Was Bitcoin Hijacked and who created it anyway? The Infiltration Operations Explained

live simondixonhardtalk this week in bitcoin Feb 13, 2026
 

No time for the full 33m video? Watch the 5-minute AI-generated TL;DR Podcast Style Discussion instead.

Hey hey Sovereign Wealth Builders.

Welcome to the definitive "TLDR" synthesis of Part 1 from my SimonDixonHardTalk livestream, "Was Bitcoin Hijacked?", which originally aired on February 13, 2026. The full broadcast ran for 3 hours and 50 minutes across YouTube, X, and Rumble, but today we are diving deep into the first 33 minutes—the segment where I expose the high-stakes infiltration operations and geopolitical maneuvers aimed at the heart of the Bitcoin ecosystem.

I’m not just an observer in this fight. My company, BnkToTheFuture, was on the front lines funding the early ecosystem—we were the ones who backed the original versions of Coinbase, Kraken, Bitstamp, and Bitfinex. I watched in real-time as these companies, one by one, were purportedly infiltrated by Silicon Valley governance and Wall Street regulators, transforming from sovereign tools into custodial surveillance engines for the state.

The "Immaculate Conception" and the Original Hijack

To answer if Bitcoin was hijacked, you have to realize that Bitcoin itself was a hijack. It is my perspective that the project was originally an intelligence-connected attempt to create a centralized, regulatory-compliant digital currency.

The precursor was David Chaum’s Digicash. Chaum, while teaching in the Netherlands—the historical birthplace of central banking, the Dutch East India Company, and currently the testing ground for a 36% unrealized gains wealth tax—purportedly tried to build private transactions within the legacy system. But the project was hijacked by regulations.

I believe the "Immaculate Conception" of Bitcoin occurred when a student of Chaum’s, the late Len Sassamon (who I purportedly identify as Satoshi Nakamoto), along with figures like the late Hal Finney, hijacked that failed centralized project and turned it into an open-source, Proof of Work model. They launched it when nobody was looking, using economic incentives and game theory to escape the "Proof of Weapons" network before the legacy powers even knew what happened.

The Three Pillars of Resistance: How Bitcoin Works

The reason Bitcoin has resisted a total takeover—despite constant attempts—is its unique decentralized structure. It is a system of checks and balances held together by three groups that act as firewalls against each other.

Role

Responsibility

Hijack Resistance

Developers

Maintain open-source code and BIPs.

Anyone can contribute; code is peer-reviewed and transparent.

Miners

Secure the chain and add blocks.

They cannot change rules without node acceptance; they compete for rewards.

Nodes

Accept blocks and maintain ledger history.

The ultimate firewall; nodes verify transactions and reject "illegal" blocks from miners.

Strategy One: The Infiltration of the Minds (Developer Infiltration)

The first strategy is the infiltration of the developer class. Because developers maintain the code, they are high-value targets for intelligence-connected and Silicon Valley interests.

We have seen purported operations aimed at funding and influencing these individuals to steer the protocol toward corporate agendas. This includes the alleged involvement of Jeffrey Epstein, who reportedly attempted to infiltrate the developer community as early as 2011. Other figures purportedly connected to these influence operations include Reid Hoffman and Peter Thiel, who allegedly communicated with Epstein in 2014 regarding efforts to destabilize the community. These purported operations were aiming to achieve specific outcomes: discrediting the protocol or creating internal civil wars to slow down adoption.

Strategy Two: Divide and Conquer (The Blocksize War)

Strategy two was the "Blocksize War" of 2015–2017—a classic divide-and-conquer operation designed to pit miners against nodes and developers. This period birthed two conflicting narratives:

  1. Digital Gold: The "Store of Value" crowd who wanted small blocks to ensure anyone could run a node.
  2. Digital Cash: The "Medium of Exchange" crowd who wanted big blocks for cheap transactions.

During this time, we saw "hijack attempts" like developer Mike Hearn’s purported effort to include KYC and passport data directly on-chain to make Bitcoin "compliant." While many believe one side was compromised, I believe both sides were targeted by infiltration operations to weaken the network's unity. Eventually, this led to the Bitcoin Cash (BCH) fork, an event I covered live on air while selling my BCH for more BTC.

Strategy Three & Four: Institutional Capture and "Proof of Weapons"

The current era (2023–2026) marks a massive escalation. We are witnessing the rise of the "Financial Industrial Complex" and what I call the Proof of Weapons network.

The Proof of Weapons network is the fiat-based system that weaponizes media, technology, and the military to maintain a debt-based Ponzi scheme. They are now attempting to integrate Bitcoin into this network through Strategy Three (Gateway to CBDCs) and Strategy Four (Custodial Centralization).

Wall Street and the current political administrations are pushing an "Orwellian Nightmare" of ETFs and IOUs. Under the guise of "crypto capital," we see the introduction of the Clarity Act and the Genius Act—legislative tools purportedly designed to build a 1984-style surveillance state. This is part of a broader Operation Chokepoint 2.0 aimed at wiping out sovereign banks and forcing everyone into "X money" social credit systems.

Members of the "PayPal Mafia," including David Sacks, Peter Thiel, and Elon Musk, are purportedly building these systems, integrating stablecoins with government debt. This aligns with the World Economic Forum (WEF) infiltration attempt to ensure you "own nothing and are happy" by replacing self-custody Bitcoin with custodial "paper" Bitcoin.

The Modern Battle: Knots vs. Core (BIP 110)

The hijack attempts have now shifted to the "Spam Debate." This is the current governance war between Core v30 and BIP 110.

The conflict centers on whether nodes should be "spam-filtered" to focus on digital money, or if they should allow "digital storage" for NFTs and tokens. One side claims the sky is falling, while the other claims the protocol is being hijacked. In reality, this is just the latest iteration of the struggle for control. As long as we have sovereign nodes, we have a fighting chance against the "Proof of Weapons" network.

Must-Watch Vlogs at SimonDixon.com:

Take Action & Follow the Money

Sovereign Wealth Builders, the attacks are never going to stop. You must stay informed and stay sovereign.

  • Share this post. Help others understand the bigger picture beyond the media narratives.
  • Subscribe to the Simon Dixon YouTube channel. Get my weekly deep dives into geopolitics, macro, and Bitcoin. Subscribe to my YouTube channel.
  • Find me on Rumble. This is my backup channel, safe from censorship. Follow me on Rumble.
  • Follow me on X @SimonDixonTwitt. I post real-time updates and analysis on X and am highly active there. Follow me on X
  • Follow me on instagram. Usually short clips are posted here
  • Follow me on TikTok. Usually short clips are posted here
  • SimonDixon.com. This is my personal site and an archive of all my content, safe from de-platforming. Join the free membership portal.   

Watch on YouTube

Prefer to listen? Available on Spotify and Apple Podcasts

Listen on Spotify

Listen on Apple Podcasts

Read other related blogs

Legal Disclaimer

The information provided in this document reflects the personal opinions and interpretations of Simon Dixon and is based on a review of available public files, historical transcripts, and geopolitical developments. The author is presenting a perspective on historical events and documented evidence for the purpose of public discourse and to provoke critical thinking regarding the intersection of finance and technology. All allegations regarding individuals or organizations—including but not limited to Jeffrey Epstein, Reid Hoffman, Peter Thiel, David Sacks, Elon Musk, Mike Hearn, and members of the PayPal Mafia—are purported and should be treated as such. These claims reflect the author’s analysis of potential influence operations and should not be interpreted as established facts or definitive statements regarding the intent or character of the mentioned parties.

This content does not constitute financial, legal, or investment advice. Bitcoin and digital assets are highly volatile and involve significant risk; you should conduct your own thorough due diligence before making any financial decisions. The author is not responsible for any financial losses or legal consequences resulting from the use of this information. The "Hard Talk" style is a subjective commentary on high-stakes geopolitical issues, and any allegations of character or defamation are unintended. The goal of this document is to provide a synthesis of public record for educational and informational purposes only within the context of sovereign wealth building.