{
  "version": "1.2.0",
  "chapters": [
    {
      "startTime": 0,
      "title": "Introduction"
    },
    {
      "startTime": 133,
      "title": "Plan B and Bitcoin in Lugano"
    },
    {
      "startTime": 1198,
      "title": "Defining Spam and Censorship in Bitcoin"
    },
    {
      "startTime": 1495,
      "title": "From Spam to CSAM: A Shift in the Overton Window"
    },
    {
      "startTime": 2049,
      "title": "Luke's Perspective on Bitcoin's Failure"
    },
    {
      "startTime": 2271,
      "title": "Bitcoin's Tolerance of Crazy Weirdos"
    },
    {
      "startTime": 2451,
      "title": "Bitcoin's Intrinsic Issue with Spam"
    },
    {
      "startTime": 2845,
      "title": "Did Knots Filtering Not Work?"
    },
    {
      "startTime": 3636,
      "title": "Was Core v30 an Attack on Bitcoin?"
    },
    {
      "startTime": 4580,
      "title": "Justifying Criticism of BIP 110"
    },
    {
      "startTime": 5274,
      "title": "Predicting the Outcome of BIP 110 Adoption"
    }
  ]
}