives parasitically, forcing every participant to shoulder its cost.

The ledger does not discriminate — every byte is sacred, every slice as permanent as the next. But permanence by excess is not sustainability. Raw-byte embedding makes each transaction a grotesque inflation of what Bitcoin was built to achieve. It is not the permanence of law; it is the permanence of landfill. Yes, the file can be reconstructed a century later, but at the cost of burdening generations with the weight of your vanity project.

The alternative is sharper, leaner, and more honest: store hashes on-chain, bytes off-chain. Anchor the image with its cryptographic fingerprints — the per-chunk hashes and the Merkle root — and let the heavy lifting of byte storage occur elsewhere. Off-chain, bandwidth and storage are cheap, mutable, abundant. On-chain, space is scarce, immutable, and costly. Use the chain for what it is: a court ledger, not a warehouse.

With hashes on-chain, permanence is achieved without extravagance. The file’s existence, integrity, and timestamp are proven by mathematics, while its substance can flow freely across whatever medium is convenient — P2P, cloud storage, USB drives buried in the desert. The ledger bears only the essential: the root, the commitment, the proof. All else is left to the world of cheap storage, which can change as it likes, knowing the cryptographic anchor guarantees fidelity.

This design is not a compromise; it is efficiency disguised as wisdom. You do not need to store every byte on the chain to prove an image existed. You only need to store the right bytes — the irreducible proofs that bind the data to history. A single Merkle root, a handful of chunk hashes, accomplish what thousands of dust outputs attempt, and they do it without poisoning the commons.

The economic distinction is profound. Raw-byte embedding is linear: file size equals outputs equals cost. Anchoring is logarithmic: proofs scale sublinearly with size, and verification remains light no matter how vast the image. One path leads to waste, the other to sustainability. The first fills the chain with noise; the second preserves the signal.

Thus, the question is not whether permanence is possible — it is. The question is whether permanence is purchased with extravagance or with discipline. Raw-byte embedding is the tantrum of a child scrawling graffiti across a cathedral wall: technically permanent, practically vandalism. Anchored hashes are the architect’s inscription: compact, verifiable, respectful of the structure that houses it.

Scale forces the hand. As images grow to megabytes, gigabytes, or terabytes, raw embedding collapses under its own absurdity. Anchored proofs endure, indifferent to size, efficient by design. The ledger was never meant to be the world’s scrapbook. It was meant to be its notary. The difference is not cosmetic but civilisational: one path sustains commerce, the other suffocates it.

In the economics of permanence, efficiency is virtue. The chain demands respect, not clutter. And the only permanence worth keeping is that which can scale.


VIII. Implications

The trick of embedding bytes in Bitcoin is not limited to pretty pictures. Images are merely the most garish demonstration, a way of saying, “Look, permanence can be vulgar too.” But permanence, when harnessed, becomes more than art-for-art’s-sake. It becomes the skeleton of contract, the ledger of evidence, the archive of civilisation itself.

Consider contracts. For centuries, men scrawled signatures on parchment, trusting ink and reputation to endure. The result: faded paper, forgeries, and disputes that drag through courts. With Bitcoin, a contract’s essential terms can be committed as a hash — a compact fingerprint anchored into time, beyond alteration. No need to store every word of the agreement on-chain. The proof suffices. If challenged, the original text can be produced and matched to its root, the chain silently testifying: this existed, here, then. The court receives not gossip but mathematics.

Evidence follows the same pattern. A photograph of a crime scene, a log of financial records, the email thread that seals guilt — all can be fingerprinted and anchored. The bytes themselves may live elsewhere, in databases or vaults, but the commitment lives forever, immune to the magician’s trick of retroactive editing. In a courtroom, permanence is not decoration; it is the line between justice and fraud. Bitcoin, properly wielded, becomes the incorruptible witness.

Archives broaden the scope further. Our civilisation has grown adept at losing itself. Libraries burn, disks rot, websites vanish, and all that was proclaimed “permanent” proves as permanent as the attention span of the mob. Anchoring archives into the chain ensures that what matters — the proofs, the commitments, the bones of memory — cannot be erased by fiat, censorship, or the great indifference of time.

And here lies the cultural sting. A society that takes permanence seriously will distinguish between graffiti and archive. Graffiti is cheap: the ASCII art, the emojis etched into dust outputs, the adolescent thrill of shouting “I was here!” into eternity. Archive is deliberate: the carefully hashed manuscript, the verifiable scientific record, the artistic work preserved not in raw bytes scattered like confetti, but in proofs that future generations can actually reconstruct. Both graffiti and archive remain, but only one carries weight. One is a footnote to human frivolity; the other, the foundation of civilisation’s memory.

The sardonic lesson is simple. Bitcoin will record whatever you feed it, whether it be Magna Carta or memes. The protocol does not blush. But the true implication lies in what we choose to commit. Will we use it as vandals, scribbling because we can? Or will we use it as builders, anchoring the structures that law, science, and culture require?

Permanence is a neutral tool. It will happily memorialise your graffiti, your contracts, your pornography, your scientific proofs. It cannot decide what is worthy; only we can. Yet in that neutrality lies its majesty: the chain preserves without fear, favour, or censorship. A tyrant may burn the library, but the hash endures.

Thus the implication is both liberating and damning. Bitcoin is the notary of last resort, the archive of choice, the incorruptible witness to fact. It will keep your graffiti alongside your Magna Carta, your ASCII alongside your art. History, for once, will not be written by the victors — but by those who knew how to commit their truths in bytes that no one could erase.


IX. Conclusion

Bitcoin has never been about asking permission. It has never been about grovelling before committees, nor about seeking consensus from the mob to validate an act of creation. Its essence is proof — cold, mathematical, irrefutable. And proof does not care whether it is applauded.

You can embed an image, a file, or a message in this system through whatever vessel you prefer: fake addresses masquerading as keys, multisig scripts stuffed with staged public keys, OP_RETURN outputs carrying payloads in plain sight, or the baroque leaves of taproot. Each of these is nothing more than a method of encoding, a choice of where to place your bytes. The method changes, the principle does not. The act itself demonstrates permanence.

What matters is not consensus but construction. Graffiti and archives both endure, because permanence is blind. The juvenile ASCII doodle and the serious scientific record share the same ledger. Proof is indifferent to taste. And in that indifference lies its power: a permanence beyond politics, beyond approval, beyond the shifting moods of committees and mobs.

The polemic is plain: permanence is never achieved by asking what the crowd allows. It is achieved by encoding what you choose. Those who whine about policy, about whether some byte string is sanctioned or not, miss the point entirely. The ledger is not a parliament; it is a monument. What is inscribed upon it stands, and no mob can erase it.

So let the critics mutter about spam, about frivolity, about what ought to be allowed. Their muttering changes nothing. The chain does not bend to taste. It does not yield to authority. It records. That is all, and that is everything. And in that recording lies the quiet revolution: permanence without permission, proof without politics, a stone upon which the fleeting winds of opinion break themselves to dust.


← Back to Substack Archive