Simon Dixon Hard Talk Episode 126 - Was Bitcoin Hijacked? The Infiltration Operations Explained
11 snips
Feb 13, 2026 A fast-paced mapping of four major infiltration vectors targeting Bitcoin: intelligence operations, Silicon Valley corporate influence, Wall Street custody and ETFs, plus central bank and regulatory maneuvers. Short chapters trace early centralization, the block-size split, node versus developer dynamics, and looming governance battles. The show sets up a deeper debate on whether these forces amount to a true hijack.
AI Snips
Chapters
Books
Transcript
Episode notes
Three Pillars Secure Bitcoin
- Bitcoin's security relies on three interlocked roles: developers, miners, and node operators.
- Dixon explains nodes validate history, miners add blocks for rewards, and developers maintain protocol code and BIP processes.
Developers Were A Primary Infiltration Vector
- Developer infiltration was an early, sustained attack vector on Bitcoin's governance.
- Simon details funders like BitPay, the Bitcoin Foundation, Blockstream and university/VC links that tried to steer protocol outcomes.
Epstein And Silicon Valley Tried To Map Developers
- High‑profile actors attempted to map and influence early developers, including Jeffrey Epstein, Reid Hoffman, and Peter Thiel.
- Dixon cites Epstein's 2011 efforts and Thiel‑Epstein communication aimed at fomenting internal Bitcoin conflict.





