- Supply Shock
- Posts
- đ Bitcoin gets Stoned
đ Bitcoin gets Stoned
How one anonymous prankster tried to crash BTC

Bitcoin has its enemies.
Environmental alarmists, stubborn central bankers and out-of-touch politicians would surely count, even if their ranks have thinned in the past few years.
Thereâs also the odd boomer economist who would still jump at the chance to suggest that bitcoin has no intrinsic value, an embodiment of the greater fool theory, if it meant extra engagement.
All those archetypes are great heels that routinely serve as sounding boards for Bitcoin discourse.
There are also those whoâve attacked Bitcoin out of boredom, curiosity or just for fun. Which I suppose is somewhat cooler.
This is the tale of one such punk hellbent on disrupting Bitcoin as best they could.

Bitcoin gets Stoned
This story starts all the way back in 1987, more than two decades before Bitcoin.
Itâs believed that an unknown student at the University of Wellington in New Zealand had developed malware known as Stoned, one of the first ever computer viruses.
Stoned was an early boot virus, a category which infects the boot sector of a hard drive or removable media (mostly floppy disks back then), altering how computers initially load their operating systems and run other necessary start-up functions.
It was technically a novel virus, but in reality, Stoned was more of an elaborate prank.
An infected machine would have a one in eight chance of loading a screen that would simply display a pro-pot message:
âYour PC is now stoned! LEGALIZE MARIJUANA!â
Check the bottom right corner â youâve been Stoned!
Twenty-seven years later, on May 15, 2014, a pseudonymous Windows 7 user reported a worrying false positive from their Microsoft Security Essentials package.
Microsoft's built-in antivirus software had detected Stonedâs virus signature in Bitcoinâs blockchain data, leading to constant annoying popups and even deletion of all relevant files.
That included removal of the complete copy of the chainâs history required to sync nodes, which was almost 19 GB large at the time, data that would be automatically re-downloaded by the Bitcoin client.
It didnât make any sense for Stoned to have really infected Bitcoin Core. The virusâs code would be completely benign even if it were somehow written to the chain in its entirety.
The running theory was that perhaps by some statistical anomaly, Bitcoinâs hash function for its block headers had somehow generated enough of Stoneâs hexadecimal byte sequences for Microsoftâs malware scanner to recognise it as the actual virus.
Microsoft then quickly patched Security Essentials to ignore the curiosity.
The smoking gun only came about six weeks later, by way of IT professional Didier Stevens. It was not a hoax: Someone had intentionally attempted to bring down Bitcoin nodes.
Stevens had discovered a series of transactions from April 4, 2014 featuring outputs containing identical byte sequences to ones inside Stonedâs code.
Bitcoin & Stoned Computer Virus: I found the smoking gun! bit.ly/1m6QkLl
â Didier Stevens (@DidierStevens)
8:38 PM ⢠Jun 23, 2014
Meanwhile, two days earlier, a Pastebin post by an anonymous author had outlined a method of spamming the Bitcoin specifically to trigger false-positives from antivirus software.
They wrote: âSpamming the bitcoin database with virus signatures will cause havoc. Some antivirus-programs will delete the database locally, others will deny their bitcoin-client access to the databases.â
âSome won't be able to start their bitcoin-clients again (and can't understand why). Some will format and reinstall their computer.. to once again get âinfected' when they get a bitcoin client again.â
Next, panic would strike âcomputer n00bsâ alongside rumors that Bitcoin is spreading viruses. Then, chaos, with the media dramatizing the situation.
âThe value of bitcoins will drop hasty⌠Please help spamming the bitcoin database with virus signatures :)â
Stoned bytecode was injected into Bitcoinâs chain data within about a day of the post.
Of course, there was no widespread panic. The price of bitcoin never crashed in relation to the prank, and there wasnât a noticeable drop in hash rate due nodes being knocked offline.
But there were forum threads about it, as well as media headlines, blogs and other posts, including this one, 11 years later. Thatâs gotta count for something.
â David

These days, Bitcoin is increasingly divided over whether spam, not unlike the Stoned bytecode, is, in fact, a virus.
âWeâve always been hostile to the shitcoiners when they invade. Make no mistake, they are invading right now and we should be hostile to them again.â
Those are the passionate words of Chris Guida, a Bitcoin ecosystem developer in favor of stopping non-standard data from ever making it to the chain via the ever-polarizing OP_RETURN field.
In todayâs epic two-hour episode of Supply Shock, Guida and host Pete Rizzo cover the spam filter debate, miner incentives, the realities of decentralization in modern day Bitcoin and other spicy topics.
âItâs called a filter and not a wall because some things are going to slip through. Thatâs okay, the point of spam filters is to raise the cost of spamming so that the worst offenders, things like BRC20s that had huge transaction volume at the peak, can't happen.â
Check out the full episode on YouTube, Apple Podcasts and Spotify.

The number of nodes running Bitcoin Knots, an alternative client that filters out (some) transactions with extra data by default, has reached a new all-time high of 1,928, or 9% of all public nodes.
Bitcoin Core developers remain adamant that their policy proposals are best for the network â with even the legendary Greg Maxwell coming back to take Knots runners to task. (The full exchange is worth a read.)
Coinbase says it wonât pay a $20 million bitcoin ransom in exchange for customer data stolen by rogue customer service agents.
US Bitcoin ETFs have net bought more than $6 billion BTC in the past month. Chad behavior!