<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Stanford Blockchain Review]]></title><description><![CDATA[Stanford Blockchain Club's Official Industry Magazine]]></description><link>https://review.stanfordblockchain.xyz</link><image><url>https://substackcdn.com/image/fetch/$s_!H-zn!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43ebfaf5-0c3c-4057-9a29-9c694a094d7d_1490x1268.png</url><title>Stanford Blockchain Review</title><link>https://review.stanfordblockchain.xyz</link></image><generator>Substack</generator><lastBuildDate>Wed, 15 Apr 2026 16:56:40 GMT</lastBuildDate><atom:link href="https://review.stanfordblockchain.xyz/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Stanford Blockchain Review]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[stanfordblockchainreview@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[stanfordblockchainreview@substack.com]]></itunes:email><itunes:name><![CDATA[Stanford Blockchain Club]]></itunes:name></itunes:owner><itunes:author><![CDATA[Stanford Blockchain Club]]></itunes:author><googleplay:owner><![CDATA[stanfordblockchainreview@substack.com]]></googleplay:owner><googleplay:email><![CDATA[stanfordblockchainreview@substack.com]]></googleplay:email><googleplay:author><![CDATA[Stanford Blockchain Club]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[#78 - Poseidon: Hashes for Zero-Knowledge Proofs (A Guide for Engineers)]]></title><description><![CDATA[Poseidon2, explained: how its sponge + partial rounds make circuits fast]]></description><link>https://review.stanfordblockchain.xyz/p/78-poseidon-hashes-for-zero-knowledge</link><guid isPermaLink="false">https://review.stanfordblockchain.xyz/p/78-poseidon-hashes-for-zero-knowledge</guid><dc:creator><![CDATA[Stanford Blockchain Club]]></dc:creator><pubDate>Tue, 06 Jan 2026 00:01:28 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!T--G!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F222aa827-5a54-4071-afb9-fe02d0ae69ec_624x390.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!T--G!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F222aa827-5a54-4071-afb9-fe02d0ae69ec_624x390.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!T--G!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F222aa827-5a54-4071-afb9-fe02d0ae69ec_624x390.png 424w, https://substackcdn.com/image/fetch/$s_!T--G!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F222aa827-5a54-4071-afb9-fe02d0ae69ec_624x390.png 848w, https://substackcdn.com/image/fetch/$s_!T--G!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F222aa827-5a54-4071-afb9-fe02d0ae69ec_624x390.png 1272w, https://substackcdn.com/image/fetch/$s_!T--G!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F222aa827-5a54-4071-afb9-fe02d0ae69ec_624x390.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!T--G!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F222aa827-5a54-4071-afb9-fe02d0ae69ec_624x390.png" width="725" height="453.125" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/222aa827-5a54-4071-afb9-fe02d0ae69ec_624x390.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:390,&quot;width&quot;:624,&quot;resizeWidth&quot;:725,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!T--G!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F222aa827-5a54-4071-afb9-fe02d0ae69ec_624x390.png 424w, https://substackcdn.com/image/fetch/$s_!T--G!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F222aa827-5a54-4071-afb9-fe02d0ae69ec_624x390.png 848w, https://substackcdn.com/image/fetch/$s_!T--G!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F222aa827-5a54-4071-afb9-fe02d0ae69ec_624x390.png 1272w, https://substackcdn.com/image/fetch/$s_!T--G!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F222aa827-5a54-4071-afb9-fe02d0ae69ec_624x390.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="pullquote"><p><em><strong>Stanford Blockchain Review</strong><br>Volume 8, Article No. 8</em></p><p><em>&#9997;&#127995; Author: <a href="https://x.com/__billygao">Billy Gao</a> &#8212; Stanford Blockchain Club<br><a href="https://eprint.iacr.org/2019/458.pdf">Poseidon Network</a></em></p><p><em>&#11088;&#65039; Technical Prerequisite: Intermediate</em></p></div><p>If you have worked with SNARKs or zkVMs, you have probably heard of Poseidon. The reason behind is simple: traditional cryptographic hash functions like SHA256 are catastrophically expensive to compute inside arithmetic circuits. Every bitwise operation, every XOR, every rotation translates to thousands of constraints in the proof system. Poseidon solves this by redesigning the hash function from the ground up to work natively in finite fields.</p><p>The core insight behind this design is that proof systems like Groth16, Plonk, or STARKs all work over finite fields (arithmetic modulo some large prime). So instead of bit-level operations in this setting, Poseidon operates directly on field elements. As such, the state is no longer a sequence of bits, but rather a vector of elements in F<sub>p</sub> (for example p is 2<sup>254</sup> for BN254 curves).</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://review.stanfordblockchain.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Stanford Blockchain Review! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2><strong>Sponge Construction</strong></h2><p>Poseidon uses the sponge construction. The idea is to maintain an internal state larger than both the input and output, then squeeze entropy through it. You have a state of width t field elements, and it is partitioned into a rate r and a capacity c where t = r + c. The rate is how many field elements you can absorb per iteration, while the capacity provides a security margin.</p><p>For instance, assume the case of Poseidon with t=3, so the state is three field elements. Setting r=2 and c=1 (absorb two field elements per round while one element stays as the capacity), and suppose we want to hash four field elements: [a, b, c, d]. The state starts at [0, 0, 0].</p><p>During absorption, we take the first chunk [a, b] and add it into the rate portion: state becomes [0+a, 0+b, 0] = [a, b, 0]. Then we apply the permutation function P to mix everything: state becomes [P<sub>0</sub>, P<sub>1</sub>, P<sub>2</sub>] where those values depend on the complex mixing of a and b. Now we absorb the second chunk [c, d]: state becomes [P<sub>0</sub>+c, P<sub>1</sub>+d, P<sub>2</sub>]. Apply the permutation again to get [Q<sub>0</sub>, Q<sub>1</sub>, Q<sub>2</sub>].</p><p>Once everything is absorbed, we switch to squeezing. We output the first r=2 elements [Q<sub>0</sub>, Q<sub>1</sub>] as the hash. If we needed more output (say for a 3-element hash), we would apply the permutation again and output another r elements. The capacity c never gets directly exposed, which is what gives resistance to length extension attacks and maintains collision resistance. An attacker cannot efficiently reconstruct the internal state from the output because they could only see r out of t elements.</p><h2><strong>The Permutation Function</strong></h2><p>The heart of Poseidon is its permutation function, which gets applied repeatedly during both absorption and squeezing. Each round of the permutation consists of three layers. First is AddRoundConstants, where we add a predetermined constant to each state element. This breaks symmetry and prevents slide attacks. Second is SubWords, which applies a power map (S-box) to each element: we compute x<sup>&#945;</sup> where &#945; is typically 5 or 7. This provides the only nonlinear component and is where most of the constraint cost comes from. Third is the MixLayer, which multiplies the state vector by a chosen MDS (Maximum Distance Separable) matrix to ensure that changes diffuse across the entire state.</p><p>Here&#8217;s what a full round actually looks like with numbers. Let&#8217;s say the state is [100, 200, 300] and &#945;=5.</p><p>AddRoundConstants: Add predetermined constants, say C = [42, 17, 99]. The state becomes [100+42, 200+17, 300+99] = [142, 217, 399].</p><p>SubWords: Apply the S-box to each element. State becomes [142<sup>5</sup>, 217<sup>5</sup>, 399<sup>5</sup>]. These are huge numbers but remember everything is mod p. This is the nonlinear layer and costs one constraint per element in most SNARK systems.</p><p>MixLayer: Multiply by an MDS matrix M. For t=3, this might look like: M = [[2, 1, 1], [1, 2, 1], [1, 1, 2]]. If the state after SubWords was [s_0, s_1, s_2], the new state becomes: [2*s_0 + 1*s_1 + 1*s_2, 1*s_0 + 2*s_1 + 1*s_2, 1*s_0 + 1*s_1 + 2*s_2]. Each output element is a weighted sum of all input elements, ensuring complete diffusion.</p><p>The breakthrough in the original Poseidon design was the concept of partial rounds. Instead of applying the expensive S-box to all t state elements in every round, we can apply it to just one element for most rounds while still maintaining security. The structure is R<sub>f/2</sub> full rounds at the beginning, then R<sub>p</sub> partial rounds in the middle where only the first state element gets the S-box, then R<sub>f/2</sub> full rounds at the end. (R<sub>f</sub> refers to the total number of full rounds, where R<sub>p</sub> refers to partial rounds)</p><p>For a typical configuration we might have 8 full rounds total (4 at the start, 4 at the end) and 56 partial rounds in the middle. So a partial round would look the same except in SubWords, we only compute state[0]^5 and leave state[1] and state[2] unchanged. This approximately halves the constraint count because the S-box is where all the cost is (80 S-box operations instead of 192 if all rounds were full).</p><p>The initial 4 full rounds ensure that by the time we hit the partial rounds, every state element is already a highly nonlinear function of the inputs. Each partial round then adds one more layer of nonlinearity to state[0], with the MDS matrix spreading that change across all positions. By the time of 56 partial rounds, the S-box has been applied 56 times to state[0], with the MDS matrix diffusing that nonlinearity to state[1] and state[2]. The final 4 full rounds then add another complete layer of mixing.</p><h2><strong>Poseidon2 Improvements</strong></h2><p>Poseidon2, published in 2023, takes this further with several optimizations. The main innovation is how the MDS matrix is constructed. The original Poseidon used a single MDS matrix throughout, but this matrix multiplication is actually pretty expensive in constraints because we need t<sup>2</sup> multiplications per round. Poseidon2 splits this into internal and external diffusion layers.</p><p>For the external rounds (the full rounds at the beginning and end), Poseidon2 uses a matrix M<sub>E</sub> that is relatively dense but only applied infrequently. For the internal rounds, it uses a much sparser matrix M<sub>I</sub> that is often circulant or nearly circulant, such that the matrix-vector product can be computed with far fewer field multiplications. Security analyses show that it is viable to use these cheaper matrices for the partial rounds because the full rounds at the boundaries provide enough mixing to prevent attacks.</p><p>The round constants are also generated differently in Poseidon2, using a more robust method that eliminates potential biases. Combined with improved cryptanalysis that allows for fewer total rounds while maintaining 128-bit security, Poseidon2 typically gives us 2-4x speedup in proving time compared to original Poseidon.</p><h3>Barretenberg and Noir</h3><p>Barretenberg is Aztec&#8217;s proving backend, it is a C++ library that implements various proof systems with custom gates and lookup tables. At this level, we are thinking about representing field operations as polynomial constraints.</p><p>For Poseidon2 in Barretenberg, each S-box operation can be done in a single custom gate that handles the multiplication chain efficiently. The matrix multiplications get compiled into linear combinations which are significantly cheaper in the constraint system. The result is that hashing 2 field elements with Poseidon2 might cost around 150-200 constraints total, whereas implementing SHA256 over the same field would cost hundreds of thousands.</p><p>Noir is the high-level language that compiles down to Barretenberg circuits. At the Noir level, we are not thinking about constraints directly but instead writing what looks like normal Rust code. But under the hood, the Noir compiler is making choices about how to represent them as arithmetic circuits. When we call the standard library&#8217;s Poseidon2 hash function, the compiler emits the optimized Barretenberg-specific implementation.</p><p>The great thing about this is that we can call std::hash::poseidon2::hash([x, y]) and get a cryptographically secure hash that is practical to prove. This enables things like Merkle trees in zkVMs, making the difference between a proof that takes seconds versus hours.</p><h2><strong>Why Poseidon2 is Secure</strong></h2><p>The security of Poseidon2 rests on a fundamentally different hardness assumption than traditional hash functions like SHA256. When you try to break Poseidon2 (finding two inputs that produce the same hash, or computing an input that hashes to a specific value) you end up needing to solve a system of multivariate polynomial equations over a finite field. This is the MQ problem (Multivariate Quadratic), which is NP-hard in the general case. The S-box operation raising elements to the 5th or 7th power creates these high-degree polynomial relationships. After just 8 full rounds, the output is a polynomial of degree 5<sup>8</sup> = 390625 in terms of the input. Even with quantum computers and Grover&#8217;s algorithm, solving these systems at the scale of Poseidon would take far longer than the available time.</p><p>The MDS matrix plays a crucial role with its Maximum Distance Separable property guaranteeing that if you change k input positions, at least t-k+1 output positions must change. For the t=3 case, changing even one input element forces all three state elements to change after the MDS layer. This prevents differential cryptanalysis, where an attacker tries to track how specific input differences propagate through the function. With Poseidon, a single field element difference in your input affects all state elements after just one round, and the probability of finding a differential characteristic that holds through all rounds drops exponentially.</p><p>The partial round structure might seem like it would weaken security, but the sandwich design is what makes it work. An attacker trying to find a collision or preimage would need to simultaneously solve through the initial full rounds, track 56 rounds of partial-round diffusion, and invert through the final full rounds. The combined complexity of this meets the 128-bit security target.</p><p>The sponge construction adds another layer of security through the capacity. When you squeeze out the hash, you are only seeing r out of t state elements with the remaining c elements staying hidden. An attacker who wants to forge a hash or extend it would need to guess the capacity elements, with c around 254 bits (one field element), that&#8217;s 2<sup>127</sup> operations.</p><p>The specific attacks that cryptographers worry about for Poseidon include Gr&#246;bner basis attacks (trying to solve the polynomial system directly), algebraic attacks (looking for low-degree relationships), differential cryptanalysis (tracking how differences propagate), and invariant subspace attacks (finding symmetries in the permutation). The round constants are specifically chosen to break symmetries, the degree growth from the S-boxes makes Gr&#246;bner basis methods infeasible at 128-bit complexity, and the MDS diffusion kills differential characteristics. The original Poseidon paper included extensive cryptanalysis and added a security margin with the recommended parameters being stronger than the bare minimum needed.</p><p>Poseidon2&#8217;s security level is calibrated to 128 bits, which means an attacker with unlimited classical computing power would need about 2<sup>128</sup> operations to break it. That&#8217;s the same security level as AES128. With quantum computers, Grover&#8217;s algorithm could reduce this to 2<sup>64</sup>, which is why some protocols are already planning for 256-bit security parameters for post-quantum resistance. But for current applications, 128 bits is considered the minimum acceptable security level for financial and cryptographic systems.</p><h2><strong>The Ecosystem</strong></h2><p>Poseidon2 is becoming a default zk-friendly hash in many modern zkVM/proving stacks, especially where Merkleization and recursion dominate runtime. SP1 uses Poseidon2 over the BabyBear field (with Plonky3-aligned parameters), and RISC Zero has adopted Poseidon2 in parts of its recursion pipeline. Plonky2 uses a Goldilocks-field Poseidon variant, while Plonky3 commonly uses Poseidon2 and supports multiple field/hash configurations. The exact parameters and optimizations differ, but the core idea remains the same.</p><p>The standardization around Poseidon2 is one of those quiet infrastructure wins that makes the entire ZK ecosystem viable. Without SNARK-friendly hash functions, you simply couldn&#8217;t build practical zkVMs or zkRollups. With them, you can prove execution of millions of instructions in reasonable time.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://review.stanfordblockchain.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Stanford Blockchain Review! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[#77 - Shedding the Light(er): the Fine Prints of ZK]]></title><description><![CDATA[A deep dive into Lighter&#8217;s verifiable perp-rollup design, explaining what ZK proofs actually enforce and what they don't]]></description><link>https://review.stanfordblockchain.xyz/p/77-shedding-the-lighter-the-fine</link><guid isPermaLink="false">https://review.stanfordblockchain.xyz/p/77-shedding-the-lighter-the-fine</guid><dc:creator><![CDATA[Stanford Blockchain Club]]></dc:creator><pubDate>Mon, 29 Dec 2025 19:27:13 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!PtFy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F021c941f-adeb-4bc5-abca-37511c4d2c21_640x360.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!PtFy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F021c941f-adeb-4bc5-abca-37511c4d2c21_640x360.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!PtFy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F021c941f-adeb-4bc5-abca-37511c4d2c21_640x360.png 424w, https://substackcdn.com/image/fetch/$s_!PtFy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F021c941f-adeb-4bc5-abca-37511c4d2c21_640x360.png 848w, https://substackcdn.com/image/fetch/$s_!PtFy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F021c941f-adeb-4bc5-abca-37511c4d2c21_640x360.png 1272w, https://substackcdn.com/image/fetch/$s_!PtFy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F021c941f-adeb-4bc5-abca-37511c4d2c21_640x360.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!PtFy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F021c941f-adeb-4bc5-abca-37511c4d2c21_640x360.png" width="724" height="407.25" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/021c941f-adeb-4bc5-abca-37511c4d2c21_640x360.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:360,&quot;width&quot;:640,&quot;resizeWidth&quot;:724,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!PtFy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F021c941f-adeb-4bc5-abca-37511c4d2c21_640x360.png 424w, https://substackcdn.com/image/fetch/$s_!PtFy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F021c941f-adeb-4bc5-abca-37511c4d2c21_640x360.png 848w, https://substackcdn.com/image/fetch/$s_!PtFy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F021c941f-adeb-4bc5-abca-37511c4d2c21_640x360.png 1272w, https://substackcdn.com/image/fetch/$s_!PtFy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F021c941f-adeb-4bc5-abca-37511c4d2c21_640x360.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="pullquote"><p><em><strong>Stanford Blockchain Review</strong><br>Volume 8, Article No. 7</em></p><p><em>&#9997;&#127995; Author: <a href="https://x.com/__billygao">Billy Gao</a> &#8212; Stanford Blockchain Club<br><a href="https://lighter.xyz/">Lighter</a>, <a href="https://x.com/Lighter_xyz">X</a></em></p><p><em>&#11088;&#65039; Technical Prerequisite: Intermediate</em></p></div><p>Lighter is an application-specific zk-rollup built on Ethereum for perp trading. Unlike general-purpose Layer 2 solutions, Lighter generates SNARK proofs for every order match and liquidation event, claiming to deliver centralized-exchange-level performance with millisecond level latency while maintaining cryptographic verifiability.</p><h1><strong>Architecture Overview</strong></h1><p>At the heart of the architecture sits the sequencer that consumes transactions from the mempool and executes them sequentially against the orderbook state. The sequencer determines transaction ordering, integrates with oracle networks for price feeds, and structures executed transactions into blocks and batches. The sequencer provides &#8220;soft finality&#8221; within milliseconds, but true settlement only occurs after proof verification on Ethereum.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://review.stanfordblockchain.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Stanford Blockchain Review! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>The prover receives execution data from parallelized witness generator services, which transform sequencer output into circuit-friendly inputs. The proving system employs a multi-layer aggregation approach where hundreds of thousands of individual execution proofs are combined into a single batch proof.</p><p>This aggregation is what makes verification on Ethereum economically feasible. Once the Ethereum smart contracts verify the batch proof against the stored commitment, the canonical state root advances and any onchain messages like withdrawal transfers would execute. The sequencer also posts compressed state deltas to Ethereum blobs, ensuring sufficient data exists onchain for users to reconstruct their state and exit independently if necessary.</p><h2><strong>State Tree Structure</strong></h2><p>The entire Lighter state is encapsulated in a merkleized data structure, using Poseidon2 for hashing. The root hash of this tree serves as a cryptographic commitment to the complete protocol state. This is what gets stored and verified on Ethereum. When a proof &#8220;verifies&#8221;, it demonstrates that a claimed state transition correctly transforms one valid root into another according to the protocol rules.</p><p>The tree contains several specialized sub-trees optimized for different operations. The account tree stores all user-related data, with each account leaf containing enough information to reconstruct a user&#8217;s complete state for exit purposes.</p><p>Another subtree is the orderbook tree which directly enables the price-time priority guarantee by encoding both price and time-priority into the leaf index itself. The encoding means that traversing the tree naturally encounters orders in price-time order. This design enables O(log N) operations for order insertion, removal, and quote retrieval while requiring only a single leaf access for matching operations. When a taker order arrives, the circuit can prove the correct maker was selected by verifying the Merkle path to that specific leaf.</p><h2><strong>Transaction Flow</strong></h2><p>When a user submits an order through the API, it enters the Sequencer&#8217;s mempool. The sequencer then determines the ordering of transactions.</p><p>After ordering, the sequencer executes transactions against the current orderbook state, generating execution receipts broadcast back to users via the API within approximately 5 milliseconds. However, this confirmation is not yet settled on Ethereum. The sequencer has committed to a particular execution, but that commitment is not yet cryptographically bound.</p><p>In parallel, execution data flows to the witness generator services, which prepare inputs for the Prover. The Prover generates SNARK proofs for the batch execution. Once the proof is ready, it is submitted to Ethereum smart contracts along with the batch commitment. The contracts verify the proof and, if valid, update the canonical state root. At this point, and only at this point, is the execution truly final in the Ethereum security model.</p><h1><strong>What Lighter&#8217;s ZK Proofs Actually Guarantee</strong></h1><p>The cryptographic guarantees provided by Lighter&#8217;s SNARK proofs are real and significant, but they have precise boundaries that are often misunderstood.</p><h2><strong>Execution Integrity</strong></h2><p>The most fundamental guarantee is execution integrity: given a sequence of transactions and oracle inputs, the resulting state is computed correctly according to the protocol rules. The prover cannot produce a valid proof for an arbitrary state transition. If the protocol specifies that a limit order at price P should execute against the best available counterparty, the proof ensures this actually happened. This ensures that the sequencer cannot modify account balances arbitrarily, or fabricate positions out of thin air.</p><p>This guarantee extends to all protocol operations encoded in the circuits. The circuits effectively act as a deterministic state machine where the sequencer provides the input ordering and oracle data, and the output state is uniquely determined. Any deviation from correct execution will cause proof generation to fail or produce an invalid proof that Ethereum contracts will reject. This is what &#8220;verifiable execution&#8221; actually means&#8212;not that the inputs are fair, but that the computation on those inputs is correct.</p><h2><strong>Price-Time Priority Within Batches</strong></h2><p>Lighter&#8217;s matching engine enforces price-time priority at the proof level, which is a stronger guarantee than most competing designs. To understand why this matters, consider how many zk-rollup orderbooks work: the sequencer performs matching offchain and the proof merely confirms that two orders intersected at a valid price. In such designs, when multiple makers have orders at the same price level, the sequencer can choose which maker gets the fill. As such, a sequencer could systematically favor a market maker, and the proof would still verify since &#8220;maker A and taker B traded at price P&#8221; is a true statement regardless of whether maker A was first in line.</p><p>Lighter&#8217;s circuit actually verifies that the correct maker determined by time priority was selected. By encoding time priority into the leaf index alongside price, the tree naturally orders makers at each price level. The matching operation requires accessing only a single leaf to find the best counterparty, and the circuit verifies that this leaf was correctly identified given the tree structure. This means within a given batch, once orders are included, a friendly market maker cannot be secretly prioritized over an older order at the same price.</p><p>However, the limitation that &#8220;within a given batch, once orders are included&#8221; is crucial. The proof verifies correct matching against the orderbook state at proof time, but the sequencer controls which orders enter that state and when.</p><h2><strong>Data Sufficiency for Self-Custodial Exits</strong></h2><p>The proofs attest that the data posted to Ethereum blobs is sufficient to reconstruct user states, which can be cryptographically verified. The account delta tree tracks all state changes during a batch, and its serialization to blobs is part of what the proof verifies. A valid proof cannot be generated if the blob data is incomplete or inconsistent with the state transition.</p><p>This guarantee underpins the escape hatch mechanism. If the sequencer fails to process priority transactions within 14 days, the rollup freezes and users can exit by proving their balance against the frozen state root using only Ethereum-posted data. The exit circuit verifies Merkle membership proofs against the state root, allowing users to withdraw without any cooperation from the sequencer. This is a meaningful improvement over other designs which lack a forced withdrawal path entirely. In those scenarios the users would have no onchain recourse if the validators stopped cooperating.</p><h1><strong>What Lighter&#8217;s ZK Proofs Do NOT Guarantee</strong></h1><h2><strong>The Ordering Problem</strong></h2><p>The Lighter whitepaper explicitly states that the sequencer&#8217;s core function is to determine transaction ordering. The proofs verify that execution was correct given the ordering, not that the ordering itself was fair. This is a crucial distinction.</p><p>Consider a concrete attack scenario. A user submits a large market buy order. The sequencer observes this order in its mempool before deciding on transaction ordering. Nothing prevents the sequencer from: (1) inserting its own buy order first at a lower price, (2) including the user&#8217;s order next, which moves the price up due to its size, and (3) inserting its own sell order at the higher price. This is a classic sandwich attack.</p><p>Every individual execution in this sequence is &#8220;correct&#8221; and will produce a valid proof. The user received correct execution at the price available after the sequencer&#8217;s front-running order, but that price just happened to be worse because the sequencer moved it. The proof verifies exactly what it claims: correct execution of the ordered transactions. It says nothing about whether that ordering was fair or whether the sequencer extracted value from the user.</p><p>Preventing this type of MEV extraction would require additional mechanisms entirely outside the proof system. Threshold encryption could commit orders before their contents are revealed to the sequencer. Commit-reveal schemes could separate order submission from execution. Enforced arrival-time ordering based on external timestamps could constrain sequencer discretion. The claim that &#8220;ZK makes front-running cryptographically impossible&#8221; is factually false. The proofs guarantee execution integrity, not ordering fairness.</p><h2><strong>The Inclusion Problem</strong></h2><p>The proofs verify correctness for transactions that are included in a batch. They cannot prove anything about transactions that were not included. If a user submits an order and the sequencer simply doesn&#8217;t include it in the current batch, no proof violation occurs. The sequencer might delay an order for seconds, minutes, or indefinitely. It might drop the order entirely.</p><p>The priority transaction queue and escape hatch mechanism address a specific subset of this problem in censorship of exit operations. Users can submit withdrawals, position closures, and other priority operations directly on Ethereum L1, and the sequencer must process them within 14 days or the rollup freezes. This provides exit liveness, such that users can always get your money out eventually. But it does not address general trading inclusion since there is no mechanism forcing the sequencer to include your limit order within any particular timeframe.</p><p>This creates a form of soft censorship that doesn&#8217;t trigger the escape hatch. A sequencer could systematically delay orders from certain addresses, or orders above certain sizes, or orders that would move the market against the sequencer&#8217;s own positions. Users would experience poor execution without any protocol-level recourse, because their orders are eventually included and all included executions verified correctly.</p><h2><strong>The Oracle Problem</strong></h2><p>Another subtle limitation concern comes from oracle data. The circuits prove that liquidations, funding calculations, and mark price applications were computed correctly using the supplied oracle data. They cannot prove that the oracle data reflects actual market conditions.</p><p>If the sequencer supplies a mark price of $100 when the true market price is $95, and this causes a user to be liquidated, the proof will verify that the liquidation was correctly executed at the supplied price. The liquidation was &#8220;correct&#8221; in the cryptographic sense where the circuit logic for liquidations was faithfully executed. But it was economically unjust because the input was wrong.</p><p>Lighter uses Stork as the primary oracle provider and constructs mark prices as a median of three values: orderbook impact prices, EMA-capped premiums, and CEX median marks. This is more robust than single-source oracles, but each input has potential manipulation vectors, and the median requires corrupting only two out of three sources.</p><h1><strong>Conclusion</strong></h1><p>Lighter represents an advancement in verifiable exchange design. The ZK architecture provides genuine guarantees absent in most competitors. These properties are cryptographically enforced and represent real security improvements over trust-based alternatives.</p><p>However, engineers and traders must understand the precise fine prints. The ZK proofs do not prevent MEV extraction since the sequencer controls ordering and can front-run at will. They do not guarantee prompt order inclusion with soft censorship through selective delay produces valid proofs. They do not verify oracle accuracy and they do not provide privacy with orderflow being visible to the sequencer.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://review.stanfordblockchain.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Stanford Blockchain Review! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[#76 - Cryptography Research Spotlight - An Overview of the LatticeFold Architectural Family]]></title><description><![CDATA[A Conversation with Dan Boneh of Stanford University]]></description><link>https://review.stanfordblockchain.xyz/p/76-cryptography-research-spotlight</link><guid isPermaLink="false">https://review.stanfordblockchain.xyz/p/76-cryptography-research-spotlight</guid><dc:creator><![CDATA[Stanford Blockchain Club]]></dc:creator><pubDate>Tue, 14 Oct 2025 18:00:39 GMT</pubDate><enclosure url="https://substackcdn.com/image/youtube/w_728,c_limit/3CIfx7g_28Q" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="pullquote"><p><em><strong>Stanford Blockchain Review</strong><br>Volume 8, Article No. 6</em></p><p><em>&#128218; Guest: Prof. Dan Boneh</em> &#8212; Stanford University<br><em>&#9997;&#127995; Author: <a href="https://www.linkedin.com/in/yavor-litchev-76b966267/">Yavor</a>  &#8212; Cryptography at Stanford</em></p><p><em>&#11088;&#65039; Technical Prerequisite: Advanced</em></p></div><div id="youtube2-3CIfx7g_28Q" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;3CIfx7g_28Q&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/3CIfx7g_28Q?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><h1>Introduction</h1><p>Folding has emerged as a practical way to scale proof systems: instead of proving every step of a large computation independently, or embedding full verifiers inside circuits, folding incrementally compresses many steps into a single accumulator that can be proved succinctly. Conventional schemes largely rely on discrete-log commitments, which are efficient today but not post-quantum and often force large field arithmetic that complicates implementations at scale. LatticeFold takes a different path: it seeks to bring plausible post-quantum security and hardware-friendly arithmetic to folding by building on lattice assumptions and Ajtai-style linear commitments.</p><p>In this article, we will first provide a concise crash course on folding, its relationship to zero-knowledge proof systems, and why folding matters for blockchains and rollups. We then develop a technical overview of the LatticeFold family (LatticeFold, LatticeFold+, and Neo), highlighting how their design choices aim to control norm growth while retaining succinctness. Finally, we discuss emerging deployments and an Ethereum-oriented outlook, including the role of folding in aggregating post-quantum signatures and how a Beam-style vision might benefit from these techniques. We would like to acknowledge Dan Boneh and Binyi Chen for authoring LatticeFold and LatticeFold+, and Wilson Nguyen and Srinath Setty for authoring Neo: these works collectively advance lattice-based folding and are the focus of what follows.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://review.stanfordblockchain.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Stanford Blockchain Review! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>1 - A Crash Course on Folding and LatticeFold Preliminaries</h2><p>Succinct proof systems (SNARKs) let verifiers check quickly that large computations have been performed accurately, but constructing a single &#8220;monolithic&#8221; proof of a massive workload can exhaust memory and time. A classic workaround is recursion: break the computation into chunks and prove each chunk, then prove the verifier of the previous proof, and so on. Folding offers a lighter alternative to running full verifiers inside circuits: it merges two instances into one <em>accumulator</em> instance while preserving correctness, so a long sequence of steps can be collapsed and proved once at the end. Formally, a folding scheme gives a <em>reduction of knowledge</em> from R_acc&#215;R_comp&#8203; to R_acc (R_comp being a single step of a computation, and R_acc relation that accumulates multiple computation steps), enabling many steps to be aggregated into a single statement about R_acc. This viewpoint underlies modern systems like HyperNova for customizable constraint systems (CCS)<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a>.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!oiAX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48027383-b891-43e1-8d30-c4b8c5a388b9_1226x523.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!oiAX!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48027383-b891-43e1-8d30-c4b8c5a388b9_1226x523.png 424w, https://substackcdn.com/image/fetch/$s_!oiAX!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48027383-b891-43e1-8d30-c4b8c5a388b9_1226x523.png 848w, https://substackcdn.com/image/fetch/$s_!oiAX!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48027383-b891-43e1-8d30-c4b8c5a388b9_1226x523.png 1272w, https://substackcdn.com/image/fetch/$s_!oiAX!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48027383-b891-43e1-8d30-c4b8c5a388b9_1226x523.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!oiAX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48027383-b891-43e1-8d30-c4b8c5a388b9_1226x523.png" width="1226" height="523" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/48027383-b891-43e1-8d30-c4b8c5a388b9_1226x523.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:523,&quot;width&quot;:1226,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!oiAX!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48027383-b891-43e1-8d30-c4b8c5a388b9_1226x523.png 424w, https://substackcdn.com/image/fetch/$s_!oiAX!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48027383-b891-43e1-8d30-c4b8c5a388b9_1226x523.png 848w, https://substackcdn.com/image/fetch/$s_!oiAX!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48027383-b891-43e1-8d30-c4b8c5a388b9_1226x523.png 1272w, https://substackcdn.com/image/fetch/$s_!oiAX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48027383-b891-43e1-8d30-c4b8c5a388b9_1226x523.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>An overview of folding, both the proving and verification stage, <a href="https://raw.githubusercontent.com/zkpstandard/docs/master/pages/presentations/2025-03-w7/20250324-zkproof7--Dan-Boneh--LatticeFold-and-LatticeFold%2B.pdf">source</a></em></p><p>As to how this relates to existing zero-knowledge systems, zero-knowledge (ZK) and folding are complementary. ZK governs privacy, where one can prove correctness of a statement while hiding why the statement is correct (the witness)<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a>, whereas folding governs scalability of recursion, that is accumulating many steps into one succinct object to be proved. A pipeline can therefore use folding to compress a long computation trace and then apply any desired SNARK/STARK (with or without ZK) to the final accumulator. This separation is valuable when moving from toy examples to real blockchain workloads (e.g., verifying an entire block or rollup batch).</p><p>Folding is important for blockchain systems since onchain and Layer 2 (L2) systems routinely confront proofs over billions of machine instructions or tens of thousands of signatures. Decomposing these tasks into chunks is natural, but repeatedly verifying full proofs inside circuits is expensive. Folding replaces those inner verifiers with simple linear updates to an accumulator, cutting prover memory and often reducing end-to-end proving time. In our interview, the authors emphasize precisely this pipeline: fold a large number of sub-statements (e.g., batches of signatures or trace segments) into one statement and prove that single accumulator at the end.</p><p>Most prior folding schemes use additively homomorphic commitments derived from discrete log (e.g., Pedersen). That choice has two ramifications. First, these constructions are not secure against large, fault-tolerant quantum computers. Second, they typically operate over large (&#8776;256-bit) fields and require non-native arithmetic or elliptic-curve operations inside circuits, which inflates prover complexity. These issues show up in comparative analyses against schemes like HyperNova and Protostar<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-3" href="#footnote-3" target="_self">3</a>.</p><p>Given these problems, LatticeFold enters the picture to replace discrete-log commitments with Ajtai commitments over rings R_q, and bases security on the Module-SIS (MSIS) assumption, which is widely studied and believed post-quantum. Working directly in rings enables arithmetic over small moduli (e.g., 64-bit primes) that align well with modern CPUs/GPUs, avoiding heavy elliptic-curve work and non-native field emulation. The paper&#8217;s evaluation targets both low-degree relations (like R1CS) and higher-degree CCS, with an aim of maintaining competitiveness with leading pre-quantum schemes while adding plausible post-quantum security.</p><p>Ajtai commitments are succinct and linearly homomorphic, but they are binding only for low-norm messages. Na&#239;vely folding by taking random linear combinations would cause witness norms to grow over many steps, eventually exceeding the binding bound B. This undermines soundness if left unchecked. LatticeFold tackles this by structuring each fold so that witnesses remain provably within a low-norm range throughout long folding chains.</p><p>At the high level, LatticeFold organizes each step into three phases, expansion, decomposition, and folding, and buttresses them with a compact range proof built from the sum-check protocol:</p><ul><li><p>Expansion reshapes the per-step relation so the accumulator and the next step can be combined without introducing problematic cross terms. For high-degree CCS, a preliminary linearization via sum-check avoids multiplicative blowups.</p></li><li><p>Decomposition writes each committed vector in a small base b so that it splits into several low-norm &#8220;digits.&#8221; Instead of combining two large-norm vectors directly, the scheme works with many small-norm fragments, making subsequent linear combinations safe with respect to the required norm bound.</p></li><li><p>Folding then aggregates those fragments using small-norm challenges drawn from a carefully chosen sampling set, preserving the low-norm invariant of the accumulator. A sum-check-based range proof certifies that all fragments truly lie in the claimed range, ensuring extractability remains compatible with the Ajtai binding guarantee.</p></li></ul><p>At a conceptual level, readers can think of Ajtai commitments as matrix&#8211;vector products in a ring: public parameters define a random rectangular matrix A over R_q, and committing to a vector x amounts to computing Ax. Linearity gives the homomorphism needed for folding, while MSIS underpins binding for low-norm openings. The combinatorial work of LatticeFold is to make sure the running &#8220;sum&#8221; of many steps never escapes the allowed range, even when we fold thousands of times.</p><p>Because LatticeFold operates over 64-bit moduli, it aligns with commodity hardware and lends itself to GPU acceleration, an angle the interview highlights explicitly. This hardware fit is particularly relevant for blockchain pipelines that must process high-volume batches under tight latency and cost constraints. Moreover, folding can play a central role in Ethereum&#8217;s prospective migration to post-quantum signatures: many hash-based signatures could be folded into a single accumulator and then proved succinctly, providing the aggregation properties that BLS gives today in the pre-quantum world. These themes, GPU friendliness and signature aggregation, emerge repeatedly in ongoing experimentation the authors mention.</p><p>We have sketched folding&#8217;s motivation and the LatticeFold intuition without the algebra. In the next section, we will unpack how LatticeFold, LatticeFold+, and Neo instantiate these ideas, how expansion, decomposition, and folding are realized over Ajtai commitments; how sum-check certifies range constraints; and how higher-degree CCS is linearized for efficient accumulation.</p><h2>2 - A Technical Deep Dive into the LatticeFold Architecture</h2><p>In order to cover the LatticeFold algorithm completely, we must first precisely describe various cryptographic ideas that will be used for the larger scheme. The key contribution of LatticeFold is that it swaps the usual discrete-log (elliptic-curve) commitments used by prior folding schemes for Ajtai commitments built from lattices. Concretely, the public key is a random matrix , and to commit to a vector , one must compute . This commitment is binding (one can&#8217;t open it two different ways) as long as the committed vector is &#8220;small&#8221;, i.e., its entries have bounded size (more on &#8220;size&#8221; below). The binding guarantee relies on the Module-SIS (MSIS) hardness assumption, which is believed to be post-quantum secure.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!yl44!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F291331bc-3d54-4a06-9879-655d1da570ba_85x22.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!yl44!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F291331bc-3d54-4a06-9879-655d1da570ba_85x22.png 424w, https://substackcdn.com/image/fetch/$s_!yl44!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F291331bc-3d54-4a06-9879-655d1da570ba_85x22.png 848w, https://substackcdn.com/image/fetch/$s_!yl44!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F291331bc-3d54-4a06-9879-655d1da570ba_85x22.png 1272w, https://substackcdn.com/image/fetch/$s_!yl44!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F291331bc-3d54-4a06-9879-655d1da570ba_85x22.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!yl44!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F291331bc-3d54-4a06-9879-655d1da570ba_85x22.png" width="85" height="22" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/291331bc-3d54-4a06-9879-655d1da570ba_85x22.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:22,&quot;width&quot;:85,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!yl44!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F291331bc-3d54-4a06-9879-655d1da570ba_85x22.png 424w, https://substackcdn.com/image/fetch/$s_!yl44!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F291331bc-3d54-4a06-9879-655d1da570ba_85x22.png 848w, https://substackcdn.com/image/fetch/$s_!yl44!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F291331bc-3d54-4a06-9879-655d1da570ba_85x22.png 1272w, https://substackcdn.com/image/fetch/$s_!yl44!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F291331bc-3d54-4a06-9879-655d1da570ba_85x22.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!wawG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d6d7016-292a-4930-aa21-8a233e403c91_62x22.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wawG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d6d7016-292a-4930-aa21-8a233e403c91_62x22.png 424w, https://substackcdn.com/image/fetch/$s_!wawG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d6d7016-292a-4930-aa21-8a233e403c91_62x22.png 848w, https://substackcdn.com/image/fetch/$s_!wawG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d6d7016-292a-4930-aa21-8a233e403c91_62x22.png 1272w, https://substackcdn.com/image/fetch/$s_!wawG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d6d7016-292a-4930-aa21-8a233e403c91_62x22.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wawG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d6d7016-292a-4930-aa21-8a233e403c91_62x22.png" width="62" height="22" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3d6d7016-292a-4930-aa21-8a233e403c91_62x22.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:22,&quot;width&quot;:62,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!wawG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d6d7016-292a-4930-aa21-8a233e403c91_62x22.png 424w, https://substackcdn.com/image/fetch/$s_!wawG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d6d7016-292a-4930-aa21-8a233e403c91_62x22.png 848w, https://substackcdn.com/image/fetch/$s_!wawG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d6d7016-292a-4930-aa21-8a233e403c91_62x22.png 1272w, https://substackcdn.com/image/fetch/$s_!wawG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d6d7016-292a-4930-aa21-8a233e403c91_62x22.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bDcX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57c846a0-4275-4436-9aa6-8b7099d59f2a_59x14.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bDcX!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57c846a0-4275-4436-9aa6-8b7099d59f2a_59x14.png 424w, https://substackcdn.com/image/fetch/$s_!bDcX!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57c846a0-4275-4436-9aa6-8b7099d59f2a_59x14.png 848w, https://substackcdn.com/image/fetch/$s_!bDcX!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57c846a0-4275-4436-9aa6-8b7099d59f2a_59x14.png 1272w, https://substackcdn.com/image/fetch/$s_!bDcX!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57c846a0-4275-4436-9aa6-8b7099d59f2a_59x14.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bDcX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57c846a0-4275-4436-9aa6-8b7099d59f2a_59x14.png" width="59" height="14" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/57c846a0-4275-4436-9aa6-8b7099d59f2a_59x14.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:14,&quot;width&quot;:59,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!bDcX!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57c846a0-4275-4436-9aa6-8b7099d59f2a_59x14.png 424w, https://substackcdn.com/image/fetch/$s_!bDcX!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57c846a0-4275-4436-9aa6-8b7099d59f2a_59x14.png 848w, https://substackcdn.com/image/fetch/$s_!bDcX!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57c846a0-4275-4436-9aa6-8b7099d59f2a_59x14.png 1272w, https://substackcdn.com/image/fetch/$s_!bDcX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57c846a0-4275-4436-9aa6-8b7099d59f2a_59x14.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!AOlw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae231745-de33-4257-82e1-4abbb93c42da_1231x540.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!AOlw!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae231745-de33-4257-82e1-4abbb93c42da_1231x540.png 424w, https://substackcdn.com/image/fetch/$s_!AOlw!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae231745-de33-4257-82e1-4abbb93c42da_1231x540.png 848w, https://substackcdn.com/image/fetch/$s_!AOlw!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae231745-de33-4257-82e1-4abbb93c42da_1231x540.png 1272w, https://substackcdn.com/image/fetch/$s_!AOlw!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae231745-de33-4257-82e1-4abbb93c42da_1231x540.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!AOlw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae231745-de33-4257-82e1-4abbb93c42da_1231x540.png" width="1231" height="540" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ae231745-de33-4257-82e1-4abbb93c42da_1231x540.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:540,&quot;width&quot;:1231,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!AOlw!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae231745-de33-4257-82e1-4abbb93c42da_1231x540.png 424w, https://substackcdn.com/image/fetch/$s_!AOlw!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae231745-de33-4257-82e1-4abbb93c42da_1231x540.png 848w, https://substackcdn.com/image/fetch/$s_!AOlw!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae231745-de33-4257-82e1-4abbb93c42da_1231x540.png 1272w, https://substackcdn.com/image/fetch/$s_!AOlw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae231745-de33-4257-82e1-4abbb93c42da_1231x540.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>A review of Ajtai commitments, <a href="https://raw.githubusercontent.com/zkpstandard/docs/master/pages/presentations/2025-03-w7/20250324-zkproof7--Dan-Boneh--LatticeFold-and-LatticeFold%2B.pdf">source</a></em></p><p>If one wished to read the LatticeFold paper in detail, one would repeatedly see the word &#8220;norm&#8221; and its importance for it to be small. What does this mean? When we say an entry is &#8220;small,&#8221; we measure it with the &#8467;&#8734; norm: this should be thought of as &#8220;the largest absolute coefficient you see.&#8221; Here, a &#8220;coefficient&#8221; means the integer coefficients of a ring element (a polynomial modulo X_d&#8201;&#8291;+&#8201;&#8291;1) after reducing into [&#8722;q/2,q/2). For a vector of ring elements, &#8741;x&#8741;&#8734; is the largest absolute coefficient appearing anywhere in the vector. Ajtai commitments are binding for vectors whose &#8467;&#8734; norm is below a threshold B. If, during folding, our vectors grow beyond B, binding can break, and therefore LatticeFold is engineered to keep norms small at every step.</p><p>Additionally, LatticeFold works over a cyclotomic ring R=Z[X]/(Xd+1) and its mod-q version</p><p>Rq=R/qR. The relevance is that these rings (a set of elements where one can perform addition and multiplication) support fast number-theoretic transforms and are standard in lattice cryptography. Using such rings also makes 64-bit arithmetic feasible in practice.</p><p>Furthermore, both R1CS and CCS (terms used frequently in LatticeFold and other literature relating to folding) are ways to encode a computation trace (such as a program execution) as algebraic constraints. This &#8220;arithmetization&#8221; is what proof systems operate on, as they lend themselves to various algebraic cryptographic operations. R1CS uses only quadratic (degree-2) constraints, whereas CCS (customizable constraint systems) allows higher-degree gates, which can be more compact for some workloads. Folding schemes like HyperNova and LatticeFold target CCS so they can handle both low- and high-degree circuits efficiently.</p><p>Given all of this, LatticeFold turns each fold into three steps: expansion, then decomposition, then finally folding. There is also a lightweight range proof ensuring every committed vector really is low-norm.</p><p><strong>Expansion:</strong> The purpose of this step is to make folding algebraically simple: before we combine &#8220;the accumulator&#8221; with &#8220;the next step,&#8221; we rewrite the step&#8217;s CCS relation into a linearized form that is easy to add up. This mirrors HyperNova&#8217;s linearization (done there over fields), adapted here to rings. One can think of it as moving to a representation where &#8220;adding instances&#8221; corresponds to &#8220;adding their commitments and claims&#8221; without creating hard cross-terms.</p><p><strong>Decomposition:</strong> Here, we wish to break apart big numbers into smaller, more manageable digits. If we combined two witnesses directly, their entries would grow and eventually exceed the binding bound B. LatticeFold avoids this by writing each vector f in base b so all pieces are tiny:</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Ggnp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6cbaa3a-943e-4bdf-b70d-fb8683c44a47_473x48.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Ggnp!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6cbaa3a-943e-4bdf-b70d-fb8683c44a47_473x48.png 424w, https://substackcdn.com/image/fetch/$s_!Ggnp!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6cbaa3a-943e-4bdf-b70d-fb8683c44a47_473x48.png 848w, https://substackcdn.com/image/fetch/$s_!Ggnp!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6cbaa3a-943e-4bdf-b70d-fb8683c44a47_473x48.png 1272w, https://substackcdn.com/image/fetch/$s_!Ggnp!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6cbaa3a-943e-4bdf-b70d-fb8683c44a47_473x48.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Ggnp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6cbaa3a-943e-4bdf-b70d-fb8683c44a47_473x48.png" width="473" height="48" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d6cbaa3a-943e-4bdf-b70d-fb8683c44a47_473x48.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:48,&quot;width&quot;:473,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Ggnp!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6cbaa3a-943e-4bdf-b70d-fb8683c44a47_473x48.png 424w, https://substackcdn.com/image/fetch/$s_!Ggnp!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6cbaa3a-943e-4bdf-b70d-fb8683c44a47_473x48.png 848w, https://substackcdn.com/image/fetch/$s_!Ggnp!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6cbaa3a-943e-4bdf-b70d-fb8683c44a47_473x48.png 1272w, https://substackcdn.com/image/fetch/$s_!Ggnp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6cbaa3a-943e-4bdf-b70d-fb8683c44a47_473x48.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>Here, b is a small base (e.g., 2 or 4), k is the number of digits, and B=b^k is the overall bound we&#8217;re willing to allow. After decomposing two witnesses, we have 2k low-norm fragments instead of two large-norm vectors. (A standard &#8220;gadget&#8221; map makes this decomposition deterministic and efficient).</p><p><strong>Folding:</strong> Finally, we wish to combine many small pieces safely. To fold, the verifier samples small-norm challenges &#961;_1,&#8230;,&#961;_2k from a strong sampling set, a set of ring elements whose pairwise differences are invertible and whose coefficients are tiny enough that multiplying by them doesn&#8217;t blow up norms too much. The prover forms one folded witness:</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!xd3_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01d269f4-a8fe-4dff-b971-84a810bd3de5_207x101.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!xd3_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01d269f4-a8fe-4dff-b971-84a810bd3de5_207x101.png 424w, https://substackcdn.com/image/fetch/$s_!xd3_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01d269f4-a8fe-4dff-b971-84a810bd3de5_207x101.png 848w, https://substackcdn.com/image/fetch/$s_!xd3_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01d269f4-a8fe-4dff-b971-84a810bd3de5_207x101.png 1272w, https://substackcdn.com/image/fetch/$s_!xd3_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01d269f4-a8fe-4dff-b971-84a810bd3de5_207x101.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!xd3_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01d269f4-a8fe-4dff-b971-84a810bd3de5_207x101.png" width="207" height="101" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/01d269f4-a8fe-4dff-b971-84a810bd3de5_207x101.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:101,&quot;width&quot;:207,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!xd3_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01d269f4-a8fe-4dff-b971-84a810bd3de5_207x101.png 424w, https://substackcdn.com/image/fetch/$s_!xd3_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01d269f4-a8fe-4dff-b971-84a810bd3de5_207x101.png 848w, https://substackcdn.com/image/fetch/$s_!xd3_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01d269f4-a8fe-4dff-b971-84a810bd3de5_207x101.png 1272w, https://substackcdn.com/image/fetch/$s_!xd3_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01d269f4-a8fe-4dff-b971-84a810bd3de5_207x101.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>Because each f_i&#8203; has tiny entries and each &#961;_i&#8203; has tiny coefficients, the key bound holds:</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Dq9V!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d7fbe5f-6f15-41d9-b211-2525b123420b_384x69.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Dq9V!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d7fbe5f-6f15-41d9-b211-2525b123420b_384x69.png 424w, https://substackcdn.com/image/fetch/$s_!Dq9V!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d7fbe5f-6f15-41d9-b211-2525b123420b_384x69.png 848w, https://substackcdn.com/image/fetch/$s_!Dq9V!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d7fbe5f-6f15-41d9-b211-2525b123420b_384x69.png 1272w, https://substackcdn.com/image/fetch/$s_!Dq9V!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d7fbe5f-6f15-41d9-b211-2525b123420b_384x69.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Dq9V!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d7fbe5f-6f15-41d9-b211-2525b123420b_384x69.png" width="384" height="69" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4d7fbe5f-6f15-41d9-b211-2525b123420b_384x69.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:69,&quot;width&quot;:384,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Dq9V!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d7fbe5f-6f15-41d9-b211-2525b123420b_384x69.png 424w, https://substackcdn.com/image/fetch/$s_!Dq9V!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d7fbe5f-6f15-41d9-b211-2525b123420b_384x69.png 848w, https://substackcdn.com/image/fetch/$s_!Dq9V!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d7fbe5f-6f15-41d9-b211-2525b123420b_384x69.png 1272w, https://substackcdn.com/image/fetch/$s_!Dq9V!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d7fbe5f-6f15-41d9-b211-2525b123420b_384x69.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>where c is a constant capturing the &#8220;expansion factor&#8221; of the challenge set (how much norms can grow when we multiply by a challenge). This inequality says the folded witness still lives inside the binding range, so we can keep folding. The &#8220;invertible differences&#8221; property guarantees the <em>knowledge extractor</em> (used in the security proof) can safely undo combinations.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!FJru!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11997ca0-b515-464e-a9f4-0b3141e39b95_1231x556.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!FJru!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11997ca0-b515-464e-a9f4-0b3141e39b95_1231x556.png 424w, https://substackcdn.com/image/fetch/$s_!FJru!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11997ca0-b515-464e-a9f4-0b3141e39b95_1231x556.png 848w, https://substackcdn.com/image/fetch/$s_!FJru!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11997ca0-b515-464e-a9f4-0b3141e39b95_1231x556.png 1272w, https://substackcdn.com/image/fetch/$s_!FJru!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11997ca0-b515-464e-a9f4-0b3141e39b95_1231x556.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!FJru!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11997ca0-b515-464e-a9f4-0b3141e39b95_1231x556.png" width="1231" height="556" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/11997ca0-b515-464e-a9f4-0b3141e39b95_1231x556.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:556,&quot;width&quot;:1231,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!FJru!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11997ca0-b515-464e-a9f4-0b3141e39b95_1231x556.png 424w, https://substackcdn.com/image/fetch/$s_!FJru!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11997ca0-b515-464e-a9f4-0b3141e39b95_1231x556.png 848w, https://substackcdn.com/image/fetch/$s_!FJru!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11997ca0-b515-464e-a9f4-0b3141e39b95_1231x556.png 1272w, https://substackcdn.com/image/fetch/$s_!FJru!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11997ca0-b515-464e-a9f4-0b3141e39b95_1231x556.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>A precise diagram of the Decomposition and Folding stages (a_1, .. , a_k are equivalent to f_0, &#8230; f_k-1), <a href="https://raw.githubusercontent.com/zkpstandard/docs/master/pages/presentations/2025-03-w7/20250324-zkproof7--Dan-Boneh--LatticeFold-and-LatticeFold%2B.pdf">source</a></em></p><p>All this only works if the prover proves its digits f_i are genuinely small and within the promised range (e.g., [&#8722;b,b]). LatticeFold encodes &#8220;u is in range&#8221; as a small polynomial identity whose zeros are exactly the allowed values, then uses sum-check over the ring to verify it for all positions at once. Sum-check is a classic subprotocol that lets a verifier check &#8220;the sum of many polynomial evaluations equals T&#8221; by interacting over a few rounds with much smaller polynomials. In short, one proves that the pieces are small, then small challenges keep them small when combined.</p><p>As to how the parameters b and k are selected, a tiny base (2 or 4) is used in practice for b. Larger bases make range proofs heavier without enough payoff. k is chosen so that the safety inequality 2k&#8201;c&#8201;(b&#8722;1)&#8197;&#8202;&lt;&#8197;&#8202;B&#8197;&#8202;&lt;&#8197;&#8202;q/2 holds comfortably, where the left side is &#8220;worst-case growth per fold,&#8221; and the right side keeps it below the modulus&#8217;s halfway point (a standard safety margin). Larger k increases B exponentially but makes decomposition produce more pieces per fold, thus implementations tune k for their workload and challenge-set constant c.</p><p>Why does the above scheme work? Well, the Ajtai commitment is linear (which means A(x+y)=Ax+Ay) and binding for low-norm messages under MSIS. This linear structure allows for commitments to be added during folding, and binding is preserved by staying below B. Decomposition works because the extractor for security reasons may need to divide by a random difference like (&#961;i&#8722;&#961;j). Doing everything at the tiny-digit level ensures that even after algebraic manipulations, the extracted pieces remain within range.</p><p>As monumental as the LatticeFold paper is, subsequent iterations and modifications have come out that have presented updates and optimizations. One such paper is LatticeFold+, which addresses the fact that LatticeFold&#8217;s heaviest subroutine is the range proof (checking that all digits lie in range), which in the original protocol used bit-decomposition and many commitments. LatticeFold+ replaces this with a purely algebraic range proof:</p><ul><li><p>The prover commits to monomials m_i=X^(f_i) (one per entry) and proves two things: (i) each m_i is indeed a monomial, and (ii) a simple algebraic relation holds between mi and the original fi. From these two facts, it follows that every fi lies in (&#8722;d/2,d/2). This avoids committing to bits entirely and dramatically shrinks the work.</p></li><li><p>To keep transcripts short when vectors have d coefficient &#8220;slices,&#8221; LatticeFold+ introduces double commitments, &#8220;commitments of commitments&#8221;, so the verifier receives one compact object instead of d separate commitments. A commitment transformation step (checked by sum-check) then maps this object back into an ordinary linear commitment that the folding machinery can handle. Net effect: shorter proofs and a simpler recursive verifier.</p></li><li><p>Structurally, LatticeFold+ folds L&gt;2 linear instances into one instance with a temporarily larger bound B^2, then uses a high/low split (a mini-decomposition) to return to two instances with bound B. This two-step trick achieves lower overall cost than doing many bit-based range proofs.</p></li></ul><p>In short, LatticeFold+ keeps the LatticeFold backbone but removes the bit-decomposition tax and compresses the recursion layer. That means faster provers and a smaller verifier circuit in practice<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-4" href="#footnote-4" target="_self">4</a>.</p><p>Neo, another paper that builds on LatticeFold, keeps the lattice security foundation but designs the commitments and reductions so that folding can run over small prime fields (e.g., Mersenne-61 or Goldilocks) and, crucially, the cost to commit scales with bit-width (&#8220;pay-per-bit&#8221;), similar to what Pedersen/KZG do, something LatticeFold&#8217;s ring embedding did not achieve<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-5" href="#footnote-5" target="_self">5</a>.</p><ul><li><p>Why pay-per-bit matters: Many witnesses are mostly small values or bits (flags, Merkle checks). Neo&#8217;s commitment maps field vectors into ring elements so that multiplying by a binary &#8220;mask&#8221; only adds a few columns, hence cost scales with the number of 1-bits. The mapping retains the linearity needed for folding evaluation claims.</p></li><li><p>Strong sampling and invertibility: As in LatticeFold, challenges come from a strong sampling set whose differences are invertible; Neo leverages explicit low-norm invertibility bounds to pick these safely in small fields.</p></li><li><p>Three reductions, field-first. Neo composes: (i) CCS &#8594; (partial) evaluations via sum-check; (ii) random linear combination of k+1 claims into one B=bk claim; (iii) decomposition to keep norms under the binding threshold. It&#8217;s the same general algorithm (linearize, combine, keep small) but engineered for small-field arithmetic and &#8220;pay-per-bit&#8221; commitments.</p></li></ul><p>Taken together: LatticeFold gives the first lattice-based folding with disciplined norm control over rings, LatticeFold+ streamlines range proofs and shrinks recursion artifacts, and Neo unlocks small-field performance and pay-per-bit costs while staying plausibly post-quantum. The architectural through-line, decompose into small pieces, combine with small challenges, certify with sum-check, is what makes the whole family practical.</p><h2>3 &#8211; Latticefold&#8217;s deployments and its future with Etherium</h2><p>Early implementations are underway. In our interview, the authors noted that NetherMind is actively prototyping both LatticeFold and LatticeFold+, with performance numbers expected from that effort; other groups are experimenting as well. While results are still being finalized, the direction of travel is clear: evaluate LatticeFold&#8217;s recursion in real proving pipelines and compare it to pre-quantum baselines.</p><p>Two engineering properties make these prototypes attractive. First, LatticeFold works over small (&#8776;64-bit) moduli and a single module structure, avoiding heavy elliptic-curve arithmetic and non-native field emulation inside the accumulator relation. That tends to simplify implementations relative to group-based folding. Second, 64-bit rings map cleanly to GPUs, and even to prospective FHE accelerators that operate over similar number-theoretic rings, so hardware built for FHE may also accelerate lattice-based folding. These factors are explicitly highlighted by the authors as reasons implementers expect good constant factors once code paths are tuned.</p><p>As to what earlier adopters are likely to try first, short-term experiments are natural where (i) workloads are embarrassingly parallel (e.g., batched signature checks, Merkle membership checks, or trace segments), and (ii) the folding verifier must stay small for recursion. The LatticeFold paper reports performance that is comparable to HyperNova for degree-2 relations and better for high-degree CCS, suggesting that CCS-heavy zkVM circuits, rollup state transitions, or hash-heavy workloads may be a good initial fit. Fold many sub-instances to a single accumulator; then produce one succinct proof at the end.</p><p>There are many possible future research directions, but as is described by the authors, LatticeFold+ shows that purely algebraic range proofs and a commitment-to-commitments &#8220;compression&#8221; step can shorten proofs and reduce the recursive verifier (fewer hashes in the Fiat&#8211;Shamir circuit), aiming for a faster prover than HyperNova while retaining plausible post-quantum security. The paper emphasizes that folding proofs act as recursive witnesses, they do not appear on chain, so shrinking them chiefly reduces the recursive verifier cost, not the final on-chain proof size. The authors also flag two open avenues: (1) re-working the analysis and subprotocols in &#8467;&#8322; (which can improve MSIS parameters), and (2) generalizing beyond prime moduli (e.g., powers of two) for implementability</p><p>Neo pushes in a complementary direction: preserve lattice assumptions but fold over small prime fields (e.g., Mersenne-61 or Goldilocks), avoid costly cyclotomic-ring sum-checks, and restore &#8220;pay-per-bit&#8221; commitment costs so committing to bits is far cheaper than to 64-bit words. That unlocks fast arithmetic and a single sum-check invocation, two practical wins for real systems, while staying plausibly post-quantum.</p><p>Finally, it is critical to discuss Etherium&#8217;s BeamChain vision and how LatticeFold might contribute to this ecosystem. At a high level, BeamChain is a conceptual direction for Ethereum that simplifies the consensus layer and moves succinct proofs to the center of the protocol. A concrete driver is post-quantum migration: Ethereum today relies on BLS for validator signatures (aggregation and thresholding are essential to PoS), but there is no drop-in post-quantum scheme with the same aggregation properties. The working plan is to adopt hash-based signatures for security, and then recover aggregation-like compression by SNARK-ifying many signatures into a single succinct proof<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-6" href="#footnote-6" target="_self">6</a>. The authors underscore that this can be done monolithically, that is fold first, then prove once. Folding promises to reduce prover memory and latency by replacing &#8220;verifying a full proof inside a circuit&#8221; with lightweight accumulator updates over the epoch.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!424a!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2e4a79b-d2f9-4f7c-985d-996810409f70_1176x684.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!424a!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2e4a79b-d2f9-4f7c-985d-996810409f70_1176x684.png 424w, https://substackcdn.com/image/fetch/$s_!424a!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2e4a79b-d2f9-4f7c-985d-996810409f70_1176x684.png 848w, https://substackcdn.com/image/fetch/$s_!424a!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2e4a79b-d2f9-4f7c-985d-996810409f70_1176x684.png 1272w, https://substackcdn.com/image/fetch/$s_!424a!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2e4a79b-d2f9-4f7c-985d-996810409f70_1176x684.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!424a!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2e4a79b-d2f9-4f7c-985d-996810409f70_1176x684.png" width="1176" height="684" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b2e4a79b-d2f9-4f7c-985d-996810409f70_1176x684.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:684,&quot;width&quot;:1176,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!424a!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2e4a79b-d2f9-4f7c-985d-996810409f70_1176x684.png 424w, https://substackcdn.com/image/fetch/$s_!424a!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2e4a79b-d2f9-4f7c-985d-996810409f70_1176x684.png 848w, https://substackcdn.com/image/fetch/$s_!424a!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2e4a79b-d2f9-4f7c-985d-996810409f70_1176x684.png 1272w, https://substackcdn.com/image/fetch/$s_!424a!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2e4a79b-d2f9-4f7c-985d-996810409f70_1176x684.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>An overview of the BeamChain Vision, <a href="https://www.bitget.com/news/detail/12560604345023">source</a></em></p><p>For BeamChain-style consensus, validators produce large batches of post-quantum signatures (e.g., per-slot attestations). Instead of building one giant monolithic proof per slot or per epoch, the pipeline can: (1) verify a chunk of signatures, (2) fold the resulting statements into the epoch&#8217;s accumulator using Ajtai commitments and small-norm challenges, and (3) repeat across slots; at epoch end, produce one succinct proof of the accumulator&#8217;s validity. Folding keeps the recursive verifier small and uniform, and the arithmetic (64-bit rings) maps to commodity hardware and GPUs. In effect, LatticeFold <a href="https://eprint.iacr.org/2024/257">gives</a> consensus designers a recursion substrate that is plausibly post-quantum secure and tuned for high-throughput batch workloads.</p><p>In our interview, the authors suggested evaluating a folding-first approach against a STARK-first or monolithic baseline along common KPIs: proof size (for on-chain verification and propagation), end-to-end latency (time to finality), and decentralization (hardware requirements for home validators and community provers). Folding contributes by lowering prover memory and allowing work to be pipelined through slots into a single epoch-level statement. The on-chain interface would still verify a single succinct proof; folding lives off-chain as part of the recursive construction, so the on-chain verifier does not need to check intermediate folding proofs. (LatticeFold+ <a href="https://eprint.iacr.org/2025/247">explicitly notes</a> that folding proofs are recursive witnesses, not part of the final proof object.)</p><p>Hash-based signatures are robust and simple, but they are large and numerous. Folding converts &#8220;verify N big signatures&#8221; into &#8220;update an accumulator N times,&#8221; which is fundamentally cheaper to express than re-verifying a full proof N times in-circuit. The authors argue this may &#8220;dramatically speed things up,&#8221; pending experimental confirmation from NetherMind and others. In other words, if Ethereum&#8217;s post-quantum path is &#8220;hash-based signatures + succinct aggregation,&#8221; a lattice-based folding substrate provides the missing accumulation primitive with post-quantum plausibility.</p><p>The 64-bit arithmetic in LatticeFold is a pragmatic match for GPU vector units; implementers are already targeting GPU folding. Longer-term, specialized FHE ASICs (designed for similar ring operations) could double as folding accelerators, aligning consensus-critical proving with a broader hardware roadmap. That is an unusual and promising alignment: investment in FHE hardware can amortize to proving infrastructure.</p><p>LatticeFold+ trims the recursive verifier and speeds the prover via algebraic range proofs and double-commitment compression. In a BeamChain pipeline this reduces the cost of the recursion layer, making per-slot updates cheaper and shrinking the accumulator circuit budget. Neo complements this by allowing folding directly over fast small fields (M61, Goldilocks), restoring pay-per-bit commitment costs and eliminating the 10&#8211;100&#215; overheads associated with cyclotomic ring sum-checks, useful when the workload is bit-heavy (hashes, flags, Merkle checks). Together, they suggest a migration path from &#8220;LatticeFold as first prototype&#8221; to &#8220;LatticeFold+ for practical recursion&#8221; to &#8220;Neo for small-field, bit-efficient deployments.&#8221;</p><p>Some protocol engineering remains. Neo documents constraints on LatticeFold&#8217;s ring choices (full splitting can harm security), motivating its shift to small fields; compatibility and parameterization across clients need careful study. More broadly, the community will want head-to-head measurements of end-to-end latency, GPU utilization, and operator costs under production loads, and a clear story for proving service decentralization. Finally, formalizing &#8467;&#8322;-based analyses and supporting non-prime moduli (both flagged by LatticeFold+) would broaden parameter choices and simplify implementations.</p><p>BeamChain&#8217;s post-quantum vision, hash-based signatures plus succinct aggregation, pairs naturally with lattice-based folding. LatticeFold provides the core reduction-of-knowledge machinery over 64-bit rings; LatticeFold+ makes the recursion layer slimmer and faster; Neo opens small-field routes with pay-per-bit commitments. If experiments from NetherMind and others validate the anticipated gains, Ethereum can plausibly adopt a folding-first accumulation layer for post-quantum consensus, with a familiar on-chain footprint (one succinct proof per epoch) and a flexible, hardware-friendly off-chain pipeline.</p><h1>Conclusion</h1><p>Folding is emerging as the practical engine of scalable, recursive proving: it aggregates long computations into a compact accumulator, leaving privacy to the underlying proof system and shifting the performance focus to efficient, repeatable updates. LatticeFold shows how to realize this paradigm on lattice assumptions: replacing discrete-log commitments with Ajtai commitments, operating over 64-bit rings, and, crucially, controlling norm growth via base-b decomposition, carefully sampled challenges, and sum-check&#8211;based range arguments. LatticeFold+ refines the recursion layer with algebraic range proofs and double-commitment compression, substantially reducing prover work and the size of the recursive verifier. Neo pushes further by enabling small-field, &#8220;pay-per-bit&#8221; commitments while preserving a post-quantum foundation.</p><p>These advances are not merely theoretical. Early implementations are exploring performance on real pipelines, and the Ethereum-facing BeamChain vision highlights a compelling application: aggregating large volumes of post-quantum signatures by folding per-slot statements into a single epoch-level proof. The hardware fit, 64-bit arithmetic and GPU-friendliness, strengthens the case for practical adoption.</p><p>We would like to acknowledge Dan Boneh and Binyi Chen for LatticeFold and LatticeFold+, and Wilson Nguyen and Srinath Setty for Neo. Together, these works chart a credible path from post-quantum security assumptions to deployable, high-throughput recursion, an essential ingredient for next-generation rollups, consensus, and verifiable computation at blockchain scale.</p><div><hr></div><h1>About the Interviewees</h1><h3>Prof. Dan Boneh</h3><p>Professor Boneh heads the applied cryptography group and co-directs the computer security lab. Professor Boneh&#8217;s research focuses on applications of cryptography to computer security. His work includes cryptosystems with novel properties, web security, security for mobile devices, and cryptanalysis. He is the author of over a hundred publications in the field and is a Packard and Alfred P. Sloan fellow. He is a recipient of the 2014 ACM prize and the 2013 Godel prize. In 2011 Dr. Boneh received the Ishii award for industry education innovation. Professor Boneh received his Ph.D from Princeton University and joined Stanford in 1997.</p><h3>Yavor Litchev</h3><p>Yavor is an undergrad at Stanford pursuing a degree in computer science with a focus on cybersecurity and cryptography. He has previously engaged in research projects relating to secure machine learning and digital signatures with more flexible access structures at MIT PRIMES. More recently, he is researching secure systems and program execution using software fault isolation through the CURIS program. He is currently the cryptography research lead and Financial Officer for the Stanford Blockchain Club.</p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p><a href="https://taiko.mirror.xyz/tk8LoE-rC2w0MJ4wCWwaJwbq8-Ih8DXnLUf7aJX1FbU">An incomplete guide to Folding: Nova, Sangria, SuperNova, HyperNova, Protostar</a></p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-2" href="#footnote-anchor-2" class="footnote-number" contenteditable="false" target="_self">2</a><div class="footnote-content"><p><a href="https://chain.link/education/zero-knowledge-proof-zkp">https://chain.link/education/zero-knowledge-proof-zkp</a></p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-3" href="#footnote-anchor-3" class="footnote-number" contenteditable="false" target="_self">3</a><div class="footnote-content"><p>LatticeFold: <a href="https://eprint.iacr.org/2024/257">https://eprint.iacr.org/2024/257</a></p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-4" href="#footnote-anchor-4" class="footnote-number" contenteditable="false" target="_self">4</a><div class="footnote-content"><p>LatticeFold+: <a href="https://eprint.iacr.org/2025/247">https://eprint.iacr.org/2025/247</a></p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-5" href="#footnote-anchor-5" class="footnote-number" contenteditable="false" target="_self">5</a><div class="footnote-content"><p>Neo: <a href="https://eprint.iacr.org/2025/294">https://eprint.iacr.org/2025/294</a></p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-6" href="#footnote-anchor-6" class="footnote-number" contenteditable="false" target="_self">6</a><div class="footnote-content"><p><a href="https://www.bitget.com/news/detail/12560604345023">Ethereum Beam Chain Proposal Overview: What is the Vision? How is the Technical Layer Constructed?</a></p></div></div>]]></content:encoded></item><item><title><![CDATA[#75 - The Business Model of Rollups]]></title><description><![CDATA[Monetizing Rollups]]></description><link>https://review.stanfordblockchain.xyz/p/75-the-business-model-of-rollups</link><guid isPermaLink="false">https://review.stanfordblockchain.xyz/p/75-the-business-model-of-rollups</guid><dc:creator><![CDATA[Stanford Blockchain Club]]></dc:creator><pubDate>Thu, 25 Sep 2025 18:15:27 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!D7AX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd86b47f2-11be-446a-9a8f-c8bc2e19fe68_1920x1080.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!D7AX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd86b47f2-11be-446a-9a8f-c8bc2e19fe68_1920x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!D7AX!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd86b47f2-11be-446a-9a8f-c8bc2e19fe68_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!D7AX!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd86b47f2-11be-446a-9a8f-c8bc2e19fe68_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!D7AX!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd86b47f2-11be-446a-9a8f-c8bc2e19fe68_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!D7AX!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd86b47f2-11be-446a-9a8f-c8bc2e19fe68_1920x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!D7AX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd86b47f2-11be-446a-9a8f-c8bc2e19fe68_1920x1080.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d86b47f2-11be-446a-9a8f-c8bc2e19fe68_1920x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;The business model of rollups&quot;,&quot;title&quot;:&quot;The business model of rollups&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="The business model of rollups" title="The business model of rollups" srcset="https://substackcdn.com/image/fetch/$s_!D7AX!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd86b47f2-11be-446a-9a8f-c8bc2e19fe68_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!D7AX!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd86b47f2-11be-446a-9a8f-c8bc2e19fe68_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!D7AX!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd86b47f2-11be-446a-9a8f-c8bc2e19fe68_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!D7AX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd86b47f2-11be-446a-9a8f-c8bc2e19fe68_1920x1080.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="pullquote"><p><em><strong>Stanford Blockchain Review</strong><br>Volume 8, Article No. 5</em></p><p><em>&#9997;&#127995; Author: <a href="https://x.com/uttam_singhk">Uttam</a> &#8212; DevRel at <a href="https://x.com/alchemy">Alchemy</a></em></p><p><em>&#11088;&#65039; Technical Prerequisite: Intermediate</em></p></div><p>Everyone talks about rollups as the future of Ethereum, but what does it really take to run one, but does the math make sense for businesses to launch their own rollup? The space is moving faster than anyone expected, yet it&#8217;s still unclear how these chains make money or cover their costs.</p><p>This piece dives into how rollups actually make money, the cost of running a rollup, the different revenue streams, and whether the model is truly sustainable. We&#8217;ll also look at how architecture and design choices shape these economics and what it all means for developers and infra teams building in the modular stack.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://review.stanfordblockchain.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Stanford Blockchain Review! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!s3hF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F802682b7-0967-4001-8c46-650a365d9246_1204x698.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!s3hF!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F802682b7-0967-4001-8c46-650a365d9246_1204x698.png 424w, https://substackcdn.com/image/fetch/$s_!s3hF!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F802682b7-0967-4001-8c46-650a365d9246_1204x698.png 848w, https://substackcdn.com/image/fetch/$s_!s3hF!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F802682b7-0967-4001-8c46-650a365d9246_1204x698.png 1272w, https://substackcdn.com/image/fetch/$s_!s3hF!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F802682b7-0967-4001-8c46-650a365d9246_1204x698.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!s3hF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F802682b7-0967-4001-8c46-650a365d9246_1204x698.png" width="1204" height="698" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/802682b7-0967-4001-8c46-650a365d9246_1204x698.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:698,&quot;width&quot;:1204,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Rollup TVL&quot;,&quot;title&quot;:&quot;Rollup TVL&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Rollup TVL" title="Rollup TVL" srcset="https://substackcdn.com/image/fetch/$s_!s3hF!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F802682b7-0967-4001-8c46-650a365d9246_1204x698.png 424w, https://substackcdn.com/image/fetch/$s_!s3hF!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F802682b7-0967-4001-8c46-650a365d9246_1204x698.png 848w, https://substackcdn.com/image/fetch/$s_!s3hF!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F802682b7-0967-4001-8c46-650a365d9246_1204x698.png 1272w, https://substackcdn.com/image/fetch/$s_!s3hF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F802682b7-0967-4001-8c46-650a365d9246_1204x698.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">TVL secured by all rollups, <a href="https://l2beat.com/scaling/summary">source</a></figcaption></figure></div><p>Key takeaways of the rollup business model:</p><ul><li><p>The business model of a rollup ultimately comes down to three levers: how it earns, where it can add upside, and what it costs to operate.</p></li><li><p>Rollups core revenue = core per-tx fees (base fees + tips) and optional operator surcharge.</p></li><li><p>Add-on revenue: rollups can earn additional revenue through MEV, hosting L3s and DA resale, and stablecoin rev-share.</p></li><li><p>The main costs of running a rollup are data availability, validation (fraud infra <em>or</em> ZK proving), infra/RPC/monitoring/storage, ecosystem incentives, and any platform/licensing cut.</p></li></ul><p>In short, you can think of these takeaways as a simple monthly P&amp;L equation to understand a rollup&#8217;s business model:</p><blockquote><p><strong>Protocol surplus = core fees + add-on revenues &#8722; cost</strong></p></blockquote><p>Let&#8217;s break down the business model of a rollup in greater detail.</p><h2>Core Revenue of a Rollup</h2><p>Core revenue for a rollup comes from the L2 fee market the rollup sequencer controls. The sequencer executes transactions on the rollup and periodically posts their data to a data-availability layer. Revenue from sequencers primarily comes from transaction fees paid by users.</p><p>Each transaction pays an L2 execution fee (an EIP-1559 style base fee, plus an optional priority tip), a DA fee that reflects the bytes to publish upstream, and, if the rollup provider chooses, an <a href="https://docs.optimism.io/stack/transactions/fees#operator-fee">operator surcharge</a> embedded in the fee policy. Those fees accrue to a rollup&#8217;s fee vault, the data component largely passes through to pay your DA bill, so the real margin driver is execution gas plus any operator surcharge after data availability fees and operations costs.</p><p>For reference, in OP stack chains, there is a specific <a href="https://docs.optimism.io/stack/transactions/fees#sequencer-fee-vault">Sequencer fee vault</a> which collects and holds transaction fees paid to the sequencer during block production.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!tOA7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff831580e-0089-491b-bdc7-9f8bdbee9455_1920x837.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!tOA7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff831580e-0089-491b-bdc7-9f8bdbee9455_1920x837.png 424w, https://substackcdn.com/image/fetch/$s_!tOA7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff831580e-0089-491b-bdc7-9f8bdbee9455_1920x837.png 848w, https://substackcdn.com/image/fetch/$s_!tOA7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff831580e-0089-491b-bdc7-9f8bdbee9455_1920x837.png 1272w, https://substackcdn.com/image/fetch/$s_!tOA7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff831580e-0089-491b-bdc7-9f8bdbee9455_1920x837.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!tOA7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff831580e-0089-491b-bdc7-9f8bdbee9455_1920x837.png" width="1456" height="635" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f831580e-0089-491b-bdc7-9f8bdbee9455_1920x837.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:635,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;World's lifetime chain revenue&quot;,&quot;title&quot;:&quot;World's lifetime chain revenue&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="World's lifetime chain revenue" title="World's lifetime chain revenue" srcset="https://substackcdn.com/image/fetch/$s_!tOA7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff831580e-0089-491b-bdc7-9f8bdbee9455_1920x837.png 424w, https://substackcdn.com/image/fetch/$s_!tOA7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff831580e-0089-491b-bdc7-9f8bdbee9455_1920x837.png 848w, https://substackcdn.com/image/fetch/$s_!tOA7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff831580e-0089-491b-bdc7-9f8bdbee9455_1920x837.png 1272w, https://substackcdn.com/image/fetch/$s_!tOA7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff831580e-0089-491b-bdc7-9f8bdbee9455_1920x837.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Example: World is one of the largest onchain apps in the world, with over 30M users, and is powered by <a href="https://www.alchemy.com/rollups">Alchemy rollups</a>.</p><h2>Additional Revenue Sources for Rollups</h2><h3>MEV / Ordering Revenue</h3><p>With the right sequencing and ordering policy, a rollup can capture <a href="https://www.alchemy.com/overviews/what-is-mev">MEV</a> as transparent chain revenue. MEV capture is a design choice &amp; isn&#8217;t guaranteed income.</p><p>Example: Arbitrum Orbit recently launched <a href="https://docs.arbitrum.io/how-arbitrum-works/timeboost/gentle-introduction">Timeboost</a> which replaces naive FCFS with an express-lane auction each round. Traders bid off-chain, proceeds go on-chain. The auction fees go to the Arbitrum sequencer, and are then distributed to the Arbitrum DAO and Developer Guild.</p><p>Timeboost crossed $3M+ in fees collected post-launch and has continued to ramp. If you run an Arbitrum chain, you can enable Timeboost and keep your chain&#8217;s auction revenue.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!0953!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7f0841c-905e-4a82-bccb-e46066332379_1462x838.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0953!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7f0841c-905e-4a82-bccb-e46066332379_1462x838.png 424w, https://substackcdn.com/image/fetch/$s_!0953!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7f0841c-905e-4a82-bccb-e46066332379_1462x838.png 848w, https://substackcdn.com/image/fetch/$s_!0953!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7f0841c-905e-4a82-bccb-e46066332379_1462x838.png 1272w, https://substackcdn.com/image/fetch/$s_!0953!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7f0841c-905e-4a82-bccb-e46066332379_1462x838.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0953!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7f0841c-905e-4a82-bccb-e46066332379_1462x838.png" width="1456" height="835" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f7f0841c-905e-4a82-bccb-e46066332379_1462x838.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:835,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Timeboost fees&quot;,&quot;title&quot;:&quot;Timeboost fees&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Timeboost fees" title="Timeboost fees" srcset="https://substackcdn.com/image/fetch/$s_!0953!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7f0841c-905e-4a82-bccb-e46066332379_1462x838.png 424w, https://substackcdn.com/image/fetch/$s_!0953!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7f0841c-905e-4a82-bccb-e46066332379_1462x838.png 848w, https://substackcdn.com/image/fetch/$s_!0953!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7f0841c-905e-4a82-bccb-e46066332379_1462x838.png 1272w, https://substackcdn.com/image/fetch/$s_!0953!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7f0841c-905e-4a82-bccb-e46066332379_1462x838.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: <a href="https://dune.com/entropy_advisors/arbitrum-timeboost">https://dune.com/entropy_advisors/arbitrum-timeboost</a></figcaption></figure></div><p>OP-Stack chains don&#8217;t have Timeboost, but you can still capture <a href="https://docs.optimism.io/stack/transactions/fees#priority-fee">priority fees</a>. The OP Mainnet sequencer will prioritize transactions with a higher priority fee and execute them before any transactions with a lower priority fee.</p><h3>Stablecoin Economics (Yield/RevShare)</h3><p>Treasury yields are 4&#8211;5% in 2025 across the short end, and issuers earn interest on reserves and often share it with distribution partners. Examples include:</p><ul><li><p>Circle shares revenue with partners (e.g., Coinbase historically, Bybit reported), though terms vary and are not chain-wide by default.</p></li><li><p>Paxos &#8596; PayPal (PYUSD) explicitly allows issuer &#8594; PayPal sharing of reserve earnings; users do not get the interest. That&#8217;s precedent for B2B rev-share on stablecoin programs.</p></li></ul><p>If your chain becomes the home for a big stablecoin footprint, a negotiated rev-share can dwarf sequencer fees. For example, a $1B average stable float &#215; 4% translates to $40M/yr. Even a more conservative 50/50 split between the stablecoin issuer and the ecosystem operator leads to $20M/yr for each party. It&#8217;s worth noting though that feasibility here depends on regulation and legal restrictions as well as distribution power.</p><h3>L3 Chain Hosting &amp; DA Resale</h3><p>If an L3 settles to your L2 (parent chain), the L3 pays the parent-chain DA fees. For example, Arbitrum Orbit L3 pays fees to Arbitrum One, and an OP-Stack L3 pays DA fees to an OP L2.</p><p>As a rollup provider, you can sell DA and charge network fees - a &#8220;wholesale blockspace&#8221; business.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!f5kp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F022aa574-215f-4d59-bdd6-3eab456f501d_1920x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f5kp!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F022aa574-215f-4d59-bdd6-3eab456f501d_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!f5kp!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F022aa574-215f-4d59-bdd6-3eab456f501d_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!f5kp!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F022aa574-215f-4d59-bdd6-3eab456f501d_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!f5kp!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F022aa574-215f-4d59-bdd6-3eab456f501d_1920x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f5kp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F022aa574-215f-4d59-bdd6-3eab456f501d_1920x1080.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/022aa574-215f-4d59-bdd6-3eab456f501d_1920x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;The rollup stack&quot;,&quot;title&quot;:&quot;The rollup stack&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="The rollup stack" title="The rollup stack" srcset="https://substackcdn.com/image/fetch/$s_!f5kp!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F022aa574-215f-4d59-bdd6-3eab456f501d_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!f5kp!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F022aa574-215f-4d59-bdd6-3eab456f501d_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!f5kp!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F022aa574-215f-4d59-bdd6-3eab456f501d_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!f5kp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F022aa574-215f-4d59-bdd6-3eab456f501d_1920x1080.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Owning the L2 means you own ordering economics (priority fees, auctions, flow partnerships). This is a big motivator for consumer fintechs to launch L2s - see <a href="https://newsroom.aboutrobinhood.com/robinhood-launches-stock-tokens-reveals-layer-2-blockchain-and-expands-crypto-suite-in-eu-and-us-with-perpetual-futures-and-staking/">Robinhood&#8217;s</a> plan to spin up an L2 (Arbitrum stack) to bring its order flow onchain.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!yJZ1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99d53db8-7ef4-449b-b373-6b853e0fa3c5_1674x1190.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!yJZ1!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99d53db8-7ef4-449b-b373-6b853e0fa3c5_1674x1190.png 424w, https://substackcdn.com/image/fetch/$s_!yJZ1!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99d53db8-7ef4-449b-b373-6b853e0fa3c5_1674x1190.png 848w, https://substackcdn.com/image/fetch/$s_!yJZ1!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99d53db8-7ef4-449b-b373-6b853e0fa3c5_1674x1190.png 1272w, https://substackcdn.com/image/fetch/$s_!yJZ1!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99d53db8-7ef4-449b-b373-6b853e0fa3c5_1674x1190.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!yJZ1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99d53db8-7ef4-449b-b373-6b853e0fa3c5_1674x1190.png" width="1456" height="1035" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/99d53db8-7ef4-449b-b373-6b853e0fa3c5_1674x1190.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1035,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A screenshot of Robinhood's chain announcement&quot;,&quot;title&quot;:&quot;A screenshot of Robinhood's chain announcement&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A screenshot of Robinhood's chain announcement" title="A screenshot of Robinhood's chain announcement" srcset="https://substackcdn.com/image/fetch/$s_!yJZ1!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99d53db8-7ef4-449b-b373-6b853e0fa3c5_1674x1190.png 424w, https://substackcdn.com/image/fetch/$s_!yJZ1!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99d53db8-7ef4-449b-b373-6b853e0fa3c5_1674x1190.png 848w, https://substackcdn.com/image/fetch/$s_!yJZ1!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99d53db8-7ef4-449b-b373-6b853e0fa3c5_1674x1190.png 1272w, https://substackcdn.com/image/fetch/$s_!yJZ1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99d53db8-7ef4-449b-b373-6b853e0fa3c5_1674x1190.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>Costs of a Rollup</h2><h3>Data availability (DA)</h3><p>DA is usually the biggest variable cost for running a rollup. On Ethereum, this is paid through blobs. The Pectra upgrade doubled the blob target from 3 &#8594; 6 per block and the <a href="https://blog.ethereum.org/2025/08/22/protocol-update-002">roadmap</a> pushes further via PeerDAS starting with <em>Fusaka. (next upgrade)</em></p><p>Alt-DA (e.g., <a href="https://celestia.org/">Celestia</a>, <a href="https://www.eigenda.xyz/">EigenDA</a>) can be cheaper per MB for many workloads while you still settle on Ethereum if your stack supports it. Celestia is a modular blockchain purpose-built for DA - it scales throughput while keeping verification lightweight through data availability sampling (anyone can check validity with a light node). EigenDA, built on EigenLayer, lets rollups outsource DA to Ethereum&#8217;s restaked validator set, offering Ethereum-aligned security with flexible bandwidth guarantees.</p><blockquote><p>Model it simply: DA_cost &#8776; MB_posted &#215; $/MB</p></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!y6I1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02835ff2-e7f3-419b-bbef-239060de59c9_1920x888.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!y6I1!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02835ff2-e7f3-419b-bbef-239060de59c9_1920x888.png 424w, https://substackcdn.com/image/fetch/$s_!y6I1!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02835ff2-e7f3-419b-bbef-239060de59c9_1920x888.png 848w, https://substackcdn.com/image/fetch/$s_!y6I1!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02835ff2-e7f3-419b-bbef-239060de59c9_1920x888.png 1272w, https://substackcdn.com/image/fetch/$s_!y6I1!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02835ff2-e7f3-419b-bbef-239060de59c9_1920x888.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!y6I1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02835ff2-e7f3-419b-bbef-239060de59c9_1920x888.png" width="1456" height="673" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/02835ff2-e7f3-419b-bbef-239060de59c9_1920x888.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:673,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;DA fees paid&quot;,&quot;title&quot;:&quot;DA fees paid&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="DA fees paid" title="DA fees paid" srcset="https://substackcdn.com/image/fetch/$s_!y6I1!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02835ff2-e7f3-419b-bbef-239060de59c9_1920x888.png 424w, https://substackcdn.com/image/fetch/$s_!y6I1!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02835ff2-e7f3-419b-bbef-239060de59c9_1920x888.png 848w, https://substackcdn.com/image/fetch/$s_!y6I1!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02835ff2-e7f3-419b-bbef-239060de59c9_1920x888.png 1272w, https://substackcdn.com/image/fetch/$s_!y6I1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02835ff2-e7f3-419b-bbef-239060de59c9_1920x888.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: <a href="https://www.growthepie.com/data-availability/fees-paid">https://www.growthepie.com/data-availability/fees-paid</a></figcaption></figure></div><h3>State Validation / Proofs</h3><p>Optimistic. In the happy path you post outputs to the L1 and pay little gas. The real cost is operational: keep a proposer and a challenger online and tie up bonds during the ~7-day window. Disputes are rare, but when they happen you pay the L1 for the fraud-proof step.</p><p>ZK: You drop the challenge window and bonds, and instead pay a proving bill. Most spend is off-chain GPU/prover time; the on-chain verify is a single cheap call per batch.</p><p>If you&#8217;re on OP-Stack, projects like <a href="https://github.com/succinctlabs/op-succinct">OP Succinct</a> let you upgrade to a type-1 zkEVM rollup.</p><h3>Infra &amp; Operations</h3><p>Running a rollup is running a 24/7 production system. Beyond the sequencer, you&#8217;re paying for batchers, RPC gateways, archive/state nodes, indexers, explorers, bridge, key management, storage, and multi-region failover. You also need observability (logs/metrics/traces), monitoring for both on-chain and off-chain signals, DDoS/rate-limit protections, rollback pipelines, and real incident response with on-call &amp; shipping new features regularly.</p><p>Rollup service providers like <a href="https://www.alchemy.com/rollups">Alchemy</a> allow virtually any team to run their own chain regardless of their technical expertise, at a low upfront cost. With Alchemy Rollups you can just offload all of that infra and operational overhead and focus on providing a better UX &amp; growing your community of onchain builders and users.</p><h3>License / RevShare to Your Stack</h3><p>OP Stack is MIT open-source, with fees only applying when joining the Superchain (2.5% of revenue or 15% of onchain profit). Arbitrum Orbit uses a Business Source License with an &#8216;Additional Use Grant&#8217; allowing free L3s on Arbitrum One while requiring a 10% profit share for independent chains.</p><h3>Go-to-Market Incentives &amp; Developer Tooling</h3><p>Ecosystem grants, airdrops, liquidity, developer tooling. These aren&#8217;t &#8220;unit costs,&#8221; but they&#8217;re very real cash/token outlays in year 0&#8211;2.</p><h2>Sample Calculations for a New Rollup</h2><p>If you&#8217;re looking for a back-of-the napkin way to approach the rollup business model, here&#8217;s a sample calculation you can use to think through whether the business model makes sense.</p><h3>Core Costs:</h3><p>Fixed Cost (per month, testnet + mainnet)</p><ul><li><p>Fixed costs include sequencer, RPC, block explorer, bridge infra &#8594; $3,000&#8211;$3,500/mo</p></li></ul><p><strong>Total fixed costs: ~$3,000&#8211;$3,500/mo</strong></p><h3>Variables:</h3><ul><li><p>Variable costs include L1 settlement + DA fees + misc. These costs are typically low at early volumes &#8594; usually $100&#8211;$500/mo total</p></li></ul><p><strong>Total variable costs: ~ $100&#8211;$500/mo for small chains</strong></p><p>If we set the total monthly cost (including fixed and variable) at $3,400, and if we anchor the net capture per tx (what the chain actually keeps) at $0.0012-$0.0020/tx, here is what a rollup&#8217;s monthly profit looks like as it scales onchain activity:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!vHWF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb912db64-dd83-41b2-8398-ce3642dc45f3_1920x1080.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!vHWF!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb912db64-dd83-41b2-8398-ce3642dc45f3_1920x1080.jpeg 424w, https://substackcdn.com/image/fetch/$s_!vHWF!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb912db64-dd83-41b2-8398-ce3642dc45f3_1920x1080.jpeg 848w, https://substackcdn.com/image/fetch/$s_!vHWF!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb912db64-dd83-41b2-8398-ce3642dc45f3_1920x1080.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!vHWF!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb912db64-dd83-41b2-8398-ce3642dc45f3_1920x1080.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!vHWF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb912db64-dd83-41b2-8398-ce3642dc45f3_1920x1080.jpeg" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b912db64-dd83-41b2-8398-ce3642dc45f3_1920x1080.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A graph showing rollup monthly profit by tx volume&quot;,&quot;title&quot;:&quot;A graph showing rollup monthly profit by tx volume&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A graph showing rollup monthly profit by tx volume" title="A graph showing rollup monthly profit by tx volume" srcset="https://substackcdn.com/image/fetch/$s_!vHWF!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb912db64-dd83-41b2-8398-ce3642dc45f3_1920x1080.jpeg 424w, https://substackcdn.com/image/fetch/$s_!vHWF!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb912db64-dd83-41b2-8398-ce3642dc45f3_1920x1080.jpeg 848w, https://substackcdn.com/image/fetch/$s_!vHWF!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb912db64-dd83-41b2-8398-ce3642dc45f3_1920x1080.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!vHWF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb912db64-dd83-41b2-8398-ce3642dc45f3_1920x1080.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!JPhD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e764bed-d5bf-4f8a-a69f-281fc4757682_1920x757.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!JPhD!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e764bed-d5bf-4f8a-a69f-281fc4757682_1920x757.jpeg 424w, https://substackcdn.com/image/fetch/$s_!JPhD!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e764bed-d5bf-4f8a-a69f-281fc4757682_1920x757.jpeg 848w, https://substackcdn.com/image/fetch/$s_!JPhD!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e764bed-d5bf-4f8a-a69f-281fc4757682_1920x757.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!JPhD!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e764bed-d5bf-4f8a-a69f-281fc4757682_1920x757.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!JPhD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e764bed-d5bf-4f8a-a69f-281fc4757682_1920x757.jpeg" width="1456" height="574" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0e764bed-d5bf-4f8a-a69f-281fc4757682_1920x757.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:574,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A table showing the same&quot;,&quot;title&quot;:&quot;A table showing the same&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A table showing the same" title="A table showing the same" srcset="https://substackcdn.com/image/fetch/$s_!JPhD!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e764bed-d5bf-4f8a-a69f-281fc4757682_1920x757.jpeg 424w, https://substackcdn.com/image/fetch/$s_!JPhD!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e764bed-d5bf-4f8a-a69f-281fc4757682_1920x757.jpeg 848w, https://substackcdn.com/image/fetch/$s_!JPhD!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e764bed-d5bf-4f8a-a69f-281fc4757682_1920x757.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!JPhD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e764bed-d5bf-4f8a-a69f-281fc4757682_1920x757.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Notes:</p><ul><li><p>You can have high chain revenue but low/negative onchain profit if DA costs are high or fees are underpriced.</p></li><li><p>You can improve onchain profit by (a) raising net capture per tx (fee policy, operator surcharge, ordering auctions), or (b) lowering onchain costs (cheaper DA, better compression, bigger batches, lower infra cost).</p></li></ul><h2>Conclusion</h2><p>Rollups can be sustainable businesses, and they give teams the chance to stop paying rent to other chains and start capturing value directly. Instead of watching fees, MEV, and ecosystem activity flow upward to an L1, projects that run their own rollup get to own those economics and reinvest them back into their users and ecosystem.</p><p>If you&#8217;re a planning to launch a rollup or if you deployed a rollup yourself and you want to migrate to a true white-glove, experienced rollup service provider, we&#8217;d love to speak with you! <a href="https://www.alchemy.com/rollups">Learn more here</a>.</p><h2>Author</h2><p>Uttam Singh is a Senior Developer Relations Engineer at Alchemy, where he helps builders ship faster with onchain infrastructure. Before joining Alchemy, he worked with Flare and Polygon. Uttam has spoken at major conferences including ETHCC, ETHOxford, and ETHPrague, as well as at several universities, and regularly publishes deep-dives, tutorials, and educational content for the onchain developer community. He completed his research on blockchain at the University of Montreal under the prestigious Mitacs research program.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://review.stanfordblockchain.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Stanford Blockchain Review! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[#74 - Cryptography Research Spotlight — zkTLS and the DECO Protocol]]></title><description><![CDATA[A Conversation with Prof. Fan Zhang of Yale University]]></description><link>https://review.stanfordblockchain.xyz/p/74-cryptography-research-spotlight</link><guid isPermaLink="false">https://review.stanfordblockchain.xyz/p/74-cryptography-research-spotlight</guid><dc:creator><![CDATA[Stanford Blockchain Club]]></dc:creator><pubDate>Wed, 13 Aug 2025 18:30:17 GMT</pubDate><enclosure url="https://substackcdn.com/image/youtube/w_728,c_limit/tOHzvE0yhU8" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="pullquote"><p><em><strong>Stanford Blockchain Review<br></strong>Volume 8, Article No. 4</em></p><p><em>&#128218; Guest: Prof. </em>Fan Zhang &#8212; Yale University<br><em>&#128218; Hosts: Jay Yu </em>&#8212; Pantera Capital and Yavor Litchev &#8212; SBC</p><p><em>&#127775;  Technical Prerequisite: Intermediate</em></p></div><div id="youtube2-tOHzvE0yhU8" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;tOHzvE0yhU8&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/tOHzvE0yhU8?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><h2>Key Takeaways:</h2><ul><li><p><strong>TLS secures the Internet, but lacks exportable provenance: </strong>TLS protects data in transit, but can&#8217;t prove where it came from. zkTLS (as implemented in DECO) fixes that with verifiable, cryptographic proof without needing server changes.</p></li></ul><ul><li><p><strong>DECO combines MPC and ZKPs: </strong>DECO uses a three-party handshake to split TLS session keys via multi-party computation, preventing session forgery. It then adds zero-knowledge proofs so users can prove facts (&#8220;I'm over 21&#8221;) without exposing raw data.</p></li></ul><ul><li><p><strong>zkTLS is fast, private, and verifiable: </strong>Techniques like selective disclosure and context-aware parsing reduce ZK proof costs while maintaining semantic integrity. Hash-based MPC and 2PC optimizations keep protocol performance within practical bounds.</p></li></ul><ul><li><p><strong>DECO has inspired multiple practical instantiations of zkTLS: </strong>Opacity and Reclaim are leading implementations of zkTLS inspired by DECO with different architectures. Opacity uses MPC, TEEs, and slashing for stronger security. Reclaim trades that for speed, with faster attestations via proxy attestors.</p></li></ul><ul><li><p><strong>zkTLS powers real-world apps: </strong>Applications include decentralized KYC, credit-based DeFi lending (3Jane), automated background checks (TransCrypts), and loyalty credentialing (e.g., Reclaim + Marriott). zkTLS also unlocks new AI applications, by creating a pipeline for models to safely ingest private user data. It creates a new trust layer for the web, independent of APIs or server cooperation.</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://review.stanfordblockchain.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://review.stanfordblockchain.xyz/subscribe?"><span>Subscribe now</span></a></p><h2>Introduction</h2><p>Transport Layer Security (TLS) is the cryptographic backbone of the modern internet, securing billions of web sessions daily. It guarantees confidentiality and integrity between clients and servers, ensuring that users can safely exchange data with websites. However, TLS has a critical shortcoming: it does not enable users to cryptographically prove to third parties that the data they accessed genuinely came from a specific website. While data is encrypted and authenticated in transit, it lacks exportable provenance: a way to vouch for the authenticity of data after the session ends.</p><p>This limitation has stymied applications like private age verification, authenticated financial disclosures, or fair pricing enforcement, especially in contexts like blockchain smart contracts, which require verifiable, third-party data. Existing solutions like trusted hardware (e.g., Intel SGX) or server-side modifications break legacy compatibility or introduce new trust assumptions.</p><p>zkTLS, <a href="https://www.deco.works/">exemplified by DECO</a><a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a>, solves this by allowing users to generate zero-knowledge proofs about data retrieved over TLS without modifying servers or relying on trusted hardware. In this article, we will first explore the cryptographic foundations of zkTLS, including TLS internals, secure multiparty computation, and zero-knowledge proofs. From there, we will provide a technical walkthrough of zkTLS as envisioned by the DECO protocol, and finally survey real-world use cases and practical deployments that demonstrate the transformative potential of zkTLS.</p><h2>1 - A Crash Course on the Fundamentals of zkTLS</h2><p>At its core, zkTLS (Zero-Knowledge TLS) aims to bridge the gap between secure data access and verifiable data provenance. While TLS ensures that communication between a client and server is secure, it does not leave behind cryptographic evidence that the data came from the claimed server. As a result, users are unable to export trustworthy, privacy-preserving attestations of online data, which is a major limitation in an era where data portability and trust minimization are paramount.</p><p>Imagine Alice wants to prove to Bob that she is over 18, based on a date of birth retrieved from a government portal. While Alice could show Bob a screenshot or forward the data, Bob cannot verify whether this information truly originated from the government&#8217;s website, since TLS protects data in transit but does not sign the content. The same challenge arises in proving financial solvency from a bank account or contesting discriminatory pricing. Screenshots can be forged, and server cooperation is often unavailable or insufficiently trustworthy. zkTLS, specifically through the DECO protocol, tackles this by enabling users to interact with any standard TLS-enabled website, extract data privately, and prove statements about that data to a verifier, all without altering the website or involving trusted execution environments (TEEs).</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Gm-9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02de3360-2f35-4ce0-8fc4-b4baf79f8ef6_617x455.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Gm-9!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02de3360-2f35-4ce0-8fc4-b4baf79f8ef6_617x455.png 424w, https://substackcdn.com/image/fetch/$s_!Gm-9!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02de3360-2f35-4ce0-8fc4-b4baf79f8ef6_617x455.png 848w, https://substackcdn.com/image/fetch/$s_!Gm-9!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02de3360-2f35-4ce0-8fc4-b4baf79f8ef6_617x455.png 1272w, https://substackcdn.com/image/fetch/$s_!Gm-9!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02de3360-2f35-4ce0-8fc4-b4baf79f8ef6_617x455.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Gm-9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02de3360-2f35-4ce0-8fc4-b4baf79f8ef6_617x455.png" width="617" height="455" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/02de3360-2f35-4ce0-8fc4-b4baf79f8ef6_617x455.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:455,&quot;width&quot;:617,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Transport Layer Security (TLS) Protocol Overview&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Transport Layer Security (TLS) Protocol Overview" title="Transport Layer Security (TLS) Protocol Overview" srcset="https://substackcdn.com/image/fetch/$s_!Gm-9!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02de3360-2f35-4ce0-8fc4-b4baf79f8ef6_617x455.png 424w, https://substackcdn.com/image/fetch/$s_!Gm-9!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02de3360-2f35-4ce0-8fc4-b4baf79f8ef6_617x455.png 848w, https://substackcdn.com/image/fetch/$s_!Gm-9!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02de3360-2f35-4ce0-8fc4-b4baf79f8ef6_617x455.png 1272w, https://substackcdn.com/image/fetch/$s_!Gm-9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02de3360-2f35-4ce0-8fc4-b4baf79f8ef6_617x455.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>TLS Protocol<sup> </sup><a href="https://docs.oracle.com/javase/8/docs/technotes/guides/security/jsse/tls.html"><sup>2</sup></a></h3><p>Before we examine the protocol details, it is prudent to first understand TLS as it currently exists, along with some other important cryptographic primitives. TLS is a cryptographic protocol that ensures confidentiality and authenticity during web communications<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a>. It consists of two main phases, one of them being a handshake protocol to establish a secure session using asymmetric cryptography and performs key exchange (e.g., via ephemeral Diffie-Hellman). The second main phase is the record protocol, which uses the shared symmetric keys derived from the handshake to encrypt and authenticate subsequent data transmissions. While TLS ensures that Alice receives data from the server securely, it does not provide her with a way to prove to Bob that the data truly originated from the server. Both Alice and the server possess the same symmetric keys, which means Alice can forge TLS messages after the fact, thereby breaking any notion of post hoc authenticity.</p><p>Prior approaches to TLS provenance typically fall into two categories: Trusted Hardware Solutions (e.g., <a href="https://eprint.iacr.org/2016/168.pdf">Town Crier</a> relies on Intel SGX to sign TLS data)<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-3" href="#footnote-3" target="_self">3</a>, or Server-Side Modifications, where TLS is modified to include signatures on data or enable verifiable logging. The problem with the former solution is that SGX (and TEEs in general) introduce new trust and security risks (e.g., side-channel attacks), whereas the issue with the latter solution is that it requires changes to the server software stack, which greatly limits deployability. DECO, and zkTLS generally, distinguishes itself by being legacy compatible, operating with any TLS server without cooperation or modification.</p><p>One of the cryptographic primitives that allows for DECO to function on legacy systems is Multiparty Computation (MPC). Secure Multiparty Computation (MPC) allows two or more parties to jointly compute a function over their inputs without revealing them. In the context of zkTLS, MPC is used to establish shared secrets (specifically, the session keys used in the TLS protocol such that neither party has access to the complete key, and the client (i.e., the prover) cannot forge or tamper with TLS records. DECO achieves this through a three-party handshake in which the prover (Alice) and the verifier (Bob) cooperate to jointly act as a TLS client. They run a two-party protocol to split the session keys between them. For instance, Alice and Bob compute additive shares of the MAC key such that neither knows the full key, but together they enable a valid TLS session. This ensures Alice cannot forge valid TLS traffic after the fact.</p><h3>Zero-Knowledge Proofs (ZKPs).</h3><p>Zero-knowledge proofs, another critical cryptographic primitive used in DECO, allow one party (the prover) to convince another (the verifier) that a certain statement is true, without revealing why it&#8217;s true or leaking any other information. In DECO, once Alice (the prover) has obtained a response from the server, she generates a cryptographic commitment to the session data. She then uses a zero-knowledge proof to prove the data she received satisfies a desired predicate (e.g., &#8220;I am over 18&#8221;) without revealing the underlying data (e.g., her birthdate). This allows for privacy-preserving attestations of sensitive information, a fundamental breakthrough for applications like identity verification or decentralized finance.</p><h3>zkTLS combines these elements as follows:</h3><ol><li><p><strong>Three-Party Handshake (TLS + MPC):</strong> Alice and Bob engage in a handshake with the server, producing shared keys such that Alice alone cannot forge session data. This maintains TLS compatibility.</p></li><li><p><strong>Query Execution and Commitment (TLS + MPC):</strong> Alice constructs a TLS query (e.g., an HTTP request) using her private data (like a login credential), and sends it to the server. She commits to the resulting session transcript.</p></li><li><p><strong>Proof Generation (ZKPs):</strong> Alice proves in zero knowledge that the session data satisfies a predicate (e.g., account balance &gt; $1000), and that it was obtained from the correct source via a proper TLS session.</p></li></ol><p>This architecture avoids the need for trusted hardware, works with existing web infrastructure, and enables selective disclosure, for instance, revealing that a condition is met without disclosing the underlying data.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!j_1q!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb753816d-cc8a-4538-bab0-bbeebd2f5207_697x422.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!j_1q!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb753816d-cc8a-4538-bab0-bbeebd2f5207_697x422.png 424w, https://substackcdn.com/image/fetch/$s_!j_1q!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb753816d-cc8a-4538-bab0-bbeebd2f5207_697x422.png 848w, https://substackcdn.com/image/fetch/$s_!j_1q!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb753816d-cc8a-4538-bab0-bbeebd2f5207_697x422.png 1272w, https://substackcdn.com/image/fetch/$s_!j_1q!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb753816d-cc8a-4538-bab0-bbeebd2f5207_697x422.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!j_1q!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb753816d-cc8a-4538-bab0-bbeebd2f5207_697x422.png" width="697" height="422" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b753816d-cc8a-4538-bab0-bbeebd2f5207_697x422.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:422,&quot;width&quot;:697,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!j_1q!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb753816d-cc8a-4538-bab0-bbeebd2f5207_697x422.png 424w, https://substackcdn.com/image/fetch/$s_!j_1q!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb753816d-cc8a-4538-bab0-bbeebd2f5207_697x422.png 848w, https://substackcdn.com/image/fetch/$s_!j_1q!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb753816d-cc8a-4538-bab0-bbeebd2f5207_697x422.png 1272w, https://substackcdn.com/image/fetch/$s_!j_1q!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb753816d-cc8a-4538-bab0-bbeebd2f5207_697x422.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The next section of the article will dive deeper into how these components are technically realized in DECO&#8217;s protocol, including the construction of the three-party handshake, optimized MPC protocols for query execution, and efficient techniques for generating zero-knowledge proofs on TLS transcripts.</p><h2>2 - A Technical Deep Dive into the DECO Protocol for zkTLS</h2><p>At the heart of DECO&#8217;s architecture is a clever synthesis of classic TLS security with modern cryptographic techniques such as secure multiparty computation (MPC) and zero-knowledge proofs (ZKPs). This section unpacks each of DECO&#8217;s core protocol phases in detail, examining how cryptographic primitives are tailored to preserve data provenance while maintaining compatibility with the existing TLS ecosystem.</p><p>A fundamental innovation of DECO is the three-party handshake between the prover (Alice), the verifier (Bob), and an unmodified TLS server. This handshake allows Alice and Bob to jointly participate in a TLS connection to a server such that neither party knows the full cryptographic keys used to authenticate the session. This eliminates the ability of Alice to forge or manipulate TLS session data after the fact, the key foundation for proving provenance.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!qacQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a07f9a8-d210-4631-994e-fe2f3d02bdd2_1266x730.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!qacQ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a07f9a8-d210-4631-994e-fe2f3d02bdd2_1266x730.png 424w, https://substackcdn.com/image/fetch/$s_!qacQ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a07f9a8-d210-4631-994e-fe2f3d02bdd2_1266x730.png 848w, https://substackcdn.com/image/fetch/$s_!qacQ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a07f9a8-d210-4631-994e-fe2f3d02bdd2_1266x730.png 1272w, https://substackcdn.com/image/fetch/$s_!qacQ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a07f9a8-d210-4631-994e-fe2f3d02bdd2_1266x730.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!qacQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a07f9a8-d210-4631-994e-fe2f3d02bdd2_1266x730.png" width="1266" height="730" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3a07f9a8-d210-4631-994e-fe2f3d02bdd2_1266x730.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:730,&quot;width&quot;:1266,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!qacQ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a07f9a8-d210-4631-994e-fe2f3d02bdd2_1266x730.png 424w, https://substackcdn.com/image/fetch/$s_!qacQ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a07f9a8-d210-4631-994e-fe2f3d02bdd2_1266x730.png 848w, https://substackcdn.com/image/fetch/$s_!qacQ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a07f9a8-d210-4631-994e-fe2f3d02bdd2_1266x730.png 1272w, https://substackcdn.com/image/fetch/$s_!qacQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a07f9a8-d210-4631-994e-fe2f3d02bdd2_1266x730.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: Original Content</figcaption></figure></div><p>TLS typically establishes a symmetric session key via an ephemeral Diffie-Hellman key exchange. In DECO, this handshake is modified such that the session key &#8212; specifically the MAC key (k_MAC) &#8212; is additively shared between Alice and Bob:</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!qllE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28681aab-e8d5-4989-af74-d26f9b2b5f5f_660x90.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!qllE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28681aab-e8d5-4989-af74-d26f9b2b5f5f_660x90.png 424w, https://substackcdn.com/image/fetch/$s_!qllE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28681aab-e8d5-4989-af74-d26f9b2b5f5f_660x90.png 848w, https://substackcdn.com/image/fetch/$s_!qllE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28681aab-e8d5-4989-af74-d26f9b2b5f5f_660x90.png 1272w, https://substackcdn.com/image/fetch/$s_!qllE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28681aab-e8d5-4989-af74-d26f9b2b5f5f_660x90.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!qllE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28681aab-e8d5-4989-af74-d26f9b2b5f5f_660x90.png" width="660" height="90" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/28681aab-e8d5-4989-af74-d26f9b2b5f5f_660x90.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:90,&quot;width&quot;:660,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!qllE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28681aab-e8d5-4989-af74-d26f9b2b5f5f_660x90.png 424w, https://substackcdn.com/image/fetch/$s_!qllE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28681aab-e8d5-4989-af74-d26f9b2b5f5f_660x90.png 848w, https://substackcdn.com/image/fetch/$s_!qllE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28681aab-e8d5-4989-af74-d26f9b2b5f5f_660x90.png 1272w, https://substackcdn.com/image/fetch/$s_!qllE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28681aab-e8d5-4989-af74-d26f9b2b5f5f_660x90.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>Here, k_P&#8203; and k_V&#8203; are shares held respectively by Alice (the prover) and Bob (the verifier), with the server S receiving the full key k_MAC&#8203; for encryption and authentication. The process involves two major steps:</p><ol><li><p><strong>Ephemeral Diffie-Hellman Key Exchange (ECDHE): </strong>Alice and Bob contribute public keys to derive a common secret g^x, without either party learning the full exponent. The server contributes its own ephemeral key g^s, completing the key exchange.</p></li><li><p><strong>Key Derivation via MPC: </strong>Since TLS session keys are derived via a pseudorandom function (PRF) over the Diffie-Hellman output, DECO uses two-party computation (2PC) to compute this derivation jointly. This is a non-trivial task because TLS-PRF is hash-based and lacks algebraic structure, requiring MPC to handle bitwise operations securely.</p></li></ol><p>By ensuring neither party has full control over the MAC key until the session is cryptographically committed, the handshake defends against forgery: Alice cannot modify session content post-hoc without breaking the MAC.</p><p>Once the handshake is complete, Alice must construct a valid query to the server and receive the response, all under TLS. The key challenge is that the session keys are now split between Alice and Bob. Hence, even basic TLS operations like MAC generation (in CBC-HMAC) or authenticated encryption (in AES-GCM) must be computed via secure 2PC protocols. For cipher suites using CBC-HMAC (common in TLS 1.2), the record protocol operates by first computing a MAC over the plaintext and then encrypting the message plus MAC. To generate the MAC securely, Alice and Bob compute the inner hash locally on Alice&#8217;s side, enabled by giving her a hash of the padded MAC key (i.e., H(k&#8853;ipad)), which does not leak the key itself due to the one way properties of cryptographic hash functions. They then perform 2PC only for the outer hash, which is short. This reduces the MPC burden significantly, as without this optimization computing HMAC over a large query in MPC would be prohibitively expensive.</p><p>For AES-GCM mode, encryption and authentication are combined into a single operation. However, unlike CBC-HMAC, it lacks a commitment property, the ciphertext does not bind to a unique plaintext, which complicates provenance guarantees. DECO supports AES-GCM by using optimized 2PC protocols for AES encryption and polynomial evaluation in Galois fields (for GCM authentication tags).</p><p>For performance-critical deployments, DECO also introduces a proxy mode, which is particularly useful for GCM. In this mode, Bob acts as a passive network proxy who relays and logs the traffic between Alice and the server. This simplifies provenance, as Bob witnesses the session directly. However, the security guarantees differ, it shifts trust toward the verifier's honest behavior and is best suited to settings where Bob is semi-trusted.</p><p>For the proof generation phase of the protocol that occurs after the server respond to Alice, she wishes to prove to Bob that the data:</p><ol><li><p>Came from the server (provenance)</p></li><li><p>Satisfies a desired predicate (e.g., over 18)</p></li><li><p>Without revealing the data itself (privacy)</p></li></ol><p>This is where zero-knowledge proofs (zkPs) come into play. Alice commits to the TLS transcript and proves a statement of the form:</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!yF8z!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0e670b2-604b-46a5-9019-1a8c9b8a135f_1072x138.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!yF8z!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0e670b2-604b-46a5-9019-1a8c9b8a135f_1072x138.png 424w, https://substackcdn.com/image/fetch/$s_!yF8z!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0e670b2-604b-46a5-9019-1a8c9b8a135f_1072x138.png 848w, https://substackcdn.com/image/fetch/$s_!yF8z!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0e670b2-604b-46a5-9019-1a8c9b8a135f_1072x138.png 1272w, https://substackcdn.com/image/fetch/$s_!yF8z!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0e670b2-604b-46a5-9019-1a8c9b8a135f_1072x138.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!yF8z!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0e670b2-604b-46a5-9019-1a8c9b8a135f_1072x138.png" width="1072" height="138" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c0e670b2-604b-46a5-9019-1a8c9b8a135f_1072x138.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:138,&quot;width&quot;:1072,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!yF8z!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0e670b2-604b-46a5-9019-1a8c9b8a135f_1072x138.png 424w, https://substackcdn.com/image/fetch/$s_!yF8z!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0e670b2-604b-46a5-9019-1a8c9b8a135f_1072x138.png 848w, https://substackcdn.com/image/fetch/$s_!yF8z!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0e670b2-604b-46a5-9019-1a8c9b8a135f_1072x138.png 1272w, https://substackcdn.com/image/fetch/$s_!yF8z!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0e670b2-604b-46a5-9019-1a8c9b8a135f_1072x138.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>Where:</p><ul><li><p>k_Enc&#8203; is the encryption key,</p></li><li><p>X is the decrypted TLS record,</p></li><li><p>Verify ensures MAC correctness,</p></li><li><p>Stmt(X) evaluates the predicate.</p></li></ul><p>Generating such proofs over entire transcripts could be computationally prohibitive. DECO addresses this with two optimizations: Selective opening, and two-stage parsing for context integrity. Selective opening means the following: instead of revealing or proving over full session data, Alice can reveal substrings of the TLS response, or redact portions of the message to preserve privacy. For example, she might reveal only a checking account balance, not the full bank statement. This selective opening is proven in zero knowledge using optimized circuits that process only the revealed parts, reducing proof size and cost. However, selective disclosure introduces a risk: Alice could quote a snippet out of context (e.g., showing a $5000 value from a message to customer service rather than the actual bank balance) and therefore prove faulty statements. To prevent such context integrity attacks, DECO introduces two-stage parsing:Local parsing and zero-knowledge proof. In local parsing, Alice parses the full session response to identify where her substring appears within a structured format (e.g., JSON). As for the zero-knowledge proof portion, she proves in ZK that the substring came from the correct structural location in the original document. This is formalized by reasoning over the structure using context-free grammars (the same way in which a compiler reasons if some piece of Python or C code is actually valid code), ensuring that any disclosed fragment is bound to the intended semantic structure.</p><p>While the main DECO protocol is ZKP-based, the original paper and interview also discuss a variant based on Trusted Execution Environments (TEEs) like Intel SGX (as was briefly mentioned in Section 1). In this mode, a TLS client runs entirely inside the TEE so as to guarantee that the prover has no access to the session keys. Provenance is thus established by logging or signing the session inside the enclave. This approach benefits from lower computational overhead (only 10&#8211;20% slower than native TLS) compared to the orders-of-magnitude cost of ZK proofs. However, it introduces reliance on hardware trust, including vulnerability to side-channel attacks, as well as vendor trust, including firmware, microcode, and remote attestation. While not mutually exclusive, the choice between ZKP-based and TEE-based deployments reflects a tradeoff between performance and trust minimization.</p><p>Now that we have a detailed understanding of how DECO functions, it is critical to analyze performance bottlenecks and potential optimizations. Despite the elegance of the construction, DECO&#8217;s most significant cost comes during proof generation, especially for complex predicates or long transcripts. The authors of the original paper report 2.85 seconds for the three-party handshake, 2.52 seconds for query execution (2PC), 3-13 seconds for ZKP generation (depending on complexity). As discussed in the interview, DECO uses several clever tricks to keep performance practical. For example, in hash-based MPC, the system doesn&#8217;t re-evaluate entire hash chains. Instead, it computes the final compression step and verifies its correctness, saving computation while preserving security. Further improvements may come from faster proof systems (e.g., STARKs, zk-SNARKs with pre-processing), as well as hardware acceleration for the 2PC steps.</p><h1>3 - Implementations and Applications of zkTLS</h1><h3>DECO Sandbox by Chainlink <a href="https://deco.chain.link/sandbox"><sup>4</sup></a></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!vIRP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53baa967-47dd-48b9-af85-1c7cb27dece4_1210x802.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!vIRP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53baa967-47dd-48b9-af85-1c7cb27dece4_1210x802.png 424w, https://substackcdn.com/image/fetch/$s_!vIRP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53baa967-47dd-48b9-af85-1c7cb27dece4_1210x802.png 848w, https://substackcdn.com/image/fetch/$s_!vIRP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53baa967-47dd-48b9-af85-1c7cb27dece4_1210x802.png 1272w, https://substackcdn.com/image/fetch/$s_!vIRP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53baa967-47dd-48b9-af85-1c7cb27dece4_1210x802.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!vIRP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53baa967-47dd-48b9-af85-1c7cb27dece4_1210x802.png" width="1210" height="802" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/53baa967-47dd-48b9-af85-1c7cb27dece4_1210x802.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:802,&quot;width&quot;:1210,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!vIRP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53baa967-47dd-48b9-af85-1c7cb27dece4_1210x802.png 424w, https://substackcdn.com/image/fetch/$s_!vIRP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53baa967-47dd-48b9-af85-1c7cb27dece4_1210x802.png 848w, https://substackcdn.com/image/fetch/$s_!vIRP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53baa967-47dd-48b9-af85-1c7cb27dece4_1210x802.png 1272w, https://substackcdn.com/image/fetch/$s_!vIRP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53baa967-47dd-48b9-af85-1c7cb27dece4_1210x802.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The DECO protocol provided us with a foundational architecture for zkTLS. Since then, zkTLS has quickly become a popular concept with many real world applications. At its core, zkTLS enables users to prove facts about their interactions with websites over HTTPS without revealing the full content of the interaction and without server cooperation. For developers, this unlocks a new design space of privacy-preserving authentication, decentralized identity, and verifiable web data extraction. In this section, we explore how zkTLS is currently being deployed, what the developer experience looks like, and how two of the leading providers of zkTLS, <a href="https://www.opacity.network/">Opacity</a> and <a href="https://reclaimprotocol.org/">Reclaim</a>, differ in architecture and trust assumptions, as well as take a look at some of the user-facing applications using zkTLS under the hood.</p><p>The original architecture proposed in DECO has been licensed by Chainlink, which has since made a <a href="https://deco.chain.link/sandbox">developer sandbox interface</a> for the protocol<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-4" href="#footnote-4" target="_self">4</a>. This sandbox provides developers with the ability to experiment with DECO-style TLS transcript proofs and witness how multiparty computation and zero-knowledge proofs interact in the context of real HTTPS sessions. Today, a developer interested in building on top of DECO can work with lower-level cryptographic libraries and frameworks such as:</p><ul><li><p>Rust and C++ for performance-critical MPC operations</p></li><li><p>zk-SNARK/STARK systems (like libsnark, circom, or R1CS toolchains) for proving validity over TLS data</p></li><li><p>WebAssembly or trusted runtime containers for deployment on consumer devices or smart contract VMs</p></li></ul><p>The long-term vision is to abstract away much of this complexity via SDKs that expose simple APIs like prove_from_website(url, predicate) or verify_proof(proof). While still early, progress is being made toward streamlining these interactions, particularly in industry deployments.</p><p>As for practical, commercial implementations, one prominent example is the <a href="https://www.opacity.network/">Opacity Network</a>.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-5" href="#footnote-5" target="_self">5</a> Opacity represents one of the most robust and comprehensive deployments of a zkTLS architecture in the wild, as it builds upon the <a href="http://2409.17670v2.pdf">TLSNotary framework</a> and significantly enhances it with a blend of cryptographic techniques,<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-6" href="#footnote-6" target="_self">6</a> including garbled circuits, oblivious transfer, proof by committee, and on-chain verification and slashing mechanisms. Opacity focuses primarily on web2 account attestations, enabling users to prove ownership over accounts on platforms like LinkedIn, Twitter, or a traditional bank, and linking these to a web3 identity, such as an Ethereum wallet. The user doesn&#8217;t need the cooperation of the web2 service to do this. Instead, the Opacity network conducts a verifiable TLS session using secure MPC between the user and a notary node. The result is a signed transcript, which is then verified by smart contracts onchain. To mitigate the risk of collusion between a user and a notary, Opacity employs several layers of defense:</p><ul><li><p><strong>Commit-and-reveal: </strong>Users must commit to the value (e.g., account balance) before a notary is assigned.</p></li><li><p><strong>Proof by committee:</strong> Multiple notaries independently compute identical proofs.</p></li><li><p><strong>On-chain logging: </strong>Every attempt to prove a value is logged publicly, discouraging manipulation.</p></li><li><p><strong>TEE isolation:</strong> All notaries must run within Intel SGX secure enclaves.</p></li><li><p><strong>Restaking and slashing: </strong>Notaries are economically incentivized to behave correctly via Eigenlayer&#8217;s AVS, which slashes misbehaving nodes in real time.</p></li><li><p><strong>Whistleblowing: </strong>Any user who can prove a notary misbehaved gets a share of their slashed stake.</p></li></ul><p>This layered architecture makes Opacity one of the most secure zkTLS systems currently deployed. It excels in environments where users need to prove private attributes from private accounts &#8212; for example, demonstrating that they are a verified university student, without revealing their name or email.</p><p>However, Opacity's heavy reliance on TEEs introduces some caveats. While SGX helps reduce computational overhead, its side-channel vulnerability remains a known concern. Opacity mitigates this by not solely depending on SGX &#8212; instead, SGX is used in tandem with cryptographic and economic safeguards.</p><p>Reclaim, another prominent implementation of zkTLS, takes a different approach. Rather than relying on MPC between notaries and users, it leverages a proxy witness model.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-7" href="#footnote-7" target="_self">7</a> The core idea is to insert an attestor node as a passive observer during a user&#8217;s TLS session. This attestor conducts the TLS handshake on the user&#8217;s behalf and then signs a verifiable statement about the session's content, with the result being a portable claim that can be presented to third parties.</p><p>Whereas Opacity prioritizes complex multi-party MPC and TEEs, Reclaim&#8217;s architecture emphasizes lightweight performance and fast attestations.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-8" href="#footnote-8" target="_self">8</a> This makes it especially attractive for verifying public-facing web data (e.g., whether a page includes a particular element), Fast KYC workflows where a single attestor's word is sufficient, and applications where the attestor is semi-trusted (e.g., a government authority or major exchange). To avoid giving the attestor full access to sensitive content like session tokens, Reclaim uses a key-upgrade mechanism where:</p><ol><li><p>The user discloses temporary TLS keys to the attestor (without revealing cookies or long-term credentials)</p></li><li><p>The attestor reconstructs the transcript and issues a signed claim</p></li><li><p>The proof is bounded to this ephemeral session and doesn&#8217;t grant replay or access</p></li></ol><p>Reclaim acknowledges that collusion between user and attestor is a risk, if they cooperate, they can forge transcripts. To mitigate this, Reclaim suggests the use of subset sampling, where a random group of attestors must validate a claim. However, unlike Opacity, Reclaim does not rely on economic slashing or proof-by-committee by default.</p><p>One operational challenge for Reclaim lies in IP-based attestor identification: since servers may notice repeated connections from known attestor IPs, they could rate-limit or block these addresses. This limits the scale at which Reclaim can operate in adversarial environments.</p><p>Nonetheless, Reclaim's simplicity and ease of integration make it a compelling zkTLS solution in controlled settings, particularly when the attestor is not adversarial, for instance, a court officer validating a digital document or a bank verifying a certificate of funds.</p><p>While Opacity and Reclaim differ in architecture and trust assumptions, they both exemplify the power of zkTLS to turn private TLS sessions into verifiable public claims. Opacity favors a maximalist security model, layering cryptography, TEEs, economic incentives, and redundant computation. Reclaim emphasizes fast attestations, minimal overhead, and real-world pragmatism. Both platforms share the same philosophical foundation: to liberate user data from platform lock-in, empower self-sovereign identity, and eliminate the need for APIs and server-side cooperation.</p><h3>Reclaim&#8217;s Verifiable Loyalty Platform</h3><p>Today, zkTLS enables a new generation of verifiable, consumer-focused applications ranging from custom-built loyalty programs, on-chain credit scores, to identity verification and automated background checks. Reclaim, for example, has created a prototype demo of how zkTLS can be used to create verifiable loyalty programs. For example, suppose Marriott wants to give a special discount voucher for Star Alliance Gold members. By using Reclaim&#8217;s loyalty toolkit,<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-9" href="#footnote-9" target="_self">9</a> users can log into their airline account, and Reclaim will use zkTLS to automatically confirm their membership status, frequent flyer points, and more, and attach these attributes as credentials to the user&#8217;s Marriott account. This process thus allows Marriott to verify that users are Star Alliance Gold members and in turn give more targeted discounts.</p><h3>3Jane Protocol using zkTLS for credit scores <a href="https://www.3jane.xyz/pdf/whitepaper.pdf"><sup>9</sup></a></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!17on!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd34842c-550a-493c-a312-75f8045d728e_1600x970.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!17on!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd34842c-550a-493c-a312-75f8045d728e_1600x970.png 424w, https://substackcdn.com/image/fetch/$s_!17on!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd34842c-550a-493c-a312-75f8045d728e_1600x970.png 848w, https://substackcdn.com/image/fetch/$s_!17on!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd34842c-550a-493c-a312-75f8045d728e_1600x970.png 1272w, https://substackcdn.com/image/fetch/$s_!17on!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd34842c-550a-493c-a312-75f8045d728e_1600x970.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!17on!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd34842c-550a-493c-a312-75f8045d728e_1600x970.png" width="1456" height="883" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fd34842c-550a-493c-a312-75f8045d728e_1600x970.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:883,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!17on!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd34842c-550a-493c-a312-75f8045d728e_1600x970.png 424w, https://substackcdn.com/image/fetch/$s_!17on!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd34842c-550a-493c-a312-75f8045d728e_1600x970.png 848w, https://substackcdn.com/image/fetch/$s_!17on!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd34842c-550a-493c-a312-75f8045d728e_1600x970.png 1272w, https://substackcdn.com/image/fetch/$s_!17on!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd34842c-550a-493c-a312-75f8045d728e_1600x970.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Another use case is using zkTLS to &#8220;export&#8221; traditional credit scores into the world of DeFi. By default, when a user wants to use an on-chain lending platform such as Aave or Morpho, these loans need to be over-collateralized, as there is no way of knowing ahead of time if the actual user is honest or not. <a href="https://www.3jane.xyz/">3Jane</a>, however, creates a credit-based lending platform that pulls a user&#8217;s real-world credit score (such as a FICO score) to create undercollateralized loans based on credit, just like a traditional bank loan.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-10" href="#footnote-10" target="_self">10</a> Under the hood, 3Jane leverages Reclaim&#8217;s zkTLS system to export credit scores, income statements, and bank assets via a Plaid authentication.</p><p>Similarly, we can use zkTLS to automate identity verification and background checks. <a href="https://www.transcrypts.com/">TransCrypts</a>, for example, uses zkTLS to automate the background check process by aggregating information from many different sources into a single platform, accelerating the hiring process without compromising user privacy. With zkTLS, TransCrypts can verify attributes like employment history, educational credentials, or legal clearances by establishing TLS sessions with official data providers (e.g., payroll services, universities, or government databases) and generating attestations without requiring direct API access or data dumps.</p><p>With its lightweight yet versatile protocol design, zkTLS can also be integrated with social media platforms. Fan Zhang&#8217;s <a href="https://x.com/0xFanZhang/status/1942307590899167609">zkLabeler</a> tool provides a lightweight way to add custom, verifiable labels to Bluesky handles.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-11" href="#footnote-11" target="_self">11</a> This process can power rich credentialing frameworks, connecting an ORCID ID to a decentralized social media handle, proving voting eligibility without doxxing your address, or verifying financial solvency without exposing transaction history.</p><p>Finally, zkTLS can also be used in &#8220;protected pipelines&#8221; (props) for private data for LLMs and machine learning. A privacy preserving oracle such as DECO can be used to export sensitive personal data &#8211; such as electronic health records and financial data &#8211; into private models for a more personalized experience.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-12" href="#footnote-12" target="_self">12</a> In the &#8220;props&#8221; framework, zkTLS serves as the secure data sourcing mechanism, allowing ML training and inference pipelines to ingest sensitive deep-web datasets with both privacy and authenticity guarantees, mitigating the risks of fabricated inputs, adversarial manipulation, and direct exposure of personal information.</p><h2>Conclusion</h2><p>Throughout this article, we&#8217;ve presented an in-depth dive into the conceptual innovations behind zkTLS, the instantiation of the DECO protocol, as well as its wider influence on production-grade zkTLS systems and applications we see today. DECO&#8217;s architecture exemplifies a new generation of cryptographic protocols that combine usability, legacy compatibility, and privacy. Through layered security, MPC for integrity, ZKP for privacy, and optionally TEEs for performance, DECO provides a blueprint for authenticated, privacy-preserving data portability across the web.</p><p>Fundamentally, zkTLS as pioneered by the DECO protocol provides a simple, intuitive, and versatile way for &#8220;exporting&#8221; data from one website or application or another. By leveraging the in-built cryptographic security and pervasive adoption of the TLS standard, zkTLS provides a framework to free the Internet from isolated data silos and convoluted APIs, ultimately building a unified access layer for our digital data.</p><div><hr></div><h2>About the Interviewees</h2><h3>Fan Zhang</h3><p>Fan Zhang is an Assistant Professor at Yale CS and runs the Decentralized Systems Group. He is broadly interested in computer security and applied cryptography, especially problems in blockchains and smart contracts, user authentication, anonymity, and hardware-assisted trusted execution environments. Fan received his Ph.D. in Computer Science from Cornell University, advised by Prof. Ari Juels, and his bachelor&#8217;s degree from Tsinghua University. Fan is also a faculty affiliate of IC3.</p><h3>Yavor Litchev</h3><p>Yavor is an undergrad at Stanford pursuing a degree in computer science with a focus on cybersecurity and cryptography. He has previously engaged in research projects relating to secure machine learning and digital signatures with more flexible access structures at MIT PRIMES. More recently, he is researching secure systems and program execution using software fault isolation through the CURIS program. He is currently the cryptography research lead and Financial Officer for the Stanford Blockchain Club.</p><h3>Jay Yu</h3><p>Jay is a Junior Partner at Pantera focusing on investments and research, and a Research Advisor to IC3. Previously, he served as President of the Stanford Blockchain Club, and founded the Stanford Blockchain Review. He conducted research on DAOs and trusted execution environments (TEEs) with faculty from Stanford Law and IC3, and was a delegate for Uniswap DAO. Jay graduated from Stanford with a double major in Computer Science and Philosophy, and a minor in French.</p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p><a href="https://www.deco.works/">DECO: A novel privacy-preserving oracle protocol</a></p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-2" href="#footnote-anchor-2" class="footnote-number" contenteditable="false" target="_self">2</a><div class="footnote-content"><p><a href="https://docs.oracle.com/javase/8/docs/technotes/guides/security/jsse/tls.html">Transport Layer Security (TLS) Protocol Overview</a></p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-3" href="#footnote-anchor-3" class="footnote-number" contenteditable="false" target="_self">3</a><div class="footnote-content"><p><a href="https://eprint.iacr.org/2016/168.pdf">Town Crier: An Authenticated Data Feed for Smart Contracts</a></p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-4" href="#footnote-anchor-4" class="footnote-number" contenteditable="false" target="_self">4</a><div class="footnote-content"><p><a href="https://deco.chain.link/sandbox">DECO Sandbox Explore</a></p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-5" href="#footnote-anchor-5" class="footnote-number" contenteditable="false" target="_self">5</a><div class="footnote-content"><p><a href="https://www.opacity.network/">Opacity Network Website</a></p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-6" href="#footnote-anchor-6" class="footnote-number" contenteditable="false" target="_self">6</a><div class="footnote-content"><p><a href="https://medium.com/@vinayak_35433/opacity-network-trust-but-verify-eb819ebb0b0a">Opacity Network: Trust but Verify | by Vinayak Kurup | Medium</a></p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-7" href="#footnote-anchor-7" class="footnote-number" contenteditable="false" target="_self">7</a><div class="footnote-content"><p><a href="https://drive.usercontent.google.com/download?id=1Ru2bq81wTXZ1KbTajjNKTjkH2u3q2O3K&amp;export=download&amp;authuser=0">Reclaim Whitepaper</a></p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-8" href="#footnote-anchor-8" class="footnote-number" contenteditable="false" target="_self">8</a><div class="footnote-content"><p><a href="https://drive.usercontent.google.com/download?id=1Ru2bq81wTXZ1KbTajjNKTjkH2u3q2O3K&amp;export=download&amp;authuser=0">Reclaim Whitepaper</a></p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-9" href="#footnote-anchor-9" class="footnote-number" contenteditable="false" target="_self">9</a><div class="footnote-content"><p><a href="https://reclaimprotocol.org/loyalty">Reclaim Loyalty Program</a></p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-10" href="#footnote-anchor-10" class="footnote-number" contenteditable="false" target="_self">10</a><div class="footnote-content"><p><a href="https://www.3jane.xyz/pdf/whitepaper.pdf">3Jane Protocol: The Credit-Based Money Market</a></p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-11" href="#footnote-anchor-11" class="footnote-number" contenteditable="false" target="_self">11</a><div class="footnote-content"><p><a href="https://x.com/0xFanZhang/status/1942307590899167609">zkLabeler</a></p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-12" href="#footnote-anchor-12" class="footnote-number" contenteditable="false" target="_self">12</a><div class="footnote-content"><p><a href="https://arxiv.org/pdf/2410.20522">Props for Machine-Learning Security</a></p><p></p></div></div>]]></content:encoded></item><item><title><![CDATA[#73 - Unpacking MonadBFT: Fast, Responsive, Fork-Resistant, Streamlined Consensus]]></title><description><![CDATA[Stanford Blockchain Review]]></description><link>https://review.stanfordblockchain.xyz/p/73-unpacking-monadbft-fast-responsive</link><guid isPermaLink="false">https://review.stanfordblockchain.xyz/p/73-unpacking-monadbft-fast-responsive</guid><dc:creator><![CDATA[Stanford Blockchain Club]]></dc:creator><pubDate>Tue, 15 Jul 2025 16:35:38 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!6lVg!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa0f4996-326a-423e-9b26-c24b7b3b8f1c_2030x1134.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6lVg!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa0f4996-326a-423e-9b26-c24b7b3b8f1c_2030x1134.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6lVg!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa0f4996-326a-423e-9b26-c24b7b3b8f1c_2030x1134.jpeg 424w, https://substackcdn.com/image/fetch/$s_!6lVg!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa0f4996-326a-423e-9b26-c24b7b3b8f1c_2030x1134.jpeg 848w, https://substackcdn.com/image/fetch/$s_!6lVg!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa0f4996-326a-423e-9b26-c24b7b3b8f1c_2030x1134.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!6lVg!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa0f4996-326a-423e-9b26-c24b7b3b8f1c_2030x1134.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6lVg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa0f4996-326a-423e-9b26-c24b7b3b8f1c_2030x1134.jpeg" width="1456" height="813" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/aa0f4996-326a-423e-9b26-c24b7b3b8f1c_2030x1134.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:813,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:112320,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://review.stanfordblockchain.xyz/i/168326611?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa0f4996-326a-423e-9b26-c24b7b3b8f1c_2030x1134.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!6lVg!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa0f4996-326a-423e-9b26-c24b7b3b8f1c_2030x1134.jpeg 424w, https://substackcdn.com/image/fetch/$s_!6lVg!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa0f4996-326a-423e-9b26-c24b7b3b8f1c_2030x1134.jpeg 848w, https://substackcdn.com/image/fetch/$s_!6lVg!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa0f4996-326a-423e-9b26-c24b7b3b8f1c_2030x1134.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!6lVg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa0f4996-326a-423e-9b26-c24b7b3b8f1c_2030x1134.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="pullquote"><p><em><strong>Stanford Blockchain Review<br></strong>Volume 8, Article No. 3</em></p><p><em>&#128218; Author: </em><a href="https://x.com/michael_lwy?lang=en">Michael Li</a> &#8212; Monad</p><p><em>&#127775;  Technical Prerequisite: Intermediate</em></p></div><p>Blockchain enforces <strong>strict</strong> <strong>global</strong> <strong>consensus</strong>, which means everyone running the network, anywhere in the world, agrees on the same set of objective outcomes.</p><p>But how does a distributed system reach agreement even when some participants are lying, offline, or actively trying to subvert the process?</p><p>This is where consensus protocol comes in. It is a set of rules that allow a network of independent and potentially dishonest participants to agree on the order and contents of transactions.</p><p>Once you have this &#8216;strict global consensus&#8217;, blockchain unlocks wonderful properties like digital property rights, monetary hardness, and social scalability. But all of that rests on a protocol&#8217;s ability to maintain <strong>safety</strong> (no two conflicting blocks are finalized) and <strong>liveness</strong> (the network keeps making progress).</p><p>This article explores MonadBFT, which builds on the HotStuff lineage. We&#8217;ll examine how it solves persistent issues like <strong>tail</strong>-<strong>forking</strong>, achieves speculative finality in a single round, and enables optimistic responsiveness. Together, these properties make MonadBFT a foundational advancement for high-performance blockchains.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://review.stanfordblockchain.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://review.stanfordblockchain.xyz/subscribe?"><span>Subscribe now</span></a></p><h2><strong>A brief recap on past consensus mechanisms</strong></h2><p>The field of consensus mechanisms has evolved over decades. Early protocols like <a href="https://pmg.csail.mit.edu/papers/osdi99.pdf">PBFT</a> [1] (Practical Byzantine Fault Tolerance) showed that agreement was possible even when up to <strong>f</strong> nodes (out of 3f+1) were malicious. These classical designs work by electing a <strong>leader</strong> who coordinates multiple rounds of voting among validators.</p><p>In each phase (e.g. pre-prepare, prepare, commit, reply), every validator must communicate with every other validator. This leads to quadratic message complexity (a full mesh of communication): if there are <em>n</em> validators, you need roughly <em><strong>n&#178;</strong></em> messages per round. That&#8217;s manageable in small networks but becomes unworkable as the validator set grows.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!q8fR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa51e5c45-c0c2-4216-a2b5-a4e722560abb_763x576.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!q8fR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa51e5c45-c0c2-4216-a2b5-a4e722560abb_763x576.png 424w, https://substackcdn.com/image/fetch/$s_!q8fR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa51e5c45-c0c2-4216-a2b5-a4e722560abb_763x576.png 848w, https://substackcdn.com/image/fetch/$s_!q8fR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa51e5c45-c0c2-4216-a2b5-a4e722560abb_763x576.png 1272w, https://substackcdn.com/image/fetch/$s_!q8fR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa51e5c45-c0c2-4216-a2b5-a4e722560abb_763x576.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!q8fR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa51e5c45-c0c2-4216-a2b5-a4e722560abb_763x576.png" width="763" height="576" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a51e5c45-c0c2-4216-a2b5-a4e722560abb_763x576.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:576,&quot;width&quot;:763,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A graph of a graph with lines and numbers\n\nAI-generated content may be incorrect.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A graph of a graph with lines and numbers

AI-generated content may be incorrect." title="A graph of a graph with lines and numbers

AI-generated content may be incorrect." srcset="https://substackcdn.com/image/fetch/$s_!q8fR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa51e5c45-c0c2-4216-a2b5-a4e722560abb_763x576.png 424w, https://substackcdn.com/image/fetch/$s_!q8fR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa51e5c45-c0c2-4216-a2b5-a4e722560abb_763x576.png 848w, https://substackcdn.com/image/fetch/$s_!q8fR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa51e5c45-c0c2-4216-a2b5-a4e722560abb_763x576.png 1272w, https://substackcdn.com/image/fetch/$s_!q8fR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa51e5c45-c0c2-4216-a2b5-a4e722560abb_763x576.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Source: <a href="https://medium.com/coinmonks/pbft-understanding-the-algorithm-b7a7869650ae">https://medium.com/coinmonks/pbft-understanding-the-algorithm-b7a7869650ae</a></p><p>Quadratic messaging is inefficient. In a network with 100 validators, you have to process tens of thousands of messages per round. For global, permissionless systems, that&#8217;s too heavy. As a result, early BFT protocols like PBFT and Tendermint were often deployed in permissioned systems or small validator sets where performance constraints were tolerable.</p><p>To scale BFT for permissionless environments, newer protocols opt for <strong>linear communication</strong>: every validator talks only to the leader, reducing message complexity from n&#178; to <em>n</em>.</p><p>Hotstuff was first introduced in 2018 and it pushed BFT consensus forward by introducing a streamlined, leader-centric communication pattern.</p><p>HotStuff features <strong>linear</strong> <strong>communication</strong>. Instead of the quadratic explosion of messages in PBFT, in HotStuff all validators just send their vote to the next leader. That leader combines them into a single, compact proof called a Quorum Certificate (QC). The QC is proof to anyone observing it that &#8216;most nodes agreed with the proposal.&#8217; Unlike PBFT where everyone checks with everyone (causing messaging overload), HotStuff is<strong> &#8216;vote once, bundle once&#8217;,</strong> meaning the network stays fast even as it grows.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Ccqw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec20129f-cf2f-47fa-bad2-de7cc17214d7_550x235.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Ccqw!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec20129f-cf2f-47fa-bad2-de7cc17214d7_550x235.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Ccqw!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec20129f-cf2f-47fa-bad2-de7cc17214d7_550x235.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Ccqw!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec20129f-cf2f-47fa-bad2-de7cc17214d7_550x235.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Ccqw!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec20129f-cf2f-47fa-bad2-de7cc17214d7_550x235.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Ccqw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec20129f-cf2f-47fa-bad2-de7cc17214d7_550x235.jpeg" width="550" height="235" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ec20129f-cf2f-47fa-bad2-de7cc17214d7_550x235.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:235,&quot;width&quot;:550,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Sensors 24 05417 g001&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Sensors 24 05417 g001" title="Sensors 24 05417 g001" srcset="https://substackcdn.com/image/fetch/$s_!Ccqw!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec20129f-cf2f-47fa-bad2-de7cc17214d7_550x235.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Ccqw!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec20129f-cf2f-47fa-bad2-de7cc17214d7_550x235.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Ccqw!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec20129f-cf2f-47fa-bad2-de7cc17214d7_550x235.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Ccqw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec20129f-cf2f-47fa-bad2-de7cc17214d7_550x235.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p><em>Notice the fan-out fan in structure and difference with the &#8216;mesh&#8217; pattern of PBFT</em></p><p>Source: <a href="https://www.mdpi.com/1424-8220/24/16/5417">https://www.mdpi.com/1424-8220/24/16/5417</a></p><p>Further, HotStuff may be <strong>pipelined</strong> for additional efficiency. In the original HotStuff protocol, the same validator serves as the leader through each round of communication until the block is finalized, and only one block is worked on at a time. In Pipelined HotStuff, each round of communication has a new leader, who is responsible <em>both</em> for assembling/propagating the Quorum Certificate from the previous round&#8217;s votes <em>and also</em> for proposing a new block.</p><p>In Pipelined HotStuff, instead of waiting for a single leader to do everything needed to finalize a block, each leader in a sequence plays a role. Leader 1 proposes a block, then Leader 2 assembles and shares a QC for Leader 1&#8217;s block while also proposing a new block, and so on. This setup forms a chain, where each new leader helps confirm the block that came before. Pipelining really just means <strong>overlapping</strong> these steps (i.e. while one block is being finalized, the next is already being proposed).</p><p>In short, HotStuff-based protocols achieved much better decentralization and performance: they can include more validators and finalize blocks with fewer messages and rounds. These properties have made HotStuff the template for many modern PoS consensus implementations. However, as we&#8217;ll see next, the pipelined design also introduces a subtle vulnerability that wasn&#8217;t immediately apparent.</p><h2><strong>&#8203;The Problem of Tail-Forking</strong></h2><p>While HotStuff (more specifically pipelined HotStuff) addressed scalability issues, new challenges come with its design. A major issue for pipelined protocols is <strong>tail forking</strong>.</p><p><strong>Tail forking</strong> can be understood as a chain reorganization at the &#8216;tail&#8217; of the chain. It occurs when a block that is valid and correctly propagated to other validators <em><strong>should</strong></em> become a part of the chain (it received the required votes) but ends up getting abandoned (orphaned) due to the behavior of the next leader.</p><p>Essentially, a block is proposed and validated by a supermajority but still fails to commit and is replaced by a different block at the same block height (very unfair right?!).</p><p><strong>Why would this happen? </strong>In pipelined HotStuff, each leader has two jobs: <strong>A.</strong> propose a new block, and <strong>B.</strong> gather votes (form a QC) for the previous leader&#8217;s block.</p><p>For example, suppose validator <strong>Alice</strong> proposes block <em><strong>B_n</strong></em> and a supermajority of validators voted for it (enough to eventually form a QC). Normally, the next leader <strong>Bob</strong> (working on block <em><strong>B_n+1</strong></em>) should include that QC in his proposal.</p><p>But if Bob is offline or intentionally misses his slot, the QC for <em><strong>B_n</strong></em><strong> </strong>won&#8217;t be propagated, and B_n will be abandoned.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!LLG6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb3b1c6-37b4-4c34-90e3-04a629deb2ac_1600x586.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!LLG6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb3b1c6-37b4-4c34-90e3-04a629deb2ac_1600x586.png 424w, https://substackcdn.com/image/fetch/$s_!LLG6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb3b1c6-37b4-4c34-90e3-04a629deb2ac_1600x586.png 848w, https://substackcdn.com/image/fetch/$s_!LLG6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb3b1c6-37b4-4c34-90e3-04a629deb2ac_1600x586.png 1272w, https://substackcdn.com/image/fetch/$s_!LLG6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb3b1c6-37b4-4c34-90e3-04a629deb2ac_1600x586.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!LLG6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb3b1c6-37b4-4c34-90e3-04a629deb2ac_1600x586.png" width="1456" height="533" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5cb3b1c6-37b4-4c34-90e3-04a629deb2ac_1600x586.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:533,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!LLG6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb3b1c6-37b4-4c34-90e3-04a629deb2ac_1600x586.png 424w, https://substackcdn.com/image/fetch/$s_!LLG6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb3b1c6-37b4-4c34-90e3-04a629deb2ac_1600x586.png 848w, https://substackcdn.com/image/fetch/$s_!LLG6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb3b1c6-37b4-4c34-90e3-04a629deb2ac_1600x586.png 1272w, https://substackcdn.com/image/fetch/$s_!LLG6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb3b1c6-37b4-4c34-90e3-04a629deb2ac_1600x586.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Why does tail forking matter?</strong></p><p>Tail-forking is <strong>1) economically unfair</strong> and <strong>2) potentially dangerous for liveness</strong>.</p><p><strong>First is the issue of lost rewards</strong>: When a block is abandoned, the proposer loses any block rewards or fees. In our example, Alice gets nothing because Bob failed to finalize her block. This creates unfair incentives&#8212;malicious leaders can sabotage others&#8217; rewards. Even honest validators might get penalized due to bad luck or misbehavior, discouraging participation or encouraging collusion.</p><p><strong>Second is the issue of MEV exploitation.</strong> If Alice&#8217;s block contains valuable arbitrage, Bob can collude with Carol to discard it and insert a new block capturing the same MEV. This kind of cross-slot reordering attack undermines fairness and encourages validator collusion.</p><p><strong>Third is the issue of UX and finality guarantees</strong>. BFT protocols promise deterministic finality, but tail-forking breaks this at the chain tip. Some dapps rely on pre-finality execution to reduce latency. If a voted block is dropped, users might see state reversals which means missing trades, incorrect balances, or broken game logic.</p><p><strong>Fourth is cascading failure</strong>. While a one-block delay is the most common, repeated forks by multiple faulty leaders can stall the chain entirely until someone commits a block that sticks.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!qU3o!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c65c2bb-8638-4698-9b7d-d6774bb767b4_1156x426.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!qU3o!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c65c2bb-8638-4698-9b7d-d6774bb767b4_1156x426.png 424w, https://substackcdn.com/image/fetch/$s_!qU3o!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c65c2bb-8638-4698-9b7d-d6774bb767b4_1156x426.png 848w, https://substackcdn.com/image/fetch/$s_!qU3o!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c65c2bb-8638-4698-9b7d-d6774bb767b4_1156x426.png 1272w, https://substackcdn.com/image/fetch/$s_!qU3o!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c65c2bb-8638-4698-9b7d-d6774bb767b4_1156x426.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!qU3o!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c65c2bb-8638-4698-9b7d-d6774bb767b4_1156x426.png" width="1156" height="426" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9c65c2bb-8638-4698-9b7d-d6774bb767b4_1156x426.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:426,&quot;width&quot;:1156,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A screenshot of a computer\n\nAI-generated content may be incorrect.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A screenshot of a computer

AI-generated content may be incorrect." title="A screenshot of a computer

AI-generated content may be incorrect." srcset="https://substackcdn.com/image/fetch/$s_!qU3o!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c65c2bb-8638-4698-9b7d-d6774bb767b4_1156x426.png 424w, https://substackcdn.com/image/fetch/$s_!qU3o!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c65c2bb-8638-4698-9b7d-d6774bb767b4_1156x426.png 848w, https://substackcdn.com/image/fetch/$s_!qU3o!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c65c2bb-8638-4698-9b7d-d6774bb767b4_1156x426.png 1272w, https://substackcdn.com/image/fetch/$s_!qU3o!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c65c2bb-8638-4698-9b7d-d6774bb767b4_1156x426.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Tail forking is a real, not just theoretical, issue. All pre-MonadBFT pipelined BFT protocols are vulnerable to it, since they rely on the next leader to finalize the previous block. Some solutions exist, like <a href="https://arxiv.org/abs/2205.11652">BeeGees</a> [2], but they reintroduce costly trade-offs such as quadratic communication.</p><h2><strong>What is MonadBFT?</strong></h2><p>MonadBFT was created to directly address tail-forking vulnerability while preserving the performance gains. It builds on the HotStuff framework, which means <strong>1)</strong> having rotating leaders, <strong>2)</strong> pipelined commits, and <strong>3)</strong> linear messaging, but introduces mechanisms to improve safety and liveness without sacrificing throughput.</p><p>The first priority for MonadBFT is to guarantee that any block proposed by an <strong>honest</strong> <strong>leader</strong> (that gathered a supermajority vote) will not get abandoned&#8203;. The desired outcome here is that if a block gets a supermajority support, the protocol ensures that block will eventually be finalized and included in the chain&#8203; (cannot be orphaned or skipped). The mechanism to enforce this is twofold: <strong>1) mandatory reproposal</strong> and <strong>2) the No-Endorsement Certificate (NEC).</strong></p><ol><li><p><strong>Re-proposals</strong></p></li></ol><p>In a BFT protocol, time is divided into rounds called &#8220;views.&#8221; Each view has a designated leader responsible for proposing a new block. If that leader fails, which means they <strong>1)</strong> did not send a proposal on time or <strong>2)</strong> sent an invalid one, the protocol moves to the next view with a new leader. MonadBFT includes a mechanism <strong>that ensures </strong><em><strong>no</strong></em><strong> honest block gets abandoned</strong> during this transition.</p><p>When the current leader fails, validators trigger a <strong>view change </strong>by broadcasting a signed message indicating that the round has timed out. Importantly, these messages also include some other information beyond just &#8216;hey there&#8217;s a failure&#8217;.</p><p>Each one must also include a reference to the most recent block that the validator saw and voted for. Think of it as saying: <em>&#8220;I attest to not receiving a proper proposal this round, and here&#8217;s the latest block I have seen.&#8221;</em></p><p>The new leader then collects these timeout messages from a supermajority of validators (2f+1) of them and combines them into what&#8217;s called a <strong>Timeout Certificate (TC</strong>). The TC provides a snapshot of the best-known blocks across the network when the last round failed. Among these, the leader identifies the most advanced block (based on block height or view number, which is labelled &#8220;<em><strong>high_tip&#8221;</strong></em>).</p><p>MonadBFT requires the new leader&#8217;s proposal to include a TC formed from 2f+1 validators&#8217; timeout messages, and to <strong>re-propose</strong> the highest-known pending block referenced in the TC , giving that block another chance to gather enough votes and be finalized. Why? Recall our intention earlier. This will ensure that blocks which were nearly finalized before the failure don&#8217;t simply vanish.</p><p>To illustrate: suppose Alice is the leader in view 5 and proposes a valid block that receives many votes. In view 6, Bob (the next leader) goes offline, so the block doesn&#8217;t get finalized. When Carol becomes leader in view 7, MonadBFT requires her to include a Timeout Certificate (TC) and re-propose the highest-voted block from the previous view&#8212;Alice&#8217;s block.</p><p>If Carol doesn&#8217;t have Alice&#8217;s block, she asks the network. Validators either send the block or, if they don&#8217;t have it, respond with a signed No-Endorsement message. If enough validators lack the block, Carol can construct a No-Endorsement Certificate (NEC) to justify skipping it.</p><p>After re-proposing Alice&#8217;s block, Carol is also given an extra slot to ensure she&#8217;s not penalized for Bob&#8217;s failure. This reproposal mechanism ensures the chain progresses fairly, and no valid block is discarded due to faults or bad actors.</p><ol start="2"><li><p><strong>No-Endorsement Certificate (NEC)</strong></p></li></ol><p>As mentioned above, when a timeout occurs at Bob&#8217;s slot, Carol asks everyone for the high_tip block (Alice&#8217;s block), and at least 2f+1 validators will respond with either Alice&#8217;s block or with a signed No-Endorsement message.</p><p>If <em>anyone</em> responds with Alice&#8217;s block, Carol has the information and justification needed to re-propose it. Furthermore, Carol is <em>expected</em> to re-propose Alice&#8217;s block &#8211; the only way she is not allowed to is if at least f+1 people sign NE messages (allowing Carol to construct a No-Endorsement Certificate).</p><p><strong>Why f+1?</strong> In any BFT system with 3f+1 validators, at most<em><strong> f </strong></em>can be malicious. If Alice&#8217;s block should persist, then at least 2f+1 honest nodes have received it. In order to skip Alice&#8217;s block and propose a new one at the same height, Carol needs f+1 validators to sign off on not receiving Alice&#8217;s block, but by assumption only <em><strong>f </strong></em>validators are Byzantine.</p><p>The NEC is the leader&#8217;s proof<strong> that skipping the reproposal is safe and justified</strong>. It is a receipt that says: &#8220;Here&#8217;s verifiable evidence that the previous block wasn&#8217;t ready to be finalized, so I&#8217;m not just ignoring it maliciously.&#8221;</p><h2><strong>Re-proposal + NEC = Tail Forking Resistance</strong></h2><p>To recap,<strong> combining re-proposal</strong> and <strong>NEC</strong> <strong>mechanism </strong>give MonadBFT a clear rulebook: either finalize what almost made it, or prove it wasn&#8217;t ready and move on. Nothing falls through the cracks.</p><p>This design guarantees <strong>tail-forking resistance</strong>: an honest leader&#8217;s block that garnered a supermajority of votes will eventually be committed. A leader cannot selfishly fork away their predecessor&#8217;s block without leaving a cryptographic trail because the absence of an NEC would expose them.</p><p>Economically, this protects validators: your block and rewards won&#8217;t be lost due to the next leader&#8217;s failure. Even if Bob skips his slot to help Carol steal Alice&#8217;s block, MonadBFT forces Carol to repropose Alice&#8217;s block first, nullifying any MEV gain.</p><p>The breakthrough here is that MonadBFT achieves this without heavy communication. Previous approaches to solve tail-forkings (like BeeGees) imposed quadratic communication in every round. MonadBFT relaxes those conditions by only invoking the broader communication (collecting lots of messages) when a failure happens, not every round. Thus, in the normal case of steady honest leaders, it still operates efficiently (more on happy vs unhappy path later).</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Fjta!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa03d6467-1172-4c4d-b9e1-4a1ae9789b46_1600x602.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Fjta!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa03d6467-1172-4c4d-b9e1-4a1ae9789b46_1600x602.png 424w, https://substackcdn.com/image/fetch/$s_!Fjta!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa03d6467-1172-4c4d-b9e1-4a1ae9789b46_1600x602.png 848w, https://substackcdn.com/image/fetch/$s_!Fjta!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa03d6467-1172-4c4d-b9e1-4a1ae9789b46_1600x602.png 1272w, https://substackcdn.com/image/fetch/$s_!Fjta!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa03d6467-1172-4c4d-b9e1-4a1ae9789b46_1600x602.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Fjta!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa03d6467-1172-4c4d-b9e1-4a1ae9789b46_1600x602.png" width="1456" height="548" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a03d6467-1172-4c4d-b9e1-4a1ae9789b46_1600x602.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:548,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Fjta!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa03d6467-1172-4c4d-b9e1-4a1ae9789b46_1600x602.png 424w, https://substackcdn.com/image/fetch/$s_!Fjta!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa03d6467-1172-4c4d-b9e1-4a1ae9789b46_1600x602.png 848w, https://substackcdn.com/image/fetch/$s_!Fjta!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa03d6467-1172-4c4d-b9e1-4a1ae9789b46_1600x602.png 1272w, https://substackcdn.com/image/fetch/$s_!Fjta!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa03d6467-1172-4c4d-b9e1-4a1ae9789b46_1600x602.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><strong>Implications of MonadBFT for developers</strong></h2><p>So far, we examined how classic PBFT consensus works and how earlier versions of HotStuff operate. We also looked at how MonadBFT solves HotStuff&#8217;s tail-forking issue which is a problem where valid blocks sometimes get left behind in pipelined systems.</p><p>This tail-forking problem creates two big issues: <strong>1) </strong>it messes up the rewards for honest block builders and <strong>2)</strong> can potentially stall the network.</p><p>MonadBFT introduces <strong>Reproposal</strong> <strong>rule</strong> and <strong>No-Endorsement </strong>vote mechanisms to eliminate the tail-forking problem, ensuring that any properly approved block from an honest proposer will always make it into the chain.</p><p>In the following sections, we explore the other two characteristics of MonadBFT which are <strong>1) speculative finality</strong> and <strong>2) optimistic responsiveness</strong>. We will also explore the implications of MonadBFT for validators and developers.</p><h2><strong>One-round speculative finality</strong></h2><p>Besides tail-fork resistance, another major feature of MonadBFT is <strong>speculative finality within a single round</strong>.</p><p>In practical terms, this means clients can receive confirmation for their transaction immediately after a block gets a supermajority of votes, even before the next round completes.</p><p>Recall that in protocols like PBFT or baseline HotStuff, a block usually isn&#8217;t considered final (irreversible) until it has gone through at least two phases (e.g. Fast-Hotstuff &amp; Diem-BFT): one phase to get a Quorum Certificate (lock the block with &#8805;2f+1 votes), and a second phase where the next leader builds on that QC and commits the block.</p><p>This two-phase commit is needed to ensure safety: once enough honest nodes have locked a block, no conflicting block can gather a quorum, and the commit in the next round makes it permanent. So normally, a client might have to wait for the next block or next round to be produced before they know the previous transaction is final.</p><p>MonadBFT basically allows a transaction to be considered <strong>final enough</strong> (safe to act on) after just one round of voting. This is called <strong>speculative finality</strong>.</p><p>When a leader proposes a block and the validators vote to form a QC for that block, that block is now in a <strong>Voted state </strong>(it&#8217;s locked by a quorum). In MonadBFT, validators will execute the block&#8217;s transactions as soon as they form the QC and even send a preliminary confirmation to clients indicating the block is (speculatively) accepted. This is like saying: <em>&#8220;We have a supermajority agreeing on this block. Unless something very unexpected happens, consider this block confirmed.&#8221;</em></p><p>This immediate confirmation is optimistic. The block hasn&#8217;t been committed in the ledger yet. That will happen when the next proposal comes and finalizes it (QC-on QC), but under normal conditions, nothing will revoke it. The only scenario that can revert a speculatively executed block is if the leader equivocated (i.e. proposed two different blocks at the same height to split the vote)&#8203;.</p><p>You can think of speculative finality as a nice by-product of tail-forking resistance. The tail-forking resistance guarantees that even if the next leader crashes, the current proposal won&#8217;t be abandoned (thanks to reproposal and NEC rules). So the only time a speculatively executed block gets dropped is if the original proposer equivocated (double-signing fault that is provably malicious), which is:<strong> 1) </strong>detectable via conflicting QCs, <strong>2)</strong> slashable and <strong>3)</strong> extremely rare.</p><p>In previous protocols, they didn&#8217;t guarantee that the next leader would repropose the previous block, so tail-forking was possible, breaking speculation assumptions.</p><h2><strong>Optimistic Responsiveness</strong></h2><p>In most consensus protocols, there&#8217;s a <strong>built-in wait</strong> after each round like a buffer period or timeout. This is to make sure all messages have arrived before moving forward. It is a protective mechanism meant to handle the worst-case scenario like when a leader crashes or sends nothing at all.</p><p>These timeouts are often overly conservative. If the network is functioning normally and all validators are behaving correctly, that fixed wait becomes unnecessary overhead. Blocks could have been finalized faster, but the protocol held back just in case.</p><p>MonadBFT introduces <strong>optimistic responsiveness</strong><em> which means the protocol can advance immediately based on network messages, instead of always relying on fixed timers. </em>The design principle here can be summarized as<em> <strong>&#8220;</strong></em><strong>fast when it can, patient when it must.&#8221;</strong> MonadBFT is designed such that in both the normal case and even in recovery from a fault, it does not pause for a predetermined timeout if it doesn&#8217;t have to&#8203;.</p><ul><li><p><strong>In the happy path (means we have an honest leader):</strong> There is no built-in delay in proposing or voting. As soon as a leader has the turn, it proposes a block. As soon as validators receive a valid proposal, they vote. The moment the leader (or rather, the next leader, since votes go to the next proposer in pipelined HotStuff) collects 2f+1 votes, QC is formed and can be disseminated. In an optimistically responsive design, this triggers the next phase immediately.</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!DW83!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37c59f93-182b-46e0-920b-8d7f887f0d22_1278x614.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!DW83!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37c59f93-182b-46e0-920b-8d7f887f0d22_1278x614.png 424w, https://substackcdn.com/image/fetch/$s_!DW83!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37c59f93-182b-46e0-920b-8d7f887f0d22_1278x614.png 848w, https://substackcdn.com/image/fetch/$s_!DW83!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37c59f93-182b-46e0-920b-8d7f887f0d22_1278x614.png 1272w, https://substackcdn.com/image/fetch/$s_!DW83!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37c59f93-182b-46e0-920b-8d7f887f0d22_1278x614.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!DW83!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37c59f93-182b-46e0-920b-8d7f887f0d22_1278x614.png" width="1278" height="614" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/37c59f93-182b-46e0-920b-8d7f887f0d22_1278x614.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:614,&quot;width&quot;:1278,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A diagram of a workflow\n\nAI-generated content may be incorrect.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A diagram of a workflow

AI-generated content may be incorrect." title="A diagram of a workflow

AI-generated content may be incorrect." srcset="https://substackcdn.com/image/fetch/$s_!DW83!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37c59f93-182b-46e0-920b-8d7f887f0d22_1278x614.png 424w, https://substackcdn.com/image/fetch/$s_!DW83!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37c59f93-182b-46e0-920b-8d7f887f0d22_1278x614.png 848w, https://substackcdn.com/image/fetch/$s_!DW83!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37c59f93-182b-46e0-920b-8d7f887f0d22_1278x614.png 1272w, https://substackcdn.com/image/fetch/$s_!DW83!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37c59f93-182b-46e0-920b-8d7f887f0d22_1278x614.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In practice, this means if network latency between nodes is, say, 100ms, the consensus can potentially finish a round in just a couple of hundred milliseconds (plus computation and aggregation overhead). It doesn&#8217;t wait, for example, a full second &#8220;slot time&#8221; if it doesn&#8217;t need to. This is in contrast with Ethereum mainnet which follows a <a href="https://ethos.dev/beacon-chain">slot-and-epoch model</a> [3]. On Ethereum, block production is fixed at 12-second intervals. Even if everyone is ready earlier, the protocol waits.</p><p>MonadBFT&#8217;s approach eliminates unnecessary delay. It retains the pipelined HotStuff structure but removes the rigid &#8220;you must wait &#916; seconds&#8221; rule in the normal case. This means it can outperform time-bound systems in responsiveness without sacrificing safety.</p><ul><li><p><strong>In the unhappy path (leader failure): </strong>In many consensus protocols, when a leader fails to propose a block, other nodes only realize this after a timeout &#916; has passed. If &#916; is, for example, 1 second, that time is essentially lost. MonadBFT handles this differently. When validators detect a missing proposal, they immediately broadcast timeout messages (TC or Timeout Certificate). As soon as 2f+1 of these timeouts are seen, the next leader takes over. The transition to the new view is <em><strong>triggered by quorum-based evidence, not by the clock.</strong></em></p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!vCDZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc76dbb9-0064-4782-aa39-3844c393e0fe_1224x518.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!vCDZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc76dbb9-0064-4782-aa39-3844c393e0fe_1224x518.png 424w, https://substackcdn.com/image/fetch/$s_!vCDZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc76dbb9-0064-4782-aa39-3844c393e0fe_1224x518.png 848w, https://substackcdn.com/image/fetch/$s_!vCDZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc76dbb9-0064-4782-aa39-3844c393e0fe_1224x518.png 1272w, https://substackcdn.com/image/fetch/$s_!vCDZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc76dbb9-0064-4782-aa39-3844c393e0fe_1224x518.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!vCDZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc76dbb9-0064-4782-aa39-3844c393e0fe_1224x518.png" width="1224" height="518" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dc76dbb9-0064-4782-aa39-3844c393e0fe_1224x518.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:518,&quot;width&quot;:1224,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!vCDZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc76dbb9-0064-4782-aa39-3844c393e0fe_1224x518.png 424w, https://substackcdn.com/image/fetch/$s_!vCDZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc76dbb9-0064-4782-aa39-3844c393e0fe_1224x518.png 848w, https://substackcdn.com/image/fetch/$s_!vCDZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc76dbb9-0064-4782-aa39-3844c393e0fe_1224x518.png 1272w, https://substackcdn.com/image/fetch/$s_!vCDZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc76dbb9-0064-4782-aa39-3844c393e0fe_1224x518.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><strong>Comparison with hotstuff-family consensus</strong></h2><p>MonadBFT builds on the lineage of HotStuff-family consensus protocols, but stands out by achieving a combination of desirable properties that no previous design has been able to fully integrate without trade-offs.</p><p>Earlier protocols were often optimized for some dimensions like pipelined throughput or linear communication but had to sacrifice others. MonadBFT uniquely manages to combine linear messaging complexity, pipelined commits, strong tail-forking resistance, instant responsiveness without fixed delays, and efficient recovery mechanisms, all while preserving fast finality and high liveness guarantees. The table below summarizes how MonadBFT compares to other rotating-leader BFT protocols across these critical dimensions:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Ezn6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbab31336-b326-4eeb-8b63-3fe7b7844cc2_1600x573.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Ezn6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbab31336-b326-4eeb-8b63-3fe7b7844cc2_1600x573.png 424w, https://substackcdn.com/image/fetch/$s_!Ezn6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbab31336-b326-4eeb-8b63-3fe7b7844cc2_1600x573.png 848w, https://substackcdn.com/image/fetch/$s_!Ezn6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbab31336-b326-4eeb-8b63-3fe7b7844cc2_1600x573.png 1272w, https://substackcdn.com/image/fetch/$s_!Ezn6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbab31336-b326-4eeb-8b63-3fe7b7844cc2_1600x573.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Ezn6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbab31336-b326-4eeb-8b63-3fe7b7844cc2_1600x573.png" width="1456" height="521" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bab31336-b326-4eeb-8b63-3fe7b7844cc2_1600x573.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:521,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Ezn6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbab31336-b326-4eeb-8b63-3fe7b7844cc2_1600x573.png 424w, https://substackcdn.com/image/fetch/$s_!Ezn6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbab31336-b326-4eeb-8b63-3fe7b7844cc2_1600x573.png 848w, https://substackcdn.com/image/fetch/$s_!Ezn6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbab31336-b326-4eeb-8b63-3fe7b7844cc2_1600x573.png 1272w, https://substackcdn.com/image/fetch/$s_!Ezn6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbab31336-b326-4eeb-8b63-3fe7b7844cc2_1600x573.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><strong>What does this mean for Developers?</strong></h2><p><strong>For Developers, MonadBFT means a couple of things:</strong></p><ul><li><p><strong>Simpler Finality Model:</strong> With MonadBFT, you can treat a block that has a QC (supermajority vote) as effectively finalized for most purposes, because the protocol will finalize it or slash if not. Developers can safely act on 1-block confirmations with high confidence. </p></li><li><p><strong>Improved UX for Apps</strong>: If you&#8217;re building a high-throughput application (exchange, game, etc.), MonadBFT&#8217;s low latency and fork-resistance translate to smoother UX. Users see their actions confirmed almost instantly and won&#8217;t commonly encounter confusing reorgs or rollbacks.</p></li><li><p><strong>Deterministic Behavior</strong>: MonadBFT&#8217;s stricter rules (like reproposal requirement) reduce the<em> non-determinism</em> in block inclusion. There are fewer &#8220;corner-case&#8221; scenarios where a block might be included or skipped depending on subtle timing such as whether a vote or a timeout reached the leader first. MonadBFT replaces such ambiguity with explicit rules and verifiable evidence. This makes it easier to reason about the protocol&#8217;s correctness and to test it. </p></li><li><p><strong>Scalability Headroom</strong>: If you are a developer concerned with scaling, MonadBFT gives you more headroom before hitting bottlenecks. And features like <a href="https://www.category.xyz/blogs/raptorcast-designing-a-messaging-layer">erasure-coded block dissemination</a> [4] mean that you can push lots of data through the network without overtaxing individual nodes. This makes it possible to aim for higher throughput which opens up design space for more ambitious on-chain applications</p></li></ul><p><strong>For End-Users</strong>. A normie user won&#8217;t know about any of the stuff we discussed here, but they feel its effects. With MonadBFT underpinning Monad the chain, users can expect all the nice qualities below without sacrificing on decentralization and censorship resistance. </p><ul><li><p><strong>Faster Confirmations</strong>: Transactions (like sending tokens, swapping assets, minting NFTs, executing trades) will confirm very quickly.</p></li></ul><ul><li><p><strong>Fewer Surprises</strong>: The consistency of the chain state is higher as stuff like tail-forking, which is an re-org essentially, gets eliminated</p></li></ul><ul><li><p><strong>Fairness and Transparency</strong>: Improvements in consensus indirectly mean that the chain&#8217;s operation is fairer. No single validator can easily censor transactions or play games with ordering across blocks.</p></li></ul><h2><strong>Conclusion</strong></h2><p>To recap, MonadBFT introduces four core innovations on top of pipelined HotStuff-style consensus:</p><p><strong>Tail-Forking Resistance</strong>: MonadBFT is the first pipelined BFT protocol to eliminate tail-forking attacks&#8203; by requiring the next leader to <strong>repropose</strong> the last voted block if the previous leader failed, or otherwise show a No-Endorsement Certificate (NEC) as proof that the block lacked support. This guarantees that no block endorsed by a supermajority will be abandoned, protecting honest leaders&#8217; rewards and preventing malicious reorgs and cross-block MEV extraction.</p><p><strong>Speculative Finality in One Round</strong>: Validators can confirm a block after a single round of communication (one leader proposal and votes), giving clients an immediate assurance of inclusion&#8203;. This speculative confirmation will only revert if the leader equivocates (an act that can be proven and punished), making it a safe assumption in practice.</p><p><strong>Optimistic Responsiveness</strong>: The protocol operates at network speed without inherent delays&#8203;. Leaders advance the consensus as soon as the necessary votes are received, and view changes occur as soon as a quorum of timeouts is observed, rather than waiting for a fixed interval. This optimistically responsive design minimizes wait times, while still handling asynchrony and faults robustly when they occur.</p><p><strong>Linear Communication:</strong> On the happy path (meaning leader is honest), message and authentication complexity is linear in the number of validators&#8203;. MonadBFT retains HotStuff&#8217;s efficient communication pattern, using aggregated signatures and simple leader-to-validators broadcasts, which enables the protocol to scale to 100s of validators without performance bottlenecks.</p><h2><strong>Works Cited</strong></h2><p><em>Read the full MonadBFT Whitepaper <a href="https://arxiv.org/abs/2502.20692">here</a> [5].</em></p><p>[1] <a href="https://pmg.csail.mit.edu/papers/osdi99.pdf">https://pmg.csail.mit.edu/papers/osdi99.pdf</a></p><p>[2] <a href="https://arxiv.org/abs/2205.11652">https://arxiv.org/abs/2205.11652</a></p><p>[3] <a href="https://ethos.dev/beacon-chain">https://ethos.dev/beacon-chain</a></p><p>[4] <a href="https://www.category.xyz/blogs/raptorcast-designing-a-messaging-layer">https://www.category.xyz/blogs/raptorcast-designing-a-messaging-layer</a></p><p>[5] <a href="https://arxiv.org/abs/2502.20692">https://arxiv.org/abs/2502.20692</a></p><h2><strong>About the Author</strong></h2><p><em>Michael is an Ecosystem Associate at Monad Foundation. Prior to joining Monad, he worked as a strategy associate at a global cryptocurrency exchange. He also<a href="http://michaellwy.substack.com/"> writes</a> about crypto, economics, and policy. Connect with him on Twitter:<a href="https://twitter.com/michael_lwy"> @michael_lwy</a>.</em></p>]]></content:encoded></item><item><title><![CDATA[#72 - The Blind Signing Problem]]></title><description><![CDATA[Shifting Blockchain Security from Reactive Measures to Proactive Protection]]></description><link>https://review.stanfordblockchain.xyz/p/72-the-blind-signing-problem</link><guid isPermaLink="false">https://review.stanfordblockchain.xyz/p/72-the-blind-signing-problem</guid><dc:creator><![CDATA[Stanford Blockchain Club]]></dc:creator><pubDate>Tue, 20 May 2025 23:00:24 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!NtK_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdadf153f-e74b-41a7-b581-fc00e102b800_1024x1024.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!NtK_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdadf153f-e74b-41a7-b581-fc00e102b800_1024x1024.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!NtK_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdadf153f-e74b-41a7-b581-fc00e102b800_1024x1024.jpeg 424w, https://substackcdn.com/image/fetch/$s_!NtK_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdadf153f-e74b-41a7-b581-fc00e102b800_1024x1024.jpeg 848w, https://substackcdn.com/image/fetch/$s_!NtK_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdadf153f-e74b-41a7-b581-fc00e102b800_1024x1024.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!NtK_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdadf153f-e74b-41a7-b581-fc00e102b800_1024x1024.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!NtK_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdadf153f-e74b-41a7-b581-fc00e102b800_1024x1024.jpeg" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dadf153f-e74b-41a7-b581-fc00e102b800_1024x1024.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!NtK_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdadf153f-e74b-41a7-b581-fc00e102b800_1024x1024.jpeg 424w, https://substackcdn.com/image/fetch/$s_!NtK_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdadf153f-e74b-41a7-b581-fc00e102b800_1024x1024.jpeg 848w, https://substackcdn.com/image/fetch/$s_!NtK_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdadf153f-e74b-41a7-b581-fc00e102b800_1024x1024.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!NtK_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdadf153f-e74b-41a7-b581-fc00e102b800_1024x1024.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="pullquote"><p><em><strong>Stanford Blockchain Review<br></strong>Volume 8, Article No. 2</em></p><p><em>&#128218; Authors: </em><a href="https://twitter.com/elliot0x">Elliot Friedman</a> &#8212; Kleidi<br><a href="https://x.com/tesvarajiang">Tesvara Jiang</a> &#8212; Stanford</p><p><em>&#127775;  Technical Prerequisite: Low</em></p></div><h1>Introduction</h1><p>Blind signing, the practice of signing cryptocurrency transactions without understanding the contents of what is being signed, has long plagued the ecosystem and been the root cause of many thefts. Even sophisticated users are vulnerable, such as Chris Larsen, chairman of Ripple, who lost $150 million in January 2024 [2]. Of the $2.2 billion stolen assets in 2024, some $500 million in thefts were directly attributable to blind signing [7]. These risky signing practices have become an unavoidable part of crypto interactions, affecting even the most sophisticated users. A decentralized Fraud Prevention Network (FPN) incentivizes security validators to identify and block fraudulent transactions before they reach the blockchain.</p><p>This article examines notable cryptocurrency hacks stemming from blind signing vulnerabilities, analyzes security systems in traditional finance that fight fraud, and demonstrates how a decentralized FPN creates an economic framework that makes security profitable while protecting users' assets.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://review.stanfordblockchain.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Stanford Blockchain Review! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>A Long History of Previous Hacks</h1><p>Blind signing vulnerabilities have enabled some of the largest cryptocurrency thefts in history, with three recent attacks highlighting how easily security measures fail when users cannot verify what they are signing.</p><h2>The ByBit Attack</h2><p>On February 21, 2025, North Korea&#8217;s Lazarus Group stole $1.46 billion from ByBit by exploiting Gnosis Safe, the largest multi-sig wallet provider [3, 4]. They first compromised a Gnosis developer&#8217;s laptop to harvest AWS credentials, then injected malicious JavaScript into the Safe&#8217;s web UI that was prepared to activate on only one routine transaction ByBit had scheduled. They tricked the users into approving unauthorized withdrawals while displaying their expected transactions on the UI. Two minutes after the theft, they erased their code and funneled the proceeds through hundreds of addresses; @<a href="https://x.com/zachxbt">ZachXBT</a> later published over 920 of them on <a href="https://www.chainabuse.com/report/b87c8824-8f5c-434a-a595-b7b916f641ad">ChainAbuse</a> to help trace the funds.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!OlM-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F67255eec-86cc-4659-9166-d0a9d430dec3_1600x855.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!OlM-!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F67255eec-86cc-4659-9166-d0a9d430dec3_1600x855.jpeg 424w, https://substackcdn.com/image/fetch/$s_!OlM-!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F67255eec-86cc-4659-9166-d0a9d430dec3_1600x855.jpeg 848w, https://substackcdn.com/image/fetch/$s_!OlM-!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F67255eec-86cc-4659-9166-d0a9d430dec3_1600x855.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!OlM-!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F67255eec-86cc-4659-9166-d0a9d430dec3_1600x855.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!OlM-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F67255eec-86cc-4659-9166-d0a9d430dec3_1600x855.jpeg" width="1456" height="778" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/67255eec-86cc-4659-9166-d0a9d430dec3_1600x855.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:778,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!OlM-!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F67255eec-86cc-4659-9166-d0a9d430dec3_1600x855.jpeg 424w, https://substackcdn.com/image/fetch/$s_!OlM-!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F67255eec-86cc-4659-9166-d0a9d430dec3_1600x855.jpeg 848w, https://substackcdn.com/image/fetch/$s_!OlM-!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F67255eec-86cc-4659-9166-d0a9d430dec3_1600x855.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!OlM-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F67255eec-86cc-4659-9166-d0a9d430dec3_1600x855.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em>Figure 1 - Blind Signing Attack Process</em></figcaption></figure></div><h2>A History of Similar Attacks</h2><p>Before ByBit, Lazarus targeted two other high-profile players: WazirX, a prominent Indian exchange, and Radiant Capital, a cross-chain lending protocol.</p><p>On WazirX (July 18, 2024): Hackers exploited mismatches in how Liminal (WazirX&#8217;s custody UI) displayed transactions, tricking signatories into approving a malicious Gnosis Safe withdrawal, stealing $230 million in customer funds [5].</p><p>On Radiant Capital (Oct 16, 2024): Hackers disguised themselves as a former contractor of the company, sending a trojan&#8208;laden ZIP of their &#8220;recent projects&#8221; by Telegram to multiple developers. Once the malware was installed, they waited for Radiant&#8217;s team to initiate Gnosis Safe transactions&#8212;then silently swapped them to drain lending-pool contracts. They lay dormant for one month, and once the team went to sign a normal protocol operation, changed the payload sent to their ledgers from the correct one to a malicious version. Within three minutes of the team signing, the attackers broadcast the transactions, stole $50m in user funds and scrubbed forensic evidence of the machine&#8217;s compromise [1].</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!MTxM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f4b840a-4f63-4cc0-b771-6b4f1b0400f4_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!MTxM!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f4b840a-4f63-4cc0-b771-6b4f1b0400f4_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!MTxM!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f4b840a-4f63-4cc0-b771-6b4f1b0400f4_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!MTxM!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f4b840a-4f63-4cc0-b771-6b4f1b0400f4_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!MTxM!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f4b840a-4f63-4cc0-b771-6b4f1b0400f4_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!MTxM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f4b840a-4f63-4cc0-b771-6b4f1b0400f4_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3f4b840a-4f63-4cc0-b771-6b4f1b0400f4_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!MTxM!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f4b840a-4f63-4cc0-b771-6b4f1b0400f4_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!MTxM!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f4b840a-4f63-4cc0-b771-6b4f1b0400f4_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!MTxM!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f4b840a-4f63-4cc0-b771-6b4f1b0400f4_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!MTxM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f4b840a-4f63-4cc0-b771-6b4f1b0400f4_1536x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em>Figure 2 - Summary of 3 Gnosis Blind Signing Attacks Attributed to North Korea</em></figcaption></figure></div><p>Both heists relied on Gnosis Safe multisigs and succeeded by targeting the human element: users who trust the UI and blind sign on hardware wallets. Even an 11-signer, 3-signature threshold Safe is useless if attackers can easily deceive all active signers. Rather than increasing signer counts, a more effective solution could involve introducing an additional transaction veto mechanism.</p><p>North Korea's state-backed operations present a persistent threat because they operate with impunity. On the other hand, independent hackers are subject to international litigation and can rarely enjoy their proceeds. Many successful independent hackers end up returning most of the proceeds in exchange for their freedom [8, 12].</p><p>Cryptocurrency companies continue to be targeted by North Korean linked groups. In 2024, Lazarus-linked hacks are estimated to have netted their country approximately $1.3 billion [7], representing approximately 4.3% of annual GDP [9]. For a country mostly cut off from the outside world by sanctions, cryptocurrency theft represents a significant windfall for their nation. Insider compromise remains sufficient to defeat multisignature controls. To close this gap, security layers need to not only harden their code, but stop fraudulent transactions from confirming on-chain. Each of these heists appears to exploit the difficulty of payload verification. Many indicators point to blind signing as the root cause, as the user is unable to verify their intent matches what they sign.</p><h2>Traditional Finance Fraud Prevention Systems</h2><p>Credit cards power close to a third of all consumer spending in the United States. These cards rely on sophisticated risk management networks that have evolved over decades. Between the card issuer and merchant is a shield activated on each transaction, protecting all parties against fraud while enabling consumers to roll back fraudulent transactions.</p><p>When a credit card is used, a defense algorithm activates, checking the transaction against the consumer&#8217;s spending history, looking through spending velocity, seasonal habits, implying their current location, and running probabilistic models on their identity. After this review, payment processors then choose to accept or reject transactions.</p><p>This system is in place because merchants and card issuers are both incentivized to prevent fraud. If a merchant accepts a fraudulent payment, they lose both their merchandise and the payment when it's charged back. If an issuer misses fraud, they bear costs from dispute resolution and often cover the losses. This incentivizes both parties to stop fraudulent transactions, as 80% of fraud losses are shared between them [10] rather than falling on consumers [6].</p><h1>Bringing Active Fraud Prevention Onchain</h1><p>Infrastructure providers currently lack <em>direct</em> economic incentives to prevent fraudulent transactions. Since there is no reason to, wallets, node providers, and validators all disclaim liability from fraud, so the consequences fall on the end user. Unlike credit card networks, where issuers and merchants share the majority of losses to fraud, transactions on public blockchains are final, without mechanisms to intervene and protect users. To fix this, automated security reviews must be embedded directly into the transaction supply chain. By rewarding security validators for preventing hacks and penalizing them for false flags, infrastructure providers are financially motivated to host and run programs to protect users in real time.</p><p>To align the incentives of users and infrastructure providers against fraud, a stake-backed, decentralized Fraud Prevention Network (FPN) will review every transaction in real time. The network will reward accurate fraud detection, penalize false flags, and block any transfer that deviates from a user&#8217;s normal patterns, stopping unauthorized transactions without slowing legitimate activity.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!B8KX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc838f0f-b7dc-4d51-961a-e142442d0d6c_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!B8KX!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc838f0f-b7dc-4d51-961a-e142442d0d6c_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!B8KX!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc838f0f-b7dc-4d51-961a-e142442d0d6c_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!B8KX!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc838f0f-b7dc-4d51-961a-e142442d0d6c_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!B8KX!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc838f0f-b7dc-4d51-961a-e142442d0d6c_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!B8KX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc838f0f-b7dc-4d51-961a-e142442d0d6c_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fc838f0f-b7dc-4d51-961a-e142442d0d6c_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!B8KX!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc838f0f-b7dc-4d51-961a-e142442d0d6c_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!B8KX!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc838f0f-b7dc-4d51-961a-e142442d0d6c_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!B8KX!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc838f0f-b7dc-4d51-961a-e142442d0d6c_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!B8KX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc838f0f-b7dc-4d51-961a-e142442d0d6c_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em>Figure 3 - Comparing Credit Card and Onchain Fraud Detection</em></figcaption></figure></div><h2>Transaction Review by a Decentralized Validator Network</h2><p>While waiting for inclusion in the mempool, a network of security nodes analyzes the transaction for potential threats, looking for unusual destination addresses, atypical transaction amounts, malicious contract interactions and deviations from the user's standard transaction patterns.</p><p>Transactions routed through this network have independent validators with staked collateral analyze the transaction. These validators are financially motivated to identify and flag suspicious transactions, as they earn rewards for correctly identifying fraud and face slashing for false positives.</p><h2>Network Overview and Operating Principles</h2><p>This network employs an optimistic approval model where transactions are assumed to be legitimate unless explicitly flagged. Account Abstraction wallets allow for the programmability of wallets, per the ERC-4337 specification [11]. Once flagged, execution is blocked, pending further review. The network leverages account abstraction's programmable nature, adding programmable transaction validation, allowing user operations to be intercepted and reviewed by specialized bundlers that query the FPN before block inclusion.</p><p>To understand how this network works in practice, consider user Alice's experience. Alice uses an account abstraction wallet to interact with what she believes is a legitimate dApp, unaware it's actually a phishing site crafting a transaction to transfer all her tokens to an attacker's address. When she initiates the transaction, her signed UserOp (User Operation, the transaction format used in account abstraction wallets) is routed through the FPN for validator review rather than immediate broadcast. Within seconds, FPN validators analyze the pending operation and identify several red flags: the recipient address was created by a known threat actor, and the transaction attempts to transfer an unusually large amount of assets to a new, unverified contract. A validator immediately flags the transaction as fraudulent, and other validators independently reach the same conclusion. Once the required quorum is met, the transaction is marked as fraudulent onchain, and the network instructs the bundler not to include it in a block. Alice's transaction never reaches the chain since it was blocked.</p><p>Alice then receives a notification explaining why her transaction was blocked, with details "The destination address is flagged as a known scam address." Her funds never leave her wallet, and she pays a small fee, 1% of the amount saved. The validators who correctly flagged the transaction receive proportional payouts from this reward. The entire process completes within three seconds, a minimal delay justified by the funds saved. Should Alice believe the transaction was actually legitimate, she has a window to open a dispute by posting a bond as collateral. A decentralized review council would then examine her case and, if they determine the transaction was indeed legitimate, her bond and reward would be refunded.</p><h2>Looking Forward: Incentive Alignment at Scale</h2><p>This network will be wrapped in a simple interface and mostly invisible to users, abstracting away the complexity, risk models, and the entire supply chain underwriting this risk. When an FPN becomes a standard layer of the transaction supply chain, scams and thefts will become significantly harder to execute as attackers know a group of guardians with veto capabilities stands between them and users' funds.</p><h1>Conclusion</h1><p>Blind signing in cryptocurrency presents a security challenge: the blockchain recognizes only what users sign, regardless of their intent. This reality has led to billions in losses as sophisticated attackers exploit the gap between interfaces and intent. When frontends or personal computers are compromised, the signed transaction serves as the authoritative record of the user&#8217;s intent.</p><p>A decentralized Fraud Prevention Network doesn&#8217;t just improve security, it transforms the users&#8217; relationship with these systems by adding a safety net to catch them. Routing transactions through security specialists with a financial stake in outcomes converts security from recurring SaaS spend for wallets into a self-sustaining ecosystem of security providers each protecting users. Had institutions like ByBit, WazirX or Radiant Capital used this network, their funds could have been saved, with malicious transactions stopped before reaching the blockchain.</p><p>The implementation of economic reward structures for security experts transforms fraud prevention from an externality to a core economic function within the blockchain ecosystem. Through the integration of a continuously operational security validation layer with financial compensation proportional to successful threat mitigation, a foundation for enhanced trust in transaction integrity is established. The proposed Fraud Prevention Network architecture would facilitate an environment where transaction execution more reliably reflects users' intents.</p><h1>About the Authors</h1><p>Elliot Friedman is a smart-contract engineer and founder of Kleidi, a decentralized Fraud Prevention Network. Prior to Kleidi, Elliot founded Solidity Labs, a boutique consulting firm that built leading DeFi protocols, hardened the largest organizations in crypto against the toughest threat actors, and created open source tools to help secure governance systems.</p><p>Tesvara Jiang is a sophomore at Stanford studying CS. </p><h1>Works Cited</h1><ol><li><p>Bitcoin.com News. (n.d.). <em>Radiant Capital hack: How hackers used a PDF to steal $50 million</em>. Retrieved May 16, 2025, from<a href="https://news.bitcoin.com/radiant-capital-hack-how-hackers-used-a-pdf-to-steal-50-million/"> https://news.bitcoin.com/radiant-capital-hack-how-hackers-used-a-pdf-to-steal-50-million/</a>.</p></li><li><p>Blockworks. (n.d.). <em>Ripple co-founder hack</em>. Retrieved May 16, 2025, from<a href="https://blockworks.co/news/ripple-co-founder-hack"> https://blockworks.co/news/ripple-co-founder-hack</a>.</p></li><li><p>Sygnia. (n.d.). <em>Sygnia investigation: Bybit hack</em>. Retrieved May 16, 2025, from<a href="https://www.sygnia.co/blog/sygnia-investigation-bybit-hack/"> https://www.sygnia.co/blog/sygnia-investigation-bybit-hack/</a>.</p></li><li><p>Cointelegraph. (n.d.). <em>Lazarus Group 2024 pause &amp; repositioning $1.4 B Bybit hack</em>. Retrieved May 16, 2025, from<a href="https://cointelegraph.com/news/lazarus-group-2024-pause-repositioning-1-4-b-bybit-hack"> https://cointelegraph.com/news/lazarus-group-2024-pause-repositioning-1-4-b-bybit-hack</a>.</p></li><li><p>Unchained Crypto. (n.d.). <em>$230 million WazirX hack potentially linked to Lazarus Group, say blockchain researchers</em>. Retrieved May 16, 2025, from<a href="https://unchainedcrypto.com/230-million-wazirx-hack-potentially-linked-to-lazarus-group-say-blockchain-researchers"> https://unchainedcrypto.com/230-million-wazirx-hack-potentially-linked-to-lazarus-group-say-blockchain-researchers</a>.</p></li><li><p>NerdWallet. (n.d.). <em>Merchants &amp; victims of credit-card fraud</em>. Retrieved May 16, 2025, from<a href="https://www.nerdwallet.com/article/credit-cards/merchants-victims-credit-card-fraud"> https://www.nerdwallet.com/article/credit-cards/merchants-victims-credit-card-fraud</a>.</p></li><li><p>Chainalysis. (2025). <em>Crypto hacking and stolen funds in 2025</em>. Retrieved May 16, 2025, from<a href="https://www.chainalysis.com/blog/crypto-hacking-stolen-funds-2025/"> https://www.chainalysis.com/blog/crypto-hacking-stolen-funds-2025/</a>.</p></li><li><p>Wikipedia. (n.d.). <em>Poly Network exploit</em>. Retrieved May 16, 2025, from<a href="https://en.wikipedia.org/wiki/Poly_Network_exploit"> https://en.wikipedia.org/wiki/Poly_Network_exploit</a>.</p></li><li><p>Wikipedia. (n.d.). <em>Economy of North Korea: Size of the North Korean economy</em>. Retrieved May 16, 2025, from<a href="https://en.wikipedia.org/wiki/Economy_of_North_Korea#Size_of_the_North_Korean_economy"> https://en.wikipedia.org/wiki/Economy_of_North_Korea#Size_of_the_North_Korean_economy</a>.</p></li><li><p>Federal Reserve. (2021). <em>2021 Interchange Fee Revenue, Covered Issuer Costs, and Covered Issuer and Merchant Fraud Losses Related to Debit Card Transactions</em>. Retrieved May 16, 2025, from<a href="https://www.federalreserve.gov/paymentsystems/2021-Interchange-Fee.htm"> https://www.federalreserve.gov/paymentsystems/2021-Interchange-Fee.htm</a>.</p></li><li><p>Ethereum Foundation. (n.d.). <em>EIP-4337: Account Abstraction via EntryPoint Contract Specification</em>. Retrieved May 16, 2025, from<a href="https://eips.ethereum.org/EIPS/eip-4337"> https://eips.ethereum.org/EIPS/eip-4337</a>.</p></li><li><p>Bitdefender. (2023, March 16). <em>Lending Protocol Announces Recovery of Some Funds After $200 Million Euler Crypto Heist</em>. Retrieved May 20, 2025, from<a href="https://www.bitdefender.com/en-us/blog/hotforsecurity/lending-protocol-announces-recovery-of-some-funds-after-200-million-euler-crypto-heist"> https://www.bitdefender.com/en-us/blog/hotforsecurity/lending-protocol-announces-recovery-of-some-funds-after-200-million-euler-crypto-heist</a></p></li></ol>]]></content:encoded></item><item><title><![CDATA[#71 - Cryptography Research Spotlight - An Architectural Overview of RISC Zero]]></title><description><![CDATA[A Conversation with Jeremy Bruestle, CEO and Cofounder of RISC Zero]]></description><link>https://review.stanfordblockchain.xyz/p/71-cryptography-research-spotlight</link><guid isPermaLink="false">https://review.stanfordblockchain.xyz/p/71-cryptography-research-spotlight</guid><dc:creator><![CDATA[Stanford Blockchain Club]]></dc:creator><pubDate>Fri, 16 May 2025 22:13:52 GMT</pubDate><enclosure url="https://substackcdn.com/image/youtube/w_728,c_limit/E2jH7-Xpw4M" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="pullquote"><p><em><strong>Stanford Blockchain Review<br></strong>Volume 8, Article No. 1</em></p><p><em>&#128218; Author: <a href="https://x.com/bruestlejeremy?lang=en">Jeremy Bruestle</a> &#8212; RISC Zero<br></em>Yavor Litchev &#8212; Stanford Blockchain<br><a href="https://x.com/0xfishylosopher?lang=en">Jay Yu</a> &#8212; Stanford Blockchain</p><p><em>&#127775;  Technical Prerequisite: Intermediate</em></p></div><p><em>This article is a long-form breakdown of the interview discussion and ideas with Yavor Litchev and Jay Yu, both from Stanford Blockchain Club during an interview conducted in March 2025. Full Video <a href="https://www.youtube.com/watch?v=E2jH7-Xpw4M">here</a>.</em></p><div id="youtube2-E2jH7-Xpw4M" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;E2jH7-Xpw4M&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/E2jH7-Xpw4M?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><h2>Introduction</h2><p>Zero Knowledge Proofs (ZKPs) are an area of cryptography which have seen a recent explosion of growth and adoption within the blockchain space. One of the most interesting applications of ZKPs is in building ZK Virtual Machines (ZKVMs), or computers that can prove that they correctly executed code on some secret input without revealing the inputs themselves.</p><p>RISC Zero is one of the leading companies within the ZKVM space, building provable computers based on the open-source RISC-V architecture. Within this article, we will first provide a primer on ZKVMs and RISC Zero&#8217;s overarching goal, before diving into the architectural design of RISC Zero&#8217;s 0STARK prover and the various architectural choices that they have made, and finally discussing some of the real-world use cases that RISC Zero unlocks, both in the blockchain space and beyond.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://review.stanfordblockchain.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Stanford Blockchain Review! Subscribe for free to receive new posts and support our work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>1 - An Introduction to ZKVMs and RISC Zero&#8217;s Prover</h2><p>Imagine a computer that could print out a receipt, proving that you spent money at a coffee shop, without revealing what items you actually bought. This is the operating principle of a ZKVM, or a Zero Knowledge Virtual Machine.</p><p>ZKVMs are a virtual machine that runs trusted code and generates proofs. Developers can write arbitrary code in a language like Rust, have the code compile down to binary, and send it to the ZKVM to both execute the code and verify its execution [1]. The verification of the executable relies on Zero Knowledge Proofs, which allow for the cryptographic proof of a statement without revealing what the statement actually is. Let&#8217;s suppose I&#8217;m at a bar, and want to issue a proof to the bartender that I am over 21 without revealing what my actual age is. I can first &#8220;commit&#8221; my age (a secret number) by putting it inside of a cryptographically sealed envelope. The bartender will then challenge me to prove that the number is greater than 21, without actually opening the envelope itself. I provide some cryptographic proof using a &#8220;Prover&#8221; algorithm, and send this proof along to the bartender. The bartender will then run a &#8220;Verifier&#8221; algorithm, and either accept or reject the proof.</p><p>This is a classic example of a zero knowledge proof between a &#8220;Prover&#8221; and a &#8220;Verifier.&#8221; ZKVMs such as RISC Zero do something similar to this, but for arbitrary computation. Instead of creating zero knowledge proofs of simple statements, such as whether my age is greater than 21, ZKVMs use zero knowledge proofs to prove the correct execution of some &#8220;guest code&#8221; that the user provides it. To do this, they essentially compile down programs to polynomials (which are a mathematical object that can contain an unbounded amount of information) and then run proofs over all of these polynomials. Compiling arbitrary programs down to polynomials is a challenging and computationally expensive operation, as even the most trivial program needs to be represented as an &#8220;<a href="https://en.wikipedia.org/wiki/Arithmetic_circuit_complexity">arithmetic circuits</a>&#8221; [2], a nested tree-structure where each intermediary node is either an addition or a multiplication operation, and each leaf node is an input to the program (and the constant 1).</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Nq2C!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b127d18-2178-422e-a635-b1432c042a4c_258x235.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Nq2C!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b127d18-2178-422e-a635-b1432c042a4c_258x235.png 424w, https://substackcdn.com/image/fetch/$s_!Nq2C!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b127d18-2178-422e-a635-b1432c042a4c_258x235.png 848w, https://substackcdn.com/image/fetch/$s_!Nq2C!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b127d18-2178-422e-a635-b1432c042a4c_258x235.png 1272w, https://substackcdn.com/image/fetch/$s_!Nq2C!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b127d18-2178-422e-a635-b1432c042a4c_258x235.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Nq2C!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b127d18-2178-422e-a635-b1432c042a4c_258x235.png" width="258" height="235" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4b127d18-2178-422e-a635-b1432c042a4c_258x235.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:235,&quot;width&quot;:258,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Nq2C!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b127d18-2178-422e-a635-b1432c042a4c_258x235.png 424w, https://substackcdn.com/image/fetch/$s_!Nq2C!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b127d18-2178-422e-a635-b1432c042a4c_258x235.png 848w, https://substackcdn.com/image/fetch/$s_!Nq2C!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b127d18-2178-422e-a635-b1432c042a4c_258x235.png 1272w, https://substackcdn.com/image/fetch/$s_!Nq2C!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b127d18-2178-422e-a635-b1432c042a4c_258x235.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">A simple arithmetic circuit. Source [2].</figcaption></figure></div><p>Many early projects in the space have sought to optimize for performance and stay close to the mathematical circuit layer. <a href="https://docs.circom.io/">Circom</a>, for example, is an early domain specific language used to define arithmetic circuits [3]. This, however, requires a high-level of expertise on the part of the developer, as developing in Circom can feel like developing in a low-level assembly language, optimized for performance but without any abstraction features or pre-built elements. Other projects, such as <a href="https://aztec.network/noir">Aztec&#8217;s Noir language</a> and <a href="https://book.cairo-lang.org/">Starkware&#8217;s Cairo language</a>, seek to use a higher-level Domain Specific Language (DSL) to aid developers to easily create arithmetic circuits with a better developer experience. However, introducing a completely new programming language optimized for proving may hinder developer adoption, especially in an era of AI-assisted coding, as there is far less tooling, documentation, and existing repositories available to reference.</p><p>RISC Zero, however, takes a different approach. As its name suggests, one of the company&#8217;s defining choices was to based their ZKVM on the open-source <strong>RISC-V instruction set architecture (ISA)</strong>, rather than create their own DSL [1]. RISC-V is a simple, minimal, and modern ISA that is much easier to arithmetic compared to other standard instruction sets such as x86 or MIPS. At the same time, it is a standard target for the LLVM compiler, so many mainstream languages, such as Rust and Go, can run directly in RISC Zero&#8217;s ZKVM and developers do not need to learn a new language from scratch. Furthermore, because RISC-V is an open ISA, it comes with a complete set of conformance tests and a formal model of the ISA [4]. RISC Zero could leverage these to ensure their ZKVM implementation exactly matches the RISC-V spec &#8211; crucial for security (no hidden undefined behaviors) and determinism. In fact, RISC Zero is working with formal verification tools (like Veridise&#8217;s Picus) to mathematically prove their ZKVM&#8217;s correctness against the RISC-V spec [4].</p><p>Thus, RISC-V represents the perfect balance between the compiler maturity, ZK performance, and semantic security. Developers can thus write code in familiar languages such as Rust, and enjoy existing infrastructure, tooling, and language support, while also leveraging the RISC Zero ZKVM to create secure, provable programs.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!RAwc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78663734-b5eb-455f-87ee-f6de479b6b88_1600x803.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!RAwc!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78663734-b5eb-455f-87ee-f6de479b6b88_1600x803.png 424w, https://substackcdn.com/image/fetch/$s_!RAwc!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78663734-b5eb-455f-87ee-f6de479b6b88_1600x803.png 848w, https://substackcdn.com/image/fetch/$s_!RAwc!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78663734-b5eb-455f-87ee-f6de479b6b88_1600x803.png 1272w, https://substackcdn.com/image/fetch/$s_!RAwc!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78663734-b5eb-455f-87ee-f6de479b6b88_1600x803.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!RAwc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78663734-b5eb-455f-87ee-f6de479b6b88_1600x803.png" width="1456" height="731" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/78663734-b5eb-455f-87ee-f6de479b6b88_1600x803.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:731,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!RAwc!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78663734-b5eb-455f-87ee-f6de479b6b88_1600x803.png 424w, https://substackcdn.com/image/fetch/$s_!RAwc!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78663734-b5eb-455f-87ee-f6de479b6b88_1600x803.png 848w, https://substackcdn.com/image/fetch/$s_!RAwc!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78663734-b5eb-455f-87ee-f6de479b6b88_1600x803.png 1272w, https://substackcdn.com/image/fetch/$s_!RAwc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78663734-b5eb-455f-87ee-f6de479b6b88_1600x803.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">High level overview of RISC Zero ZKVM. Source [1]</figcaption></figure></div><p>From a developer perspective, at a high level, RISC Zero&#8217;s ZKVM works as follows [1]:</p><ol><li><p>A developer writes a &#8220;guest program&#8221; in Rust, that gets compiled down to a standard ELF binary</p></li><li><p>The executor executes the binary, and produces an execution trace of the &#8220;session&#8221;, or a complete record of the computation</p></li><li><p>The prover will take in session, and use that to generate a ZK proof as a receipt.</p></li></ol><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!_-gb!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f604101-0a9a-47a3-bea7-86d7dec80e05_1600x524.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_-gb!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f604101-0a9a-47a3-bea7-86d7dec80e05_1600x524.png 424w, https://substackcdn.com/image/fetch/$s_!_-gb!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f604101-0a9a-47a3-bea7-86d7dec80e05_1600x524.png 848w, https://substackcdn.com/image/fetch/$s_!_-gb!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f604101-0a9a-47a3-bea7-86d7dec80e05_1600x524.png 1272w, https://substackcdn.com/image/fetch/$s_!_-gb!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f604101-0a9a-47a3-bea7-86d7dec80e05_1600x524.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_-gb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f604101-0a9a-47a3-bea7-86d7dec80e05_1600x524.png" width="1456" height="477" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3f604101-0a9a-47a3-bea7-86d7dec80e05_1600x524.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:477,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!_-gb!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f604101-0a9a-47a3-bea7-86d7dec80e05_1600x524.png 424w, https://substackcdn.com/image/fetch/$s_!_-gb!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f604101-0a9a-47a3-bea7-86d7dec80e05_1600x524.png 848w, https://substackcdn.com/image/fetch/$s_!_-gb!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f604101-0a9a-47a3-bea7-86d7dec80e05_1600x524.png 1272w, https://substackcdn.com/image/fetch/$s_!_-gb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f604101-0a9a-47a3-bea7-86d7dec80e05_1600x524.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">RISC Zero Prover Architecture. Source [5].</figcaption></figure></div><p>Under the hood, RISC Zero&#8217;s prover splits the process into several steps [5]:</p><ol><li><p><strong>Execution. </strong>The program is executed, generating a number of &#8220;segments.&#8221;</p></li><li><p><strong>RISC-V Proving. </strong>Each segment is proven separately using FRI-based 0STARK Prover</p></li><li><p><strong>Aggregation Proving. </strong>All the segment proofs are aggregated into a single proof, using a FRI-based 0STARK Prover</p></li><li><p><strong>STARK-to-SNARK Proving. </strong>In order to output a proof that&#8217;s small enough to verify on-chain, the last step in the proving system relies on an elliptic-curve based Groth16 prover for a smaller on-chain footprint</p></li></ol><p>As we can see, the majority of the proving, including the individual proving of the segments and the aggregation of these segment proofs relies on RISC Zero&#8217;s own proof system, the FRI-based 0STARK Prover. In Section 2, we will dive deeper into how this 0STARK Prover works, and the different architectural choices that the 0STARK system makes, and in Section 3, we&#8217;ll talk about what developers may be able to build using this system.</p><h2>2 - A Technical Deep Dive into 0STARK Prover Architecture</h2><p>The 0STARK Prover&#8217;s goal is to couple a RISC-V execution engine and session trace with a transparent, post-quantum secure STARK-based proof system. In this section, we will first dive into the reasoning for RISC Zero&#8217;s choice of STARKs, before discussing the three key parts to the 0STARK prover system: (1) randomized AIR arithmetization, (2) DEEP-ALI + FRI STARK instantiation for RISC-V proving, and (3) Merkle-based trace commitment scheme [6].</p><p>The 0STARK prover system relies on a zk-STARK foundation, eschewing SNARK-based architectures like Plonk or Marlin for several reasons. Firstly, STARKs allow working over small base fields without requiring trusted setups, and their polynomial IOPs naturally express repeated state&#8208;transition constraints in hardware-inspired traces [6]. Secondly, STARKs scale nearly linearly with execution size and avoid pairing&#8208;based cryptography, making them well-suited for VMs with millions of clock&#8208;cycles. Moreover, unlike SNARKs, STARKs require no trusted setup, which simplifies tooling for developers and reduces operational risk. Verification remains efficient, on the order of milliseconds, even for large traces.</p><p>Nonetheless, the final step of the RISC Zero process relies on a &#8220;STARK to SNARK&#8221; process, where RISC Zero wraps the STARK transcript in a Groth 16-style succinct SNARK, yielding short on-chain proofs. This hybrid approach balances the efficient, transparent prover properties of STARKs with the minimal proof sizes enabled by Groth16 SNARKs.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!fMgz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F448829f1-5e11-4e1a-96c3-a26ebf9362e1_1600x524.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!fMgz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F448829f1-5e11-4e1a-96c3-a26ebf9362e1_1600x524.png 424w, https://substackcdn.com/image/fetch/$s_!fMgz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F448829f1-5e11-4e1a-96c3-a26ebf9362e1_1600x524.png 848w, https://substackcdn.com/image/fetch/$s_!fMgz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F448829f1-5e11-4e1a-96c3-a26ebf9362e1_1600x524.png 1272w, https://substackcdn.com/image/fetch/$s_!fMgz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F448829f1-5e11-4e1a-96c3-a26ebf9362e1_1600x524.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!fMgz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F448829f1-5e11-4e1a-96c3-a26ebf9362e1_1600x524.png" width="1456" height="477" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/448829f1-5e11-4e1a-96c3-a26ebf9362e1_1600x524.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:477,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!fMgz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F448829f1-5e11-4e1a-96c3-a26ebf9362e1_1600x524.png 424w, https://substackcdn.com/image/fetch/$s_!fMgz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F448829f1-5e11-4e1a-96c3-a26ebf9362e1_1600x524.png 848w, https://substackcdn.com/image/fetch/$s_!fMgz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F448829f1-5e11-4e1a-96c3-a26ebf9362e1_1600x524.png 1272w, https://substackcdn.com/image/fetch/$s_!fMgz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F448829f1-5e11-4e1a-96c3-a26ebf9362e1_1600x524.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Use of 0STARK Prover in RISC Zero Prover Architecture. Source [5].</figcaption></figure></div><p>Thus, this architecture is designed for recursive proofs, where one ZKVM proof can be verified inside another. While the current system uses a sequential (non-recursive) composition, RISC Zero engineers are exploring witness folding and proof&#8208;system modularity to eventually enable on-chain recursive rollups without compromising the core AIR structure.</p><p>Now that we have discussed why RISC Zero chose to use STARKs over SNARKs as the foundation for its 0STARK system, we can now describe the interlocking components to the 0STARK system: a randomized AIR arithmetization, a DEEP-ALI + FRI STARK instantiation for RISC-V proving, and a Merkle-based trace commitment scheme. At a high level, the 0STARK protocol runs as follows [6]:</p><ol><li><p><strong>Setup: </strong>Public parameters &#8211;trace size, tapset definitions, AIR constraints &#8211; are derived from the RISC-V binary</p></li><li><p><strong>Randomized Preprocessing: </strong>The prover executes the program, records control and data columns, encodes them via Reed-Solomon, and commits to Merkle caps. A verifier-randomness seeds the generation of memory and byte accumulators, which are also committed</p></li><li><p><strong>Main Phase (DEEP-ALI + FRI): </strong>All constraints are linked into a combined constraint polynomial. The prover computes the validity witness, commits its low-degree segments, and responds to a DEEP query point. A batched FRI then checks proximity of the mixed R ap witness to the RS code, with query rounds verifying the integrity of the split and mix operations across multiple cosets</p></li><li><p><strong>Verification: </strong>The verifier recomputes the combined constraint at the DEEP point, checks DEEPAnswerSequence consistency, and validates the FRI queries &#8211; all in polylogarithmic time relative to trace size</p></li></ol><p>Throughout this model, 0STARK makes several cryptographic design decisions including [6]:</p><ul><li><p><strong>AIR over R1CS or CCS &#8211; </strong>In the setup process, Arithmetic Intermediate Representation (AIR) was chosen over R1CS or CCS because AIR naturally captures the time&#8208;sequential, repeating structure of a CPU trace. Each AIR constraint enforces a low-degree polynomial relation between taps (field evaluations of registers or memory at nearby cycles). This leads to fewer and simpler constraints than an R1CS encoding, which would require auxiliary variables and more complex gate wiring for each instruction. While R1CS is more general, AIR yields better prover performance for deterministic, cycle-based computations, and directly leverages fast FFT and FRI operations. RISC Zero is also experimenting with the M&#179; arithmetization from the Irreducible team for further efficiency gains.</p></li></ul><ul><li><p><strong>Handling large programs </strong>&#8211; Long execution traces from large programs can, in theory, lower the soundness margin if all cycles were checked naively. RISC Zero mitigates this by segmenting programs into smaller chunks, generating partial witnesses for each segment, and then composing them in a final DEEP-ALI step. This segmentation bounds the length of individual AIR checks, preventing an attacker from easily sampling invalid witnesses in a huge trace. The segments are merged using the same mixing and quotienting techniques present in the main STARK loop, ensuring end-to-end integrity.</p></li></ul><ul><li><p><strong>Randomized Preprocessing and Constraint Batching Innovations &#8211; </strong>RISC Zero&#8217;s soundness analysis diverges from ethSTARK primarily in its use of randomized preprocessing to instantiate PLONK-style permutation and PLOOKUP-based range arguments for memory consistency. In this phase, accumulators for memory and byte-lookup are computed and committed alongside the trace, enabling a single AIR to enforce both permutation and lookup in one shot.<br><br>During DEEP-ALI, all AIR constraints are batched parametrically into a single combined polynomial using powers of a single random field element, rather than multiple independent randomness values. This parametric batching reduces round-trip complexity and improved prover efficiency compared to affine batching in ethSTARK. Similarly, the batched FRI protocol compresses multiple FRI instances into one using a single random challenge, further streamlining proof generation.</p></li></ul><ul><li><p><strong>Optimizing Validity Polynomials &#8211; </strong>Standard STARK constructions yield separate FRI checks for the trace and for the validity polynomial. 0STARK moves beyond this by splitting the high-degree validity quotient into four low-degree &#8220;segment&#8221; polynomials, each of which is folded into the main FRI invocation. This degree reduction both lowers FRI complexity and unifies the FRI checks into a single proximity argument, tightening the overall soundness bound.</p></li></ul><p>Through its combination of STARK transparency, parametric batching, AIR efficiency, and FRI folding, RISC Zero delivers a high-throughput, developer-friendly ZKVM capable of proving arbitrary Rust programs compiled to RISC-V. This architecture balances practical prover performance with small, fast proofs, and lays the groundwork for recursive proof composition and integration with broader cryptographic protocols.</p><p>RISC Zero&#8217;s ZKVM is inherently generic: any computation expressible in RISC-V can be proven. This opens the door to running operations on data encrypted via Fully Homomorphic Encryption (FHE), yielding proofs of correct decryption or transformation without revealing secrets. Similarly, ZKVMs can host multi-party computations by encoding MPC protocols as RISC-V code. Many in the community are exploring MPC + ZKVM hybrids, where parties jointly compute on secret data and produce a single succinct proof of correctness. RISC Zero&#8217;s flexible proof architecture is well positioned to serve as the trustless foundation for these advanced cryptographic stacks.</p><h2>3 - Performance and Applications of RISC Zero in Practice</h2><p>RISC Zero&#8217;s ZKVM is not just an academic exercise. In this section, we survey the RISC Zero ZKVM&#8217;s performance and its potential applications and developer tooling ecosystem.</p><p>There are many methods of benchmarking the performance of a system, however one important metric is quite simply the execution speed of the system. While traditional VMs are measured in billions of instructions per second, zkVMs report throughput in megahertz of proof&#8208;checked execution. RISC Zero currently sustains around 60 MHz of effective execution throughput on a single GPU-enabled prover, meaning it can validate 60 million RISC-V clock cycles per second in zero knowledge, around the computation speed of a 1990s computer [7].</p><p>While this may be much less performant than modern CPUs in isolation, the computational cost of ZK proving is already orders of magnitude cheaper than execution on the Ethereum L1. The proof-generation process can be highly parallelizable: by distributing AIR constraint evaluations and FRI folds across multiple GPUs, provers can proportionally increase throughput.</p><p>Moreover, just as Moore&#8217;s Law once captured the rapid scaling of transistor density, we&#8217;re witnessing a ZK Moore&#8217;s Law in cryptographic proof systems, where the growth is rapidly accelerating thanks to several simultaneous scaling laws [8]. These include optimizations in arithmetization logic, such as AIR batching, FFT implementations, as well as GPU-friendly FRI algorithms that are delivering year-over-year prover speed improvements that outpace hardware transistor scaling. There have also been proposals for the development of SNARK proving ASICs [9] and other hardware level acceleration tactics for ZK. Similar to the early days of deep learning, where algorithmic advances and parallel hardware yielded exponential gains, ZKVM performance is hyperscaling, with practical prover throughput doubling (or better) each cycle. Over the next few years, ZKVM prover speed is expected to converge towards native RISC-V speeds, closing the gap between proof-checked and regular code execution.</p><p>Having ZKVMs available to provide this verifiable computation unlocks many different use cases both within the blockchain world and beyond. In the blockchain world, ZKVMs enhance scaling and privacy by shifting heavy computation off-chain and verifying results with succinct proofs &#8211; an idea known as ZK Coprocessors. ZKVMs can also work with components of the existing blockchain scaling stack. For example, RISC Zero has worked with Optimism to add ZK fraud proofs to their optimistic rollup using the Kailua ecosystem, improving finality delays in the optimistic rollup process and reducing rollup collateral costs [10]. Furthermore, RISC Zero also allows for the proving of an entire Ethereum block, including verifying transaction signatures, account and state storage, applying transactions, and updating the state root by taking existing Rust implementations of the Ethereum such as revm and running RISC Zero&#8217;s prover [11].</p><p>On the application layer, RISC Zero&#8217;s ZKVM has also enabled many innovative use-cases. For example, an early demo application was Bonsai-Pay, which allowed users to send Ethereum to others&#8217; Gmail addresses and was based on the RISC Zero Bonsai prover system [12]. The Hashflow Exchange is also launching an off-chain exchange engine called xOS that uses RISC Zero to prove the matching and risk calculations of a high-performance trading engine, with proofs posted to a Celestia-based chain [13]. By separating the fast &#8220;service layer&#8221; (running off-chain with normal performance) from the verifiable &#8220;settlement layer,&#8221; Hashflow can give users the best of both worlds: CEX-like speed with DEX-like trustlessness.</p><p>RISC Zero&#8217;s ZKVM also has further applications in the social and identity realm outside of web3, such as the example mentioned at the start of proving someone&#8217;s age without revealing the age itself. In fact, RISC Zero has shown how it can be used to prove that a JSON file contains a specific field and value without revealing the full file [14]. This could be especially useful in selectively proving sensitive information like photo metadata &#8211; we may want to prove that a photo was taken by a certain device (such as a Canon 5D Mark IV) without revealing other sensitive information such as the location of the photo.</p><p>Crucially, developers can write all of these applications using the familiar language of Rust, rather than have to learn a low-level ZK circuit language like Circom or a DSL such as Noir or Cairo. If you know Rust, or any other language that can compile to RISC-V, you can simply write your logic, compile with <strong>cargo risc0</strong> to a RISC-V binary, and the toolchain emits a provable artifact in minutes. And in the process, you can leverage the power of all existing Rust sources, from language documentation to debuggers like GDB to AI-assisted coding tools like Copilot or Cursor. For example, our example at the beginning of proving a person&#8217;s age is over 21, we can simply write as our guest function:</p><pre><code>// ----
// check_age.rs:

#![no_main]
risc0_zkvm::guest::entry!(main);

pub fn main() {
    let age: u32 = 25;

    let is_over_21 = age &gt;= 21;

    risc0_zkvm::guest::env::commit(&amp;is_over_21);
}

// -----
// main.rs:
use methods::CHECK_AGE_ELF;
use risc0_zkvm::default_prover;

fn main() {
    let prover = default_prover();
    let receipt = prover.prove(CHECK_AGE_ELF).unwrap();

    let is_over_21: bool = receipt.journal.decode().unwrap();

    println!("Proof generated. Over 21: {}", is_over_21);
}</code></pre><h2>Conclusion</h2><p>In conclusion, RISC Zero represents a major leap in the evolution of zero-knowledge computing, offering a practical, performant, and developer-friendly ZKVM built on top of the open RISC-V architecture. By combining a transparent STARK-based proof system with a familiar Rust-based development experience, RISC Zero bridges the gap between cryptographic rigor and real-world usability. Its architectural innovations &#8211; such as the 0STARK prover, recursive-proof readiness, and hybrid STARK-to-SNARK compression &#8211; position it at the forefront of verifiable computation, unlocking a new generation of applications from scalable blockchain rollups to high-performant trading engines to privacy-preserving identity and social proofs.</p><p>Looking ahead, RISC Zero is building toward a future where zero-knowledge computing is universal, scalable, and developer-friendly. By standardizing proof APIs, enabling recursive proofs, accelerating performance with hardware, expanding language and tooling support, and streamlining the developer experience, RISC Zero aims to make ZKVMs a core primitive across blockchains and beyond.</p><h1>References</h1><p>[1] <a href="https://dev.risczero.com/api/zkvm/">https://dev.risczero.com/api/zkvm/</a></p><p>[2] <a href="https://en.wikipedia.org/wiki/Arithmetic_circuit_complexity">https://en.wikipedia.org/wiki/Arithmetic_circuit_complexity</a></p><p>[3] https://docs.circom.io/</p><p>[4] <a href="https://risczero.com/blog/RISCZero-formally-verified-zkvm">https://risczero.com/blog/RISCZero-formally-verified-zkvm</a></p><p>[5] <a href="https://risczero.com/blog/designing-high-performance-zkVMs">https://risczero.com/blog/designing-high-performance-zkVMs</a></p><p>[6] See details of 0STARK technical paper: <a href="https://dev.risczero.com/proof-system-in-detail.pdf">https://dev.risczero.com/proof-system-in-detail.pdf</a></p><p>[7] High-end 1990s computers like the Pentium operated at 60 MHz: <a href="https://en.wikipedia.org/wiki/Pentium_(original)">https://en.wikipedia.org/wiki/Pentium_(original)</a></p><p>[8] See ZK Moore&#8217;s Law: <a href="https://review.stanfordblockchain.xyz/p/22-moores-law-for-zero-knowledge">https://review.stanfordblockchain.xyz/p/22-moores-law-for-zero-knowledge</a></p><p>[9] <a href="https://www.youtube.com/watch?v=URCH2d1cdyg">ZK11: SNARK proving ASICs - Justin Drake</a></p><p>[10] <a href="https://risczero.com/blog/kailua-how-it-works">https://risczero.com/blog/kailua-how-it-works</a></p><p>[11] Zeth: <a href="https://risczero.com/blog/zeth-release">https://risczero.com/blog/zeth-release</a></p><p>[12] Bonsai Pay: <a href="https://risczero.com/blog/bonsai-pay">https://risczero.com/blog/bonsai-pay</a></p><p>[13] HashFlow: <a href="https://medium.com/@hashflowdex/introducing-xos-the-provable-exchange-e875f4e6b30e">https://medium.com/@hashflowdex/introducing-xos-the-provable-exchange-e875f4e6b30e</a></p><p>[14] RISC Zero JSON Example: <a href="https://github.com/risc0/risc0/tree/release-2.0/examples/json">https://github.com/risc0/risc0/tree/release-2.0/examples/json</a></p><p>[15] Image Metadata: <a href="https://libguides.graduateinstitute.ch/rdm/image-metadata">https://libguides.graduateinstitute.ch/rdm/image-metadata</a></p><h1>About the Interviewees</h1><p><strong>Jeremy Bruestle</strong></p><p><em>Jeremy Bruestle is the co-founder and CEO of RISC Zero, a company pioneering general-purpose zero-knowledge virtual machines (zkVMs). With over two decades of experience in cryptography, distributed computing, and software engineering, Jeremy has consistently focused on bridging emerging mathematical research with real-world applications. Prior to RISC Zero, he co-founded Spiral Genetics, where he served as CTO, developing cloud-based bioinformatics platforms for rapid genome analysis. He also held roles such as Principal Engineer at Intel and Chief Scientist at Vertex.AI, contributing to advancements in mathematical models and algorithms.</em></p><p><strong>Yavor Litchev</strong></p><p><em>Yavor is an undergrad at Stanford pursuing a degree in computer science with a focus on cybersecurity and cryptography. He has previously engaged in research projects relating to secure machine learning and digital signatures with more flexible access structures at MIT PRIMES. More recently, he is researching secure systems and program execution using software fault isolation through the CURIS program. He is currently the cryptography research lead for the Stanford Blockchain Club.</em></p><p><strong>Jay Yu</strong></p><p><em>Jay is an undergrad at Stanford pursuing a double major in Computer Science and Philosophy. He is President of the Stanford Blockchain Club and founder of the Stanford Blockchain Review. He researches designs for Decentralized Autonomous Organizations (DAOs) and blockchain governance with Stanford Law School faculty and as a Research Fellow for IC3. He also works on the investments team at Pantera Capital.</em></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://review.stanfordblockchain.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Stanford Blockchain Review! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[#70 - Injective: A Specialized L1 for Onchain Capital Markets]]></title><description><![CDATA[Injective's Deflationary Model, iAssets, and New Products]]></description><link>https://review.stanfordblockchain.xyz/p/injective-a-specialized-l1-for-onchain</link><guid isPermaLink="false">https://review.stanfordblockchain.xyz/p/injective-a-specialized-l1-for-onchain</guid><dc:creator><![CDATA[Stanford Blockchain Club]]></dc:creator><pubDate>Tue, 29 Apr 2025 19:23:48 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!p-WA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81b0a222-6df6-44b7-a36d-dbc3cdde8664_2400x1626.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!p-WA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81b0a222-6df6-44b7-a36d-dbc3cdde8664_2400x1626.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!p-WA!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81b0a222-6df6-44b7-a36d-dbc3cdde8664_2400x1626.png 424w, https://substackcdn.com/image/fetch/$s_!p-WA!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81b0a222-6df6-44b7-a36d-dbc3cdde8664_2400x1626.png 848w, https://substackcdn.com/image/fetch/$s_!p-WA!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81b0a222-6df6-44b7-a36d-dbc3cdde8664_2400x1626.png 1272w, https://substackcdn.com/image/fetch/$s_!p-WA!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81b0a222-6df6-44b7-a36d-dbc3cdde8664_2400x1626.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!p-WA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81b0a222-6df6-44b7-a36d-dbc3cdde8664_2400x1626.png" width="1456" height="986" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/81b0a222-6df6-44b7-a36d-dbc3cdde8664_2400x1626.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:986,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:780527,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://review.stanfordblockchain.xyz/i/162222690?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81b0a222-6df6-44b7-a36d-dbc3cdde8664_2400x1626.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!p-WA!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81b0a222-6df6-44b7-a36d-dbc3cdde8664_2400x1626.png 424w, https://substackcdn.com/image/fetch/$s_!p-WA!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81b0a222-6df6-44b7-a36d-dbc3cdde8664_2400x1626.png 848w, https://substackcdn.com/image/fetch/$s_!p-WA!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81b0a222-6df6-44b7-a36d-dbc3cdde8664_2400x1626.png 1272w, https://substackcdn.com/image/fetch/$s_!p-WA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81b0a222-6df6-44b7-a36d-dbc3cdde8664_2400x1626.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="pullquote"><p><em><strong>Stanford Blockchain Review<br></strong>Volume 7, Article No. 10</em></p><p><em>&#128218; Author: </em><a href="https://x.com/0xBrans">Brandon Goss</a> - <a href="https://x.com/injective">Injective</a></p><p><em>&#127775;  Technical Prerequisite: Intermediate</em></p></div><p>In the blockchain ecosystem, Injective has emerged as a notable implementation of onchain finance. As a high-performance Layer-1 blockchain optimized specifically for financial applications, Injective distinguishes itself through its token economics, approach to asset tokenization, and long-term technical architecture. This article explores three key elements that define Injective's unique position in the blockchain ecosystem: its deflationary model centered around the burn auction mechanism, the revolutionary iAssets framework, and the chain&#8217;s technical roadmap.</p><h2><strong>Injective's Deflationary Model: An Alternative Approach to Tokenomics</strong></h2><h3><strong>The Mechanics of INJ's Deflationary System</strong></h3><p>Injective implements a deflationary model through its Burn Auction mechanism. Rather than relying on traditional fee burns &#8212; which often create friction between network scalability and deflationary goals &#8212; Injective hosts weekly auctions where participants bid with INJ tokens for a basket of assets generated from application revenue across the ecosystem. The winning bid is permanently burned, reducing the supply of INJ.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://review.stanfordblockchain.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Stanford Blockchain Review! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>This design fundamentally reshapes INJ&#8217;s tokenomics by introducing a deflationary system that scales horizontally with the growth of the broader ecosystem.</p><p>The Burn Auction is enabled by two core native modules on Injective: the <strong>exchange module</strong> and the <strong>auction module</strong>. These are available out-of-the-box for anyone building on Injective, forming part of its suite of plug-and-play financial primitives. Auctions are held weekly and can be accessed via the Injective Hub or directly on-chain.</p><p>The Burn Auction follows a clear and repeatable cycle:</p><ul><li><p><strong>Fee Collection:</strong> 60% of revenue (typically in stablecoins) from applications using the exchange module is pooled into an Auction Fund.</p></li><li><p><strong>Bidding Process:</strong> Users bid on the collected assets using INJ in an English auction format.</p></li><li><p><strong>Burning Mechanism:</strong> The winning bidder receives the full basket of assets, and the winning INJ bid is burned, permanently removing it from the total supply.</p></li></ul><p>This cyclical process creates an economic feedback loop. As ecosystem revenue increases, so does the size and impact of each Burn Auction &#8212; amplifying deflationary pressure on INJ and driving greater on-chain economic activity. The mechanism forms a central component of Injective's economic architecture.</p><h3><strong>Mint Module &amp; Dynamic Supply Mechanics</strong></h3><p>While the Burn Auction reduces supply through market-based burns, Injective&#8217;s mint module offers the counterpart: a dynamic, programmable supply system that adapts in real time. The Supply Rate automatically adjusts on a block-by-block basis, calculated based on the network's targeted bonded-stake ratio (Goal Bonded Percentage), Supply Rate Change parameter, lower/upper bounds on token Supply Rate, and Blocks Per Year.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!_3Hf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcb3c9c5-a973-4f97-b8cd-84b03718701e_555x339.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_3Hf!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcb3c9c5-a973-4f97-b8cd-84b03718701e_555x339.png 424w, https://substackcdn.com/image/fetch/$s_!_3Hf!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcb3c9c5-a973-4f97-b8cd-84b03718701e_555x339.png 848w, https://substackcdn.com/image/fetch/$s_!_3Hf!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcb3c9c5-a973-4f97-b8cd-84b03718701e_555x339.png 1272w, https://substackcdn.com/image/fetch/$s_!_3Hf!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcb3c9c5-a973-4f97-b8cd-84b03718701e_555x339.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_3Hf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcb3c9c5-a973-4f97-b8cd-84b03718701e_555x339.png" width="555" height="339" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dcb3c9c5-a973-4f97-b8cd-84b03718701e_555x339.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:339,&quot;width&quot;:555,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!_3Hf!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcb3c9c5-a973-4f97-b8cd-84b03718701e_555x339.png 424w, https://substackcdn.com/image/fetch/$s_!_3Hf!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcb3c9c5-a973-4f97-b8cd-84b03718701e_555x339.png 848w, https://substackcdn.com/image/fetch/$s_!_3Hf!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcb3c9c5-a973-4f97-b8cd-84b03718701e_555x339.png 1272w, https://substackcdn.com/image/fetch/$s_!_3Hf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcb3c9c5-a973-4f97-b8cd-84b03718701e_555x339.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This Moving Change Rate Mechanism is designed to engineer network activity that is responsive and adaptable. When more INJ is minted per block as the block reward, participants are incentivized to stake more INJ to benefit from increased rewards. Conversely, when the block reward decreases, stakers are incentivized to unbond staked INJ due to decreased rewards.</p><h3><strong>Programmable Token Economy</strong></h3><p>What distinguishes INJ from other Layer-1 tokens is its programmable economic model built around two complementary mechanisms:</p><ol><li><p><strong>Dynamic Supply Mechanism</strong>: A programmatic approach to token issuance through the Moving Change Rate Mechanism, which automatically adjusts supply rates in real-time every block. This mechanism operates within predetermined bounds that decrease quarterly through 2026.</p></li><li><p><strong>Burn Auction Mechanism</strong>: An innovative mechanism that decouples deflationary pressure from network usage. Rather than burning transaction fees, which creates tension between scalability and value accrual, participants bid with INJ tokens for a basket of assets generated from ecosystem revenue. This aligns network value accrual with ecosystem growth rather than network congestion.</p></li></ol><h3><strong>Evolution of the Burn Auction</strong></h3><p>Injective's burn mechanism has evolved significantly since its inception:</p><ul><li><p><strong>INJ 2.0 (2023)</strong>: Expanded the burn auction by allowing any application to contribute to the Auction Fund, not just those using the exchange module.</p></li><li><p><strong>INJ 3.0 (2024)</strong>: Significantly enhanced the deflationary model by increasing the deflation rate 400%, raising the Supply Rate Change from 10% to 50%, and implementing a schedule for quarterly decreases in Supply Rate bounds. Over two years, the lower bound will decrease by 25% (from 5% to 4%), and the upper bound will decrease by 30% (from 10% to 7%).</p></li><li><p><strong>INJ Burn Upgrade (2024)</strong>: Expanded access to allow individual users to make contributions, enabling any project or user to directly contribute to the Injective Burn Auction.</p></li></ul><h3><strong>Comparative Advantage Over Other L1s</strong></h3><p>Injective's tokenomics model differs from traditional approaches used by most Layer-1 blockchains, particularly in how deflationary pressure is applied and how communities engage with the token economics:</p><ol><li><p><strong>Active Community Participation: </strong>Unlike most L1s where token burns are automatic and passive (e.g., fee burning on Ethereum), Injective&#8217;s Burn Auction requires active participation. Users bid with INJ to acquire protocol-generated assets, making the deflationary mechanism inherently community-driven. This transforms token burning from a background process into a direct form of engagement and value expression.</p></li><li><p><strong>Ecosystem-Wide Contribution: </strong>The 2024 INJ Burn Upgrade expanded the mechanism to allow any project or user, not just exchange module-based applications, to contribute revenue to the auction pool. This inclusive design ensures that value from across the entire ecosystem contributes to INJ&#8217;s deflationary model, not just a subset of protocol activity.</p></li><li><p><strong>Transparent, Decentralized Design: </strong>The Burn Auction is fully on-chain and open to all. Its transparent mechanics and public visibility reinforce Injective&#8217;s commitment to decentralization. Participants can track each auction, verify the burn, and witness real-time reduction in circulating supply, a level of clarity rarely offered by other L1s.</p></li><li><p><strong>Scalability Without Congestion: </strong>Most L1s rely on burning gas fees, which scale with network congestion &#8212; a model that can disincentivize growth. Injective decouples deflation from congestion. Because burn volume is tied to ecosystem revenue, not block space, Injective&#8217;s model scales linearly with ecosystem expansion, not transaction load.</p></li></ol><h3><strong>Scalability of the Deflationary Model</strong></h3><p>As more applications are built on Injective and ecosystem revenue increases, the size of each burn auction naturally scales upward. This continuous cycle ensures an ongoing reduction in INJ supply that is not directly tied to network congestion, unlike methods most major L1s employ.</p><p>The scalability of this model creates a virtuous economic flywheel:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5GKZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2398261-0581-436a-9637-f35393258150_1600x900.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5GKZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2398261-0581-436a-9637-f35393258150_1600x900.png 424w, https://substackcdn.com/image/fetch/$s_!5GKZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2398261-0581-436a-9637-f35393258150_1600x900.png 848w, https://substackcdn.com/image/fetch/$s_!5GKZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2398261-0581-436a-9637-f35393258150_1600x900.png 1272w, https://substackcdn.com/image/fetch/$s_!5GKZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2398261-0581-436a-9637-f35393258150_1600x900.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5GKZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2398261-0581-436a-9637-f35393258150_1600x900.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f2398261-0581-436a-9637-f35393258150_1600x900.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5GKZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2398261-0581-436a-9637-f35393258150_1600x900.png 424w, https://substackcdn.com/image/fetch/$s_!5GKZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2398261-0581-436a-9637-f35393258150_1600x900.png 848w, https://substackcdn.com/image/fetch/$s_!5GKZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2398261-0581-436a-9637-f35393258150_1600x900.png 1272w, https://substackcdn.com/image/fetch/$s_!5GKZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2398261-0581-436a-9637-f35393258150_1600x900.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The introduction of INJ 3.0 in 2024marked a major inflection point, increasing the deflation rate by 400% and tightening supply bounds through a scheduled reduction mechanism that continues through 2026.</p><p>In a low inflation or deflationary environment, economic activity tends to increase. This is rooted in basic economic principles: as the value of money or assets appreciates over time, participants are incentivized to engage in trade, investment, and productivity to maximize their benefits within the system.</p><p>As economic activity on the network rises, two things occur:</p><ol><li><p>Applications generate more revenue.</p></li><li><p>New applications are created to capitalize on the thriving ecosystem, further boosting overall revenue.</p></li></ol><p>This creates compounding growth, strengthening the flywheel with every turn.</p><p>The Burn Auction collects a portion of protocol-generated revenue and auctions it in exchange for INJ, which is then burned. As ecosystem revenue increases, the size of the INJ Burn Auction grows, further accelerating INJ's deflation rate.</p><h2><strong>iAssets: Revolutionizing On-Chain Asset Tokenization</strong></h2><h3><strong>What Are iAssets?</strong></h3><p>Injective&#8217;s iAssets represent a paradigm shift in how real-world assets are integrated into the blockchain. Far beyond static tokenized representations, iAssets are programmable financial primitives that enable dynamic liquidity allocation, position-based exposure, and seamless cross-market composability.</p><p>Each iAsset functions as an on-chain instrument with second-order utility and zero pre-funding constraints &#8212; enabling any stock, bond, or ETF to be launched not as a synthetic stand-in, but as a fully programmable, capital-efficient financial instrument. This unlocks an entirely new design space for tokenized markets.</p><h3><strong>Market Performance and Adoption</strong></h3><p>Since launch, iAssets have rapidly gained traction in both adoption and usage:</p><ul><li><p><strong>Trading Volume</strong>: Over $200 million</p></li><li><p><strong>Market Share</strong>: 78% weekly market share across all chains (year-to-date)</p></li><li><p><strong>First Implementation</strong>: TRADFI, an index of 500 U.S. stocks, deployed as the first iAsset</p></li></ul><p>These metrics highlight not only demand for on-chain real-world assets (RWAs), but also the effectiveness of Injective&#8217;s infrastructure in delivering institutional-grade performance.</p><h3><strong>The Technical Innovation Behind iAssets</strong></h3><p>Traditional financial markets remain defined by rigid contracts, intermediary dependence, and exclusionary practices. While DeFi introduced programmability and permissionless access, its early models, most notably overcollateralized synthetic assets, were capital-inefficient and failed to deliver true composability.</p><p>iAssets address these shortcomings through a modular framework powered by Injective&#8217;s specialized financial infrastructure:</p><ul><li><p><strong>No Pre-Funding or Over-Collateralization</strong>: Unlike synthetic assets requiring 150%+ collateral, iAssets do not require user capital lock-ups, immediately freeing liquidity and improving capital efficiency.</p></li><li><p><strong>Oracle-Based Price Sourcing</strong>: iAssets derive real-time value from off-chain assets (e.g., stocks, commodities) via Injective&#8217;s Oracle Module, enabling accurate, tamper-resistant pricing.</p></li><li><p><strong>Permissionless Market Creation</strong>: The Exchange Module allows any iAsset to launch as a tradable market using Injective&#8217;s on-chain CLOB, ensuring deep liquidity and fast execution.</p></li><li><p><strong>Dynamic Liquidity Management</strong>: Market makers and institutions supply liquidity to iAsset markets without needing pre-funded collateral pools. Liquidity dynamically adjusts to market demand, creating efficient price discovery and execution.</p></li></ul><p>This architecture ensures that iAssets are not only more flexible than traditional tokenization methods, but also more usable from day one.</p><h3><strong>Comparison with Other Tokenization Approaches</strong></h3><p>iAssets represent a significant advancement over existing tokenization methods across both traditional finance and other blockchain platforms:</p><h4><strong>Legacy Finance Limitations</strong></h4><ul><li><p>Settlement delays (T+1 or T+2) restrict capital mobility</p></li><li><p>Clearinghouses (e.g., DTCC, LCH) introduce bottlenecks and lock-ups</p></li><li><p>Legal agreements (e.g., ISDAs) limit derivatives access to large institutions</p></li><li><p>Fixed trading hours exclude global retail participation</p></li></ul><h4><strong>Early DeFi Synthetic Assets</strong></h4><ul><li><p>Required excessive collateral (150%+), reducing capital efficiency</p></li><li><p>Collateral drawdowns led to liquidation cascades and systemic fragility</p></li><li><p>Isolated liquidity pools limited flexibility and composability</p></li></ul><p>By contrast, iAssets are designed to maximize usability, efficiency, and programmability from launch &#8212; with no barriers to global participation or protocol composability.</p><h4><strong>Key Advantages of iAssets</strong></h4><ul><li><p><strong>Capital Efficiency: </strong>No collateral requirements for users</p></li><li><p><strong>Programmability: iAssets can power lending, hedging, and complex strategies</strong></p></li><li><p><strong>Liquidity: Benefit from Injective&#8217;s shared liquidity layer and on-chain order book</strong></p></li><li><p><strong>Accessibility: 24/7 trading with global access and instant settlement</strong></p></li></ul><h3><strong>Multipurpose Utility and Composability</strong></h3><p>iAssets integrate directly into Injective&#8217;s financial infrastructure, making them deployable across spot markets, derivatives, lending platforms, and structured products, without needing separate liquidity pools or asset silos.</p><p>Because of Injective&#8217;s architecture, iAssets can also support native rehypothecation with full transparency, enabling advanced capital efficiency without sacrificing security.</p><p>For example, a theoretical iAsset like iAAPL (Apple Inc.) could:</p><ul><li><p>Be traded 24/7 globally</p></li><li><p>Serve as margin for leveraged trades</p></li><li><p>Be used in algorithmic yield strategies</p></li><li><p>Remain auditable and traceable across all rehypothecated uses</p></li></ul><p>This opens up a new category of dynamic financial instruments, where assets aren&#8217;t just held &#8212; they actively contribute to composable, multi-purpose financial activity.</p><h3><strong>How Injective's Infrastructure Enables iAssets Without Collateral</strong></h3><p>Injective&#8217;s approach to iAssets is powered by its specialized financial infrastructure, highlighted by its modular liquidity architecture and Exchange Module, which features an on-chain order book for efficient price discovery and trade execution.</p><p>Unlike traditional synthetic assets that rely on pre-funded collateral pools, iAssets tap into Injective&#8217;s shared liquidity environment. A decentralized network of institutions supplies liquidity to each newly created market, treating iAssets like any other trading pair and dynamically adjusting liquidity provisioning in response to market demand.</p><p>This infrastructure allows iAssets to operate as fully tradable, composable instruments from day one, eliminating the need for user collateral and enabling a more open, programmable, and capital-efficient financial system.</p><h2><strong>Long-Term Vision</strong></h2><h3><strong>Network-Level Liquidity Architectures in Financial Blockchains</strong></h3><p>One of Injective&#8217;s innovations designed to solve the problem of application-specific liquidity is called Liquidity Availability. Rather than requiring each application to silo its own liquidity, Injective transforms liquidity into a shared, network-level resource. This decouples liquidity provisioning from individual dApps, enabling the network to dynamically allocate capital wherever it&#8217;s needed most, at any given moment.</p><p>Core components of Liquidity Availability include:</p><ul><li><p><strong>Just-in-Time (JIT) Actions: </strong>Autonomous actions triggered by specific on-chain conditions to reallocate resources and fulfill liquidity demands in real time.</p></li><li><p><strong>Liquidity Proving: </strong>A verification layer that allows dApps to cryptographically prove they possess the liquidity necessary to meet transaction obligations.</p></li><li><p><strong>Solver &amp; Routing Layer: </strong>A decision-making engine that intelligently routes liquidity across the network, optimizing for execution efficiency and capital utilization.</p></li></ul><p>While iAssets eliminate liquidity fragmentation at the asset level, Liquidity Availability removes it at the intra-application and network level. Together, they create a fully composable financial layer where capital is constantly in motion: adaptive, efficient, and accessible to all.</p><h3><strong>Expanding the iAssets Ecosystem</strong></h3><p>The long-term vision for iAssets is to build a comprehensive, programmable financial system that unites real-world assets with blockchain-native functionality. This vision includes:</p><ul><li><p><strong>Deeper Market Coverage: </strong>Expansion into new asset classes such as global equities, ETFs, commodities, and forex pairs, each represented as capital-efficient iAssets.</p></li><li><p><strong>Plug-and-Play Financial Products: </strong>Structured products, index strategies, and algorithmic portfolios built natively on iAssets, offering institutional-grade tooling for DeFi and TradFi participants alike.</p></li><li><p><strong>Scaling Global Market Access: </strong>Building on Injective&#8217;s existing 24/7, permissionless trading framework, future iterations of iAssets will expand support for additional regions, asset types, and fiat onramps &#8212; removing the final frictions that still exist between global TradFi participants and real-time decentralized markets.</p></li></ul><p>Each new iAsset adds composability to the ecosystem, enabling developers and protocols to build higher-order financial primitives without needing to re-engineer core infrastructure.</p><h3><strong>Network Effects and Market Potential</strong></h3><p>As the iAssets ecosystem expands, it reinforces Injective&#8217;s role as the base layer for capital-efficient finance. By removing collateral constraints and liquidity silos, Injective attracts liquidity providers and developers looking to build in a system where assets can be deployed multifunctionally and reused intelligently.</p><p>According to market estimates, the tokenized asset market could reach $30 trillion by 2030. iAssets are uniquely positioned to capture this momentum, offering a live, performant, and composable framework that meets the needs of both retail and institutional players.</p><p>Injective is not just building new financial instruments. It is building a new financial system, with iAssets and Liquidity Availability as foundational primitives. This system is decentralized, scalable, and architected for global adoption.</p><h2><strong>Conclusion</strong></h2><p>Injective offers a specialized approach to financial blockchain infrastructure. Through its programmable tokenomics, asset frameworks, and modular infrastructure built for financial applications, Injective represents a distinct implementation in onchain finance.</p><p>Where most Layer-1s offer general-purpose platforms, Injective delivers a specialized financial operating system: one designed to scale capital markets on-chain with efficiency, composability, and transparency. Its novel auction-based supply reduction mechanism aligns protocol-level activity with supply dynamics, creating a deflationary architecture that evolves in tandem with ecosystem growth. Meanwhile, iAssets break from legacy tokenization models, enabling real-world financial instruments to function as natively digital, composable building blocks across trading, lending, and structured products.</p><p>With innovations like Liquidity Availability, Injective is transforming liquidity into a network-wide resource, dissolving the silos that have long fragmented both DeFi and traditional finance. The result is more than a blockchain; it&#8217;s a high-performance financial infrastructure layer capable of supporting everything from global equities to algorithmic structured products. All composable, all on-chain.</p><p>As the industry accelerates toward mass adoption of tokenized assets and blockchain-native finance, Injective is positioned not just to participate &#8212; but to lead.</p><h3><strong>About the Author</strong></h3><p><a href="https://x.com/0xBrans">Brandon Goss</a> is the Head of Research at Injective Labs, leading research and market intelligence across decentralized finance and blockchain technologies. Before joining Injective, he was a researcher at Messari and an enginner in the defense industry.</p>]]></content:encoded></item><item><title><![CDATA[#69 - Type III Stablecoins]]></title><description><![CDATA[How Self-Enforcing Mechanisms Can Transform Yield-Bearing Stablecoins]]></description><link>https://review.stanfordblockchain.xyz/p/69-type-iii-stablecoins</link><guid isPermaLink="false">https://review.stanfordblockchain.xyz/p/69-type-iii-stablecoins</guid><dc:creator><![CDATA[Stanford Blockchain Club]]></dc:creator><pubDate>Fri, 28 Mar 2025 17:31:12 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!871a!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4ef30fe-dad0-4041-928e-0df34572f4b0_1600x900.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!871a!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4ef30fe-dad0-4041-928e-0df34572f4b0_1600x900.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!871a!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4ef30fe-dad0-4041-928e-0df34572f4b0_1600x900.png 424w, https://substackcdn.com/image/fetch/$s_!871a!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4ef30fe-dad0-4041-928e-0df34572f4b0_1600x900.png 848w, https://substackcdn.com/image/fetch/$s_!871a!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4ef30fe-dad0-4041-928e-0df34572f4b0_1600x900.png 1272w, https://substackcdn.com/image/fetch/$s_!871a!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4ef30fe-dad0-4041-928e-0df34572f4b0_1600x900.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!871a!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4ef30fe-dad0-4041-928e-0df34572f4b0_1600x900.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b4ef30fe-dad0-4041-928e-0df34572f4b0_1600x900.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!871a!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4ef30fe-dad0-4041-928e-0df34572f4b0_1600x900.png 424w, https://substackcdn.com/image/fetch/$s_!871a!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4ef30fe-dad0-4041-928e-0df34572f4b0_1600x900.png 848w, https://substackcdn.com/image/fetch/$s_!871a!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4ef30fe-dad0-4041-928e-0df34572f4b0_1600x900.png 1272w, https://substackcdn.com/image/fetch/$s_!871a!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4ef30fe-dad0-4041-928e-0df34572f4b0_1600x900.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="pullquote"><p><em><strong>Stanford Blockchain Review<br></strong>Volume 7, Article No. 9</em></p><p><em>&#9997;&#127995; Author: <a href="https://x.com/Benjamin918_">Benjamin</a> and <a href="https://x.com/stablejae">Jae</a> &#8212; Cap Labs</em></p><p><em>&#11088;&#65039; Technical Prerequisite: Intermediate</em></p></div><p><em>Thanks to <a href="https://x.com/CarsonMBrown">Carson</a>, <a href="https://x.com/ekrahm">Ekram</a> and <a href="https://x.com/ishaan0x">Ishaan</a> for their thoughtful feedback on this piece.</em></p><p>With more than<a href="https://defillama.com/stablecoins"> $200B</a> in circulating supply, stablecoins have undoubtedly become the most significant sector within crypto today. One could even argue that the stablecoin sector has decoupled itself from the volatile crypto market&#8212;stablecoins have proved resiliency despite the crypto market's downturn in 2025, with more TradFi institutions actively integrating DeFi into their solutions.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://review.stanfordblockchain.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Stanford Blockchain Review! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Specifically, stablecoins have mastered two functions today: settlement for fiat and store of value (SoV). Daily transaction volume for stablecoins is<a href="https://www.developerreport.com/developer-report?s=daily-transaction-volume-is-at-an-all-time-high-81b-with-usdc-usdt-capturing-more-than-95-of-volume"> at all-time highs</a>, at $81B, with USDT and USDC capturing more than 95% in both mature economies and emerging markets. They represent not only simple transactions but also financial inclusion and access to a less volatile currency.</p><p>However, unlike SoV, yield for stablecoins is in a very different state of adoption. Despite all the innovation in DeFi, yield-bearing stablecoins have remained a niche use case for stablecoins. The total market cap of yield-bearing stablecoins<a href="https://www.developerreport.com/developer-report?s=tether-is-the-most-issued-stablecoin-at-72-usdc-is-second-at-20"> remains at around 10%</a> of USDT and USDC's combined market cap.</p><p>Why do such discrepancies exist? More importantly, what can we do to improve where yield-bearing stablecoins are today?</p><p>In this piece, we will examine the evolution of yield-bearing stablecoins, the different enforcement rules for yield, and finally, how Cap strives to solve their scalability and safety issues.</p><h3><strong>Evolution of Yield-Bearing Stablecoins: Endogenous to Exogenous Yield</strong></h3><p>During the early years, the sources of yield for stablecoins were endogenous; yield stemmed purely from within DeFi platforms. In particular, the yield was generated via liquidity provisioning and platform incentives, meaning the money flow was circular and self-contained. Accordingly, users were jumping from one protocol to another to speculate on the next high APR; thus, yield could only scale as much as the platform.</p><p>The most prominent example is crypto-overcollateralized stablecoins or Collateral Debt Positions (CDPs). CDPs are best exemplified by the early days of MakerDAO, where DAI was minted by lending ETH as collateral. CDPs generate yield through interest rates charged to borrowers who use their collateral to mint stablecoins. This interest is then shared with protocol participants, and the mechanism operates entirely within the DeFi ecosystem. Vanilla CDPs could only scale as much as the demand to lever ETH.</p><p>Another widely popular model relied on vote-escrow tokens (veTokens), where locking these tokens allowed protocols to direct incentive emissions to certain liquidity pools. These tokens led to what is known as<a href="https://www.coingecko.com/learn/vetokens-and-vetokenomics"> veToken wars</a>, where stablecoin protocols would maximize their ability to control a large percentage of liquidity pools to capture these DEX emissions. These token wars, such as with CRV and BAL, involved yield schemes that relied on external parties purchasing DEX tokens to fuel flywheels.</p><p>While both models grew to billions of dollars in TVL, their yields were volatile and speculative. Most importantly, they were limited by the considerably small demand for these platforms, especially compared to the context outside DeFi mechanisms.</p><p>Accordingly, founders have made industry-wide efforts to scale stablecoins beyond the ceiling set by endogenous yield models. Acknowledging that most yield for US Dollars can be found outside crypto-specific use cases,<a href="https://a16zcrypto.com/posts/article/understanding-stablecoins-banking-history/"> strategy-backed synthetic dollars</a> backed by either fiat or other assets have been gaining popularity. From vanilla T-Bill wrappers to experimental hedge fund strategy wrappers, there is now an abundance (as well as fragmentation of liquidity) of stablecoins attempting to address the scalability of yield-bearing stablecoins.</p><p>The question then becomes, what lens should we use to analyze these new stablecoins?</p><h3><strong>Regulating yield-bearing stablecoins</strong></h3><p>The idea behind yield-bearing stablecoins is simple: a reserve issues new money by lending highly liquid assets to execute an investment strategy.</p><p>Beyond the logistical decision of which assets are backing and what lending parameters are used, what fundamentally differentiates a yield-bearing stablecoin is its method for enforcing yield: Who decides who runs what strategies? What recourse do users have in case of bankruptcy?</p><p>In other words, the frameworks we use to evaluate enforcement are capital allocation mechanisms and safety guarantees. In DeFi today, there are two prevailing enforcement styles: authoritarian and committee-based. We introduce a third type, self-enforcing yield, that the Cap team is actively pioneering.</p><p>The following section is a deep dive into each stablecoin type. Specifically, we will examine the incentives for capital allocation and safety and the corresponding trade-offs.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iGg-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0153ff3d-b48f-4cc5-852b-5d390e2be24a_1600x905.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iGg-!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0153ff3d-b48f-4cc5-852b-5d390e2be24a_1600x905.png 424w, https://substackcdn.com/image/fetch/$s_!iGg-!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0153ff3d-b48f-4cc5-852b-5d390e2be24a_1600x905.png 848w, https://substackcdn.com/image/fetch/$s_!iGg-!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0153ff3d-b48f-4cc5-852b-5d390e2be24a_1600x905.png 1272w, https://substackcdn.com/image/fetch/$s_!iGg-!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0153ff3d-b48f-4cc5-852b-5d390e2be24a_1600x905.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iGg-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0153ff3d-b48f-4cc5-852b-5d390e2be24a_1600x905.png" width="1456" height="824" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0153ff3d-b48f-4cc5-852b-5d390e2be24a_1600x905.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:824,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!iGg-!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0153ff3d-b48f-4cc5-852b-5d390e2be24a_1600x905.png 424w, https://substackcdn.com/image/fetch/$s_!iGg-!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0153ff3d-b48f-4cc5-852b-5d390e2be24a_1600x905.png 848w, https://substackcdn.com/image/fetch/$s_!iGg-!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0153ff3d-b48f-4cc5-852b-5d390e2be24a_1600x905.png 1272w, https://substackcdn.com/image/fetch/$s_!iGg-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0153ff3d-b48f-4cc5-852b-5d390e2be24a_1600x905.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><strong>Type I Stablecoins: Authoritarian</strong></h3><p>Type I stablecoins are one-sided marketplaces where a single entity utilizes depositor capital to generate yield. They function as hedge funds, where the dApp team handpicks and executes a single (in some cases, few) strategy themselves. As the name suggests, Type 1 stablecoins are centralized, as the team gets the final say over capital allocation and recourse provision. Depending on the team, they can decide to provide safety guarantees, including over-collateralization, decentralization, and transparency, but it is up to the team&#8217;s discretion and hence risk is inherently more centralized.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!9RPY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97837999-4626-4969-b3e1-7fdd8c1f4b99_1082x290.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9RPY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97837999-4626-4969-b3e1-7fdd8c1f4b99_1082x290.png 424w, https://substackcdn.com/image/fetch/$s_!9RPY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97837999-4626-4969-b3e1-7fdd8c1f4b99_1082x290.png 848w, https://substackcdn.com/image/fetch/$s_!9RPY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97837999-4626-4969-b3e1-7fdd8c1f4b99_1082x290.png 1272w, https://substackcdn.com/image/fetch/$s_!9RPY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97837999-4626-4969-b3e1-7fdd8c1f4b99_1082x290.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9RPY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97837999-4626-4969-b3e1-7fdd8c1f4b99_1082x290.png" width="1082" height="290" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/97837999-4626-4969-b3e1-7fdd8c1f4b99_1082x290.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:290,&quot;width&quot;:1082,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!9RPY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97837999-4626-4969-b3e1-7fdd8c1f4b99_1082x290.png 424w, https://substackcdn.com/image/fetch/$s_!9RPY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97837999-4626-4969-b3e1-7fdd8c1f4b99_1082x290.png 848w, https://substackcdn.com/image/fetch/$s_!9RPY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97837999-4626-4969-b3e1-7fdd8c1f4b99_1082x290.png 1272w, https://substackcdn.com/image/fetch/$s_!9RPY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97837999-4626-4969-b3e1-7fdd8c1f4b99_1082x290.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The primary motivations for adopting this model are low development costs for teams and user agency. Low development costs arise from the ease of designing and operating protocols tailored explicitly for a single strategy, such as the basis trade. Additionally, users have the agency to switch between Type I stablecoins to gain exposure to specific strategies.</p><p>Examples of Type I stablecoins include Ondo, Ethena, Usual, Agora, Resolv, and other team-run strategy-backed synthetic assets.</p><p><em>Incentive alignment</em></p><p>The decision maker in this model is the dApp team. Naturally, they optimize for higher yield and safety to attract more users. If yield is not competitive or users lose funds, projects quickly become obsolete as more and more projects launch. As such, teams focus on continually growing TVL and maintaining competitive yields.</p><p>In theory, it is true that teams should ensure that their strategy has low risk. However, given that most of these stablecoins are incorporated in bankruptcy-remote entities, users have little regulatory or law-enforcement recourse. As such, teams do not have to prioritize optimizing user protections and transparency to the level favored by highly regulated financial institutions.</p><p><em>Trade-offs</em></p><p>The main reason that teams choose Type I stablecoin designs is simplicity. These models have low startup costs because they can focus the engineering effort on implementing a single strategy. This can also reduce the attack surface for potential exploits. Another benefit is user agency. By focusing on one or two strategies, teams return the decision-making power to users - who can move their deposits between applications as market conditions affect yields.</p><p>Unfortunately, as mentioned above, Type I stablecoins usually lack recourse. They behave like unsecured loans to application teams. If strategies result in losses, custodians blow up, or teams walk away with user deposits, users have no concrete means to recuperate their funds. Regulations are not present to protect applications if teams decide to hide behind legal structures.</p><p>Yet another essential consideration is obsolescence&#8212;no strategy can indefinitely generate above-market returns at scale. When a team decides on a particular strategy suitable to the current market condition, they can generate an extraordinary yield of over<a href="https://www.coindesk.com/business/2024/04/11/ethena-labs-divides-opinion-as-high-yield-stirs-memories-of-terra"> 30%</a>. Eventually, regardless of the team's competency, market conditions erode the alpha generated by teams, or scale dilutes their yield. This results in teams constantly searching for alternative strategies whenever market conditions change.</p><h3><strong>Type II Stablecoins: Committee-Based</strong></h3><p>One obvious solution to the problem of obsolescence is to have multiple strategies that could be run concurrently. Type II stablecoins introduce a governance dimension by establishing committees or decentralized autonomous organizations (DAOs) to delegate user deposits to various yield strategies, including Type I teams but also beyond crypto, including banks and market makers. Rather than internalizing yield generation, these DAOs collectively authorize which external parties can access the pooled capital. Compared to Type I stablecoins, this model shifts the burden of enforcement from a team to a collective.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!OoXU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c7df90c-7574-4655-9184-33d638b75312_1086x358.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!OoXU!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c7df90c-7574-4655-9184-33d638b75312_1086x358.png 424w, https://substackcdn.com/image/fetch/$s_!OoXU!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c7df90c-7574-4655-9184-33d638b75312_1086x358.png 848w, https://substackcdn.com/image/fetch/$s_!OoXU!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c7df90c-7574-4655-9184-33d638b75312_1086x358.png 1272w, https://substackcdn.com/image/fetch/$s_!OoXU!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c7df90c-7574-4655-9184-33d638b75312_1086x358.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!OoXU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c7df90c-7574-4655-9184-33d638b75312_1086x358.png" width="1086" height="358" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0c7df90c-7574-4655-9184-33d638b75312_1086x358.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:358,&quot;width&quot;:1086,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!OoXU!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c7df90c-7574-4655-9184-33d638b75312_1086x358.png 424w, https://substackcdn.com/image/fetch/$s_!OoXU!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c7df90c-7574-4655-9184-33d638b75312_1086x358.png 848w, https://substackcdn.com/image/fetch/$s_!OoXU!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c7df90c-7574-4655-9184-33d638b75312_1086x358.png 1272w, https://substackcdn.com/image/fetch/$s_!OoXU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c7df90c-7574-4655-9184-33d638b75312_1086x358.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The primary motivation for adopting this model is scalability. If the current strategy becomes unprofitable or deemed too risky, DAOs can decide to switch to a better strategy. This allows Type II stablecoins to have a stronger robustness guarantee.</p><p>Examples of Type II stablecoins include Maple and Sky (formerly MakerDAO).</p><p><em>Incentive alignment</em></p><p>Broadly, three parties can allocate capital: governance token holders, delegates, and committees.</p><p>Governance token holders are incentivized to vote to deploy capital to the most performant and scalable third-party strategies. Like Type I stablecoin teams, DAOs want their governance tokens to accrue value. Whereas governance tokens in Type I stablecoins have limited utility and thus function more like equity, Type II governance token holders can exercise more power to have a meaningful impact on the protocol. This leads them to participate in discourse in an open forum that allows DAOs to make more robust, albeit slower, decisions than a single team. Yet, we note that the governance token holders are not necessarily the most knowledgeable in risk management.</p><p>Delegates are actors who do not hold governance tokens but are instead allocated voting power by governance token holders. Large token holders like investors and founders typically delegate their voting power to professional delegates, DAO service providers, and university blockchain clubs. Delegates are bound to the best wishes of depositors only by the payments they receive for being delegates, if any. We note that no concrete alignment angles exist between delegates and dApp depositors. Delegates do not have fiduciary duties to depositors, nor do they provide legal warranties to users.</p><p>Committees are decision makers within a project assigned to a finite set of decisions. These decisions can include onboarding new collaterals, managing marketing narratives, and other core functionalities of a project. For the purpose of this analysis, we look at committees tasked with allocating user collateral for yield generation. Committees, similarly to delegates, are aligned with depositors by the monetary remuneration they receive from projects. In contrast to delegates, committees tend to have more thorough onboarding requirements. Members of these committees are typically doxxed - this adds an extra layer of protection to the extent that members value their public brands.</p><p><em>Trade-offs</em></p><p>A notable characteristic of Type II stablecoins is scalability via outsourcing. They are a layer on top of professional yield generators, including Type I stablecoins. Because markets always outperform individual teams, Type II stablecoins can harness this market-driven power to achieve yield at scale. The strategies/teams they deploy capital to change as market conditions change, with governing bodies reallocating capital based on performance and safety. In other words, Type II stablecoins have a stronger robustness guarantee than Type I stablecoins.</p><p>However, much like Type I stablecoins, recourse is not guaranteed for Type II stablecoins. If third-party teams lose funds, end users cannot recuperate funds. Given the decentralized nature of these organizations, legal recourse is also inviable.</p><p>Another important consideration for users is the corruption of groups. As seen throughout the years of DAO experiments, it is relatively straightforward to bribe and corrupt delegates, DAO voters, and committees. Special advisors positions, regular payments, and token allocations are some ways that group decision makers have been successfully corrupted in the past. This directly impacts the safety of Type II stablecoins, as corrupted decision makers can allocate capital to unsafe or malicious actors.</p><h3><strong>Type III Stablecoins: Self-Enforcing</strong></h3><p>Type III stablecoins represent a move away from subjective human decision making and towards an autonomously enforced system of common rewards and penalties. In this sense, they resemble more of a protocol than a hedge fund, as seen in other types. Immutable rules set by smart contracts replace the human decision-making process of capital allocation and recourse provision.</p><p>The primary motivations for adopting a Type III stablecoin model are safety and latency. Users are protected at the smart contract level, where they can verify the recourse if a strategy fails. Instead of relying on the good faith of dApp teams/committees or obscure legal structures, users can inspect the code to verify the safety guarantees. The latency to switch strategies is significantly reduced in open marketplaces, as they respond rapidly to shifting market dynamics without the delays inherent in governance. This allows Type III stablecoins to fully utilize the power of markets to swiftly identify and deploy multiple concurrent yield strategies.</p><p><em><strong>Today, there are no Type III stablecoins - Cap is the first stablecoin to pioneer this category.</strong></em></p><p>Cap is innovating on the first Type III stablecoin by utilizing the power of lending markets and shared security models (SSMs) to provide efficient capital allocation and credible financial guarantees. The protocol regulates the ability of third-party operators to generate yield by issuing smart contract-level rules of engagement. We recommend interested readers read the<a href="https://mirror.xyz/0x83c21bb4Bf0EC116f5a1945AaeF847Fe3b321B32/-Fw6wiyvnSV5aOYeKhaADvEqXdwngJfWMfZJuFv6iA4"> introduction article</a> for an overview of the mechanics.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!7Iwb!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa13cd157-316a-478c-842f-2a88601dac4b_1240x384.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!7Iwb!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa13cd157-316a-478c-842f-2a88601dac4b_1240x384.png 424w, https://substackcdn.com/image/fetch/$s_!7Iwb!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa13cd157-316a-478c-842f-2a88601dac4b_1240x384.png 848w, https://substackcdn.com/image/fetch/$s_!7Iwb!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa13cd157-316a-478c-842f-2a88601dac4b_1240x384.png 1272w, https://substackcdn.com/image/fetch/$s_!7Iwb!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa13cd157-316a-478c-842f-2a88601dac4b_1240x384.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!7Iwb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa13cd157-316a-478c-842f-2a88601dac4b_1240x384.png" width="1240" height="384" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a13cd157-316a-478c-842f-2a88601dac4b_1240x384.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:384,&quot;width&quot;:1240,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!7Iwb!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa13cd157-316a-478c-842f-2a88601dac4b_1240x384.png 424w, https://substackcdn.com/image/fetch/$s_!7Iwb!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa13cd157-316a-478c-842f-2a88601dac4b_1240x384.png 848w, https://substackcdn.com/image/fetch/$s_!7Iwb!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa13cd157-316a-478c-842f-2a88601dac4b_1240x384.png 1272w, https://substackcdn.com/image/fetch/$s_!7Iwb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa13cd157-316a-478c-842f-2a88601dac4b_1240x384.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Cap is a three-sided marketplace that combines operators, restakers, and end users.</p><p>Operators are financial institutions tasked with generating yield. Their participation is regulated via smart contracts and market dynamics. Before operators can borrow any asset, the protocol first checks if they are over-collateralized as commonly seen in crypto lending markets. The difference here is that rather than the operators putting up the capital themselves, which would be capital inefficient, operators receive delegations from restakers to use locked crypto assets as collateral. This restaked collateral was previously idle, and earns yield via this new use case. It is up to the operators to convince restakers to delegate stake to them.</p><p>Capital allocation to operators is economically regulated via the interest rate set by the lending market mechanism. Rather than the team deciding how much each operator should get, operators themselves self-select in and out of the protocol based on whether they can deliver yield at the current benchmark rate. The benchmark rate is also programmatically determined- it is the sum of the deposit rate at major lending markets, plus the added utilization premium at Cap. This utilization premium is calculated as a percentage of capital borrowed, indicating the competitiveness of capital provisioning at a given market condition.</p><p>Restakers are rewarded for delegating to an operator. The rate is determined as an agreement via the restaker and operator. Similarly, end users are rewarded for providing capital, where the rate is determined by the benchmark yield. The amount they receive is recorded and distributed onchain, providing transparency to the protocol.</p><p>If operators act maliciously or a black swan event occurs, such that the borrowed amount is lost, restakers are slashed. Slashing removes cryptocurrencies held as bonds by retakers to compensate end users. The slashed funds are redistributed to the end users, ensuring recourse is always available and verifiable via code.</p><p><em>Incentive alignment</em></p><p>Since third party operators cannot borrow unless they secure delegations from restakers, the decision makers in Cap are the restakers. They have the final say over which third parties can enter the protocol to generate yield.</p><p>Restakers are incentivized to make decisions because of delegation premiums provided by operators. Restaked assets have low opportunity costs and low capital premiums because they are locked crypto assets. In other words, unlike the US Dollar that is being borrowed by the operators, these assets cannot be used to generate significant returns. Hence, they are motivated to delegate to operators on SSMs to create use out of this idle value. With the power to make decisions also comes direct exposure to the outcomes of the decisions. As such, restakers are incentivized to prioritize safety over every other metric.</p><p>We note that the north star for Cap is to become a fully permissionless, governance-minimized protocol where operators and restakers can freely participate. Yet, acknowledging that the novelty of the design, in the initial phases of the protocol, both restakers and operators would be accredited institutions and whitelisted. This functions as a safety mechanism for restakers as they would have means to enter into agreements and enforce legal recourse with their counterparty.</p><p><em>Trade offs</em></p><p>The key benefit of this model is safety. Given that decision makers maintain full exposure to their decisions, retail stablecoin holders are shielded from the risk of yield generation. All rules are enforced by smart contracts, removing the need for human arbitration between those that generate yield and those that consume it. This is a notable improvement to the regulatory protections retail investors usually enjoy in traditional finance.</p><p>Much like Type II stablecoins, latency is lowered when identifying and adopting new strategies. The system has no switching costs for reallocating capital. Unlike in Type II stablecoins, no lengthy DAO and committee deliberation are needed to allocate capital. Each restaker has the power to separately allocate capital to operators concurrently.</p><p>However, we note that this model is far more complex than previous types of stablecoins. These complexities can introduce smart contract risks borne from the reliance on code to regulate the system.</p><h3><strong>Mass adoption of interest-bearing stablecoins</strong></h3><p>Yield is far from where it needs to be in order to unlock the potential DeFi has to offer. As the stablecoin market continues to grow, there will be more and more strategy backed interest-bearing stablecoins. But unless a paradigm shift happens in the fundamental design of these stablecoins, we are again bound to face the same risks and fatigue that have prevented us from scaling in the first place. Thus, it is time to grow beyond the limitations of having human judgment in the capital allocation process and create an incentive-aligned system that is more efficient, scalable, and safe.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://review.stanfordblockchain.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Stanford Blockchain Review! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[#68 - Hyperbolic: The Ultimate Deep Dive]]></title><description><![CDATA[Transforming Decentralized AI Infrastructure]]></description><link>https://review.stanfordblockchain.xyz/p/68-hyperbolic-the-ultimate-deep-dive</link><guid isPermaLink="false">https://review.stanfordblockchain.xyz/p/68-hyperbolic-the-ultimate-deep-dive</guid><dc:creator><![CDATA[Stanford Blockchain Club]]></dc:creator><pubDate>Tue, 11 Mar 2025 17:30:54 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Ds9Z!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c3da770-2bb0-45f6-ac48-94a3dd94d58e_1766x936.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Ds9Z!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c3da770-2bb0-45f6-ac48-94a3dd94d58e_1766x936.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Ds9Z!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c3da770-2bb0-45f6-ac48-94a3dd94d58e_1766x936.png 424w, https://substackcdn.com/image/fetch/$s_!Ds9Z!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c3da770-2bb0-45f6-ac48-94a3dd94d58e_1766x936.png 848w, https://substackcdn.com/image/fetch/$s_!Ds9Z!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c3da770-2bb0-45f6-ac48-94a3dd94d58e_1766x936.png 1272w, https://substackcdn.com/image/fetch/$s_!Ds9Z!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c3da770-2bb0-45f6-ac48-94a3dd94d58e_1766x936.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Ds9Z!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c3da770-2bb0-45f6-ac48-94a3dd94d58e_1766x936.png" width="1456" height="772" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9c3da770-2bb0-45f6-ac48-94a3dd94d58e_1766x936.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:772,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:339371,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://review.stanfordblockchain.xyz/i/158646629?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c3da770-2bb0-45f6-ac48-94a3dd94d58e_1766x936.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Ds9Z!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c3da770-2bb0-45f6-ac48-94a3dd94d58e_1766x936.png 424w, https://substackcdn.com/image/fetch/$s_!Ds9Z!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c3da770-2bb0-45f6-ac48-94a3dd94d58e_1766x936.png 848w, https://substackcdn.com/image/fetch/$s_!Ds9Z!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c3da770-2bb0-45f6-ac48-94a3dd94d58e_1766x936.png 1272w, https://substackcdn.com/image/fetch/$s_!Ds9Z!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c3da770-2bb0-45f6-ac48-94a3dd94d58e_1766x936.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="pullquote"><p><em><strong>Stanford Blockchain Review<br></strong>Volume 7, Article No. 8</em></p><p><em>&#9997;&#127995; Author: </em><a href="https://x.com/hyperbolic_labs">Hyperbolic Labs</a></p><p><em>&#11088;&#65039; Technical Prerequisite: Intermediate</em></p></div><h2><strong>Introduction: The Foundation of Trust in Decentralized AI</strong></h2><p>Trust is the foundation of artificial intelligence. Without it, even the most powerful AI models are just black boxes generating unreliable outputs. At Hyperbolic, we are champions of decentralized AI infrastructure. This truth becomes even more critical when we adopt decentralization for AI&#8212;a move that promises greater accessibility and lower costs, but introduces new challenges in ensuring reliable results.</p><p>At Hyperbolic, we&#8217;re building a decentralized AI Cloud to democratize access to AI and push AI&#8217;s evolution forward. Today, we power 100,000+ developers with compute and inference. We are solving three pain points in AI today: Access to compute, Verifiability of AI Outputs, and Privacy of user data in decentralized AI systems.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://review.stanfordblockchain.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Stanford Blockchain Review! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2><strong>The AI Accessibility Paradox</strong></h2><p>The acceleration of AI development has created an unfortunate paradox: while open-source AI models are theoretically available to everyone, actually using and implementing them remains out of reach for most. In today's rapidly evolving AI landscape, startups, developers, and researchers face significant challenges accessing the compute they need from traditional cloud providers to keep pace with their ideas.</p><p>Currently, sources of compute are centralized with companies such as AWS, Azure, and Google Cloud, creating an impression of scarcity of this valuable resource and allowing these providers to charge inflated prices. The cost of inference is becoming prohibitive as centralized inference platforms charge premium rates that can quickly drain development budgets, forcing teams to limit their experimentation or abandon promising projects entirely. The current pricing is heavily subsidized, but if inference is only controlled by centralized platforms, they will have the control to raise prices and trap developers.</p><p>Further, should a developer be able to afford compute from these sources, the inflexibility and complexity of implementing these solutions also serve as prohibitive barriers to innovation and scalability. Meanwhile, the growing gap between model release and availability has become an ever-widening chasm, difficult to cross.</p><p>A vast amount of GPU resources in data centers, mining farms, and individual machines worldwide remain underutilized while 2 billion computers around the world sit idle for over 19 hours a day. A common situation has also emerged where companies reserve machines from data centers for years, only to abandon strategies that leave their purchased resources unused. These scenarios all represent missed opportunities for monetization and efficient utilization.</p><p>Clearly GPU resources are not scarce, just uncoordinated. Without a way to connect those in need with those sitting on this golden resource, global GPU usage remains exceedingly inefficient and limits productivity in the field of AI.</p><p>These challenges make it clear that while a select few large organizations have the resources to leverage AI's full potential, the broader AI community remains constrained by accessibility barriers.</p><h2><strong>Hyperbolic's Integrated Solution Stack</strong></h2><p>Hyperbolic is creating an open and accessible AI ecosystem, where AI inference is available to all, democratizing this paradigm-shifting technology. Today, our solution stack consists of three core components that work seamlessly together:</p><ol><li><p><strong>Hyper-dOS</strong>: Our decentralized operating system that coordinates globally distributed GPU resources.</p></li><li><p><strong>GPU Marketplace</strong>: Our platform connecting GPU suppliers with those who need compute resources.</p></li><li><p><strong>Inference Service</strong>: Access the latest open-source models, at a fraction of the cost.</p></li><li><p><strong>Agent Framework</strong>: Tools powered by Hyperbolic which allows for autonomous intelligence allowing agents to tap into our network, enabling them to evolve, self-replicate, and scale beyond limitations.</p></li></ol><p>In the future, we will implement our groundbreaking <a href="https://hyperbolic.xyz/blog/hyperbolic-introduces-novel-practical-solution-to-the-problem-of-verification-in-decentralized-ai?utm_source=stanford_blockchain">Proof of Sampling (PoSP) protocol</a>&#8212;the gold standard for verifying AI outputs. Developed in collaboration with researchers from UC Berkeley and Columbia University, PoSP addresses the trust problem in decentralized AI while preserving the cost advantages of decentralization.</p><p>We will also introduce a privacy layer for confidential computing, leveraging advanced cryptographic techniques to safeguard data and computations. This ensures strict confidentiality and privacy, allowing even Web2 enterprises with stringent data policies to securely utilize our network with the necessary security and privacy protections.</p><p>Let's dive deeper into each component to understand how Hyperbolic is systematically dismantling the barriers to AI accessibility.</p><h2><strong>Hyper-dOS: The Backbone of Decentralized Compute</strong></h2><p>The Hyperbolic Decentralized Operating System (Hyper-dOS) was developed to provide a robust and scalable backend architecture to efficiently manage a vast network of globally distributed GPUs. These compute resources are organized into a solar system-like network as independent planets coordinated by a sun cluster that governs and sustains each planetary cluster. This central cluster provides essential services and support to ensure the stability and efficiency of the overall system.</p><p>Hyper-dOS is so easy to use that, once installed on an underutilized machine, its compute power is seamlessly integrated with our distributed network in minutes for AI builders to quickly and easily rent scalable and cost-effective compute.</p><h2><strong>Hyperbolic&#8217;s GPU Marketplace: AI Compute at Global Scale</strong></h2><p>Compute is the limiting factor of AI. The more intelligence scales, the more power it demands. And yet, access remains locked in the hands of a few. AWS, Google, and OpenAI dictate availability, throttle supply, and extract value from the very builders driving innovation. It is a system built on scarcity, and it will not last.</p><p>Hyperbolic&#8217;s <a href="http://app.hyperbolic.xyz/compute?utm_source=stanford_blockchain">GPU Marketplace</a> is changing that. We coordinate a globally distributed compute network that removes the artificial constraints imposed by cloud monopolies.</p><ul><li><p><strong>Permissionless access</strong>&#8212;anyone can contribute or utilize compute resources in under a minute.</p></li><li><p><strong>Cost reductions of up to 75%</strong>&#8212;because AI should not be priced out of reach.</p></li><li><p><strong>A network already running at scale</strong>&#8212;powering Stanford, NYU, Cornell, and the most advanced AI startups today.</p></li></ul><p>This is not an experiment. It is not a testnet. Hyperbolic is live, in production, and expanding. If you are building AI, you will need compute, and if you need compute, you will end up here.</p><h2><strong>Hyperbolic&#8217;s Inference Service: Open-Source Intelligence at a Fraction of the Cost</strong></h2><p>AI is only as good as the models that power it. But those models remain locked behind restrictive APIs, inaccessible infrastructure, and corporate gatekeeping. Open-source AI should not be an afterthought&#8212;it should be the foundation.</p><p>Hyperbolic&#8217;s <a href="http://app.hyperbolic.xyz/models?utm_source=stanford_blockchain">Inference Service</a> gives developers frictionless access to cutting-edge models, without compromising privacy or control. With Hyperbolic you get access to:</p><ul><li><p><strong>The latest open-source models</strong>&#8212;served on a decentralized network, optimized for efficiency.</p></li><li><p><strong>Absolute privacy</strong>&#8212;no prompt or output data is ever stored on our servers.</p></li><li><p><strong>A cost model built for builders</strong>&#8212;because experimentation should not be a luxury.</p></li></ul><p>We are already powering Andrej Karpathy, former director of AI at Tesla and OpenAI founding member. We support 38+ models, with 100,000+ developers building on our platform today.</p><p>AI is moving too fast to be waiting for permission. With Hyperbolic, you don&#8217;t have to.</p><h2><strong>Proof of Sampling (PoSP): The Gold Standard in Decentralized Verification</strong></h2><h3><strong>The Decentralized AI Verification Problem</strong></h3><p>Trusting the behavior of third party nodes poses a different challenge. How can one be certain that their inference output from a third-party node is valid?</p><p>Verification has been a challenge for decentralized technologies for a long time, with just a few methodologies emerging to address the issue. These traditional verification methods often rely on redundant computation or complex cryptographic proofs, which can introduce significant computational overhead to the system.</p><p>While such time and computation-heavy methods may have worked for the cryptographic use cases required in decentralized finance, they do not present as a practical solution for verification in decentralized AI inference. It isn't realistic to expect users of AI to wait for 10 days as the generated result of their request is verified. Further, current verification best practices can increase the cost of inference by up to 300%, negating any previously held cost advantage of decentralized GPU networks.</p><p>While decentralization promises to democratize access to AI, solutions often lack robust verification mechanisms, leaving developers uncertain about the reliability and consistency of their results. In the absence of trusted verification mechanisms, many remain hesitant to build on decentralized infrastructure&#8212;so does it really democratize access?</p><p>Trust in decentralized systems requires more than promises.</p><h3><strong>Hyperbolic's Game-Theoretical Approach to Verification</strong></h3><p>Hyperbolic's novel <a href="https://hyperbolic.xyz/blog/proof-of-sampling-posp-breakdown?utm_source=stanford_blockchain">Proof of Sampling (PoSP)</a> takes a fundamentally different approach to verification. Developed by our co-founder and CEO Jasper Zhang in collaboration with researchers from UC Berkeley and Columbia University, it secures the decentralized network by relying on a Nash Equilibrium-like approach to verifying outputs.</p><p>A Nash Equilibrium can be easily understood in the context of a train ticket verification system. Say a ticket costs $10, and to increase efficiency by reducing the number of train conductors that are required on each train, tickets are checked via a random sample of travelers with a $100 fine if a traveler is found to be without a ticket. One would think that this would open the door for grifters to feel more confident boarding the train without a ticket and thus getting a free ride. Logically, however, if the train conductors check just 1 in 10 tickets, there is a 10% chance that a grifter would need to pay a $100 fine, which works out to $10 for every ride in 10 rides, the same cost as the ticket. The optimized random sampling rate removes any incentive for a rider to act dishonestly while allowing for greatest possible efficiency for the train conductors.</p><p>Just as the train conductors don't have to check 100% of the tickets and are still able to ensure that 100% of the riders pay for their tickets, PoSP saves the computational time and energy of checking outputs from all nodes, and instead verifies a strategic proportion of outputs.</p><h3><strong>How PoSP Works in Practice</strong></h3><p>When implemented, the verification process begins when a client submits an inference request to the Hyperbolic network. The request is assigned to available third-party nodes based on computational requirements. Meanwhile, the system computes the appropriate verification sampling rate based on node reputation and stake, increasing for newer nodes in the network and decreasing for more nodes that have been proven reliable.</p><p>If an output is selected for verification, the system duplicates the work on trusted validator nodes. Should a validator find that the output is invalid, it will send the computation back through the orchestrator to trigger an arbitration process.</p><p>Because the cost of arbitration and the probability of validation are established to remain as a Nash Equilibrium, we have created a system where honest computation is the dominant strategy for participating GPUs. We have thus avoided having to spend the computational energy on checking every single result from our decentralized network, maintaining cost efficiency and ensuring practical usability.</p><p>PoSP ensures that every inference run on our network is verified without the significant computational overhead of other verification mechanisms, combining the benefits of decentralization with the reliability of traditional centralized systems. This represents a fundamental breakthrough in making the utilization of coordinated decentralized GPU resources both trustworthy and cost-effective.</p><h2><strong>Hyperbolic&#8217;s Agent Framework: The Future of Autonomous Intelligence</strong></h2><p>AI is evolving. It is moving beyond static models, beyond single-use applications. Autonomous intelligence is emerging&#8212;agents that act, adapt, and evolve without human intervention. But without infrastructure to support them, they remain locked in research papers and theoretical discussions.</p><p>Hyperbolic&#8217;s Agent Framework is designed for this future.</p><ul><li><p><strong>Self-evolving intelligence</strong>&#8212;AI that adapts in real time, without retraining.</p></li><li><p><strong>Scalable AI agents</strong>&#8212;capable of operating autonomously across distributed networks.</p></li><li><p><strong>A foundation for collective intelligence</strong>&#8212;where AI collaborates beyond human-defined constraints.</p></li></ul><h2><strong>The Future of AI with Hyperbolic</strong></h2><p>As we continue to push the boundaries of what's possible in AI infrastructure, our commitment to empowering developers with the tools they need to build the future of AI remains consistent. The combination of our rapid model deployment, superior precision, comprehensive model selection, and groundbreaking cost efficiency creates an environment where innovation can flourish.</p><p>At Hyperbolic, our mission is to build an open and accessible AI ecosystem. With our integrated solution stack&#8212;Hyper-dOS, Proof of Sampling, GPU Marketplace, Inference Service, and Agent Framework&#8212;we are empowering AI builders looking to shape the future of AI by making resources available to all.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://review.stanfordblockchain.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Stanford Blockchain Review! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[#67 - MegaETH: Building a Real-Time Blockchain]]></title><description><![CDATA[Putting Performance First]]></description><link>https://review.stanfordblockchain.xyz/p/66-megaeth-building-a-real-time-blockchain</link><guid isPermaLink="false">https://review.stanfordblockchain.xyz/p/66-megaeth-building-a-real-time-blockchain</guid><dc:creator><![CDATA[Stanford Blockchain Club]]></dc:creator><pubDate>Tue, 25 Feb 2025 18:01:36 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!NfFd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a7373f8-df7f-497c-8a4b-e073804c8579_1280x427.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!NfFd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a7373f8-df7f-497c-8a4b-e073804c8579_1280x427.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!NfFd!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a7373f8-df7f-497c-8a4b-e073804c8579_1280x427.jpeg 424w, https://substackcdn.com/image/fetch/$s_!NfFd!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a7373f8-df7f-497c-8a4b-e073804c8579_1280x427.jpeg 848w, https://substackcdn.com/image/fetch/$s_!NfFd!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a7373f8-df7f-497c-8a4b-e073804c8579_1280x427.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!NfFd!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a7373f8-df7f-497c-8a4b-e073804c8579_1280x427.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!NfFd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a7373f8-df7f-497c-8a4b-e073804c8579_1280x427.jpeg" width="1280" height="427" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3a7373f8-df7f-497c-8a4b-e073804c8579_1280x427.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:427,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:66128,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://review.stanfordblockchain.xyz/i/157529069?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a7373f8-df7f-497c-8a4b-e073804c8579_1280x427.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!NfFd!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a7373f8-df7f-497c-8a4b-e073804c8579_1280x427.jpeg 424w, https://substackcdn.com/image/fetch/$s_!NfFd!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a7373f8-df7f-497c-8a4b-e073804c8579_1280x427.jpeg 848w, https://substackcdn.com/image/fetch/$s_!NfFd!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a7373f8-df7f-497c-8a4b-e073804c8579_1280x427.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!NfFd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a7373f8-df7f-497c-8a4b-e073804c8579_1280x427.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="pullquote"><p><em><strong>Stanford Blockchain Review<br></strong>Volume 7, Article No. 7</em></p><p><em>&#9997;&#127995; Author: </em><a href="https://x.com/0xSami_M">Sami</a> &#8212; DevRel at <a href="https://x.com/megaeth_labs">MegaETH</a></p><p><em>&#11088;&#65039; Technical Prerequisite: Intermediate</em></p></div><p>At MegaETH, performance isn&#8217;t an afterthought&#8212; it&#8217;s the bedrock of what we&#8217;re building. Our blockchain is designed from the ground up with the north stars of providing high throughput and more importantly, low latency, to enable apps that were previously impossible. In this article, we&#8217;ll explore our design philosophy, the approaches we&#8217;ve taken, the tradeoffs we embrace and the benchmarking to support our claims&#8212; all of which we wear proudly and unapologetically.</p><h3>Understanding Latency</h3><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!arkw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F086d9fc4-6147-4d62-966e-903653cff6a2_1603x370.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!arkw!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F086d9fc4-6147-4d62-966e-903653cff6a2_1603x370.png 424w, https://substackcdn.com/image/fetch/$s_!arkw!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F086d9fc4-6147-4d62-966e-903653cff6a2_1603x370.png 848w, https://substackcdn.com/image/fetch/$s_!arkw!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F086d9fc4-6147-4d62-966e-903653cff6a2_1603x370.png 1272w, https://substackcdn.com/image/fetch/$s_!arkw!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F086d9fc4-6147-4d62-966e-903653cff6a2_1603x370.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!arkw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F086d9fc4-6147-4d62-966e-903653cff6a2_1603x370.png" width="1456" height="336" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/086d9fc4-6147-4d62-966e-903653cff6a2_1603x370.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:336,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!arkw!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F086d9fc4-6147-4d62-966e-903653cff6a2_1603x370.png 424w, https://substackcdn.com/image/fetch/$s_!arkw!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F086d9fc4-6147-4d62-966e-903653cff6a2_1603x370.png 848w, https://substackcdn.com/image/fetch/$s_!arkw!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F086d9fc4-6147-4d62-966e-903653cff6a2_1603x370.png 1272w, https://substackcdn.com/image/fetch/$s_!arkw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F086d9fc4-6147-4d62-966e-903653cff6a2_1603x370.png 1456w" sizes="100vw"></picture><div></div></div></a><figcaption class="image-caption">Figure 1: Example Life Cycle of End-To-End Latency</figcaption></figure></div><p>Let&#8217;s begin with an overview of the lifecycle of end-to-end latency. A given transaction will begin in your browser at home and needs to travel to the block producer. This first step, often referred to as the &#8216;speed-of-light propagation delay&#8217;, takes ~100ms for most city pairs. Short of colocating with the block producer&#8212;which may only be necessary for latency-critical applications such as on-chain CLOBS&#8212;there isn&#8217;t much that can physically be done to optimize this stage.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://review.stanfordblockchain.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Stanford Blockchain Review! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Once a transaction arrives at a block producer, we enter the domain of block time, where the transaction will likely wait in a memory pool before it is batched, sequenced, and executed. On Ethereum mainnet, this process takes around 12s, whereas performance focused blockchains bring it down to 1-2s.</p><p>Lastly, a receipt needs to travel back to the user, adding another ~100ms. Given that the propagation delays are a physical limit, and relatively insignificant, this article will focus on the part that can be optimized&#8212; block times.</p><h3>Sequencing &amp; DA</h3><p>Above, I mentioned that a transaction must wait in a memory pool before being sequenced&#8212; that&#8217;s not strictly true and is a byproduct of batched sequencing. Conventional sequencing is done via a consensus algorithm, which, no matter how optimized, requires sending messages at least twice around the world (here we&#8217;re not allowed to relinquish responsibility for speed of light delays).</p><p>By replacing the consensus algorithm with centralized block production, we eliminate the need for coordination between multiple parties to produce blocks. This allows the active server to process transactions as a continuous stream, rather than having them queue to be batched, minimizing the idle time between blocks.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!vjoW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20b9b02d-ec8b-47f8-8c7e-c3f40ae1873f_1092x388.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!vjoW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20b9b02d-ec8b-47f8-8c7e-c3f40ae1873f_1092x388.png 424w, https://substackcdn.com/image/fetch/$s_!vjoW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20b9b02d-ec8b-47f8-8c7e-c3f40ae1873f_1092x388.png 848w, https://substackcdn.com/image/fetch/$s_!vjoW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20b9b02d-ec8b-47f8-8c7e-c3f40ae1873f_1092x388.png 1272w, https://substackcdn.com/image/fetch/$s_!vjoW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20b9b02d-ec8b-47f8-8c7e-c3f40ae1873f_1092x388.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!vjoW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20b9b02d-ec8b-47f8-8c7e-c3f40ae1873f_1092x388.png" width="1092" height="388" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/20b9b02d-ec8b-47f8-8c7e-c3f40ae1873f_1092x388.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:388,&quot;width&quot;:1092,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!vjoW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20b9b02d-ec8b-47f8-8c7e-c3f40ae1873f_1092x388.png 424w, https://substackcdn.com/image/fetch/$s_!vjoW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20b9b02d-ec8b-47f8-8c7e-c3f40ae1873f_1092x388.png 848w, https://substackcdn.com/image/fetch/$s_!vjoW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20b9b02d-ec8b-47f8-8c7e-c3f40ae1873f_1092x388.png 1272w, https://substackcdn.com/image/fetch/$s_!vjoW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20b9b02d-ec8b-47f8-8c7e-c3f40ae1873f_1092x388.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Figure 2: Real photograph of the MegaETH sequencer hard at work</figcaption></figure></div><p>Here we introduce a key tradeoff&#8212;centralized block production. Simply removing consensus and expecting a chain to remain secure is absurd, <em>unless</em> you build it on top of a properly decentralized Layer 1. This architecture was actually proposed by Vitalik Buterin in a 2021 blogpost titled <em>Endgame</em> (<a href="https://vitalik.eth.limo/general/2021/12/06/endgame.html">https://vitalik.eth.limo/general/2021/12/06/endgame.html</a>), where he concludes that all solutions to scale a blockchain inevitably lead to centralized block production.</p><p>But this illustrates something important that sets us apart: we don&#8217;t believe in reinventing the wheel, nor are we so arrogant as to think we can do everything best. Instead, we defer security to proven decentralized systems like Ethereum mainnet and EigenDA, allowing us to focus on performance.</p><h3><strong>Measure, Then Build</strong></h3><p>The next thing that sets us apart from other blockchains is the initial approach we took to designing our execution layer. Rather than making assumptions or guessing where improvements can be made, we decided to really understand the existing state of the art first. Unfortunately, finding up-to-date performance data proved to be difficult, which explains why the limitations of current systems are often poorly understood by most outside of their core engineering teams.</p><p>To address this, we took a methodical approach to experimentation (i.e. started from the ground up (i.e. i.e. decided to measure, then build)). This level of control and granularity allowed us to isolate and analyze specific bottlenecks.</p><p>&#8212; skip if not interested &#8212;</p><p>Test configuration:</p><p><strong>CPU:</strong> Intel Xeon w5-2465X (16 core @ 3.1GHz)</p><p><strong>RAM:</strong> Samsung 512G DDR5-4800</p><p><strong>Disk:</strong> Intel SSD D7-P5510 7.68 TB (NVMe PCIe 4.0)</p><p>We started by using the Linux <code>cgroup</code> command to simulate machines with varying memory sizes. This allowed us to test cases such as limited memory and high-load. Then, we performed both historical sync and live sync experiments under various memory scenarios to attain a clear understanding of the limiting factors of execution clients, and how they evolve with different modes.</p><p>&#8212; come back! &#8212;</p><h4><strong>Important to know:</strong></h4><ul><li><p>Historical Sync refers to syncing past blocks on a blockchain, without the need for real-time updates of state changes.</p></li><li><p>Live Sync is the process of syncing the blockchain while it is actively being updated, requiring continuous state updates and writing to the database after each block.</p></li></ul><h3>EVM Overhead</h3><p>To isolate execution layer performance without database I/O distorting results, we ran a historical sync using 512GB memory, persisting changes every 500k blocks.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!uJJ5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19f60f8d-8214-4303-b41d-cc7b135bf31a_1502x626.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!uJJ5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19f60f8d-8214-4303-b41d-cc7b135bf31a_1502x626.png 424w, https://substackcdn.com/image/fetch/$s_!uJJ5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19f60f8d-8214-4303-b41d-cc7b135bf31a_1502x626.png 848w, https://substackcdn.com/image/fetch/$s_!uJJ5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19f60f8d-8214-4303-b41d-cc7b135bf31a_1502x626.png 1272w, https://substackcdn.com/image/fetch/$s_!uJJ5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19f60f8d-8214-4303-b41d-cc7b135bf31a_1502x626.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!uJJ5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19f60f8d-8214-4303-b41d-cc7b135bf31a_1502x626.png" width="1456" height="607" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/19f60f8d-8214-4303-b41d-cc7b135bf31a_1502x626.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:607,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!uJJ5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19f60f8d-8214-4303-b41d-cc7b135bf31a_1502x626.png 424w, https://substackcdn.com/image/fetch/$s_!uJJ5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19f60f8d-8214-4303-b41d-cc7b135bf31a_1502x626.png 848w, https://substackcdn.com/image/fetch/$s_!uJJ5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19f60f8d-8214-4303-b41d-cc7b135bf31a_1502x626.png 1272w, https://substackcdn.com/image/fetch/$s_!uJJ5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19f60f8d-8214-4303-b41d-cc7b135bf31a_1502x626.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Figure 3: Historical sync: 512GB memory, persist every 500k blocks</figcaption></figure></div><p>Looking at the transactions per second (TPS) of the first 18 million Ethereum mainnet blocks, we see that TPS averages at ~14,000 in the last million blocks. The TPS volatility preceding this can be attributed to transactions being less complex closer to genesis.</p><p>Now, is 14k TPS slow? Of course not. But is it fast enough for the <a href="https://static.megaeth.com/Revisiting%20The%20World%20Computer.pdf">World Computer</a>? Unfortunately not. (Also, consider that this is not true TPS&#8212; it&#8217;s artificially high as disk I/O overhead is omitted).</p><p>To understand this constraint, we analyzed the time breakdown of a common smart contract when it is interpreted by the EVM. We then compared this to the same smart contract, but with its bytecode precompiled to native instructions before execution.</p><p>This highlighted a significant bottleneck in the EVM&#8217;s real-time translation of bytecode into CPU instructions, which occurs because smart contracts are compiled into bytecode and interpreted during execution. To alleviate this, we implemented Just-In-Time (JIT) compilation, which automatically translates the EVM bytecode into native machine code before execution. Testing against the most recent historic transactions from the ETH mainnet (as of January 2025) has resulted in substantial performance boosts for both average and compute-intensive applications.</p><h3>State Update Overhead</h3><p>In Figure 3 we found that the historical sync of the last million blocks achieved 14,000 TPS. When we transition this to live sync&#8212;which requires the update of the state root after each block&#8212;the average TPS for the same million blocks drops down to around 1000 TPS.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!aP5t!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb4d08ca-484d-4d8a-9e6d-18b293793a8f_1508x604.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!aP5t!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb4d08ca-484d-4d8a-9e6d-18b293793a8f_1508x604.png 424w, https://substackcdn.com/image/fetch/$s_!aP5t!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb4d08ca-484d-4d8a-9e6d-18b293793a8f_1508x604.png 848w, https://substackcdn.com/image/fetch/$s_!aP5t!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb4d08ca-484d-4d8a-9e6d-18b293793a8f_1508x604.png 1272w, https://substackcdn.com/image/fetch/$s_!aP5t!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb4d08ca-484d-4d8a-9e6d-18b293793a8f_1508x604.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!aP5t!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb4d08ca-484d-4d8a-9e6d-18b293793a8f_1508x604.png" width="1456" height="583" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/eb4d08ca-484d-4d8a-9e6d-18b293793a8f_1508x604.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:583,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!aP5t!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb4d08ca-484d-4d8a-9e6d-18b293793a8f_1508x604.png 424w, https://substackcdn.com/image/fetch/$s_!aP5t!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb4d08ca-484d-4d8a-9e6d-18b293793a8f_1508x604.png 848w, https://substackcdn.com/image/fetch/$s_!aP5t!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb4d08ca-484d-4d8a-9e6d-18b293793a8f_1508x604.png 1272w, https://substackcdn.com/image/fetch/$s_!aP5t!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb4d08ca-484d-4d8a-9e6d-18b293793a8f_1508x604.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Figure 4: TPS comparison between historic sync &amp; live sync</figcaption></figure></div><p>The 14x slowdown between historical sync and live sync can be attributed to two primary factors:</p><ol><li><p>Merkleization Cost: Updating the state root through merkleization causes a 9.3x slowdown, even when the entire Merkle Patricia Trie (MPT) fits in memory. This is due to the need for extensive tree traversals to locate and modify nodes, and the fact that numerous nodes must be read before they can be modified.</p></li><li><p>State Writing: Writing the state changes to the database after each block incurs an additional 1.5x slowdown.</p></li></ol><p>To minimize the number of database I/Os required during state updates, we replaced the traditional MPT with a newly designed state trie which significantly reduces disk I/O when updating the state. Additionally, due to the write-intensive nature of the application, we opted for a database optimized for writes.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!B3pn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99ce15cb-e933-4c3c-ae7e-d46f88b40b74_1024x393.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!B3pn!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99ce15cb-e933-4c3c-ae7e-d46f88b40b74_1024x393.png 424w, https://substackcdn.com/image/fetch/$s_!B3pn!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99ce15cb-e933-4c3c-ae7e-d46f88b40b74_1024x393.png 848w, https://substackcdn.com/image/fetch/$s_!B3pn!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99ce15cb-e933-4c3c-ae7e-d46f88b40b74_1024x393.png 1272w, https://substackcdn.com/image/fetch/$s_!B3pn!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99ce15cb-e933-4c3c-ae7e-d46f88b40b74_1024x393.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!B3pn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99ce15cb-e933-4c3c-ae7e-d46f88b40b74_1024x393.png" width="1024" height="393" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/99ce15cb-e933-4c3c-ae7e-d46f88b40b74_1024x393.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:393,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!B3pn!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99ce15cb-e933-4c3c-ae7e-d46f88b40b74_1024x393.png 424w, https://substackcdn.com/image/fetch/$s_!B3pn!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99ce15cb-e933-4c3c-ae7e-d46f88b40b74_1024x393.png 848w, https://substackcdn.com/image/fetch/$s_!B3pn!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99ce15cb-e933-4c3c-ae7e-d46f88b40b74_1024x393.png 1272w, https://substackcdn.com/image/fetch/$s_!B3pn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99ce15cb-e933-4c3c-ae7e-d46f88b40b74_1024x393.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Figure 5: Non-optimized vs. In-Memory Computation optimized block builder</figcaption></figure></div><p>Further analysis presented a fundamental problem with state access during the execution layer: over 80% of the time is spent on database I/O, with less than 20% on actual transaction execution. By moving the entire state into memory&#8212;effectively caching all state data&#8212;we were able to minimize disk access to just ~10% of the block assembly time.</p><h3>A Real-Time Blockchain</h3><p>Today, through the optimizations outlined above (along with many others), we&#8217;re able to reach 10ms block times, even under extreme loads (think 100k TPS). This level of performance empowers developers to build the apps that, they were previously told, are impossible on-chain.</p><p><strong>A real-time blockchain will only be realized if we don&#8217;t apologize for putting performance first.</strong></p><h3>Author</h3><p><a href="https://x.com/0xSami_M">Sami Muduroglu</a> leads Developer Relations at MegaETH, overseeing developer onboarding and optimizing the developer experience. He has a keen interest in applied cryptography and high-performance systems. He is currently on leave from Brown University, where he studies Applied Mathematics and Computer Science. He has previously conducted research on how cloud contamination biases satellite observations of Arctic sea ice and worked in industry designing aerial radar-based landmine detection systems.</p><p><em>Huge thanks to Yilong Li for spearheading the research and Lei Yang for guidance and countless contributions.</em></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://review.stanfordblockchain.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Stanford Blockchain Review! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[#66 - Beyond Digital Gold: Bitcoin's Evolution into a Full-Service Blockchain Platform]]></title><description><![CDATA[Magic Eden perspective of Bitcoin's Transformation from Store of Value to Web3 Infrastructure]]></description><link>https://review.stanfordblockchain.xyz/p/67-beyond-digital-gold-bitcoins-evolution</link><guid isPermaLink="false">https://review.stanfordblockchain.xyz/p/67-beyond-digital-gold-bitcoins-evolution</guid><dc:creator><![CDATA[Stanford Blockchain Club]]></dc:creator><pubDate>Thu, 20 Feb 2025 22:10:35 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!XzGu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bb3146f-f1af-4f37-88a2-73265dccc6ef_1280x876.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!XzGu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bb3146f-f1af-4f37-88a2-73265dccc6ef_1280x876.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!XzGu!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bb3146f-f1af-4f37-88a2-73265dccc6ef_1280x876.jpeg 424w, https://substackcdn.com/image/fetch/$s_!XzGu!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bb3146f-f1af-4f37-88a2-73265dccc6ef_1280x876.jpeg 848w, https://substackcdn.com/image/fetch/$s_!XzGu!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bb3146f-f1af-4f37-88a2-73265dccc6ef_1280x876.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!XzGu!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bb3146f-f1af-4f37-88a2-73265dccc6ef_1280x876.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!XzGu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bb3146f-f1af-4f37-88a2-73265dccc6ef_1280x876.jpeg" width="1280" height="876" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0bb3146f-f1af-4f37-88a2-73265dccc6ef_1280x876.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:876,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:93671,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://review.stanfordblockchain.xyz/i/157527688?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bb3146f-f1af-4f37-88a2-73265dccc6ef_1280x876.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!XzGu!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bb3146f-f1af-4f37-88a2-73265dccc6ef_1280x876.jpeg 424w, https://substackcdn.com/image/fetch/$s_!XzGu!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bb3146f-f1af-4f37-88a2-73265dccc6ef_1280x876.jpeg 848w, https://substackcdn.com/image/fetch/$s_!XzGu!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bb3146f-f1af-4f37-88a2-73265dccc6ef_1280x876.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!XzGu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bb3146f-f1af-4f37-88a2-73265dccc6ef_1280x876.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="pullquote"><p><em><strong>Stanford Blockchain Review<br></strong>Volume 7, Article No. 6</em></p><p><em>&#9997;&#127995; Author: </em><a href="https://www.linkedin.com/in/matthewswetz/">Matthew Swetz</a> &#8212; Head of Bitcoin Product at <a href="https://www.google.com/search?q=magic+eden&amp;oq=magic+eden+&amp;gs_lcrp=EgZjaHJvbWUqBwgAEAAYjwIyBwgAEAAYjwIyDAgBEAAYFBiHAhiABDIMCAIQABgUGIcCGIAEMgcIAxAAGIAEMgcIBBAAGIAEMgYIBRBFGEAyBwgGEAAYgAQyBggHEEUYPNIBCDI4NzBqMGo3qAIAsAIA&amp;sourceid=chrome&amp;ie=UTF-8">Magic Eden</a></p><p><em>&#11088;&#65039; Technical Prerequisite: Low</em></p></div><p>Bitcoin is digital gold. This idea has been widely embraced by crypto industry leaders for years, and recently respected by mainstream financial figures and institutions. As the first cryptocurrency, Bitcoin laid the foundation for the rapidly evolving ecosystem we have today. But while its reputation as a store of value is well-established, Bitcoin has recently proved itself to be far more than just a hedge against inflation. The future of Bitcoin, and the broader crypto landscape, lies in developing Bitcoin&#8217;s untapped potential as a canvas for alternative assets, digital art &amp; media, &amp; the cornerstone of decentralized finance. At Magic Eden, we&#8217;re at the forefront of this revolution, building new meaning directly on the Bitcoin blockchain.</p><h3><strong>Unlocking Bitcoin&#8217;s Potential</strong></h3><p>For years within the crytpo community, Bitcoin has been referred to as digital gold, a label that is now gaining broader acceptance across global financial and economic sectors. Many high-profile individuals, such as BlackRock CEO Larry Fink and President Donald Trump, have voiced their belief in Bitcoin as a store of value. Even Jerome Powell, the chair of the US Federal Reserve, has acknowledged Bitcoin akin to digital gold and encouraged banks to service crypto companies.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://review.stanfordblockchain.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Stanford Blockchain Review! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>This acceptance has led to an increasing number of corporations and nation-states &#8220;stacking sats&#8221; by holding Bitcoin on their balance sheets as a store of wealth and to hedge against inflation and de-dollarization. This broader recognition is a testament to Bitcoin&#8217;s durability and growing influence in the global financial system.</p><p>But what if Bitcoin can be more than just digital gold?</p><p>When Bitcoin was created as the first cryptocurrency in 2009, the Bitcoin blockchain itself served simply as a means to store and transfer Bitcoin in a peer-to-peer decentralized network. Over time however, builders and cryptocurrency enthusiasts recognized the potential of blockchain technology outside of a store of value. Other blockchains such as Ethereum and Solana, emerged to introduce new capabilities and features that the Bitcoin blockchain was not able to support. These capabilities include decentralized finance (DeFi), non-fungible tokens (NFTs), decentralized applications (dApps), smart contracts, and new fungible tokens. These chains gained value over the years by fostering innovation and enabling new use cases, with their native tokens serving as the currency, and deriving value from, each individual blockchain economy.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!VNnE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe7fcdb9-c5cf-424e-a932-a52b4d16b263_1542x858.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!VNnE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe7fcdb9-c5cf-424e-a932-a52b4d16b263_1542x858.png 424w, https://substackcdn.com/image/fetch/$s_!VNnE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe7fcdb9-c5cf-424e-a932-a52b4d16b263_1542x858.png 848w, https://substackcdn.com/image/fetch/$s_!VNnE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe7fcdb9-c5cf-424e-a932-a52b4d16b263_1542x858.png 1272w, https://substackcdn.com/image/fetch/$s_!VNnE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe7fcdb9-c5cf-424e-a932-a52b4d16b263_1542x858.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!VNnE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe7fcdb9-c5cf-424e-a932-a52b4d16b263_1542x858.png" width="1456" height="810" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fe7fcdb9-c5cf-424e-a932-a52b4d16b263_1542x858.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:810,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!VNnE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe7fcdb9-c5cf-424e-a932-a52b4d16b263_1542x858.png 424w, https://substackcdn.com/image/fetch/$s_!VNnE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe7fcdb9-c5cf-424e-a932-a52b4d16b263_1542x858.png 848w, https://substackcdn.com/image/fetch/$s_!VNnE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe7fcdb9-c5cf-424e-a932-a52b4d16b263_1542x858.png 1272w, https://substackcdn.com/image/fetch/$s_!VNnE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe7fcdb9-c5cf-424e-a932-a52b4d16b263_1542x858.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Over the past few years however, builders like Magic Eden have started figuring out how to reverse engineer these capabilities on the Bitcoin blockchain itself. The opportunity of these efforts is immense; if builders are successful, they can create a crypto economy backed by digital gold and secured by the most decentralized blockchain network. This may one day allow people around the world without access to banking infrastructure the ability to use a permissionless, free, and fair financial system that goes far beyond simply storing value, and to do it all on a single blockchain network.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!RNag!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b21d023-8e74-4581-ad87-142870293c52_1600x884.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!RNag!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b21d023-8e74-4581-ad87-142870293c52_1600x884.png 424w, https://substackcdn.com/image/fetch/$s_!RNag!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b21d023-8e74-4581-ad87-142870293c52_1600x884.png 848w, https://substackcdn.com/image/fetch/$s_!RNag!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b21d023-8e74-4581-ad87-142870293c52_1600x884.png 1272w, https://substackcdn.com/image/fetch/$s_!RNag!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b21d023-8e74-4581-ad87-142870293c52_1600x884.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!RNag!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b21d023-8e74-4581-ad87-142870293c52_1600x884.png" width="1456" height="804" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0b21d023-8e74-4581-ad87-142870293c52_1600x884.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:804,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!RNag!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b21d023-8e74-4581-ad87-142870293c52_1600x884.png 424w, https://substackcdn.com/image/fetch/$s_!RNag!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b21d023-8e74-4581-ad87-142870293c52_1600x884.png 848w, https://substackcdn.com/image/fetch/$s_!RNag!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b21d023-8e74-4581-ad87-142870293c52_1600x884.png 1272w, https://substackcdn.com/image/fetch/$s_!RNag!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b21d023-8e74-4581-ad87-142870293c52_1600x884.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>At Magic Eden, we&#8217;ve been at the forefront of building on Bitcoin, having helped launch and build social consensus towards fungible and non-fungible token standards on Bitcoin. Looking ahead, we anticipate potential programmability upgrades and the integration of smart contracts. These advancements will allow Bitcoin to unlock its full potential and bring the entire on-chain economy home to Bitcoin.</p><h3><strong>Bitcoin&#8217;s Development: Playing Catch-Up</strong></h3><p>To understand the trajectory of Bitcoin&#8217;s evolution, it&#8217;s helpful to view it in the context of other blockchains. While other blockchains have been innovating with smart contracts and DeFi applications for years, Bitcoin is steadily catching up.</p><p>The most direct comparison can be made to the Ethereum blockchain. In 2017, Ethereum faced its first major congestion crisis due the the abundance of ICOs and the viral onchain game CryptoKitties. This lead to research and development of Layer Two scaling solutions which launched into the market in the coming years.</p><p>Bitcoin is just a few years behind. In January 2023, the Ordinals protocol released, making it possible to inscribe digital media directly into individual Satoshis on the Bitcoin blockchain. This advent of a non-fungible token standard quickly took hold, resulting in massive fee spikes that congested the network and renewed research into Bitcoin scaling solutions.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!QDvm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8735b356-6ea1-4937-ba4f-5d1f1a1a0bf7_1600x894.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!QDvm!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8735b356-6ea1-4937-ba4f-5d1f1a1a0bf7_1600x894.png 424w, https://substackcdn.com/image/fetch/$s_!QDvm!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8735b356-6ea1-4937-ba4f-5d1f1a1a0bf7_1600x894.png 848w, https://substackcdn.com/image/fetch/$s_!QDvm!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8735b356-6ea1-4937-ba4f-5d1f1a1a0bf7_1600x894.png 1272w, https://substackcdn.com/image/fetch/$s_!QDvm!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8735b356-6ea1-4937-ba4f-5d1f1a1a0bf7_1600x894.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!QDvm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8735b356-6ea1-4937-ba4f-5d1f1a1a0bf7_1600x894.png" width="1456" height="814" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8735b356-6ea1-4937-ba4f-5d1f1a1a0bf7_1600x894.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:814,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!QDvm!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8735b356-6ea1-4937-ba4f-5d1f1a1a0bf7_1600x894.png 424w, https://substackcdn.com/image/fetch/$s_!QDvm!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8735b356-6ea1-4937-ba4f-5d1f1a1a0bf7_1600x894.png 848w, https://substackcdn.com/image/fetch/$s_!QDvm!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8735b356-6ea1-4937-ba4f-5d1f1a1a0bf7_1600x894.png 1272w, https://substackcdn.com/image/fetch/$s_!QDvm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8735b356-6ea1-4937-ba4f-5d1f1a1a0bf7_1600x894.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Credit: Ren, Electric Capital</figcaption></figure></div><p>The Ordinals protocol went on to achieve social consensus, becoming one of the top NFT protocols and driving over $2 billion in trading volume in just two years. Following Ordinals, the Runes Protocol released in April 2024, establishing a means to inscribe fungible tokens directly into the Bitcoin blockchain. In 2024, over 50% of transactions on the Bitcoin blockchain involved either an Ordinal or Rune transfer, highlighting both the opportunity and interest in Bitcoin native assets.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5c8f!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdbe005ba-1b3e-482a-89ad-5afb2a247310_1552x866.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5c8f!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdbe005ba-1b3e-482a-89ad-5afb2a247310_1552x866.png 424w, https://substackcdn.com/image/fetch/$s_!5c8f!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdbe005ba-1b3e-482a-89ad-5afb2a247310_1552x866.png 848w, https://substackcdn.com/image/fetch/$s_!5c8f!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdbe005ba-1b3e-482a-89ad-5afb2a247310_1552x866.png 1272w, https://substackcdn.com/image/fetch/$s_!5c8f!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdbe005ba-1b3e-482a-89ad-5afb2a247310_1552x866.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5c8f!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdbe005ba-1b3e-482a-89ad-5afb2a247310_1552x866.png" width="1456" height="812" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dbe005ba-1b3e-482a-89ad-5afb2a247310_1552x866.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:812,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5c8f!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdbe005ba-1b3e-482a-89ad-5afb2a247310_1552x866.png 424w, https://substackcdn.com/image/fetch/$s_!5c8f!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdbe005ba-1b3e-482a-89ad-5afb2a247310_1552x866.png 848w, https://substackcdn.com/image/fetch/$s_!5c8f!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdbe005ba-1b3e-482a-89ad-5afb2a247310_1552x866.png 1272w, https://substackcdn.com/image/fetch/$s_!5c8f!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdbe005ba-1b3e-482a-89ad-5afb2a247310_1552x866.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Credit: The Block</figcaption></figure></div><p>As these new protocols gain traction, they are paving the way for a more dynamic Bitcoin economy, where Bitcoin is no longer just digital gold, but a thriving platform for innovation. Additionally, this new network activity plays a crucial role in the future of Bitcoin&#8217;s security. During the launch of the Runes protocol, Bitcoin transaction fees surpassed the value of miner rewards for the first time ever. In a future with diminishing miner rewards reliant upon Bitcoin&#8217;s price appreciation to make mining economically profitable, transaction fees offer a net new revenue stream that incentivizes participation in mining and network security.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Tc7V!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb941e4e6-5073-4b6a-b6e3-2ef935949971_1600x898.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Tc7V!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb941e4e6-5073-4b6a-b6e3-2ef935949971_1600x898.png 424w, https://substackcdn.com/image/fetch/$s_!Tc7V!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb941e4e6-5073-4b6a-b6e3-2ef935949971_1600x898.png 848w, https://substackcdn.com/image/fetch/$s_!Tc7V!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb941e4e6-5073-4b6a-b6e3-2ef935949971_1600x898.png 1272w, https://substackcdn.com/image/fetch/$s_!Tc7V!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb941e4e6-5073-4b6a-b6e3-2ef935949971_1600x898.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Tc7V!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb941e4e6-5073-4b6a-b6e3-2ef935949971_1600x898.png" width="1456" height="817" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b941e4e6-5073-4b6a-b6e3-2ef935949971_1600x898.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:817,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Tc7V!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb941e4e6-5073-4b6a-b6e3-2ef935949971_1600x898.png 424w, https://substackcdn.com/image/fetch/$s_!Tc7V!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb941e4e6-5073-4b6a-b6e3-2ef935949971_1600x898.png 848w, https://substackcdn.com/image/fetch/$s_!Tc7V!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb941e4e6-5073-4b6a-b6e3-2ef935949971_1600x898.png 1272w, https://substackcdn.com/image/fetch/$s_!Tc7V!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb941e4e6-5073-4b6a-b6e3-2ef935949971_1600x898.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Credit: Ren, Electric Capital</figcaption></figure></div><h3><strong>The Challenge of Building on Bitcoin</strong></h3><p>Building on Bitcoin presents unique challenges, particularly due to its technical constraints and the need to maintain its core principles of decentralization and self-custody. For developers, this means tackling the complexities of Bitcoin&#8217;s infrastructure while ensuring a seamless user experience.</p><p>There are two key challenges that Bitcoin builders must address:</p><ol><li><p><strong>Building the Rails:</strong> Creating infrastructure for trading assets on the Bitcoin network is more complex than on other blockchains. Unlike Ethereum or Solana, Bitcoin&#8217;s UTXO (Unspent Transaction Output) model and long block confirmation times present significant hurdles for developers. Additionally, Bitcoin&#8217;s lack of native smart contract support means that developers must reverse-engineer solutions using simple peer-to-peer transactions.</p></li><li><p><strong>Simplifying the User Experience (UX):</strong> Bitcoin&#8217;s technical complexities make it difficult for users to interact with the blockchain. To scale Bitcoin&#8217;s onchain economy, developers must push the technology to the background, allowing users to engage without being overwhelmed by its intricacies.</p></li></ol><h3><strong>A Real-World Example: Solving Mempool Sniping</strong></h3><p>As the Bitcoin onchain economy grows, we at Magic Eden have played a significant role in developing new, open-source solutions for building applications and facilitating transactions on the Bitcoin blockchain. Most recently, our team successfully developed a solution for the highly technical challenge of Mempool Sniping, which is the practice of &#8220;replacing&#8221; someone else&#8217;s Bitcoin transaction.</p><p>Due to Bitcoin&#8217;s lengthy block times, unconfirmed transactions in the Bitcoin mempool can be "replaced" with a different version of that transaction, utilizing a higher fee to "jump" the original transaction in line. Though this does not result in any economic loss for those who are &#8220;jumped&#8221; in line, it significantly hurts the viability of trading alternative assets on the Bitcoin blockchain given that buyers cannot be certain of asset delivery. Additionally, this phenomenon results in sellers accruing less profit from their assets at the point of sale, as value is &#8220;discovered&#8221; in the mempool through fee escalations realized as revenue by Bitcoin miners.</p><p>To solve this problem, while maintaining a fully decentralized marketplace with no asset custody, we at Magic Eden built an intricate solution using Tapscript to encode an allowlist merkle tree of users that facilitates peer-to-peer Bitcoin transactions with minimal trust assumptions. We hope this invention plays a fundamental role in the development of Bitcoin and the Bitcoin economy in years to come. A deep dive on the technicalities of this solution can be found here: <a href="https://x.com/MakeTokensFun/status/1853472486597509208">https://x.com/MakeTokensFun/status/1853472486597509208</a>, in addition to a video overview of the build here: </p><div id="youtube2-nl1tRVy-8gY" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;nl1tRVy-8gY&quot;,&quot;startTime&quot;:&quot;233s&quot;,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/nl1tRVy-8gY?start=233s&amp;rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><h3>Author</h3><p><a href="https://www.linkedin.com/in/matthewswetz/">Matthew Swetz</a> is the head of Bitcoin Product at Magic Eden, the number one onchain Bitcoin marketplace by transaction volume and users. Prior to joining Magic Eden, Matthew worked in product management and corporate strategy across the crypto and digital gaming industries. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://review.stanfordblockchain.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Stanford Blockchain Review! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[#65 - Introducing the EigenLayer Security Model]]></title><description><![CDATA[A Novel Approach to Operating and Securing Decentralized Services]]></description><link>https://review.stanfordblockchain.xyz/p/65-introducing-the-eigenlayer-security</link><guid isPermaLink="false">https://review.stanfordblockchain.xyz/p/65-introducing-the-eigenlayer-security</guid><dc:creator><![CDATA[Stanford Blockchain Club]]></dc:creator><pubDate>Tue, 04 Feb 2025 19:01:34 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!82pD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd7e0b00-e9d4-4a16-93c7-7b205af88fcc_1600x800.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!82pD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd7e0b00-e9d4-4a16-93c7-7b205af88fcc_1600x800.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!82pD!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd7e0b00-e9d4-4a16-93c7-7b205af88fcc_1600x800.jpeg 424w, https://substackcdn.com/image/fetch/$s_!82pD!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd7e0b00-e9d4-4a16-93c7-7b205af88fcc_1600x800.jpeg 848w, https://substackcdn.com/image/fetch/$s_!82pD!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd7e0b00-e9d4-4a16-93c7-7b205af88fcc_1600x800.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!82pD!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd7e0b00-e9d4-4a16-93c7-7b205af88fcc_1600x800.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!82pD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd7e0b00-e9d4-4a16-93c7-7b205af88fcc_1600x800.jpeg" width="1456" height="728" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bd7e0b00-e9d4-4a16-93c7-7b205af88fcc_1600x800.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:728,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Le protocole de restaking EigenLayer se lance sur le mainnet d'Ethereum  (ETH)&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Le protocole de restaking EigenLayer se lance sur le mainnet d'Ethereum  (ETH)" title="Le protocole de restaking EigenLayer se lance sur le mainnet d'Ethereum  (ETH)" srcset="https://substackcdn.com/image/fetch/$s_!82pD!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd7e0b00-e9d4-4a16-93c7-7b205af88fcc_1600x800.jpeg 424w, https://substackcdn.com/image/fetch/$s_!82pD!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd7e0b00-e9d4-4a16-93c7-7b205af88fcc_1600x800.jpeg 848w, https://substackcdn.com/image/fetch/$s_!82pD!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd7e0b00-e9d4-4a16-93c7-7b205af88fcc_1600x800.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!82pD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd7e0b00-e9d4-4a16-93c7-7b205af88fcc_1600x800.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="pullquote"><p><em><strong>Stanford Blockchain Review<br></strong>Volume 7, Article No. 5</em></p><p><em>&#9997;&#127995; Author: <a href="https://x.com/brettpalatiello">Brett Palatielo</a> &#8212; Eigen Labs and <a href="https://x.com/eigenlayer">EigenLayer</a></em></p><p><em>&#11088;&#65039; Technical Prerequisite: Intermediate</em></p></div><p>Building a new Web3 service comes with significant challenges: bootstrapping crypto-economic security and assembling a reliable network of operators. Meanwhile, the Web3 ecosystem is rich with opportunities, including a surplus of asset holders eager to earn rewards and skilled Operators seeking to expand into new, value-driven services. EigenLayer bridges this gap, aligning incentives and unlocking untapped potential for both builders and the broader community.</p><p>EigenLayer is a protocol built on Ethereum that introduces Restaking, a new primitive for Web3 builders that provides a "marketplace for trust" bringing together restakers, operators, and actively validated services (AVSs). It allows users to stake assets such as Native ETH, Liquid Staking Tokens (LSTs), the EIGEN token, or any ERC20 token into EigenLayer smart contracts, thereby extending Ethereum's crypto-economic security to additional applications on the network. It fosters innovation by enabling newer projects to benefit from Ethereum&#8217;s robust security guarantees without the need to replicate the costly process of securing their own network.</p><h3><strong>Introduction</strong></h3><p>The original <a href="https://docs.eigenlayer.xyz/assets/files/EigenLayer_WhitePaper-88c47923ca0319870c611decd6e562ad.pdf">EigenLayer security model</a> had the following structure: each operator can opt into a subset of AVSs, and the entire stake delegated to that operator could be slashed by any of those AVSs, which meant:</p><ol><li><p><strong>Less control over slashing risk</strong>: An AVS sharing slashable stake could be inadvertently exposed to the risks of slashing by other AVSs. Additionally, the entirety of an operator&#8217;s delegated stake is at risk of being slashed by any AVS it opted into.</p></li><li><p><strong>No slashable stake assurances for AVSs</strong>: AVSs had no assurance that they would have access to slashable stake when needed.</p></li><li><p><strong>Needs a common slashing veto committee:</strong> The system needed a common veto committee to buffer slashing events from becoming systemic.</p></li><li><p><strong>Permissioned onboarding of AVSs</strong>: Because of the need for a common veto committee, AVS onboarding needed to be permissioned otherwise the veto committee would be taking on uncalibrated risks.</p></li></ol><p><strong>Eigen Labs is excited to introduce the latest iteration of the EigenLayer Security Model </strong>which has been specifically designed to address these shortcomings by offering greater flexibility and control<strong>. </strong>This blog post is a simple description of how EigenLayer empowers AVSs to operate more efficiently and create economically aligned incentives using three foundational concepts: Operator Sets, Total Stake, and Unique Stake. In upcoming articles, we will dive deeper into the technical details of the planned protocol updates, uncovering the full potential and advantages of EigenLayer&#8217;s innovative design.</p><h3><strong>Operator Sets</strong></h3><p>An Operator Set is a group of operators who have been delegated ETH by stakers and are assigned certain tasks by an AVS. Although EigenLayer accepts many different types of tokens, and multiple tokens can be used in a single Operator Set, for simplicity, we will proceed using only staked ETH, which we will refer to simply as ETH.</p><p>Stakers delegate ETH to operators who participate in various Operator Sets created by AVSs.<sup>2</sup> To join Operator Sets, operators send requests to the respective AVSs for inclusion. AVSs can reward operators within an Operator Set if they perform their assigned tasks correctly and impose penalties if they do not. An AVS can create as many different Operator Sets as it wants.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!T6gk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa8a811fb-a365-4f0b-b67c-0b20c8a39c4c_1456x772.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!T6gk!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa8a811fb-a365-4f0b-b67c-0b20c8a39c4c_1456x772.png 424w, https://substackcdn.com/image/fetch/$s_!T6gk!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa8a811fb-a365-4f0b-b67c-0b20c8a39c4c_1456x772.png 848w, https://substackcdn.com/image/fetch/$s_!T6gk!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa8a811fb-a365-4f0b-b67c-0b20c8a39c4c_1456x772.png 1272w, https://substackcdn.com/image/fetch/$s_!T6gk!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa8a811fb-a365-4f0b-b67c-0b20c8a39c4c_1456x772.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!T6gk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa8a811fb-a365-4f0b-b67c-0b20c8a39c4c_1456x772.png" width="1456" height="772" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a8a811fb-a365-4f0b-b67c-0b20c8a39c4c_1456x772.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:772,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!T6gk!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa8a811fb-a365-4f0b-b67c-0b20c8a39c4c_1456x772.png 424w, https://substackcdn.com/image/fetch/$s_!T6gk!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa8a811fb-a365-4f0b-b67c-0b20c8a39c4c_1456x772.png 848w, https://substackcdn.com/image/fetch/$s_!T6gk!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa8a811fb-a365-4f0b-b67c-0b20c8a39c4c_1456x772.png 1272w, https://substackcdn.com/image/fetch/$s_!T6gk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa8a811fb-a365-4f0b-b67c-0b20c8a39c4c_1456x772.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><strong>Total Stake</strong></h3><p>The total amount of ETH delegated to an operator is the Total Stake of that operator. An Operator Set&#8217;s Total Stake is the sum of all its operators Total Stake. For example, if there are 3 operators in an Operator Set and each has 100 ETH delegated to them, then the Total Stake for each operator is 100 ETH, and the Total Stake for that Operator Set is 300 ETH.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!nrJ4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3a4167b-bacd-47e1-83cc-5ef3bf488b1c_1456x646.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!nrJ4!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3a4167b-bacd-47e1-83cc-5ef3bf488b1c_1456x646.jpeg 424w, https://substackcdn.com/image/fetch/$s_!nrJ4!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3a4167b-bacd-47e1-83cc-5ef3bf488b1c_1456x646.jpeg 848w, https://substackcdn.com/image/fetch/$s_!nrJ4!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3a4167b-bacd-47e1-83cc-5ef3bf488b1c_1456x646.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!nrJ4!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3a4167b-bacd-47e1-83cc-5ef3bf488b1c_1456x646.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!nrJ4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3a4167b-bacd-47e1-83cc-5ef3bf488b1c_1456x646.jpeg" width="1456" height="646" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b3a4167b-bacd-47e1-83cc-5ef3bf488b1c_1456x646.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:646,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!nrJ4!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3a4167b-bacd-47e1-83cc-5ef3bf488b1c_1456x646.jpeg 424w, https://substackcdn.com/image/fetch/$s_!nrJ4!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3a4167b-bacd-47e1-83cc-5ef3bf488b1c_1456x646.jpeg 848w, https://substackcdn.com/image/fetch/$s_!nrJ4!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3a4167b-bacd-47e1-83cc-5ef3bf488b1c_1456x646.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!nrJ4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3a4167b-bacd-47e1-83cc-5ef3bf488b1c_1456x646.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><strong>Unique Stake</strong></h3><p>Operators allocate a percentage of their ETH that an Operator Set is permitted to slash. An operator&#8217;s total allocation across Operator Sets must be between 0% and 100%. In other words, a unit of ETH can only be slashed by a single Operator Set at any given time. The allocated amount of ETH is called the operator's Unique Stake for that Operator Set.</p><p>If a task is performed incorrectly, the Operator Set may choose to slash an operator for up to that amount as defined by the AVS. The Unique Stake of an Operator Set is the amount of ETH exclusively slashable by that Operator Set.</p><p>Building on our previous example, if an AVS has one Operator Set and the three operators allocate 0%, 10%, and 20% of their ETH to it, their Unique Stake would be 0, 10 and 20 ETH, respectively, totaling 30 ETH in Unique Stake for the Operator Set.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5tKY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd66beb5-17da-48c1-b85a-d5a2b0debd76_1456x743.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5tKY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd66beb5-17da-48c1-b85a-d5a2b0debd76_1456x743.jpeg 424w, https://substackcdn.com/image/fetch/$s_!5tKY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd66beb5-17da-48c1-b85a-d5a2b0debd76_1456x743.jpeg 848w, https://substackcdn.com/image/fetch/$s_!5tKY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd66beb5-17da-48c1-b85a-d5a2b0debd76_1456x743.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!5tKY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd66beb5-17da-48c1-b85a-d5a2b0debd76_1456x743.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5tKY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd66beb5-17da-48c1-b85a-d5a2b0debd76_1456x743.jpeg" width="1456" height="743" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cd66beb5-17da-48c1-b85a-d5a2b0debd76_1456x743.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:743,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5tKY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd66beb5-17da-48c1-b85a-d5a2b0debd76_1456x743.jpeg 424w, https://substackcdn.com/image/fetch/$s_!5tKY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd66beb5-17da-48c1-b85a-d5a2b0debd76_1456x743.jpeg 848w, https://substackcdn.com/image/fetch/$s_!5tKY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd66beb5-17da-48c1-b85a-d5a2b0debd76_1456x743.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!5tKY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd66beb5-17da-48c1-b85a-d5a2b0debd76_1456x743.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><strong>Attack Mitigation Using Total and Unique Stake</strong></h3><p>AVSs can use the Total Stake and Unique Stake of an Operator Set for security. For example, consider an AVS creates a single Operator Set which has operators perform a task and vote on its output. The output that receives more than 50% of the stake-weighted vote is deemed correct. We assume that all pre-existing operators are honest and cannot be bribed to corrupt the task.</p><p>Using the numbers from our previous example, if the Operator Set weighs votes solely by Total Stake, a new malicious operator could manipulate the task&#8217;s result (attack) by allocating slightly more than 300 ETH in Total Stake (eg. 301 ETH). Without the ability to slash, no penal action can be taken against this operator besides ejection from the Operator Set.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://review.stanfordblockchain.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Stanford Blockchain Review! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>To use slashing as a punitive disincentive for misbehavior, the Operator Set can instead weigh votes by Unique Stake. In this case, the malicious operator would need to allocate just over 30 ETH in Unique Stake to carry out an attack (e.g. 30.1 ETH). Afterward, the Operator Set can slash the malicious operator for 30.1 ETH. While this imposes a tangible economic penalty, it significantly lowers the capital requirement from 301 ETH to 30.1 ETH.</p><p>An Operator Set could also require agreement between votes based on both Total Stake and Unique Stake, effectively balancing their weaknesses and leveraging their strengths. This approach forces a new malicious operator to meet the higher threshold of 301 ETH in Total Stake to compromise the task&#8217;s result while committing 30.1 ETH in Unique Stake that can be slashed after the attack. Thus, the Total Stake raises the capital required to corrupt the task, while the Unique Stake ensures an economic penalty for the malicious operator.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!hZQA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96e9377c-3c18-49f0-bc34-61e64c5eaab5_1456x1413.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!hZQA!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96e9377c-3c18-49f0-bc34-61e64c5eaab5_1456x1413.jpeg 424w, https://substackcdn.com/image/fetch/$s_!hZQA!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96e9377c-3c18-49f0-bc34-61e64c5eaab5_1456x1413.jpeg 848w, https://substackcdn.com/image/fetch/$s_!hZQA!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96e9377c-3c18-49f0-bc34-61e64c5eaab5_1456x1413.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!hZQA!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96e9377c-3c18-49f0-bc34-61e64c5eaab5_1456x1413.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!hZQA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96e9377c-3c18-49f0-bc34-61e64c5eaab5_1456x1413.jpeg" width="1456" height="1413" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/96e9377c-3c18-49f0-bc34-61e64c5eaab5_1456x1413.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1413,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!hZQA!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96e9377c-3c18-49f0-bc34-61e64c5eaab5_1456x1413.jpeg 424w, https://substackcdn.com/image/fetch/$s_!hZQA!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96e9377c-3c18-49f0-bc34-61e64c5eaab5_1456x1413.jpeg 848w, https://substackcdn.com/image/fetch/$s_!hZQA!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96e9377c-3c18-49f0-bc34-61e64c5eaab5_1456x1413.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!hZQA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96e9377c-3c18-49f0-bc34-61e64c5eaab5_1456x1413.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><strong>Operator Sets are Versatile and Extensible</strong></h3><p>Thus far, we have provided a simplified demonstration of how this security model works. In reality, Operator Sets are far more versatile. For example, an Operator Set can include multiple tasks and tokens, none of which need to be ETH. It can specify slashing conditions for different types of tokens, tasks, and infractions, as well as define confirmation rules for the set of tasks. An Operator Set can determine which tokens will be used to reward operators and how these rewards will be distributed. This model is also extensible to accommodate various preferences for handling slashed stake, including burning or redistribution (see<a href="https://arxiv.org/abs/2401.05797"> StakeSure</a>), although redistribution will not be available in the initial slashing release. Finally, because an Operator Set&#8217;s Unique Stake is only slashable by that specific Operator Set, slashing is localized, eliminating the need for a common veto committee.</p><h3><strong>Recent Developments</strong></h3><p>Since publication of the new security model, the team has put out three EigenLayer Improvement Proposals (ELIPs) which are documents proposing changes to the core EigenLayer contracts. They outline the motivation, technical specification, rationale, implementation path, and impact of each upgrade, providing the EigenLayer community with transparency and clarity on upcoming features. ELIP-001 introduces operator-directed rewards, variable operator fees, and batch claiming, giving AVSs more flexibility in distributing and claiming rewards. ELIP-002, now live on testnet, enables the logic of the new security model with slashing via Unique Stake and Operator Sets. Finally, ELIP-003 implements secure key rotation, revocation, and recovery at the protocol level, leading to a more modular AVS architecture and robust key management for upstream contracts integrating with EigenLayer. For the latest updates and discourse, please see our blog and forum.</p><h3><strong>Conclusion</strong></h3><p>In future articles we will delve into the nuances of the security model, why it is an improvement over other models, and other components that are actively being researched.</p><h3><strong>Appendix</strong></h3><p><sup>1 </sup>Stakers can delegate to only one operator per address. For example, as shown in Figure 1, stakers collectively have delegated 100 ETH to each of the three operators. However, behind the scenes, each staker uses three separate addresses, with each one delegating to a specific operator.</p><p>Consider Figure 5 below in the context of Figure 1:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ab41!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c2fa5ac-e69e-4ca3-9711-55dc70220926_1456x700.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ab41!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c2fa5ac-e69e-4ca3-9711-55dc70220926_1456x700.png 424w, https://substackcdn.com/image/fetch/$s_!ab41!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c2fa5ac-e69e-4ca3-9711-55dc70220926_1456x700.png 848w, https://substackcdn.com/image/fetch/$s_!ab41!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c2fa5ac-e69e-4ca3-9711-55dc70220926_1456x700.png 1272w, https://substackcdn.com/image/fetch/$s_!ab41!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c2fa5ac-e69e-4ca3-9711-55dc70220926_1456x700.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ab41!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c2fa5ac-e69e-4ca3-9711-55dc70220926_1456x700.png" width="1456" height="700" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3c2fa5ac-e69e-4ca3-9711-55dc70220926_1456x700.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:700,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ab41!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c2fa5ac-e69e-4ca3-9711-55dc70220926_1456x700.png 424w, https://substackcdn.com/image/fetch/$s_!ab41!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c2fa5ac-e69e-4ca3-9711-55dc70220926_1456x700.png 848w, https://substackcdn.com/image/fetch/$s_!ab41!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c2fa5ac-e69e-4ca3-9711-55dc70220926_1456x700.png 1272w, https://substackcdn.com/image/fetch/$s_!ab41!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c2fa5ac-e69e-4ca3-9711-55dc70220926_1456x700.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3>About the Authors</h3><p><a href="https://x.com/brettpalatiello">Brett Palatiello</a> is the Head of Economic Research at Eigen Labs, a core contributor to EigenLayer, an Ethereum-based restaking protocol. He brings expertise from a career in finance, software, quant, and his studies at Columbia. </p>]]></content:encoded></item><item><title><![CDATA[#64 - Citrea: Scaling Bitcoin’s Future with ZK Rollups]]></title><description><![CDATA[A Deep Dive into Bitcoin's ZK Rollup Solution: Citrea's Clementine Bridge]]></description><link>https://review.stanfordblockchain.xyz/p/64-citrea-scaling-bitcoins-future</link><guid isPermaLink="false">https://review.stanfordblockchain.xyz/p/64-citrea-scaling-bitcoins-future</guid><dc:creator><![CDATA[Stanford Blockchain Club]]></dc:creator><pubDate>Thu, 23 Jan 2025 18:31:04 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6e5a4f1-f71c-4c59-86ff-2f0621dda737_1600x698.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="pullquote"><p><em><strong>Stanford Blockchain Review<br></strong>Volume 7, Article No. 4</em></p><p><em>&#128218; Author: </em><a href="https://x.com/ekrembal_">Ekrem Bal</a>, Hakan, and Yusuf - Citrea</p><p><em>&#127775;  Technical Prerequisite: Intermediate</em></p></div><p>While Bitcoin core values lie in security and decentralization, these strengths create inherent limitations in scalability and programmability. Various scaling solutions like the Lightning Network and side chains tried to overcome these constraints, but none have successfully enabled complex applications without sacrificing Bitcoin's security or modifying its consensus rules.</p><p>Citrea introduces a new approach to Bitcoin scalability through a zero-knowledge (ZK) rollup architecture. Zero-knowledge proofs (ZKPs) use cryptography to allow one party to prove to another that a statement is true without revealing the statement. With ZK technology, Citrea enhances the capabilities of Bitcoin&#8217;s blockspace, transforming it into a fully programmable financial system while inheriting the network&#8217;s core values: security, decentralization, and censorship resistance.</p><p>Citrea also inherits validity from Bitcoin through its BitVM-based Bitcoin bridge, Clementine. By combining BitVM, zero-knowledge proofs, and Bitcoin as a data availability layer, Clementine enables the safest and most-trust minimized way to bridge BTC and extend its utility. This article focuses specifically on the workings of Citrea&#8217;s BitVM-based Bitcoin bridge, Clementine, discussing its peg-in and peg-out mechanisms and how it optimistically verifies ZKPs.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://review.stanfordblockchain.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Stanford Blockchain Review! Subscribe for free to receive the latest blockchain news!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2><strong>Clementine: Citrea&#8217;s BitVM-Based Bitcoin Bridge</strong></h2><p><em>Note that Clementine&#8217;s design is not final and is subject to change.</em></p><p>In the past, State Channels and Sidechains were seen by the Bitcoin community as the only viable scaling solutions. However, the lack of programmability in the State Channels and the insecurity of Sidechains led researchers to seek alternative ways to scale Bitcoin. In this search, Citrea emphasized that scaling Bitcoin blockspace is the only way to transact with Bitcoin security, therefore proposed rollups as the most secure and incentive-aligned way to scale Bitcoin blocks. Considering Bitcoin&#8217;s block-size limitations, Citrea chose to leverage ZKPs over fraud proofs since they are the most efficient way to verify the validity of execution inside Bitcoin within the block size limit.</p><p>ZK Rollups collect thousands of transactions, generate a ZKP to ensure their validity and inscribe the ZKP to Bitcoin alongside the data that can restore the rollups&#8217; state. However, the verification of ZKPs on Bitcoin presents a significant challenge due to Bitcoin&#8217;s limited programmability.</p><p>An emerging solution to this challenge is BitVM, a computing paradigm for expressing Turing-Complete contracts on Bitcoin without changing its consensus rules. BitVM allows anyone to challenge the execution of a contract if the computation is incorrect, making it an optimistic scheme.</p><p>Clementine is a BitVM based trust-minimized two-way peg mechanism between Citrea and Bitcoin that optimistically verifies ZKPs to extend BTC&#8217;s utility in the most secure and efficient way. The following sections will cover how Clementine handles peg-in and peg-outs and how it optimistically verifies ZKPs.</p><h3>Peg-in and Peg-outs</h3><p>Traditional Bitcoin scaling solutions rely on trusted entities for peg-ins and peg-outs, risking fund loss and censorship. Clementine mitigates these risks through its BitVM-based two-way peg mechanism.</p><p>Clementine&#8217;s architecture relies on three distinct roles, consisting of signers, operators, and watchtowers. Each performs a different functionality. N entities, each one is called a signer, forms a federation by setting up an N-of-N multisig to collectively decide how funds are going to be spent. Operators are another set of entities that front-covers users&#8217; withdrawals, and later get repaid with a reimbursement process. Watchtowers are responsible for challenging the operator in the case of a malicious act, and gets rewarded if challenge is valid.</p><p>Here is an example of how this works. To initiate the deposit process, Alice, the depositor, sends 10 BTC to a predefined Taproot address, shown in Image 1. The bridge signers accept, hence sign, the deposit only if it equals to a predefined fixed amount of 10 BTC. Once all signers approve the transaction, Alice&#8217;s deposit is transferred to the multisig, and her corresponding cBTC is minted on Citrea. If the signers reject, Alice gets her deposit back trustlessly using timelocks 200 Bitcoin blocks later.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!RVcn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1b03998-55e6-4e20-8adb-8a339492a969_1600x713.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!RVcn!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1b03998-55e6-4e20-8adb-8a339492a969_1600x713.png 424w, https://substackcdn.com/image/fetch/$s_!RVcn!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1b03998-55e6-4e20-8adb-8a339492a969_1600x713.png 848w, https://substackcdn.com/image/fetch/$s_!RVcn!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1b03998-55e6-4e20-8adb-8a339492a969_1600x713.png 1272w, https://substackcdn.com/image/fetch/$s_!RVcn!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1b03998-55e6-4e20-8adb-8a339492a969_1600x713.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!RVcn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1b03998-55e6-4e20-8adb-8a339492a969_1600x713.png" width="1456" height="649" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a1b03998-55e6-4e20-8adb-8a339492a969_1600x713.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:649,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!RVcn!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1b03998-55e6-4e20-8adb-8a339492a969_1600x713.png 424w, https://substackcdn.com/image/fetch/$s_!RVcn!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1b03998-55e6-4e20-8adb-8a339492a969_1600x713.png 848w, https://substackcdn.com/image/fetch/$s_!RVcn!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1b03998-55e6-4e20-8adb-8a339492a969_1600x713.png 1272w, https://substackcdn.com/image/fetch/$s_!RVcn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1b03998-55e6-4e20-8adb-8a339492a969_1600x713.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image 1: Deposit Process</figcaption></figure></div><p>Before accepting the deposit, each signer pre-signs a set of transactions which will be used to punish the operator in case of a malicious act. These pre-signed transactions include timeout transactions and disprove transactions. Timeout transactions will be used if the operator does not send the given transaction, namely kickoff transactions and assert transactions, within a predefined time period.</p><p>Peg-ins can be handled using an N-of-N multisig because signers are not incentived to reject a valid deposit. However, this is not the case when it comes to peg-outs because if multisig handles peg-outs, then any signer will be able to censor them and might have an incentive to censor the withdrawal request. To address this, Clementine uses multiple operators to compete with each other for front-covering withdrawals.</p><p>Bob, the person who wants to peg-out, initiates a cBTC burn transaction on Citrea, along with a Partially Signed Bitcoin Transaction. Partially Signed Bitcoin Transaction is initiated by Bob, for an operator to front-cover his peg-out. Bob gradually decreases the amount he will get on Bitcoin by initiating new Partially Signed Bitcoin transactions, incentivizing operators to front-cover his withdrawal. Once front-covering Bob&#8217;s withdrawal becomes profitable for an operator, Bob&#8217;s peg-out will be fulfilled. Bridge operators later get repaid for the peg-outs they front-covered through a reimbursement process.</p><p>To handle the reimbursement process, each operator manages a chain of transactions called Collateral Time Transactions, involving Time Transaction 1, Kickoff Transaction, Time2 Transaction and Timeout Transaction. These transactions allow an operator to reuse their collateral by restricting them to cover 1 withdrawal per 2 weeks. Time Transaction 1, shown in Image 2, is a requirement for the operator to initiate a Kickoff Transaction. A Kickoff Transaction involves the operator's commitment to the transaction ID of the deposit they intend to claim reimbursement for. The operator's commitment will be used in the reimbursement process.</p><p>The reimbursement process works optimistically, meaning that as long as watchtowers do not challenge, the operator can continue to cover 1 withdrawal per 2 weeks. If watchtowers do not challenge, the operator gets 10 BTC back by using the reimburse connector output in the Time2 Transaction. Later, the operator covers another withdrawal, initiates a new Time Transaction 2 and the cycle continues as long as the operator behaves honestly. Watchtowers challenge an operator if they&#8217;re convinced that an operator is malicious, i.e., tries to claim BTC from the bridge without paying for a user&#8217;s peg-out. To challenge an operator, each watchtower generates a succinct longest chain proof of Bitcoin, ensuring that they&#8217;re following the Bitcoin blockchain. Along with the longest chain proof, the challenging watchtower also provides 2 BTC to the operator to compensate for the Assert Transaction.</p><p>After the longest chain proof is submitted, the operator generates a zero-knowledge proof that asserts the validity of Citrea&#8217;s Light Client Proof, SPV proof the withdrawal operator has front-covered, <a href="https://bitcoin.org/bitcoin.pdf">see section 8 for SPV</a>, and the validity of all longest chain proofs submitted by the watchtowers.</p><p>Operators&#8217; proof is considered to be valid if not challenged by any watchtower for a week. If unchallenged, the operator is reimbursed with the 10 BTC they front-covered. Image 2 below illustrates the entire reimbursement process, which involves Collateral Time Transactions.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2NkT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6e5a4f1-f71c-4c59-86ff-2f0621dda737_1600x698.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2NkT!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6e5a4f1-f71c-4c59-86ff-2f0621dda737_1600x698.png 424w, https://substackcdn.com/image/fetch/$s_!2NkT!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6e5a4f1-f71c-4c59-86ff-2f0621dda737_1600x698.png 848w, https://substackcdn.com/image/fetch/$s_!2NkT!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6e5a4f1-f71c-4c59-86ff-2f0621dda737_1600x698.png 1272w, https://substackcdn.com/image/fetch/$s_!2NkT!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6e5a4f1-f71c-4c59-86ff-2f0621dda737_1600x698.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2NkT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6e5a4f1-f71c-4c59-86ff-2f0621dda737_1600x698.png" width="1456" height="635" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b6e5a4f1-f71c-4c59-86ff-2f0621dda737_1600x698.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:635,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!2NkT!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6e5a4f1-f71c-4c59-86ff-2f0621dda737_1600x698.png 424w, https://substackcdn.com/image/fetch/$s_!2NkT!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6e5a4f1-f71c-4c59-86ff-2f0621dda737_1600x698.png 848w, https://substackcdn.com/image/fetch/$s_!2NkT!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6e5a4f1-f71c-4c59-86ff-2f0621dda737_1600x698.png 1272w, https://substackcdn.com/image/fetch/$s_!2NkT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6e5a4f1-f71c-4c59-86ff-2f0621dda737_1600x698.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image 2: Collateral Time Transaction Table</figcaption></figure></div><h3><strong>Optimistically Verifying ZKPs</strong></h3><p>Validity inheritance from Bitcoin is one of Citrea&#8217;s most crucial attributes, ensuring that the system maintains Bitcoin&#8217;s security guarantees. However, achieving validity inheritance is particularly challenging because it requires the verification of ZKPs on Bitcoin, a difficult task due to Bitcoin&#8217;s block size limitation.</p><p>What makes Bitcoin&#8217;s programmability limited is actually its limited blocksize. In theory, a ZKP can be verified directly via Bitcoin Script. However, the ZK verifier function requires around 1.2 GB of Script to execute, while Bitcoin blocks are capped at 4 MB.</p><p>Clementine addresses this challenge using BitVM2, an upgraded version of BitVM. BitVM2 enables optimistic verification of ZKPs, meaning a proof is assumed valid unless challenged. This approach relies on a 1-of-N trust assumption, where as long as at least one honest actor exists within the set of watchtowers, any invalid proof will be detected, and the rollup will remain secure.</p><p>Challengers are entities that can challenge the given ZKP and punish the prover. To give challengers the ability to challenge a ZKP, the ZK verifier is shredded into functions and each function is small enough to fit into a Bitcoin block. Each functions&#8217; output is called an intermediate state and these functions are chained by their inputs and outputs, shown in the Image 3.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!riUc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2e6a42a-abff-492f-b945-64a395128d5c_1098x1600.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!riUc!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2e6a42a-abff-492f-b945-64a395128d5c_1098x1600.png 424w, https://substackcdn.com/image/fetch/$s_!riUc!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2e6a42a-abff-492f-b945-64a395128d5c_1098x1600.png 848w, https://substackcdn.com/image/fetch/$s_!riUc!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2e6a42a-abff-492f-b945-64a395128d5c_1098x1600.png 1272w, https://substackcdn.com/image/fetch/$s_!riUc!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2e6a42a-abff-492f-b945-64a395128d5c_1098x1600.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!riUc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2e6a42a-abff-492f-b945-64a395128d5c_1098x1600.png" width="220" height="320.58287795992715" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a2e6a42a-abff-492f-b945-64a395128d5c_1098x1600.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1600,&quot;width&quot;:1098,&quot;resizeWidth&quot;:220,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!riUc!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2e6a42a-abff-492f-b945-64a395128d5c_1098x1600.png 424w, https://substackcdn.com/image/fetch/$s_!riUc!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2e6a42a-abff-492f-b945-64a395128d5c_1098x1600.png 848w, https://substackcdn.com/image/fetch/$s_!riUc!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2e6a42a-abff-492f-b945-64a395128d5c_1098x1600.png 1272w, https://substackcdn.com/image/fetch/$s_!riUc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2e6a42a-abff-492f-b945-64a395128d5c_1098x1600.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image 3: ZK Verifier Script Chained Functions</figcaption></figure></div><p>Watchtowers challenge the operator's withdrawal claim by providing the longest chain proof and paying 2 BTC directly to the operator as compensation for the assert transaction. In an assert transaction, the Prover reveals the intermediate states, which must be submitted whenever there is a challenge. If the Operator does not submit the assert transaction, it then gets punished with 2 BTC.</p><p>The Operator reveals the intermediate states by signing them with the Winternitz One-Time Signature Scheme and submits the signatures to Bitcoin. Later, the challenger provides the Script of the intermediate state that he believes is invalid. If the challenger&#8217;s claim is correct, then he&#8217;s rewarded.</p><h3><strong>Winternitz One-Time Signature Scheme</strong></h3><p>Winternitz is a hash-based signature scheme that is used in BitVM to ensure the authenticity of input(s) and output(s) of each function. The operator signs each function's input(s) and output(s) with the Winternitz One-Time Signature Scheme and commits to both the proof and the intermediate states which are the outputs of functions, namely Z0, Z1 &#8230; Zn.</p><p>Before signing, the message is split into 8 bit chunks, and a checksum is calculated to ensure that no other signature can be formed from a given signature. The operator generates a random secret key for each chunk and the checksum, which will later be used to sign them. The operator computes the corresponding public keys by hashing each secret key 256 times and distributes it amongst watchtowers.</p><p>To sign the message, each chunk is represented as a digit, which is a value between 0 and 255(let that be equal to N), and the secret key is hashed 256 - N times. To verify the signature, the watchtower hashes the data N times more. If the output is equal to the public key, then the signature is valid. A more detailed explanation of Winternitz One-Time Signature Scheme is represented in the Image 4 below.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bicv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc712c8d6-248d-43c3-a4c2-4680ea70bfce_1600x861.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bicv!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc712c8d6-248d-43c3-a4c2-4680ea70bfce_1600x861.png 424w, https://substackcdn.com/image/fetch/$s_!bicv!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc712c8d6-248d-43c3-a4c2-4680ea70bfce_1600x861.png 848w, https://substackcdn.com/image/fetch/$s_!bicv!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc712c8d6-248d-43c3-a4c2-4680ea70bfce_1600x861.png 1272w, https://substackcdn.com/image/fetch/$s_!bicv!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc712c8d6-248d-43c3-a4c2-4680ea70bfce_1600x861.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bicv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc712c8d6-248d-43c3-a4c2-4680ea70bfce_1600x861.png" width="1456" height="784" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c712c8d6-248d-43c3-a4c2-4680ea70bfce_1600x861.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:784,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!bicv!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc712c8d6-248d-43c3-a4c2-4680ea70bfce_1600x861.png 424w, https://substackcdn.com/image/fetch/$s_!bicv!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc712c8d6-248d-43c3-a4c2-4680ea70bfce_1600x861.png 848w, https://substackcdn.com/image/fetch/$s_!bicv!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc712c8d6-248d-43c3-a4c2-4680ea70bfce_1600x861.png 1272w, https://substackcdn.com/image/fetch/$s_!bicv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc712c8d6-248d-43c3-a4c2-4680ea70bfce_1600x861.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image 4: Winternitz One-Time Signature Scheme</figcaption></figure></div><p>The prover splits the intermediate states into 8 bit chunks and signs each chunk using the Winternitz Signature Scheme. These signatures are then submitted to Bitcoin. Watchtowers use these signatures to authenticate the intermediate states. If the signatures are valid, the watchtower moves the signed values to an alt stack to re-execute that function.</p><p>If the output of the re-executed function does not match the signed value, the proof is invalid. In this case, anyone can disprove the prover with a single transaction by revealing the script of that function and Bitcoin checks whether the challenge is valid or not. If the challenger is correct, prover is slashed, and the challenger receives a reward. An example disproving is shown in the Image 5 below.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!MY0k!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc120af77-df7d-4445-878b-838e4a4d8006_1506x1600.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!MY0k!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc120af77-df7d-4445-878b-838e4a4d8006_1506x1600.png 424w, https://substackcdn.com/image/fetch/$s_!MY0k!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc120af77-df7d-4445-878b-838e4a4d8006_1506x1600.png 848w, https://substackcdn.com/image/fetch/$s_!MY0k!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc120af77-df7d-4445-878b-838e4a4d8006_1506x1600.png 1272w, https://substackcdn.com/image/fetch/$s_!MY0k!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc120af77-df7d-4445-878b-838e4a4d8006_1506x1600.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!MY0k!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc120af77-df7d-4445-878b-838e4a4d8006_1506x1600.png" width="478" height="507.875" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c120af77-df7d-4445-878b-838e4a4d8006_1506x1600.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1547,&quot;width&quot;:1456,&quot;resizeWidth&quot;:478,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!MY0k!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc120af77-df7d-4445-878b-838e4a4d8006_1506x1600.png 424w, https://substackcdn.com/image/fetch/$s_!MY0k!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc120af77-df7d-4445-878b-838e4a4d8006_1506x1600.png 848w, https://substackcdn.com/image/fetch/$s_!MY0k!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc120af77-df7d-4445-878b-838e4a4d8006_1506x1600.png 1272w, https://substackcdn.com/image/fetch/$s_!MY0k!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc120af77-df7d-4445-878b-838e4a4d8006_1506x1600.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image 5: Disproving Logic</figcaption></figure></div><h3><strong>Conclusion</strong></h3><p>Citrea demonstrates that Bitcoin blockspace can be scaled without compromising the network&#8217;s core values of security and decentralization. Its trust-minimized, BitVM-based bridge, Clementine, inherits Bitcoin&#8217;s validity and provides one of the most secure ways to use BTC in decentralized finance, without altering Bitcoin&#8217;s consensus rules.</p><p>Clementine&#8217;s design continues to evolve, with ongoing improvements to enhance both efficiency and security. This article features the current design which reduces the complexity around the zero-knowledge proof verifier and improves security. The challenge process is reduced to 2 weeks which was 40 weeks in the old Clementine design. The new version also allows extending the signer and watchtower set and introduces multiple operators to compete.</p><h3><strong>About the Authors</strong></h3><p><a href="https://x.com/ekrembal_">Ekrem Bal</a> is the Co-founder and Chief Scientist at Chainway Labs,<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> where he focuses on privacy and zero-knowledge research. He spearheaded the development of Proof of Innocence and is currently leading efforts to build Bitcoin's first trust-minimized bridge using BitVM on Citrea.</p><p>Hakan Karakus is a Software Engineer at Chainway Labs and a recent graduate from Bogazici University with a double major in Computer Engineering and Mathematics. He is a ZK enthusiast and loves the mathematical aspects of important protocols. As a part of the BitVM Alliance, he leads the efforts for BitVM development in Chainway Labs.</p><p><a href="https://x.com/Artsteiin">Yusuf Ozmi&#351;</a> is an undergraduate student at Y&#305;ld&#305;z Technical University, majoring in Mathematical Engineering. He works as a Researcher at Chainway Labs, where his research primarily focuses on rollups and their applications in emerging technologies.</p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>Chainway Labs is the initial contributor company to Citrea.</p><p></p></div></div>]]></content:encoded></item><item><title><![CDATA[#63 - Electric Capital: 2025 Crypto Landscape]]></title><description><![CDATA[Avichal Garg and Maria Shen on Crypto Developer Activity, NFTs, and Latest Crypto Projects]]></description><link>https://review.stanfordblockchain.xyz/p/63-electric-capital-2025-crypto-landscape</link><guid isPermaLink="false">https://review.stanfordblockchain.xyz/p/63-electric-capital-2025-crypto-landscape</guid><dc:creator><![CDATA[Stanford Blockchain Club]]></dc:creator><pubDate>Mon, 20 Jan 2025 18:31:06 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabdecfbf-c283-4bb9-9c32-c2b91bb5ae71_1456x755.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="pullquote"><p><em><strong>Stanford Blockchain Review</strong><br>Volume 7, Article No. 3</em></p><p><em>&#128218; Interview Guests: <a href="https://x.com/avichal">Avichal Garg</a> and <a href="https://x.com/MariaShen">Maria Shen</a> &#8212; Electric Capital<br>&#9997;&#127995; Author: <a href="https://x.com/tesvarajiang">Tesvara Jiang</a> &#8212; Stanford Blockchain Club</em></p><p>&#11088;&#65039; Technical Prerequisite: Low</p></div><p><em>Following SBR&#8217;s annual tradition, I sat down (virtually) with Electric Capital's Avichal Garg and Maria Shen to discuss the happenings of crypto in 2024 and explore what we expect to see going forward. This article is a long-form exploration of our discussions, drawing upon their experience in crypto and their research on developer activity to understand what&#8217;s coming for crypto this year.</em></p><p><em>This article focuses on 3 major themes from our discussion: the state of global developer activity, NFT trends, and some of Electric Capital&#8217;s latest investments.</em></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://review.stanfordblockchain.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Stanford Blockchain Review! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2><strong>Global Shift in Developer Activity</strong></h2><p>Each year, Electric Capital publishes an Annual Developer Report,<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> which is read by hundreds of thousands seeking the most meaningful insights into crypto developer activity across various ecosystems. To compile this year&#8217;s report, Electric fingerprinted over 902 million code commits across 1.7 million repositories.[1]</p><p>The very first edition of this report was written in 2018. Each following year, Electric Capital is at it again because they believe&#8212;and I do too&#8212;that the only metric that truly matters to the future of crypto is developer engagement. We need developers to build apps that deliver value to users, to draw customers and, in turn, bring more developers into the scene.</p><p>For our interview, I brought Avichal and Maria the following questions and summarized the insights they provided:</p><h3><strong>1. Could you both briefly introduce yourselves and share how you first got into crypto?</strong></h3><p><em>Maria</em> - Maria was first drawn to crypto due to cross-border payment solutions, but only dove into it more after Ethereum launched. She was interested in programmable money, which she thought could solve issues she was facing with her startup in the supply chain space. Specifically, she was interested in using Ethereum to create lightweight and cheap escrow systems. At the time, in 2016, she found that the infrastructure wasn&#8217;t ready for real-world use cases, but this exploration led her down the &#8220;crypto rabbit hole&#8221; and she realized the potential of the technology, even if it was still immature.</p><p><em>Avichal</em> - Avichal first stumbled into crypto around 2010-2011 while working on his second startup, Spool, which focused on mobile content caching for offline reading. During this time, he and his co-founder Curtis became acquainted with several Bitcoin miners and considered doing mining. After selling Spool to Facebook in 2012, Avichal stayed in the space as a hobbyist.</p><p>His involvement deepened during the 2017 Bitcoin bull run, where he immersed himself in Bitcoin, Ethereum, and ICOs and conducted educational sessions for curious venture capitalists. By 2018, recognizing that traditional VCs weren&#8217;t as knowledgeable about crypto assets, several VCs approached Avichal to manage their crypto investments.</p><p>Avichal&#8217;s background in distributed systems and security naturally led him to explore privacy-preserving technologies in the blockchain space. His interest in crypto privacy stems from the unique challenges of blockchain technology, particularly in areas like custody and security.</p><h3><strong>2. The report mentioned that despite all-time highs in new developers, experienced devs are still contributing 70% of code. What does this say about the maturity of the crypto space?</strong></h3><p><em>Maria</em> - The space is much more accessible now with numerous options to explore, unlike the early days where we just had Bitcoin and Ethereum and experimenting was costly. Today, developers can easily build on new chains with extensive documentation and supportive communities of mentors. However, there's churnamong newcomers. While onboarding is easier than ever, true commitment requires a significant mindset shift from traditional development. Once developers make it past this initial hurdle though, retention rates are notably high. This dynamic explains why experienced developers still drive the majority of contributions.</p><h3><strong>3. Asia has overtaken North America as the leading continent for crypto developers. How has this affected your investment thesis?</strong></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!oL5Z!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabdecfbf-c283-4bb9-9c32-c2b91bb5ae71_1456x755.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!oL5Z!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabdecfbf-c283-4bb9-9c32-c2b91bb5ae71_1456x755.jpeg 424w, https://substackcdn.com/image/fetch/$s_!oL5Z!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabdecfbf-c283-4bb9-9c32-c2b91bb5ae71_1456x755.jpeg 848w, https://substackcdn.com/image/fetch/$s_!oL5Z!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabdecfbf-c283-4bb9-9c32-c2b91bb5ae71_1456x755.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!oL5Z!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabdecfbf-c283-4bb9-9c32-c2b91bb5ae71_1456x755.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!oL5Z!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabdecfbf-c283-4bb9-9c32-c2b91bb5ae71_1456x755.jpeg" width="1456" height="755" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/abdecfbf-c283-4bb9-9c32-c2b91bb5ae71_1456x755.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:755,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!oL5Z!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabdecfbf-c283-4bb9-9c32-c2b91bb5ae71_1456x755.jpeg 424w, https://substackcdn.com/image/fetch/$s_!oL5Z!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabdecfbf-c283-4bb9-9c32-c2b91bb5ae71_1456x755.jpeg 848w, https://substackcdn.com/image/fetch/$s_!oL5Z!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabdecfbf-c283-4bb9-9c32-c2b91bb5ae71_1456x755.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!oL5Z!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabdecfbf-c283-4bb9-9c32-c2b91bb5ae71_1456x755.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Maria</em> - The biggest growth in new crypto developers came from India in 2024. However, we also see developer activity increasing from regions like Nigeria, Southeast Asia, and more. I&#8217;ve spoken to some developers from these areas who use crypto and stablecoin and then decide to build better applications for it because they know best how to improve the product for their needs.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!kS4a!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe804495-121d-4070-9d0d-c8cf7789733c_1456x766.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!kS4a!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe804495-121d-4070-9d0d-c8cf7789733c_1456x766.jpeg 424w, https://substackcdn.com/image/fetch/$s_!kS4a!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe804495-121d-4070-9d0d-c8cf7789733c_1456x766.jpeg 848w, https://substackcdn.com/image/fetch/$s_!kS4a!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe804495-121d-4070-9d0d-c8cf7789733c_1456x766.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!kS4a!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe804495-121d-4070-9d0d-c8cf7789733c_1456x766.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!kS4a!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe804495-121d-4070-9d0d-c8cf7789733c_1456x766.jpeg" width="1456" height="766" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fe804495-121d-4070-9d0d-c8cf7789733c_1456x766.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:766,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!kS4a!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe804495-121d-4070-9d0d-c8cf7789733c_1456x766.jpeg 424w, https://substackcdn.com/image/fetch/$s_!kS4a!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe804495-121d-4070-9d0d-c8cf7789733c_1456x766.jpeg 848w, https://substackcdn.com/image/fetch/$s_!kS4a!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe804495-121d-4070-9d0d-c8cf7789733c_1456x766.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!kS4a!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe804495-121d-4070-9d0d-c8cf7789733c_1456x766.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Avichal</em> - Avichal mentioned later on, something that is also relevant here, that building core infrastructure requires larger dev teams and funding. But countries in Asia and Africa generally have less of both the technical expertise and access to capital to enable this. This reinforces the division.</p><h3><strong>4. One in three developers now works across multiple chains, with EVM chains leading this trend. How do you see this multi-chain ethos evolving, especially with the rise of ecosystems like Base and Solana?</strong></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5ivK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8016896f-4bc6-4101-b5c2-dca1ee9e6534_1456x795.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5ivK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8016896f-4bc6-4101-b5c2-dca1ee9e6534_1456x795.jpeg 424w, https://substackcdn.com/image/fetch/$s_!5ivK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8016896f-4bc6-4101-b5c2-dca1ee9e6534_1456x795.jpeg 848w, https://substackcdn.com/image/fetch/$s_!5ivK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8016896f-4bc6-4101-b5c2-dca1ee9e6534_1456x795.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!5ivK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8016896f-4bc6-4101-b5c2-dca1ee9e6534_1456x795.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5ivK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8016896f-4bc6-4101-b5c2-dca1ee9e6534_1456x795.jpeg" width="1456" height="795" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8016896f-4bc6-4101-b5c2-dca1ee9e6534_1456x795.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:795,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5ivK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8016896f-4bc6-4101-b5c2-dca1ee9e6534_1456x795.jpeg 424w, https://substackcdn.com/image/fetch/$s_!5ivK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8016896f-4bc6-4101-b5c2-dca1ee9e6534_1456x795.jpeg 848w, https://substackcdn.com/image/fetch/$s_!5ivK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8016896f-4bc6-4101-b5c2-dca1ee9e6534_1456x795.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!5ivK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8016896f-4bc6-4101-b5c2-dca1ee9e6534_1456x795.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Avichal</em> - Each chain has carved out its own niche. Ethereum is used for high-value, high-security operations, while Solana and Base are used for speed and price-focused applications like NFT minting and gaming. They are super-fast and low-cost compared to what Ethereum is providing today, so we see that as long as community and affordability are there, most of the activity will follow.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!NXyY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F597cf224-adb4-4a6d-82d7-84939c0fd10f_1456x749.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!NXyY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F597cf224-adb4-4a6d-82d7-84939c0fd10f_1456x749.png 424w, https://substackcdn.com/image/fetch/$s_!NXyY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F597cf224-adb4-4a6d-82d7-84939c0fd10f_1456x749.png 848w, https://substackcdn.com/image/fetch/$s_!NXyY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F597cf224-adb4-4a6d-82d7-84939c0fd10f_1456x749.png 1272w, https://substackcdn.com/image/fetch/$s_!NXyY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F597cf224-adb4-4a6d-82d7-84939c0fd10f_1456x749.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!NXyY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F597cf224-adb4-4a6d-82d7-84939c0fd10f_1456x749.png" width="1456" height="749" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/597cf224-adb4-4a6d-82d7-84939c0fd10f_1456x749.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:749,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!NXyY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F597cf224-adb4-4a6d-82d7-84939c0fd10f_1456x749.png 424w, https://substackcdn.com/image/fetch/$s_!NXyY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F597cf224-adb4-4a6d-82d7-84939c0fd10f_1456x749.png 848w, https://substackcdn.com/image/fetch/$s_!NXyY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F597cf224-adb4-4a6d-82d7-84939c0fd10f_1456x749.png 1272w, https://substackcdn.com/image/fetch/$s_!NXyY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F597cf224-adb4-4a6d-82d7-84939c0fd10f_1456x749.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Solana has become the leading ecosystem for new developers in 2024. It&#8217;s attracting developers with its high-performance architecture and growing ecosystem. Another key player is Base. Base has the advantage of being EVM-compatible and backed by Coinbase, which makes it easy for Ethereum developers to move their applications there. It became the most popular chain among EVM multi-chain deployers in 2024, now taking 25% of the original on-chain code logic on all EVM chains.</p><h2><strong>NFT Adoption</strong></h2><h3><strong>5. You mentioned NFT action expanding beyond artwork, what are some examples that you are following?</strong></h3><p><em>Maria</em> - NFTs and blockchain ledgers have the ability to accurately assign ownership. One example is BasePaint. BasePaint is a crypto collaborative art project on Base where artists create digital art together on a shared set of pixels. After each 24-hour creation period, the artwork is turned into an open edition NFT, with 90% of the profits distributed to contributing artists based on their pixel contributions. IP on chain is straightforward. Digitalized contributions and smart contract governance over profits ensures that everyone is rewarded proportionately to the number of pixels they contributed.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!y5-y!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb77eac84-f3d9-4d98-8fea-9c5cef99ae46_1456x851.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!y5-y!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb77eac84-f3d9-4d98-8fea-9c5cef99ae46_1456x851.jpeg 424w, https://substackcdn.com/image/fetch/$s_!y5-y!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb77eac84-f3d9-4d98-8fea-9c5cef99ae46_1456x851.jpeg 848w, https://substackcdn.com/image/fetch/$s_!y5-y!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb77eac84-f3d9-4d98-8fea-9c5cef99ae46_1456x851.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!y5-y!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb77eac84-f3d9-4d98-8fea-9c5cef99ae46_1456x851.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!y5-y!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb77eac84-f3d9-4d98-8fea-9c5cef99ae46_1456x851.jpeg" width="1456" height="851" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b77eac84-f3d9-4d98-8fea-9c5cef99ae46_1456x851.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:851,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!y5-y!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb77eac84-f3d9-4d98-8fea-9c5cef99ae46_1456x851.jpeg 424w, https://substackcdn.com/image/fetch/$s_!y5-y!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb77eac84-f3d9-4d98-8fea-9c5cef99ae46_1456x851.jpeg 848w, https://substackcdn.com/image/fetch/$s_!y5-y!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb77eac84-f3d9-4d98-8fea-9c5cef99ae46_1456x851.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!y5-y!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb77eac84-f3d9-4d98-8fea-9c5cef99ae46_1456x851.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em>See BasePaint @ <a href="https://basepaint.xyz/">https://basepaint.xyz/</a>.</em></figcaption></figure></div><p><em>Avichal</em> - In blockchain things are either fungible or non-fungible. Most things are non-fungible&#8212;unique and irreplaceable. They are NFTs, which are their digital representations on the blockchain.</p><p>One of the first applications of NFTs is PFPs. It's a way to signal to others that you have excess capital if you can buy a $100k NFT or to display that you are an early adopter. Both of these are a means to signal social fitness. Humans as primates have a deep seeded desire and need to signal fitness to each other. In a digital realm, with people spending 12+ hours a day online, this will happen primarily online and through digitally scarce goods. For example, if you are in a video meeting on Zoom, most people don&#8217;t care what shoes you&#8217;re wearing. You may care because you are into shoes and craftsmanship. But a huge portion of the world buys nice shoes so that others can see it. In that environment, what you are wearing above the shoulder matters most.</p><p>NFTs are just the natural mechanism by which humans will socially signal to each other in a digital world. Knowing that something is cryptographically verifiable as scarce drives value, and this value drives social signaling. Instead of buying expensive shoes or an expensive watch or an expensive purse, people will buy expensive digital goods.</p><p>This reminds me of the early Internet where time spent had shifted online, but advertising dollars were still primarily spent on television and newspapers. Social time and work time has shifted online, but luxury goods spending and spend directed towards social signaling has not yet shifted online.</p><p>As a result, we have invested in many investments in the NFT space, like Magic Eden, the largest NFT marketplace across chains. When Electric first met the Magic Eden team, it was clear that they were one of the best in crypto and they understood the value of NFTs, memes, and digital culture.</p><p><em>Magic Eden is a leading multi-chain NFT marketplace that supports trading on Solana, Ethereum, Polygon, and Bitcoin Ordinals, known for low fees and user-friendly platform. Electric Capital led the last round and was an investor in the seed round. Other investors include Sequoia, Greylock, and Paradigm. The company&#8217;s most recent round valued them at $1.6 billion.</em></p><h3><strong>7. Have you heard of NFT-compatible credit cards from Mastercard?</strong></h3><p><em>Maria</em> - No!</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iAHi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F935df281-d9a0-465c-8f0e-0c3c2c45d327_750x1016.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iAHi!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F935df281-d9a0-465c-8f0e-0c3c2c45d327_750x1016.png 424w, https://substackcdn.com/image/fetch/$s_!iAHi!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F935df281-d9a0-465c-8f0e-0c3c2c45d327_750x1016.png 848w, https://substackcdn.com/image/fetch/$s_!iAHi!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F935df281-d9a0-465c-8f0e-0c3c2c45d327_750x1016.png 1272w, https://substackcdn.com/image/fetch/$s_!iAHi!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F935df281-d9a0-465c-8f0e-0c3c2c45d327_750x1016.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iAHi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F935df281-d9a0-465c-8f0e-0c3c2c45d327_750x1016.png" width="750" height="1016" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/935df281-d9a0-465c-8f0e-0c3c2c45d327_750x1016.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1016,&quot;width&quot;:750,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;hi Debit Card | Most Rewarding Crypto Debit Card | hi&quot;,&quot;title&quot;:&quot;hi Debit Card | Most Rewarding Crypto Debit Card | hi&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="hi Debit Card | Most Rewarding Crypto Debit Card | hi" title="hi Debit Card | Most Rewarding Crypto Debit Card | hi" srcset="https://substackcdn.com/image/fetch/$s_!iAHi!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F935df281-d9a0-465c-8f0e-0c3c2c45d327_750x1016.png 424w, https://substackcdn.com/image/fetch/$s_!iAHi!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F935df281-d9a0-465c-8f0e-0c3c2c45d327_750x1016.png 848w, https://substackcdn.com/image/fetch/$s_!iAHi!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F935df281-d9a0-465c-8f0e-0c3c2c45d327_750x1016.png 1272w, https://substackcdn.com/image/fetch/$s_!iAHi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F935df281-d9a0-465c-8f0e-0c3c2c45d327_750x1016.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em>See hi @ <a href="https://newsroom.mastercard.com/news/europe/en/newsroom/press-releases/en/2022/september-2022/hi-launches-world-s-first-nft-customizable-card-with-mastercard/">https://newsroom.mastercard.com/news/europe/en/newsroom/press-releases/en/2022/september-2022/hi-launches-world-s-first-nft-customizable-card-with-mastercard/</a>.</em></figcaption></figure></div><p><em>Tesvara</em> - I had a dinner with our president of SBC, Jay, where I learned of it for the first time. There&#8217;s an NFT Customizable Mastercard made by hi, a crypto &amp; fiat financial app. You use the card to spend fiat, stablecoins and other cryptos on products worldwide, and customize the cover with an NFT avatar that you verifiably own.</p><p>I think these kinds of real-world integrated initiatives are really good for helping conversion of people into crypto, or at least expose more people to it. And also being able to spend crypto from a card increases the utility of having crypto. And third, having something flashy like this is also a natural product to sell to online people, who by definition are already interested in these types of community signaling, and would be interested in more ways to show that they are part of some group.</p><h2><strong>Electric Capital&#8217;s 2024 Investments</strong></h2><h3><strong>8. The report highlights your investment in EigenLayer which introduced re-staking as a service, adding $30B+ in Total Value Locked (TVL) to Ethereum this year. How do you evaluate its impact on Ethereum and DeFi, and what&#8217;s next for EigenLayer?</strong></h3><p><em>EigenLayer offers &#8220;re-staking as a service&#8221; It is a middleware protocol on Ethereum that allows ETH validators to re-stake their tokens to secure additional protocols. Electric Capital participated in EigenLayer&#8217;s $14.5 million seed round in August 2022 and $50.8 million in a Series A round in February 2023.</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!HfM2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F640fd8aa-0690-4965-9917-8398703f4ffa_1456x749.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HfM2!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F640fd8aa-0690-4965-9917-8398703f4ffa_1456x749.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HfM2!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F640fd8aa-0690-4965-9917-8398703f4ffa_1456x749.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HfM2!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F640fd8aa-0690-4965-9917-8398703f4ffa_1456x749.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HfM2!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F640fd8aa-0690-4965-9917-8398703f4ffa_1456x749.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HfM2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F640fd8aa-0690-4965-9917-8398703f4ffa_1456x749.jpeg" width="1456" height="749" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/640fd8aa-0690-4965-9917-8398703f4ffa_1456x749.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:749,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!HfM2!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F640fd8aa-0690-4965-9917-8398703f4ffa_1456x749.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HfM2!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F640fd8aa-0690-4965-9917-8398703f4ffa_1456x749.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HfM2!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F640fd8aa-0690-4965-9917-8398703f4ffa_1456x749.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HfM2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F640fd8aa-0690-4965-9917-8398703f4ffa_1456x749.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Maria</em> - EigenLayer introduced Liquid Re-staking Tokens (LRTs) as a new sector, which added over $30B TVL to the Ethereum mainnet. EigenLayer is a great example of the developer flywheel. EigenLayer began with a small group of dedicated developers who unlocked a new use case. This new use case attracted capital, users, and new products. As TVL grew, more developers began to build AVSes for Eigenlayer, creating even more utility and attracting more capital, users, and developers.</p><h3><strong>9. Why did you invest in Monad?</strong></h3><p><em>Monad is an EVM-compatible Layer 1 blockchain designed to achieve high performance without sacrificing decentralization or security. Electric Capital participated in Monad&#8217;s $225 million in a Series A round in April 2024, led by Paradigm.</em></p><p><em>Tesvara - </em>Monad&#8217;s approach to achieving high performance while maintaining EVM compatibility bridges the gap between Ethereum&#8217;s robust developer ecosystem and the speed and efficiency needs of consumer applications.</p><p><em>Avichal</em> - The founders Eunice Giarta, Keone Hon and James Hunsaker are past big-tech managers, and Jump Trading alumni with expertise building high-frequency trading systems. Their experience translates well to creating a fast and scalable blockchain infrastructure.</p><p>Both Maria and Avichal stressed the potential of Monad to enable new use cases that require both Ethereum compatibility and high transaction throughput, such as on-chain order books and complex DeFi protocols. They view Monad as a potential catalyst for the next wave of blockchain application development.</p><h2><strong>Conclusion</strong></h2><h3><strong>10. Many of our club members new to crypto often ask &#8220;What should I work on?&#8221; As someone deeply involved in the space as VCs, what gaps do you see that our devs at Stanford could fulfill?</strong></h3><p>&#8220;Go build weirder applications.&#8221; - <em>Maria</em></p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>Developer Report. <em>Executive summary</em>. Retrieved December 30, 2024, from<a href="https://www.developerreport.com/developer-report?s=executive-summary"> https://www.developerreport.com/developer-report?s=executive-summary</a>.</p><p></p></div></div>]]></content:encoded></item><item><title><![CDATA[#62 - What Makes a Stablecoin, Stable?]]></title><description><![CDATA[An Interview with Dr. Gordon Liao, the Chief Economist and Head of Research at Circle International Financial, the origin of USDC.]]></description><link>https://review.stanfordblockchain.xyz/p/what-makes-a-stablecoin-stable</link><guid isPermaLink="false">https://review.stanfordblockchain.xyz/p/what-makes-a-stablecoin-stable</guid><dc:creator><![CDATA[Stanford Blockchain Club]]></dc:creator><pubDate>Wed, 15 Jan 2025 18:00:53 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!a8Bt!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd72da918-338e-4bb6-9c25-126ae3b774d1_1920x990.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!a8Bt!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd72da918-338e-4bb6-9c25-126ae3b774d1_1920x990.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!a8Bt!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd72da918-338e-4bb6-9c25-126ae3b774d1_1920x990.webp 424w, https://substackcdn.com/image/fetch/$s_!a8Bt!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd72da918-338e-4bb6-9c25-126ae3b774d1_1920x990.webp 848w, https://substackcdn.com/image/fetch/$s_!a8Bt!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd72da918-338e-4bb6-9c25-126ae3b774d1_1920x990.webp 1272w, https://substackcdn.com/image/fetch/$s_!a8Bt!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd72da918-338e-4bb6-9c25-126ae3b774d1_1920x990.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!a8Bt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd72da918-338e-4bb6-9c25-126ae3b774d1_1920x990.webp" width="1456" height="751" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d72da918-338e-4bb6-9c25-126ae3b774d1_1920x990.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:751,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;What is USDC? A Comprehensive Look at Circle's Stablecoin | Transfi&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="What is USDC? A Comprehensive Look at Circle's Stablecoin | Transfi" title="What is USDC? A Comprehensive Look at Circle's Stablecoin | Transfi" srcset="https://substackcdn.com/image/fetch/$s_!a8Bt!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd72da918-338e-4bb6-9c25-126ae3b774d1_1920x990.webp 424w, https://substackcdn.com/image/fetch/$s_!a8Bt!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd72da918-338e-4bb6-9c25-126ae3b774d1_1920x990.webp 848w, https://substackcdn.com/image/fetch/$s_!a8Bt!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd72da918-338e-4bb6-9c25-126ae3b774d1_1920x990.webp 1272w, https://substackcdn.com/image/fetch/$s_!a8Bt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd72da918-338e-4bb6-9c25-126ae3b774d1_1920x990.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="pullquote"><p><em><strong>Stanford Blockchain Review<br></strong>Volume 7, Article No. 2</em></p><p><em>&#128218; Author: </em><a href="https://x.com/AustinB31415">Austin Bennett</a> - Stanford Blockchain Club (VP of Finance)</p><p><em>&#127775;  Technical Prerequisite: Low</em></p></div><h2><strong>Stability in the Best of Times vs the Worst of Times</strong></h2><p>With the advent of a new federal regime, the crypto market has been more optimistic than ever. At the time of writing, Bitcoin is pushing $100,000 per token and altcoins have risen over 50% in a week.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> Despite these gains, however, some top coins have held constant in their price &#8211; and that&#8217;s a very good thing.</p><p>While speculating on the value of cryptocurrencies can generate excitement in the space, the volatility associated with it serves as a major barrier to adoption. Cryptocurrencies are transacted quickly, but when trading pairs fluctuate by more than 1% in an hour, the result is an unstable medium of exchange. Users seek decentralization, but not at the cost of a potential default. Stablecoins may be the solution &#8211; providing order in a market that&#8217;s rife with uncertainty.</p><p>A stablecoin is a cryptocurrency that attempts to fix its value in line with some underlying asset, be it a fiat currency, like US Dollars, or a commodity, like gold. By pegging their value to another asset, these tokens stabilize transactions by removing the incentive to speculate on their value. Using them is analogous to putting assets in a blockchain bank: you gain access to its fast, decentralized financial infrastructure, but still maintain a redeemable digital representation of them as a store of value.</p><p>Though what makes a stablecoin, <em>stable</em>? How do stablecoins keep their value? And to what extent should we be using stablecoins? I sat down with Dr. Gordon Liao, the Chief Economist of a major stablecoin provider, Circle, to learn a little bit more.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://review.stanfordblockchain.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Stanford Blockchain Review! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2><strong>All Dollars May Be Equal, but their Stablecoins Are Not</strong></h2><p>While the Department of the Treasury reports stablecoin usage has increased dramatically in the past few years,<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a> their presence in the crypto market is longstanding. Because they resist price fluctuations, stablecoins like Tether, USDC, and Dai are popular choices for transacting cryptocurrencies both with exchanges and on-chain. They all seek to hold a peg at a US Dollar, but their mechanisms for doing so vary dramatically.</p><p>Depending on their construction, some stablecoins prioritize decentralization, while others prioritize regulatory compliance. Although they may be pegged to the same asset, they have different processes for obtaining the tokens and may even require different kinds of assets to mint them. Clearly, designing a stablecoin is no easy feat &#8211; though according to Dr. Liao, much of the work has already been done.</p><p>He mentioned that asset-backed stablecoins are well studied, so their risks are relatively known. In particular, he mentioned that it&#8217;s important to have a highly liquid asset backing the stablecoin as well as ensure that the backing assets are segregated for the benefit of the stablecoin holders. Additionally, providers need to manage issues outside of the stablecoins themselves, such as credit, market, and operational risks. Given this large set of issues, Dr. Liao&#8217;s team recently published the <a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4926568">Token Capital Adequacy Framework</a><a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-3" href="#footnote-3" target="_self">3</a> to help synthesize all of these complicated metrics into one place. In doing so, he hopes to help create industry standards for stablecoins, so that users can make an informed choice about their provider.</p><h2><strong>Stability in Different States</strong></h2><p>Circle, for example, emphasizes transparency and stability. Unlike its peers, Circle publishes both their Reserves Composition<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-4" href="#footnote-4" target="_self">4</a> as well as advertises third-party daily reporting on the Circle Reserve Fund.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-5" href="#footnote-5" target="_self">5</a> Dr. Liao further explained that due to these reserves, a user should always be able to redeem their USDC for an equivalent fiat value in the long term. The assets backing the USDC stablecoins, themselves, are segregated; and therefore, offer strong assurance to Stablecoin users.</p><p>In the short-term, however, spot market prices for USDC can still be slightly different than a dollar. This is because tokens like USDC are traded on a secondary market, so short-term inefficiencies in trading pairs can cause the price of USDC to diverge slightly from its dollar peg. Usually, this is due to the liquidity of market makers. He gave the example of a crashing Bitcoin price, where traders will rush into USDC as a &#8220;safer&#8221; asset. In doing so, they can artificially inflate the value of USDC to be slightly over a dollar, before it quickly moves back to its pegged value.</p><p>Circle, however, doesn&#8217;t see much secondary market conversion against fiat. Dr. Liao noted that approximately 95% of the USDC redemptions occur on the primary market, directly through Circle as the issuer. This has held even in cases of uncertainty, such as the collapse of Silicon Valley Bank,<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-6" href="#footnote-6" target="_self">6</a> which led to billions in USDC redemptions.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-7" href="#footnote-7" target="_self">7</a> Thus, while the spot price of USDC may be slightly different at times, it doesn&#8217;t necessarily mean that USDC has lost its peg. It&#8217;s often just a matter of temporary market inefficiency.</p><p>On the other hand, cases like the SVB crash could provide evidence that transparency in assets backing a stablecoin may sometimes be a double-edged sword. While transparency is a highly desirable trait in a stablecoin, especially one with a multi-billion dollar company behind it,<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-8" href="#footnote-8" target="_self">8</a> listing the location of assets could certainly stoke fears in the market. That being said, one would be hard-pressed to find a crypto advocate who believes that absconding financial information is the best method of financial security. Blockchains are built on truth; and even if it sometimes hurts, it&#8217;s best that the public is well informed of the issues.</p><h2><strong>Stablecoins and Decentralized Finance</strong></h2><p>Beyond serving as a store of value, stablecoins have a long found utility as a method of powering Decentralized Finance (DeFi) applications. In fact, MakerDAO, one of the first major DeFi protocols, is a decentralized stablecoin provider that mints the popular US Dollar stablecoin, Dai, in exchange for an Ethereum lockup.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-9" href="#footnote-9" target="_self">9</a> Despite Circle&#8217;s existence as a centralized financial institution, Dr. Liao recognizes the importance of the DeFi ecosystem, claiming that it&#8217;s central to the blockchain and web3 space.</p><p>Unfortunately, much like the broader crypto market, the DeFi ecosystem is marred by a history of volatility. For example, consider the spectacular collapse of UST, an algorithmic US Dollar stablecoin managed by the Terra Blockchain.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-10" href="#footnote-10" target="_self">10</a> Instead of relying on equivalent backing in fiat funds, UST derived its value in part from its governance token, LUNA. Given their symbiotic relationship, when both tokens suddenly collapsed, it wiped out billions of dollars in value. For this reason, Dr. Liao argues that we should &#8220;want the safest form of a store of value and a unit of account to be the bedrock of DeFi.&#8221; By this criteria, USDC is certainly a strong contender to underpin the ecosystem.</p><p>At the same time, however, DeFi advocates could argue that there&#8217;s something inherently contradictory with using a centralized stablecoin, like USDC, to power DeFi infrastructure. While perhaps less secure, if we seek to truly embody the ethos of decentralized finance we may want stablecoins run through DAO Governance, such as MakerDAO&#8217;s Dai, Under this argument, however, one could reasonably argue that underpinning the global DeFi with a stablecoin tied to a national currency is centralized for the same reason &#8211; yet this hasn&#8217;t stopped the US Dollar from serving as a stablecoin gold standard.</p><p>Dr. Liao has a different perspective on what DeFi really means: &#8220;DeFi, overall, is not necessarily about decentralizing governance or decentralizing permissioning even, it&#8217;s about decentralizing balance sheet capacity.&#8221; From the failures he&#8217;s seen in the legacy financial system, he explains that he believes &#8220;the biggest innovation is the ability for you to really decentralize risk-taking to a greater set of participants that otherwise wouldn&#8217;t have the technology to participate.&#8221;</p><p>He offers the example of market making, where he claims that historically we&#8217;ve needed &#8220;highly sophisticated technology and highly sophisticated capital to participate&#8221;; thereby, leading to a highly concentrated market structure with high frequency trading firms running the show. Dr. Liao claims that &#8220;the difference with DeFi is that you can harness the technology to use a broader set of participants &#8211; it&#8217;s not just specialized firms, but also just everyday capital owners.&#8221;</p><p>Perhaps the best example of this collective impact are on Decentralized Exchanges (DEXs). Besides serving as an oasis for meme coins, DEXs democratize the traditional order book in a way that&#8217;s fast and easy-to-use. As a course assistant for the new Stanford GSB Pathfinder course, BUSGEN 102, I saw this first-hand. Students with no prior experience suddenly became traders and liquidity providers for our fictitious &#8220;Red&#8221; and &#8220;Blue&#8221; tokens on Uniswap&#8217;s Sepolia Testnet. No longer were they bound to centralized exchange to trade &#8211; they could do it with each other.</p><p>When DeFi provides this level of access, the issue of stablecoin centralization might be moot. After all, if our goal is to truly achieve a truly decentralized financial infrastructure then we should be able to work with all stablecoins without consequence &#8211; be it USDC, Tether, or Dai &#8211; bearing in mind that DeFi protocols may choose the same. There may not be a one-size-fits-all stablecoin, but the other ones are always just a swap away.</p><h2><strong>Stablecoins in the Modern Era</strong></h2><p>Recognizing these various preferences within the crypto community, Circle has also taken major steps to make USDC interoperable across a variety of chains. Dr. Liao discusses Circle&#8217;s software that allows users to burn USDC tokens across one chain and mint an equivalent amount on another chain. He claims this functionality is a major benefit of USDC, as it&#8217;s relatively seamless compared to using a bridge to move assets between blockchains, which historically are quite bug-prone. Dr. Liao acknowledged that while Circle&#8217;s trust&#8211;based intermediation is centralized, as DeFi continues to expand the need for these platforms will grow to prevent the space from becoming too fragmented.</p><p>Finding the right amount of centralization, if any, within blockchains has also gathered a substantial amount of regulatory interest. In addition to litigation, governments have experimented with a controversial new class of stablecoins known as Central Bank Digital Currencies (CBDCs). Usually issued by a central bank, these cryptocurrencies can be thought of as a stablecoin representation of a national currency. Given their blockchain-based implementations, they offer significant advantages over legacy banking systems with respect to efficiency; but at the same time, the transparency that makes crypto projects successful might be exactly what makes them dangerous.</p><p>While CBDCs may leverage blockchain technology, current implementations offer a marked departure from the stablecoin structures we know today. Perhaps the most well known implementation of a CBDC is the e-CNY, a stablecoin pegged to the Chinese Yuan organized by the People&#8217;s Bank of China. As of July 2024, the token has been piloted inside 29 pilot areas with personal identifiers being needed to access the token.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-11" href="#footnote-11" target="_self">11</a> Given its lukewarm reception, however, the Chinese government has become more aggressive with their adoption efforts with some cities mandating that public sector employees receive their salary in the token.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-12" href="#footnote-12" target="_self">12</a></p><p>Dr. Liao noted that the places where CBDCs have been launched in beta modes, tend to be more controlling. Indeed, the Royal Bank of Canada recently confirmed to CBC that they&#8217;ve shifted focus away from CBDC development and Jerome Powell,<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-13" href="#footnote-13" target="_self">13</a> Chairman of the Federal Reserve, has claimed that the creation of a US Dollar CBDC would require congressional approval.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-14" href="#footnote-14" target="_self">14</a> That being said, we may see the first government sponsored US dollar stablecoin in the Wyoming State Token,<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-15" href="#footnote-15" target="_self">15</a> which is set to launch in 2025.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-16" href="#footnote-16" target="_self">16</a> Regardless of the token provider, however, Dr. Liao still emphasizes that high standards are needed in terms of reserve backing.</p><p>Whether operated by a government entity, private corporation, or smart contract, the future of stablecoins remains an exciting prospect. Grounding the blockchain space in real-world assets may just bridge the gap between our banking institutions and a future of decentralized finance; but at the same time, we must remain vigilant to ensure this balance is properly struck. Without sufficiently decentralized stablecoin infrastructure, we risk losing Satoshi&#8217;s vision. Blockchains may devolve to the very centralized institutions they were created to avoid. Though, without proper stablecoin backing, our tokens may have no teeth. There&#8217;s no value to rely upon and no one to shoot if it all goes wrong.</p><h2>About the Authors</h2><h4><em>Gordon Liao</em></h4><p><a href="https://x.com/gordonliao">Gordon Liao</a> is the Chief Economist and Head of Research at Circle International Financial, a leading financial services firm building payment infrastructure for the internet. He is also a Research Fellow at the Cornell Fintech Initiative and a co-chair of the National Association for Business Economics Finance Roundtable. Gordon&#8217;s career has encompassed diverse areas within finance and technology, including fixed income relative value trading at the Harvard endowment, machine learning and AI at Kensho, policy advising on short-term funding markets at the Federal Reserve Board of Governors, and leading research and development in decentralized finance and tokenization. His research contributions have been published in respected journals such as the Review of Financial Studies and Journal of Financial Economics. His work has been featured in Bloomberg, WSJ, Barrons, PYMNTS, among others. Gordon holds a Ph.D. in Economics from Harvard University. He received his Bachelor&#8217;s degree in Applied Mathematics from Harvard College.</p><h4><em>Austin Bennett</em></h4><p><a href="https://x.com/AustinB31415">Austin Bennett</a> is the VP of Finance at Stanford Blockchain, pursuing a triple major in Data Science, Economics, and Public Policy as well as a Master&#8217;s in Computer Science. At Stanford, he works as a researcher for Stanford CodeX, the Computational Law Center, as well as the Finance Department at the Graduate School of Business. There, he helped create a GSB class on stablecoins called &#8220;BUSGEN 102: The Future of Money and Payments&#8221;, for which he serves as a course assistant. Beyond these pursuits, Austin is passionate about Blockchain Governance, Crypto Law, and his hometown Boston Bruins. </p><p></p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p><a href="https://coinmarketcap.com/, as of November 25th, 2024">https://coinmarketcap.com/</a>, as of November 25th, 2024. </p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-2" href="#footnote-anchor-2" class="footnote-number" contenteditable="false" target="_self">2</a><div class="footnote-content"><p><a href="https://home.treasury.gov/system/files/221/CombinedChargesforArchivesQ42024.pdf">https://home.treasury.gov/system/files/221/CombinedChargesforArchivesQ42024.pdf</a>. </p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-3" href="#footnote-anchor-3" class="footnote-number" contenteditable="false" target="_self">3</a><div class="footnote-content"><p><a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4926568">https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4926568</a>. </p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-4" href="#footnote-anchor-4" class="footnote-number" contenteditable="false" target="_self">4</a><div class="footnote-content"><p><a href="https://www.circle.com/transparency">https://www.circle.com/transparency</a>. </p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-5" href="#footnote-anchor-5" class="footnote-number" contenteditable="false" target="_self">5</a><div class="footnote-content"><p><a href="https://www.blackrock.com/cash/en-us/products/329365/">https://www.blackrock.com/cash/en-us/products/329365/</a>. </p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-6" href="#footnote-anchor-6" class="footnote-number" contenteditable="false" target="_self">6</a><div class="footnote-content"><p><a href="https://www.coindesk.com/business/2023/03/11/circle-confirms-33b-of-usdcs-cash-reserves-stuck-at-failed-silicon-valley-bank">https://www.coindesk.com/business/2023/03/11/circle-confirms-33b-of-usdcs-cash-reserves-stuck-at-failed-silicon-valley-bank</a>. </p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-7" href="#footnote-anchor-7" class="footnote-number" contenteditable="false" target="_self">7</a><div class="footnote-content"><p><a href="https://www.coindesk.com/markets/2023/03/11/circles-usdc-endured-1b-of-net-redemptions-since-silicon-valley-banks-shutdownhttps://www.coindesk.com/markets/2023/03/11/circles-usdc-endured-1b-of-net-redemptions-since-silicon-valley-banks-shutdown">https://www.coindesk.com/markets/2023/03/11/circles-usdc-endured-1b-of-net-redemptions-since-silicon-valley-banks-shutdown</a>. </p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-8" href="#footnote-anchor-8" class="footnote-number" contenteditable="false" target="_self">8</a><div class="footnote-content"><p><a href="https://www.coindesk.com/business/2024/07/30/circle-said-to-be-trading-around-5b-valuation-ahead-of-planned-ipo-sources">https://www.coindesk.com/business/2024/07/30/circle-said-to-be-trading-around-5b-valuation-ahead-of-planned-ipo-sources</a>.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-9" href="#footnote-anchor-9" class="footnote-number" contenteditable="false" target="_self">9</a><div class="footnote-content"><p><a href="https://makerdao.com/en/whitepaper">https://makerdao.com/en/whitepaper</a>. </p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-10" href="#footnote-anchor-10" class="footnote-number" contenteditable="false" target="_self">10</a><div class="footnote-content"><p><a href="https://www.coindesk.com/learn/the-fall-of-terra-a-timeline-of-the-meteoric-rise-and-crash-of-ust-and-luna">https://www.coindesk.com/learn/the-fall-of-terra-a-timeline-of-the-meteoric-rise-and-crash-of-ust-and-luna</a>. </p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-11" href="#footnote-anchor-11" class="footnote-number" contenteditable="false" target="_self">11</a><div class="footnote-content"><p><a href="https://www.forbes.com/sites/digital-assets/2024/07/15/a-2024-overview-of-the-e-cny-chinas-digital-yuan/">https://www.forbes.com/sites/digital-assets/2024/07/15/a-2024-overview-of-the-e-cny-chinas-digital-yuan/</a>. </p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-12" href="#footnote-anchor-12" class="footnote-number" contenteditable="false" target="_self">12</a><div class="footnote-content"><p><a href="https://www.cnn.com/2023/04/24/economy/china-digital-yuan-government-salary-intl-hnk/index.html">https://www.cnn.com/2023/04/24/economy/china-digital-yuan-government-salary-intl-hnk/index.html</a>. </p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-13" href="#footnote-anchor-13" class="footnote-number" contenteditable="false" target="_self">13</a><div class="footnote-content"><p><a href="https://www.cbc.ca/news/business/bakx-boc-cbdc-digital-currency-1.7326887">https://www.cbc.ca/news/business/bakx-boc-cbdc-digital-currency-1.7326887</a>. </p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-14" href="#footnote-anchor-14" class="footnote-number" contenteditable="false" target="_self">14</a><div class="footnote-content"><p><a href="https://www.coindesk.com/policy/2024/03/07/us-fed-chair-powell-says-nowhere-near-pursuing-cbdc-wont-spy-on-americans">https://www.coindesk.com/policy/2024/03/07/us-fed-chair-powell-says-nowhere-near-pursuing-cbdc-wont-spy-on-americans</a>. </p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-15" href="#footnote-anchor-15" class="footnote-number" contenteditable="false" target="_self">15</a><div class="footnote-content"><p><a href="https://www.wyoleg.gov/Legislation/2023/SF0127">https://www.wyoleg.gov/Legislation/2023/SF0127</a>. </p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-16" href="#footnote-anchor-16" class="footnote-number" contenteditable="false" target="_self">16</a><div class="footnote-content"><p><a href="https://www.wyomingpublicmedia.org/politics-government/2024-09-25/wyoming-stable-token-commission-aims-for-2025-launch-but-still-has-a-lot-of-legwork">https://www.wyomingpublicmedia.org/politics-government/2024-09-25/wyoming-stable-token-commission-aims-for-2025-launch-but-still-has-a-lot-of-legwork</a>. </p><p></p></div></div>]]></content:encoded></item><item><title><![CDATA[#61 - DeSci: Opportunities, Problems, and Perspectives]]></title><description><![CDATA[A tribulation on using crypto to accelerate the scientific frontier]]></description><link>https://review.stanfordblockchain.xyz/p/desci-opportunities-problems-and</link><guid isPermaLink="false">https://review.stanfordblockchain.xyz/p/desci-opportunities-problems-and</guid><dc:creator><![CDATA[Stanford Blockchain Club]]></dc:creator><pubDate>Mon, 13 Jan 2025 18:01:48 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!V1Ke!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc845fb65-91fd-4fda-91f8-e16fab17c112_1600x862.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Happy New Year! To our fantastic audience, thank you for your readership of Stanford Blockchain Review. And as we kick of 2025 with a deep dive into DeSci, we remain committed to bringing you relevant analysis of the crypto space all year long. I will be Editor of the Review this year and look forward to covering exciting projects and revelations this year. If you're interested in collaborating with Stanford Blockchain Club or Review, please reach out to me via Twitter &#8212; Tesvara <a href="https://x.com/tesvarajiang">@tesvarajiang</a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!V1Ke!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc845fb65-91fd-4fda-91f8-e16fab17c112_1600x862.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!V1Ke!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc845fb65-91fd-4fda-91f8-e16fab17c112_1600x862.png 424w, https://substackcdn.com/image/fetch/$s_!V1Ke!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc845fb65-91fd-4fda-91f8-e16fab17c112_1600x862.png 848w, https://substackcdn.com/image/fetch/$s_!V1Ke!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc845fb65-91fd-4fda-91f8-e16fab17c112_1600x862.png 1272w, https://substackcdn.com/image/fetch/$s_!V1Ke!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc845fb65-91fd-4fda-91f8-e16fab17c112_1600x862.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!V1Ke!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc845fb65-91fd-4fda-91f8-e16fab17c112_1600x862.png" width="1456" height="784" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c845fb65-91fd-4fda-91f8-e16fab17c112_1600x862.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:784,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!V1Ke!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc845fb65-91fd-4fda-91f8-e16fab17c112_1600x862.png 424w, https://substackcdn.com/image/fetch/$s_!V1Ke!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc845fb65-91fd-4fda-91f8-e16fab17c112_1600x862.png 848w, https://substackcdn.com/image/fetch/$s_!V1Ke!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc845fb65-91fd-4fda-91f8-e16fab17c112_1600x862.png 1272w, https://substackcdn.com/image/fetch/$s_!V1Ke!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc845fb65-91fd-4fda-91f8-e16fab17c112_1600x862.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="pullquote"><p><em><strong>Stanford Blockchain Review<br></strong>Volume 7, Article No. 1</em></p><p><em>&#128218; Author: </em><a href="https://x.com/0xfishylosopher">Jay Yu</a> - Stanford Blockchain Club &amp; Pantera Capital</p><p><em>&#127775;  Technical Prerequisite: Low</em></p></div><p><em>Many thanks to Andy Hung from Stanford Blockchain Club for reviewing and editing this article!</em></p><p>Science today sits on top of a paradox: on the one hand, scientific innovation thrives on open borders, open communication, and international collaboration. On the other hand, opaque and convoluted funding mechanisms, drawn-out research processes, and the uncertainty of breakthrough success forces scientists to fight for funding and mindshare from a handful of ivory-tower institutions and donors.</p><p>But what if, instead of having to seek funding and prestige from gatekeeper organizations, scientists could bootstrap their wildest ideas from a decentralized community? This is the promise of decentralized science: a paradigm shift in the way science is produced, accessed, and monetized. In this article, we will discuss how we might be able to use crypto rails to address three core issues in academic research: <strong>the accessibility of science, the funding of science, and the productionization of science</strong>.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://review.stanfordblockchain.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Stanford Blockchain Review! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>1 - The Accessibility of Science</h1><h2>The History of Open Science</h2><p>The concept of &#8220;<a href="https://en.wikipedia.org/wiki/Open_science#History">open science</a>&#8221; has a long history, and one that has been greatly intertwined with the development of the Internet [1]. The World Wide Web, for example, was originally conceived and developed as a tool for information-sharing between different universities around the world [2], and the idea of &#8220;open source software&#8221; also has its roots in an academic and research setting.</p><p>Open science is fundamentally about <em><strong>accessibility</strong></em> &#8211; of papers, data, and methodologies. Today, renting a single research paper for 48 hours from an academic publisher can cost over $30 &#8211; something completely unsustainable for scientists with a budget constraint and not affiliated with wealthy universities or research institutions [3]. Journal publishers have built billion-dollar businesses with profit margins that dwarf even those of the most successful tech companies, largely by positioning themselves as intermediaries using prestige. Critics argue that this publishing model diverts valuable resources away from productive research [4].</p><p>Within the &#8220;open science&#8221; movement, perhaps one of the most interesting and controversial projects is <a href="https://en.wikipedia.org/wiki/Sci-Hub">Sci-Hub</a>, a &#8220;shadow library&#8221; that provides direct access to millions of research papers and journals, regardless of copyright. Unsurprisingly, Sci-Hub, like many other open-access &#8220;shadow libraries,&#8221; have faced a lot of criticism over the ethical considerations, and in 2022, the head librarians of Z-Lib were arrested for copyright infringement and other charges [5]. These arrests sparked some alarm from the research community, with some calling this a modern day &#8220;burning of the Library of Alexandria&#8221; [6] &#8211; a testament to the vital role that open access plays in the process of academic research.</p><p>Today, in many fields of academic research, researchers often share their latest work via online &#8220;<a href="https://en.wikipedia.org/wiki/Preprint">preprint servers</a>&#8221; such as <a href="https://arxiv.org/">ArXiv</a>, before submitting their work to journals for peer review. Unlike shadow libraries such as Sci-Hub, which operate outside of the process of academic publishing, preprint journals are an integral part of the multi-year academic process. However, many of the popular preprint servers today rely on legacy infrastructure from over 30 years ago, and are hosted by centralized university servers. ArXiv, for example, was created by Cornell University researchers in 1991 [7]. Papers are usually directed and shared as PDFs, with no way for others to rate, comment, or otherwise interact with the content.</p><h2>Creating A Crypto-Based Preprint Server</h2><p>One of the most interesting ideas within the &#8220;decentralized science&#8221; movement <strong>is the creation of a modern, crypto-based preprint server</strong>. ResearchHub, for example, is a DeSci project led by Brian Armstrong, the founder and CEO of Coinbase [8]. In November 2024, it announced the ResearchHub journal [9], an open-access journal with immediate preprint publication services and a 21-day peer review. In line with crypto ethos, ResearchHub is attempting to challenge the status quo of intermediaries in the realm of scientific publishing.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!n7km!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3fd55b1-dd9a-4b25-b62e-4b112e3d0d8c_1600x817.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!n7km!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3fd55b1-dd9a-4b25-b62e-4b112e3d0d8c_1600x817.png 424w, https://substackcdn.com/image/fetch/$s_!n7km!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3fd55b1-dd9a-4b25-b62e-4b112e3d0d8c_1600x817.png 848w, https://substackcdn.com/image/fetch/$s_!n7km!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3fd55b1-dd9a-4b25-b62e-4b112e3d0d8c_1600x817.png 1272w, https://substackcdn.com/image/fetch/$s_!n7km!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3fd55b1-dd9a-4b25-b62e-4b112e3d0d8c_1600x817.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!n7km!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3fd55b1-dd9a-4b25-b62e-4b112e3d0d8c_1600x817.png" width="1456" height="743" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e3fd55b1-dd9a-4b25-b62e-4b112e3d0d8c_1600x817.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:743,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!n7km!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3fd55b1-dd9a-4b25-b62e-4b112e3d0d8c_1600x817.png 424w, https://substackcdn.com/image/fetch/$s_!n7km!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3fd55b1-dd9a-4b25-b62e-4b112e3d0d8c_1600x817.png 848w, https://substackcdn.com/image/fetch/$s_!n7km!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3fd55b1-dd9a-4b25-b62e-4b112e3d0d8c_1600x817.png 1272w, https://substackcdn.com/image/fetch/$s_!n7km!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3fd55b1-dd9a-4b25-b62e-4b112e3d0d8c_1600x817.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>ResearchHub Preprint Server. Source [10]</p><p>In its preprint server, ResearchHub augments the PDF hosting of traditional preprint servers with a modern, Reddit-like discussion forum, allowing researchers to receive instant feedback and discussion. This brings transparency into the traditionally opaque peer review process and opens a research article to the wider community for scientific discourse. Perhaps one of the most interesting aspects of ResearchHub is its use of the ResearchCoin token to create a novel incentivization system. ResearchHub incentivizes publication, reviewing, and collaboration using RSC, and allows users to create grants, tip other users, and gain voting rights using their tokens [11]. Peer reviewers, for example, are awarded 1000 USD worth of ResearchCoin each month [12].</p><p>ResearchHub is a great case study for how token incentives can be used to reimagine the publication process. <strong>Accessibility is fundamentally a financial problem</strong> &#8211; and by offering financial incentives for open-source work, ResearchHub may be able to create a compliant, open-access alternative not only to paywall publications, but also existing open-access services such as shadow libraries and preprint servers.</p><h2>Open Questions for Open Access</h2><p>Nonetheless, ResearchHub and other open-access DeSci platforms remain in an experimental stage, and there remain several open questions that still need to be addressed, including but not limited to:</p><ul><li><p><strong>Tokenomics Design</strong>: As mentioned previously, RSC tokens act as a core way to incentivize open science work on the platform, and can be used on the platform itself &#8211; in governance, research requests, and tips. But to what extent are recipients of RSC actually spending on-platform versus converting to fiat? Are these token incentives sustainable and effective in driving quality research? To what extent is on-platform research quality affected by market fluctuations? <em>This question of tokenomics design is perhaps the core question at stake for ResearchCoin and other token-based preprint servers.</em></p></li></ul><ul><li><p><strong>Disciplinary Fragmentation: </strong>The scientific process today is highly specialized, and there is no monolithic process of publication. Even within a single discipline, such as biology or computer science, there are numerous subfields, each with their own publications, conventions, and timelines. Today, many DeSci projects tend to focus on a single discipline or research area. ResearchHub&#8217;s journal, for example, focuses only on biomedical topics and publications. <em>This fragmentation potentially limits the scale and market for each individual project &#8211; after all, there are only so many professional endocrinologists in the world.</em> As DeSci projects develop, one likely scenario is that they will develop a federated structure, similar to professional organizations such as IEEE (Institute of Electronics and Electrical Engineers), containing numerous subcommittees and different conference conventions for each subtopic.</p></li></ul><ul><li><p><strong>Quality Control: </strong>Another key question for an open-access journal and preprint platform such as ResearchHub is quality control. <em>Compared to a traditional journal, a fully open-source platform may have a lower mean but higher variance in the quality of publication. </em>For every outstanding paper published on these platforms that is blocked on traditional venues, there are perhaps thousands of other papers inferior in quality. Although identity and authorship verification, token rewards, and reputational scores may help, they still don&#8217;t fully address the question of quality control. The effectiveness of all these metrics are also limited by the expertise of the community, and could potentially even be compromised by those farming for reputational points and token allocations.</p></li></ul><ul><li><p><strong>Association of Prestige: </strong>In science, as in many places, <em>scarcity creates prestige</em>. Publications such as <em>Nature</em> are coveted precisely because there is a rigorous selection process and low acceptance rate &#8211; the opposite of an open-access process. Since prestige requires a continuous process of curation, open-access journals where all articles are accepted run the risk of being seen as inferior in quality and content to traditional venues. This sense of conventional prestige is perhaps the strongest moat for traditional processes for scientific publication, and makes it uniquely difficult for a decentralized platform to disrupt.</p></li></ul><ul><li><p><strong>Community Accessibility: </strong>Finally, there is the question of audience. Are these open-access platforms such as ResearchHub aimed at an audience of professional scientists, or that of a wider, science-curious audience? At the moment, there does not seem to be a clear answer on either side, as some features &#8211; such as article publication and peer reviewing &#8211; seem to be geared towards professionals, whereas others, such as question posting and commenting seem geared towards a wider audience. This question of audience is important due to the differing incentives and levels of understanding that professionals and hobbyists have. One interesting idea could be for these decentralized science platforms to act as places for scientific communication and &#8220;technical translation&#8221; &#8211; to transform dense, jargon-ridden research papers into easily understandable ideas.</p></li></ul><h1>2 - The Funding of Science</h1><h2>Decentralized Incubation of Science</h2><p>Today, researchers can spend as much as half their time writing grant proposals for their work, and this vicious competition for funding can impact the quality of research work that they produce [13]. The current funding model leaves a gap for non-mainstream ideas, replication efforts, and early-stage applied research. One of the core missions of DeSci is to reform the funding process, and allow scientists to directly bootstrap their work from a decentralized community interested in their work.</p><p>One of the early pioneers in this space is <a href="https://www.molecule.xyz/">Molecule Protocol</a>, which provides biology researchers with a platform to create funding proposals for their research projects. For each project, Molecule will mint an IP NFT that represents the patentable research output. Ownership of this NFT is then fractionalized into &#8220;IP tokens&#8221; that are given to all of the participants that provided funding to the research project through &#8220;crowdsales&#8221; [14]. If the funding is successful and reaches its goal, the project then enters a negotiation phase, where the researcher, their research organization, and the funders will reach a licensing and revenue sharing agreement.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!8yC9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F391a349a-99ef-4b26-8892-cc4aa6084359_1265x833.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8yC9!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F391a349a-99ef-4b26-8892-cc4aa6084359_1265x833.png 424w, https://substackcdn.com/image/fetch/$s_!8yC9!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F391a349a-99ef-4b26-8892-cc4aa6084359_1265x833.png 848w, https://substackcdn.com/image/fetch/$s_!8yC9!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F391a349a-99ef-4b26-8892-cc4aa6084359_1265x833.png 1272w, https://substackcdn.com/image/fetch/$s_!8yC9!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F391a349a-99ef-4b26-8892-cc4aa6084359_1265x833.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8yC9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F391a349a-99ef-4b26-8892-cc4aa6084359_1265x833.png" width="1265" height="833" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/391a349a-99ef-4b26-8892-cc4aa6084359_1265x833.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:833,&quot;width&quot;:1265,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!8yC9!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F391a349a-99ef-4b26-8892-cc4aa6084359_1265x833.png 424w, https://substackcdn.com/image/fetch/$s_!8yC9!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F391a349a-99ef-4b26-8892-cc4aa6084359_1265x833.png 848w, https://substackcdn.com/image/fetch/$s_!8yC9!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F391a349a-99ef-4b26-8892-cc4aa6084359_1265x833.png 1272w, https://substackcdn.com/image/fetch/$s_!8yC9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F391a349a-99ef-4b26-8892-cc4aa6084359_1265x833.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Molecule DAO Projects [15]</p><p>Molecule&#8217;s IP NFT infrastructure underlies many of the popular DeSci protocols today. VitaDAO, for example, is a DeSci project focusing on accelerating research in the longevity space to provide tangible, usable research. Similarly, HairDAO is a DeSci organization aimed at creating hair loss solutions, while CerebrumDAO seeks to tackle Alzheimers and advance brain health.</p><p>Recently, Molecule has also introduced <a href="https://www.pump.science/">pump.science</a>, a DeSci funding platform on Solana inspired by memecoin launch platforms such as pump.fun. On pump.science, anyone can submit experiments with drug regimens for <em>C. elegans</em> worms, trying to create a regimen that will extend the lifespan of the worm [16]. Users can try to predict the success or failure of the various regimens, and the token liquidity can be used to fund the ongoing research. The data from the research will then be streamed back to users, who will have a stake in the success of the project.</p><p><em>The core observation in pump.science is that memecoins can be more than just for capturing the social media zeitgeist</em> &#8211; they can be used to bootstrap attention for socially productive ideas such as scientific experiments. In December of 2024, Siqi Chen, the founder of Runway, <a href="https://x.com/blader/status/1871747049315786940">shared on X</a> (fka. Twitter) his daughter Mira&#8217;s battle with a rare brain tumour. This prompted <a href="https://x.com/waddles_eth/status/1872146501373444099">an X user to launch a memecoin</a> named MIRA with half the supply dedicated to Siqi [17]. The token eventually allowed Siqi to <a href="https://x.com/blader/status/1872302462629286220">donate over a million dollars</a> towards a research study for his daughter&#8217;s rare brain cancer at the Hankinson Lab at the University of Colorado &#8211; showcasing the potential for memecoins to direct attention and capital to good causes [17].</p><p>Another prominent project working on this funding and bootstrapping aspect of decentralized science is BIO protocol. Building off of the success of Molecule and early DeSci DAOs such as VitaDAO, BIO protocol is a &#8220;financial layer&#8221; for DeSci, aiming to incubate a new generation of BioDAOs that provide researchers with community-sourced funding and resources to conduct pharmaceutical research and pharma products [16]. Some of the the latest projects in BIO protocol&#8217;s cohort include Long Covid Labs, aiming to provide a cure for long COVID patients, Curetopia, creating a space to unite families suffering from rare diseases, and Quantum Biology DAO, aiming to build a quantum biology microscope [18].</p><h2>Evaluating Science DAOs and Community Ownership of Science</h2><p>Interestingly, many DeSci projects today take shape in the format of a DAO, emphasizing the communal ownership of science and IPs. Aside from the historical reason that many early experiments in the DeSci space took shape as DAOs or DAO-launching platforms, there may be several reasons behind this. Firstly, launching a DAO token allows for a simple, straightforward way of crowdsourcing funding via a publicly tradable token. Secondly, this token creates a community of engaged stakeholders within a project that a researcher can communicate their findings with.</p><p>However, DAOs as an organizational form have faced many unique challenges in their development. One of the most prevalent is the question of <strong>community engagement and voter apathy</strong> &#8211; a problem systemic to the vast majority of DAOs. Even in popular DeSci DAOs, such as VitaDAO, voting quorum for any given proposal is around 10% of the total supply, and there are sometimes less than 10 votes for a proposal [18]. In VitaDAO&#8217;s recent VDP-157, for example, which introduces the concept of pump.science, the vote, which has only around 2M votes, is dominated by a single voter with 1.2M VITA tokens [19]. This poses centralization risks to the voting process.</p><p>Furthermore, unlike some of the largest protocol DAOs today, such as Uniswap, Arbitrum, or Optimism, the governance of VitaDAO and other BioDAOs occur entirely offchain, relying on Snapshot as a centralized service provider. Moreover, unlike protocol DAOs that use smart contracts to manage a &#8220;tangible&#8221; on-chain treasury,<em> it is not immediately clear how precisely a decentralized organization would govern an &#8220;intangible&#8221; asset of an IP NFT</em>. Compared to their centralized counterparts, decentralized governance could add a lot more latency and coordination problems to the research process, not to mention potential regulatory hurdles within the space.</p><p>Perhaps one of the core issues that decentralized funding and governance bring to this process of scientific research <strong>is the question of audience</strong>. Although the token-buying stakeholders may be interested in a project, they may not necessarily be fully aware of the research norms, context, and specialized knowledge of academic research. This would push researchers to have to do much more technical communication and &#8220;translate&#8221; their research to a generalist audience, a burden that may slow down frontier research efforts.</p><p>Moreover, for projects like pump.science that have adopted a memecoin launchpad model, it is unclear if the short attention cycles and reflexive market behaviour of memecoins would be able to uphold a multi-year, or oftentimes multi-decade process of biomedical research. <strong>Crypto and academic science simply operate on two different timescales.</strong> The average time to market for a new drug is 10-15 years, which is about as long as the entire history of blockchains [20]. If these protocols seek to return tangible products back to their stakeholders, they will likely only be able to tackle products in the late phases research productionization, rather than contribute to the cutting edge discovery process that many DeSci evangelists envision.</p><p>Finally, deploying new funding into science does not address the complex issues funders face to meaningfully define success. Researchers and funders have become dependent on publication and citation counts as metrics, but this incentive system has contributed to a <a href="https://www.nature.com/articles/483531a">reproducibility crisis</a>, undermining public trust and impeding genuine progress [21]. Merely diversifying the sources of funding fails to address the underlying inefficiencies inherent in current research institutions.</p><h1>3 - The Productionization of Science</h1><h2>From DeSci to DePIN: Productionizing Research IP</h2><p>As mentioned above, one of the core problems for DeSci is the timescale mismatch between crypto attention span and the time it takes to develop a wholly new scientific project. This means that as opposed to helping scientists do groundbreaking foundational research, perhaps DeSci&#8217;s edge and primary use case will be in the productionization of science &#8211; turning proven research into a specific consumer product. <strong>In this way, DeSci&#8217;s future can be seen as a domain-specific extension of DePIN &#8211; combining physical consumer products with tokenomics design to incentivize user behavior and aid researchers with data collection.</strong></p><p>Many of the major existing DeSci projects seem to recognize this &#8220;productionization&#8221; angle. Molecule&#8217;s Catalyze platform, for example, emphasizes that it is for &#8220;translational research&#8221; that will directly result in an IP that can be productionized, rather than for fundamental research [22]. Moreover, it has several restrictions on project size, asking scientists to raise each round of funding with &lt;$50k of funding and taking less than 12 months to complete [22]. Compared to traditional science, DeSci&#8217;s capacity for permissionless contributions is particularly well-suited to product translation. Motivated patients and users can act as citizen scientists, giving a project instant access to real-world feedback and expertise.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!aMbS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51240bd0-e29b-4eb4-9cd0-19eec3dbd122_586x815.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!aMbS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51240bd0-e29b-4eb4-9cd0-19eec3dbd122_586x815.png 424w, https://substackcdn.com/image/fetch/$s_!aMbS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51240bd0-e29b-4eb4-9cd0-19eec3dbd122_586x815.png 848w, https://substackcdn.com/image/fetch/$s_!aMbS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51240bd0-e29b-4eb4-9cd0-19eec3dbd122_586x815.png 1272w, https://substackcdn.com/image/fetch/$s_!aMbS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51240bd0-e29b-4eb4-9cd0-19eec3dbd122_586x815.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!aMbS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51240bd0-e29b-4eb4-9cd0-19eec3dbd122_586x815.png" width="586" height="815" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/51240bd0-e29b-4eb4-9cd0-19eec3dbd122_586x815.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:815,&quot;width&quot;:586,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!aMbS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51240bd0-e29b-4eb4-9cd0-19eec3dbd122_586x815.png 424w, https://substackcdn.com/image/fetch/$s_!aMbS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51240bd0-e29b-4eb4-9cd0-19eec3dbd122_586x815.png 848w, https://substackcdn.com/image/fetch/$s_!aMbS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51240bd0-e29b-4eb4-9cd0-19eec3dbd122_586x815.png 1272w, https://substackcdn.com/image/fetch/$s_!aMbS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51240bd0-e29b-4eb4-9cd0-19eec3dbd122_586x815.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Introduction of Lushair device [23]</p><p>So what might these &#8220;productionization&#8221; projects for DeSci actually look like? Recently, HairDAO has also partnered with Genpulse to create <a href="https://www.lushair.net/">Lushair</a>, the world&#8217;s first at-home AI-powered scalp analysis solution that provides data analysis on metrics including hair density, follicle activity, and oil state [23] [24]. Lushair, as a physical product, may provide us with some hints of what &#8220;productionized research&#8221; may look like in the future via DeSci:</p><ul><li><p>Crowdsourced funding from a widespread, known consumer pain point</p></li><li><p>Productionization of patents and analysis from existing, well-established scientific literature</p></li><li><p>Creation of physical products, such as detector devices, designed for everyday consumer use</p></li><li><p>Using DePIN-like tokenomics structures to crowdsource consumer data and provide real-world data for further medical literature</p></li></ul><p>As DeSci DAOs continue to develop these consumer-grade physical devices for their members, we can see a path for a business model for DeSci that looks similar to existing decentralized physical infrastructure networks (DePIN) such as Helium and Hivemapper.</p><h2>Crypto as a Distribution Channel for Evangelizing Research</h2><p>Aside from the creation of physical consumer products such as Lushair, one of decentralized science&#8217;s most promising aspects is the ability to allow existing but niche areas of research to be popularized into the mainstream. As we&#8217;ve mentioned before, the token holders within these DeSci communities are more likely to be generalist users with interest in a specific scientific problem, rather than being academic scientists themselves. This may present an &#8220;audience problem&#8221; for some of the previously mentioned projects that try to create a platform intended for academic scientists.</p><p>Rather than trying to bootstrap an audience of academic researchers or converting a generalist audience into research scientists, perhaps DeSci DAOs should lean into the &#8220;technical communication&#8221; part of science and actively engage their audience with digestible summaries and takeaways from research that can be applicable to their daily lives. Thus, it is possible that DeSci DAOs will act as &#8220;research amplifiers,&#8221; with products and educational programs that popularize science for a generalist audience.</p><p>Recently, we&#8217;ve seen how platforms such as pump.science have been inspired by the rise of memecoins. The attention-grabbing economics of memecoins could be particularly interesting in creating educational channels and awareness campaigns for science projects. <strong>However, memecoins only represent a top-of-funnel attention; the core challenge for a DeSci DAO is to optimize for retention, and transform this top-of-funnel attention into long term holders and stakeholders of these research projects.</strong></p><p>These education products can take place in many different ways. For example, these DeSci communities could create AI agents that are able to translate academic papers into attention-grabbing short videos, tweets, and other forms of media for a mass audience. We could also potentially see the development of &#8220;Masterclass-style&#8221; platforms that allow for the decentralized education of science. By developing these education-based products, DeSci projects can use a wider crypto community as a distribution channel and carve out another path to allow these communities to stay relevant, both within a crypto context as well as in the scientific community.</p><h2>Disciplinary Limitations for DeSci: The Lifestyle Relevance Test</h2><p>Throughout our discussion of DeSci, we&#8217;ve pretty much only focused on a single discipline &#8211; biology &#8211; that is not necessarily representative of research in other scientific disciplines. As we&#8217;ve suggested above, this may be because there are certain disciplinary limitations for DeSci. <strong>In other words, DeSci works far better for some scientific disciplines than for others.</strong></p><p>But what characterizes these disciplines with DeSci potential? I believe that the most important litmus test for DeSci is the <strong>&#8220;lifestyle relevance&#8221; test &#8211; does the science being conducted actually affect my day-to-day lifestyle?</strong></p><p>This litmus test, derived from the observation that most DeSci community members are an interested, informed public, explains why many of the DeSci projects we see today &#8211; from VitaDAO to HairDAO to CereberumDAO &#8211; focus on biology and medicine. The findings from these research projects could actually affect the day-to-day lifestyle of many consumers. Thus, in the productionization of existing research, DeSci organizations will likely prioritize projects that can create tangible products that create lifestyle changes for a mass consumer audience.</p><h1>Conclusion</h1><p>Throughout this article, we&#8217;ve examined three key aspects of science that the DeSci movement aims to tackle &#8211; the accessibility of science, the funding of science, and the productionization of science. While projects like ResearchHub and Molecule Protocol demonstrate promising innovations in open access publishing and research funding, many of these existing DeSci models face significant challenges around tokenomics, governance, and audience.</p><p>Because of the fundamental timescale mismatch between academic science and crypto, perhaps the future of DeSci will be in the productionization and distribution of research-proven solutions. Moreover, DeSci seems to be much more suitable for certain types of scientific problems &#8211; those that can affect behavioral and lifestyle changes &#8211; rather than covering all research in all disciplines. Thus, in the long term, DeSci&#8217;s future likely lies not in replacing the traditional scientific research process, but in complementing them by creating new funding vehicles, new publication channels, and new productionization venues that allow theoretical results to quickly translate into tangible consumer products. This perhaps is the ultimate goal of DeSci, translating abstract scientific advances into concrete, everyday products that can benefit humanity at large.</p><h1>About the Author</h1><p>Jay, or <a href="https://x.com/0xfishylosopher?lang=en">0xFishylosopher</a>, is a senior at Stanford pursuing a double major in Computer Science and Philosophy. He is President of the Stanford Blockchain Club and founder of the Stanford Blockchain Review. He researches designs for Decentralized Autonomous Organizations (DAOs) and blockchain governance with Stanford Law School faculty and as a Research Fellow for IC3. He also works on the investments team at Pantera Capital.</p><div><hr></div><h1>References</h1><p>[1] <a href="https://en.wikipedia.org/wiki/Open_science">https://en.wikipedia.org/wiki/Open_science</a></p><p>[2] <a href="https://home.web.cern.ch/science/computing/birth-web#:~:text=The%20web%20was%20originally%20conceived,and%20institutes%20around%20the%20world.&amp;text=The%20first%20website%20at%20CERN,on%20Berners%2DLee's%20NeXT%20computer">https://home.web.cern.ch/science/computing/birth-web</a></p><p>[3] <a href="https://www.forbes.com/sites/johncumbers/2023/04/28/the-desci-movement-will-crypto-really-solve-sciences-biggest-problems/">https://www.forbes.com/sites/johncumbers/2023/04/28/the-desci-movement-will-crypto-really-solve-sciences-biggest-problems/</a></p><p>[4] <a href="https://www.theguardian.com/science/2017/jun/27/profitable-business-scientific-publishing-bad-for-science">https://www.theguardian.com/science/2017/jun/27/profitable-business-scientific-publishing-bad-for-science</a></p><p>[5] <a href="https://www.vice.com/en/article/shadow-libraries-are-moving-their-pirated-books-to-the-dark-web-after-fed-crackdowns/">https://www.vice.com/en/article/shadow-libraries-are-moving-their-pirated-books-to-the-dark-web-after-fed-crackdowns/</a></p><p>[6] <a href="https://seattlespectator.com/2022/11/16/z-library-shutdown-raises-questions-about-educational-accessibility/">https://seattlespectator.com/2022/11/16/z-library-shutdown-raises-questions-about-educational-accessibility/</a></p><p>[7] <a href="https://info.arxiv.org/about/index.html">https://info.arxiv.org/about/index.html</a></p><p>[8] <a href="https://www.researchhub.com/team">https://www.researchhub.com/team</a></p><p>[9] <a href="https://www.researchhub.com/researchhub-journal">https://www.researchhub.com/researchhub-journal</a></p><p>[10] <a href="https://www.researchhub.com/paper/1299036/biomedical-publishing-past-historic-present-continuous-future-conditional">https://www.researchhub.com/paper/1299036/biomedical-publishing-past-historic-present-continuous-future-conditional</a></p><p>[11] <a href="https://docs.researchhub.com/welcome/what-is-researchhub">https://docs.researchhub.com/welcome/what-is-researchhub</a></p><p>[12] <a href="https://docs.researchhub.com/researchcoin/rsc-tokenomics">https://docs.researchhub.com/researchcoin/rsc-tokenomics</a></p><p>[13] <a href="https://www.vox.com/2016/7/14/12016710/science-challeges-research-funding-peer-review-process#1">https://www.vox.com/2016/7/14/12016710/science-challeges-research-funding-peer-review-process#1</a></p><p>[14] <a href="https://docs.molecule.to/documentation/ip-tokens/what-is-a-crowdsale-of-ipts">https://docs.molecule.to/documentation/ip-tokens/what-is-a-crowdsale-of-ipts</a></p><p>[15] </p><p>https://www.molecule.xyz/</p><p>[16] <a href="https://www.molecule.xyz/blog/solana-foundation-awards-grant-to-molecule-for-building-solana-native-desci-funding-platform-pump-science">https://www.molecule.xyz/blog/solana-foundation-awards-grant-to-molecule-for-building-solana-native-desci-funding-platform-pump-science</a></p><p>[17] <a href="https://www.coindesk.com/markets/2024/12/27/memecoin-degens-raise-millions-for-rare-cancer-research-after-a-father-s-plea">https://www.coindesk.com/markets/2024/12/27/memecoin-degens-raise-millions-for-rare-cancer-research-after-a-father-s-plea</a></p><p>[18] <a href="https://www.bio.xyz/blog-posts/desci-2-0-how-bio-will-unleash-biotech-revolution">https://www.bio.xyz/blog-posts/desci-2-0-how-bio-will-unleash-biotech-revolution</a></p><p>[19] VitaDAO VDP-157 Snapshot vote: </p><p>https://snapshot.box/#/s:vote.vitadao.eth/proposal/0x01fdb4f1a1fa5dfbca0cd3a046740e752f05c221ae01be543987ad639988aeec/votes</p><p>[20] <a href="https://pharmaoffer.com/blog/how-long-does-it-take-to-bring-new-medicines-to-the-market/#:~:text=How%20long%20does%20it%20typically,new%20drug%20to%20be%20approved%3F&amp;text=On%20average%2C%20it%20takes%20about,initial%20discovery%20to%20the%20market">https://pharmaoffer.com/blog/how-long-does-it-take-to-bring-new-medicines-to-the-market</a></p><p>[21] <a href="https://www.nature.com/articles/483531a">https://www.nature.com/articles/483531a</a></p><p>[22] <a href="https://docs.molecule.to/documentation/catalyst/submit-a-project">https://docs.molecule.to/documentation/catalyst/submit-a-project</a></p><p>[23] <a href="https://x.com/GenpulseAI/status/1865976938663428461">https://x.com/GenpulseAI/status/1865976938663428461</a></p><p>[24] <a href="https://www.lushair.net/about">https://www.lushair.net/about</a></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://review.stanfordblockchain.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Stanford Blockchain Review! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[#60 - Cross-chain MEV: Challenges and Solutions]]></title><description><![CDATA[An Analysis of Multi-Chain Value Extraction in Decentralized Finance]]></description><link>https://review.stanfordblockchain.xyz/p/60-cross-chain-mev-challenges-and</link><guid isPermaLink="false">https://review.stanfordblockchain.xyz/p/60-cross-chain-mev-challenges-and</guid><dc:creator><![CDATA[Stanford Blockchain Club]]></dc:creator><pubDate>Tue, 07 Jan 2025 20:30:47 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!9sL1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41867a33-5a04-40e9-9527-3a81e96da277_1400x839.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="pullquote"><p><em><strong>Stanford Blockchain Review</strong><br>Volume 6, Article No. 10</em></p><p><em>&#9997;&#127995; Author: <a href="https://x.com/__billygao">Billy Gao</a> &#8212; Stanford Blockchain Club &amp; Pantera Capital</em></p><p>&#11088;&#65039; Technical Prerequisite: Intermediate</p></div><p>The rise of interconnected blockchains has unleashed a powerful new form of value extraction, the cross-chain MEV. Cross chain MEV refers to the profits that can be extracted by exploiting inefficiencies, price discrepancies, or transaction dynamics across multiple blockchain networks. With the rise of cross-chain bridges and multi-chain protocols, MEV has grown from a single-chain concept into a multi-chain opportunity that reshapes how liquidity and assets flow within DeFi. To grasp its full potential and implications, we must delve deeper into what cross-chain MEV is, how it works, and the challenges and opportunities it presents. </p><p><em>A glossary below provides definitions to assist in understanding this article! For our readers new to blockchain, please use it as a resource.</em></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://review.stanfordblockchain.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Stanford Blockchain Review! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>Understanding Cross-Chain MEV</h2><p>At its simplest, cross-chain MEV builds on MEV as it was first understood in single-blockchain environments like Ethereum. Initially, MEV&#8212;short for Miner Extractable Value&#8212;described profits miners could earn by reordering, including, or excluding transactions within a block to maximize their gains. Over time, as validators replaced miners and the term evolved to Maximal Extractable Value, the scope expanded to include strategies such as front-running, back-running, and arbitrage.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!9sL1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41867a33-5a04-40e9-9527-3a81e96da277_1400x839.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9sL1!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41867a33-5a04-40e9-9527-3a81e96da277_1400x839.png 424w, https://substackcdn.com/image/fetch/$s_!9sL1!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41867a33-5a04-40e9-9527-3a81e96da277_1400x839.png 848w, https://substackcdn.com/image/fetch/$s_!9sL1!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41867a33-5a04-40e9-9527-3a81e96da277_1400x839.png 1272w, https://substackcdn.com/image/fetch/$s_!9sL1!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41867a33-5a04-40e9-9527-3a81e96da277_1400x839.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9sL1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41867a33-5a04-40e9-9527-3a81e96da277_1400x839.png" width="1400" height="839" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/41867a33-5a04-40e9-9527-3a81e96da277_1400x839.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:839,&quot;width&quot;:1400,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:224073,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!9sL1!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41867a33-5a04-40e9-9527-3a81e96da277_1400x839.png 424w, https://substackcdn.com/image/fetch/$s_!9sL1!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41867a33-5a04-40e9-9527-3a81e96da277_1400x839.png 848w, https://substackcdn.com/image/fetch/$s_!9sL1!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41867a33-5a04-40e9-9527-3a81e96da277_1400x839.png 1272w, https://substackcdn.com/image/fetch/$s_!9sL1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41867a33-5a04-40e9-9527-3a81e96da277_1400x839.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image by <a href="https://medium.com/blockchain-biz/what-is-a-cross-chain-mev-8e778c59c9f1">OnTokens</a></figcaption></figure></div><p>Cross-chain MEV extends these opportunities to a multi-chain context. When interconnected blockchains facilitate the movement of assets and liquidity between them, they create inefficiencies, which would be price differences for the same asset on different chains, imbalanced liquidity pools, or gaps in transaction ordering. Cross-chain MEV capitalizes on these inefficiencies, allowing traders, liquidators, and arbitrageurs to profit by executing strategies that span multiple blockchains. As a simple example, if a token trades for $10 on Ethereum but $9.50 on Polygon, a trader can buy the token on Polygon, bridge it to Ethereum, and sell it there for a profit.</p><p>This interconnected nature of blockchains means that cross-chain MEV is no longer limited to isolated opportunities on a single network. It's about identifying and exploiting inefficiencies across a web of blockchains while managing the complexities of bridging delays, transaction fees, and security vulnerabilities.</p><h2>The Role and Benefits of Cross-Chain MEV</h2><p>Cross-chain MEV plays a crucial role in enhancing market efficiency, especially within the DeFi ecosystem. By capitalizing on price discrepancies and liquidity imbalances, arbitrageurs help align prices and redistribute liquidity across chains. For instance, without arbitrage, a token might remain overvalued on one chain and undervalued on another, creating fragmented markets. Cross-chain MEV resolves these inefficiencies, ensuring that prices converge and liquidity flows where it is needed most. This alignment benefits not only traders but also DeFi protocols and their users, as it fosters a more stable and predictable financial environment.</p><p>It is this exact competitive nature of cross-chain MEV that drives innovation in the blockchain space. Traders, developers, and protocol designers are constantly pushing the boundaries of technology to identify opportunities, optimize execution, and mitigate risks. For example, advanced algorithms, real-time analytics tools, and automated bots are being developed to detect and act on cross-chain MEV opportunities. Additionally, protocols are integrating MEV-aware features to enhance user experience and security. This continuous pursuit of efficiency and innovation benefits the broader blockchain ecosystem, as the tools and techniques developed for cross-chain MEV often have wider applications.</p><p>Certain forms of cross-chain MEV, such as liquidations, are vital for the stability of DeFi protocols. When a borrower's collateral falls below the required threshold on a lending platform, liquidators step in to repay the loan and claim the collateral. In a multi-chain context, liquidators may need to bridge assets from one chain to another to complete this process. By enabling these activities, cross-chain MEV helps prevent bad debt from accumulating and ensures that lending platforms remain solvent.</p><h2>Key Challenges</h2><p>Despite its potential, cross-chain MEV introduces numerous challenges. One of the most critical challenges in cross-chain MEV is transaction latency. Unlike single-chain operations that execute near-instantaneously, cross-chain transactions often require bridging mechanisms that introduce significant delays. These delays can span several minutes to hours, creating substantial risks in fast-moving markets. For instance, a trader identifying a price discrepancy between Ethereum and Polygon might initiate an arbitrage strategy using a cross-chain bridge. However, by the time the transaction is finalized, market conditions may shift, erasing the profit margin or even resulting in a loss. This unpredictability makes cross-chain MEV inherently risky and often inaccessible to those without precise timing tools and real-time data. Moreover, high latency discourages smaller participants from engaging in cross-chain MEV, as they lack the resources to mitigate timing risks effectively. Larger players with access to private bridging solutions or faster infrastructure gain a disproportionate advantage, exacerbating centralization risks.</p><p>Another significant issue is the lack of atomicity in cross-chain operations. Atomicity ensures that a transaction either executes completely or fails entirely. In cross-chain MEV, this is crucial for preventing partial execution, where one leg of a transaction completes, but another fails. For example, a trader might buy an asset on one blockchain but be unable to sell it on another due to delays or errors in the bridging process. This creates stranded transactions where assets are locked in a bridge or on a destination chain, resulting in financial losses. The inherent differences in block times, consensus mechanisms, and transaction ordering rules between blockchains make achieving atomicity challenging. While atomic swaps provide some solutions, their scope is limited, and implementing them across heterogeneous blockchain networks remains complex.</p><p>Security vulnerabilities also plague cross-chain MEV, particularly due to the reliance on cross-chain bridges. These bridges, which enable interoperability between blockchains, are often the weakest link in the ecosystem and frequent targets for hackers. Bridge exploits have led to billions of dollars in losses, shaking trust in cross-chain operations. In 2022, bridge exploits accounted for approximately 69% of all cryptocurrencies stolen, amounting to nearly $2 billion across 13 separate incidents. Notable examples include the Ronin Bridge hack, where attackers stole $622 million, and the Wormhole Bridge exploit, resulting in a $320 million loss. The vulnerabilities arise from several factors, including smart contract bugs, centralized control, and consensus conflicts between connected blockchains. For example, poorly coded bridge contracts can be exploited to drain funds, while bridges controlled by a small group of validators create single points of failure. Differences in consensus mechanisms can also introduce inconsistencies that attackers can exploit. These vulnerabilities deter participants from engaging in cross-chain MEV strategies reliant on bridges, limiting the potential of multi-chain operations.</p><p>The issue of centralization risks further complicates cross-chain MEV. Large trading firms, institutional investors, and specialized MEV extraction platforms dominate the space, leveraging their advanced tools, substantial capital, and sophisticated infrastructure to gain a competitive edge. This creates an uneven playing field, where smaller participants are unable to compete effectively. Centralized entities may exploit their position to influence transaction ordering, fee structures, or even bridge operations, undermining the fairness of the ecosystem. This concentration of power contradicts the decentralized ethos of blockchain technology and raises concerns about equity and accessibility. Addressing these risks is critical to ensuring that cross-chain MEV opportunities remain inclusive and do not lead to systemic imbalances.</p><p>Fragmented infrastructure across blockchain networks presents another hurdle. Each blockchain operates with its own protocols, consensus mechanisms, and fee structures, creating a fragmented environment that complicates cross-chain MEV strategies. Traders must navigate these differences to execute their strategies effectively, which adds complexity and increases the likelihood of errors. For instance, a trader attempting a multi-chain arbitrage strategy may encounter inconsistent fee structures, divergent block times, and protocol-specific rules. These challenges require significant time and resources to overcome, limiting the scalability of cross-chain MEV and reducing its accessibility to smaller participants.</p><p>Additionally, ethical and regulatory concerns are increasingly relevant in the context of cross-chain MEV. While certain forms of MEV, such as arbitrage, contribute to market efficiency, others&#8212;like front-running and sandwich attacks&#8212;are seen as exploitative and detrimental to fairness. From a regulatory perspective, some MEV activities may be viewed as akin to insider trading or market manipulation, particularly in jurisdictions with strict financial regulations. This uncertainty creates additional risks for participants, who must navigate a shifting legal landscape while engaging in cross-chain MEV. Ethically, the concentration of MEV opportunities among a few large players exacerbates inequities within the DeFi ecosystem, undermining the principles of inclusivity and fairness that underpin blockchain technology.</p><p>The accumulation of noise and errors adds yet another layer of complexity. In cross-chain MEV strategies, each bridging operation or transaction introduces potential rounding errors, slippage, or discrepancies in token valuations. Over time, these inaccuracies can accumulate, eroding profit margins and creating inconsistent outcomes. Mitigating these issues requires robust risk management frameworks and precise execution, which are challenging to implement in the fragmented and volatile multi-chain environment.</p><p>These challenges collectively underscore the complexity of cross-chain MEV and its impact on the broader DeFi ecosystem. Addressing these obstacles is essential to ensure that cross-chain MEV evolves into a force for innovation and efficiency, rather than a source of instability or inequality. To unlock the full potential of cross-chain MEV while addressing its challenges, the community has developed and continues to refine innovative solutions. These advancements focus on improving speed, security, and fairness, making cross-chain MEV more sustainable and accessible.</p><h2>Emerging Solutions</h2><p>Enhanced bridging mechanisms are a cornerstone of these solutions. Traditional bridges, often slow and prone to vulnerabilities, are being replaced with faster and more secure alternatives. For instance, developers are introducing bridging protocols that optimize block confirmations, enabling faster transaction finality. Some advanced bridges allow partial confirmations on the destination chain, expediting asset transfers without compromising security. Integration with Layer-2 solutions, such as rollups, further enhances these mechanisms. By batching transactions, rollups reduce fees and time-to-finality, making cross-chain MEV strategies more cost-effective. Additionally, dynamic fee structures on bridges adapt to network conditions, lowering costs during periods of low activity and making MEV opportunities more accessible to smaller participants.</p><p>Atomic transactions and advanced protocols are also pivotal. Hash Time-Locked Contracts (HTLCs) provide a widely adopted solution for enabling atomic swaps between blockchains. These contracts ensure that transactions execute fully or fail entirely, preventing scenarios where assets are stranded mid-operation. Cross-chain consensus protocols like Cosmos' Inter-Blockchain Communication (IBC) enable direct and secure communication between blockchains, allowing for atomic interactions and reducing the complexity of cross-chain operations. Emerging solutions focus on composable atomicity, enabling multiple atomic operations to execute simultaneously across chains. This innovation reduces risks and enhances the efficiency of complex multi-chain strategies.</p><p>To address the centralization risks associated with transaction sequencing, decentralized sequencers and fair order execution mechanisms are being explored. Decentralized sequencers distribute transaction ordering power among multiple participants, eliminating single points of control and reducing the risk of biased ordering. Some protocols implement auction systems for transaction ordering, allowing participants to bid for inclusion in blocks. This transparent and competitive process ensures fairness while preventing undue influence by centralized entities. Randomized sequencing introduces another layer of fairness by selecting transaction orders randomly, reducing the likelihood of manipulation.</p><p>MEV-resistant protocol designs further enhance the ecosystem's resilience. Encrypted mempools, for example, conceal transaction details until they are executed, preventing malicious actors from exploiting pending transactions. Threshold encryption delays the visibility of transaction data until specific conditions are met, thwarting exploitative practices like front-running. Fee-burning mechanisms, such as those introduced in Ethereum's EIP-1559, reduce the financial incentives for MEV extraction, aligning participant behavior with network health.</p><p>Interoperability standards play a critical role in reducing fragmentation across blockchains. Standardized bridge designs ensure consistent operation across networks, minimizing bugs and vulnerabilities. Unified messaging protocols, such as LayerZero and Polkadot's XCMP, enable seamless data and asset exchanges between blockchains, simplifying cross-chain MEV operations. Interoperable smart contracts automate trustless interactions between chains, improving efficiency and reducing manual intervention.</p><p>Finally, AI and machine learning are revolutionizing cross-chain MEV by enhancing decision-making and execution. AI algorithms analyze large datasets across multiple blockchains in real-time, identifying arbitrage opportunities or liquidation risks faster than human traders. Predictive modeling anticipates market conditions, such as price movements or network congestion, enabling traders to adapt proactively. Automated bots powered by AI execute complex strategies with precision, ensuring timely and accurate multi-chain operations.</p><p>These solutions collectively transform cross-chain MEV, addressing its challenges while unlocking new opportunities for traders, developers, and DeFi protocols. As these innovations mature, they pave the way for a more interconnected, efficient, and equitable blockchain ecosystem.</p><h2>Conclusion</h2><p>To conclude, cross-chain MEV represents a transformative force in the DeFi landscape, offering lucrative opportunities and driving technological innovation. However, it also presents significant challenges that must be addressed to ensure its potential is realized equitably. By integrating enhanced bridging mechanisms, atomic transaction protocols, decentralized sequencing, and MEV-resistant designs, the blockchain community can mitigate these challenges and create a more sustainable and inclusive ecosystem. As blockchain networks continue to interconnect, cross-chain MEV will remain a critical driver of efficiency and evolution, shaping the future of decentralized finance.</p><div><hr></div><h2>Glossary</h2><p><strong>Arbitrage</strong>: The practice of taking advantage of price differences for the same asset across different markets.</p><p><strong>Atomicity</strong>: A property in computing and blockchain where a transaction either completes entirely or not at all, with no partial execution.</p><p><strong>DeFi (Decentralized Finance)</strong>: Financial services and products built on blockchain technology that operate without traditional intermediaries.</p><p><strong>Front-running</strong>: The practice of entering into a transaction based on advance knowledge of pending transactions.</p><p><strong>Layer-2</strong>: A secondary framework or protocol built on top of an existing blockchain that helps with scaling and transaction speeds.</p><p><strong>Liquidity</strong>: The ease with which an asset can be converted to cash or traded without affecting its market price.</p><p><strong>MEV (Maximal Extractable Value)</strong>: The maximum value that can be extracted from block production in excess of the standard block reward and gas fees.</p><p><strong>Mempool</strong>: A waiting area for transactions that have been broadcast to a blockchain network but not yet confirmed.</p><p><strong>Rollups</strong>: A scaling solution that processes transactions outside the main blockchain while maintaining security through the main chain.</p><p><strong>Sandwich Attack</strong>: A type of front-running where an attacker places one transaction before and one after a target transaction.</p><h2><strong>About The Author</strong></h2><p>Billy Gao (<a href="https://x.com/__billygao">@__billygao)</a> serves as the Head of Governance for the Stanford Blockchain Club, an analyst at Pantera Capital, and is a sophomore studying computer science. He has experience in the blockchain ventures industry, especially in Hong Kong, having worked with venture capital firms with a focus on DeFi. </p><p>.</p>]]></content:encoded></item><item><title><![CDATA[#59 - The $3.6 Billion Bet: How Polymarket Called the 2024 Election Before Anyone Else]]></title><description><![CDATA[An exploration into blockchain prediction markets as powerful forecasting tools]]></description><link>https://review.stanfordblockchain.xyz/p/59-the-36-billion-bet-how-polymarket</link><guid isPermaLink="false">https://review.stanfordblockchain.xyz/p/59-the-36-billion-bet-how-polymarket</guid><dc:creator><![CDATA[Stanford Blockchain Club]]></dc:creator><pubDate>Sun, 29 Dec 2024 18:00:43 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!gavK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79bc0d5c-dca0-4d1a-ba32-5e6f6a876b36_1812x1013.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!gavK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79bc0d5c-dca0-4d1a-ba32-5e6f6a876b36_1812x1013.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gavK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79bc0d5c-dca0-4d1a-ba32-5e6f6a876b36_1812x1013.jpeg 424w, https://substackcdn.com/image/fetch/$s_!gavK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79bc0d5c-dca0-4d1a-ba32-5e6f6a876b36_1812x1013.jpeg 848w, https://substackcdn.com/image/fetch/$s_!gavK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79bc0d5c-dca0-4d1a-ba32-5e6f6a876b36_1812x1013.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!gavK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79bc0d5c-dca0-4d1a-ba32-5e6f6a876b36_1812x1013.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gavK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79bc0d5c-dca0-4d1a-ba32-5e6f6a876b36_1812x1013.jpeg" width="1456" height="814" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/79bc0d5c-dca0-4d1a-ba32-5e6f6a876b36_1812x1013.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:814,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:161814,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!gavK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79bc0d5c-dca0-4d1a-ba32-5e6f6a876b36_1812x1013.jpeg 424w, https://substackcdn.com/image/fetch/$s_!gavK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79bc0d5c-dca0-4d1a-ba32-5e6f6a876b36_1812x1013.jpeg 848w, https://substackcdn.com/image/fetch/$s_!gavK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79bc0d5c-dca0-4d1a-ba32-5e6f6a876b36_1812x1013.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!gavK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79bc0d5c-dca0-4d1a-ba32-5e6f6a876b36_1812x1013.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="pullquote"><p><em><strong>Stanford Blockchain Review<br></strong>Volume 6, Article No. 9</em></p><p><em>&#128218; Author: </em><a href="https://x.com/tesvarajiang">Tesvara Jiang</a> - Stanford Blockchain Club</p><p><em>&#127775;  Technical Prerequisite: Low</em></p></div><p>On Election Day 2024, when most were fixated on the New York Times live election board, an undercurrent of digital activity preferred Polymarket&#8212;an emerging blockchain-native prediction market that had eclipsed $3.6 billion in bets solely on the election by the end of the night.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> The climax of Polymarket&#8217;s fame came at 11:43 p.m. ET, nearly six hours before the Associated Press called the election, when Polymarket&#8217;s odds for Trump had already reached 95%.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a> You can&#8217;t really call this casual gambling for dads anymore. The staggering volume and its appearance on national and international headlines signaled a watershed moment in decentralized finance (DeFi) and crypto.</p><p>Yet this excitement is tampered by increasing regulatory scrutiny. The U.S. ban on Polymarket remains firm, and on November 14th, the FBI raided the home of Polymarket&#8217;s founder and CEO, Shayne Coplan.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-3" href="#footnote-3" target="_self">3</a> Against the controversy, urgent questions arise for observers, users, and investors alike: <em>What are blockchain prediction markets? How does it work? Are Polymarket odds a genuine reflection of collective sentiment, or do they echo the biases of a niche demographic? And what is the long-term future of blockchain-native prediction?</em></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://review.stanfordblockchain.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Stanford Blockchain Review! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3><strong>Overview on Polymarket and Blockchain</strong></h3><p>First, let&#8217;s open Polymarket and take a look: <a href="https://polymarket.com/">https://polymarket.com/</a>. A brief tour of the user interface reveals a design reminiscent of Twitter&#8217;s minimalist aesthetic. There is a scrollable feed of ongoing markets, each represented by a small profile image and a concise descriptive blurb. Tabbing between categories like &#8220;Sports,&#8221; &#8220;Politics,&#8221; or &#8220;Crypto&#8221; is intuitive, and a simple clickable sidebar displays implied probabilities, alongside &#8220;Yes&#8221; or &#8220;No&#8221; buy buttons with their dollar equivalents. Notably, there is no overt mention of crypto on the front page. I would argue that the platform&#8217;s clean, approachable look aims to encourage frequent visits to check up on continuous updates to odds and trading volumes. It almost tricks you into checking back every few hours because these numbers update constantly, making the entire experience feel less like a formal betting exchange and more like a casual, interactive social media.</p><p>The moment one attempts to place bets, however, Polymarket&#8217;s crypto infrastructure reveals itself. Instead of credit cards, users connect an Ethereum-compatible wallet, such as MetaMask. Since U.S. residents are barred from trading due to a 2022 agreement with the Commodity Futures Trading Commission, Americans must use a VPN.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-4" href="#footnote-4" target="_self">4</a> This necessity surfaces the uncomfortable regulatory gray zone of crypto. While the site&#8217;s interface feels welcoming, the underlying technical requirements and legal constraints remain obstacles for many potential users. Despite these hurdles, Polymarket&#8217;s unprecedented $3.6 billion in volume&#8212;much of it still held on the platform&#8212;and command of 84% of all money placed in election-related betting,<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-5" href="#footnote-5" target="_self">5</a> speaks positively on the demand for decentralized prediction markets even under regulatory limitations.</p><p>To understand the broader significance of Polymarket, it is helpful to consider the evolution of internet infrastructure. As Chris Dixon&#8217;s <em>Read Write Own</em> explains, Web1 offered a read-only online environment, Web2 introduced read-write capabilities through centralized social media platforms, and Web3 envisions a decentralized read-write-own paradigm. In this future, digital content and financial transactions migrate from corporate servers to decentralized networks. Polymarket exemplifies this vision by shifting trust from intermediaries to cryptographic proofs and publicly verifiable smart contracts. If blockchain becomes the default infrastructure of the future internet following this vision, Polymarket&#8217;s billions in event-based wagers will be minimal compared to the future valuation of decentralized finance.</p><p>One of the clearest use cases for blockchain even early in the days of its existence is actually prediction markets. When blockchain emerged with Bitcoin in 2008, its transformative power lay behind three fundamental components: trust, decentralization, and ownership. Cryptographic verification obviates the need for intermediaries; decentralization distributes authority across a global network, mitigating risks of manipulation; and smart contracts automatically execute predefined rules without human intervention, ensuring that participants' funds are locked and released solely based on verified outcomes. This programmatic enforcement of rules, combined with on-chain asset ownership, grants participants control independent of central gatekeepers. These elements are the foundations of the broader Web3 vision&#8212;and just so happens to be exactly what a prediction platform would want to be built on. Polymarket, built upon these principles, offers participants secure deposits, transparent rules, and verifiable evidence of their holdings.</p><p>When bettors review an event on Polymarket, the platform first tells you the Rules explaining what exact outcome must occur for you to "win." Upon clicking "confirm," a smart contract is signed on the Polygon blockchain using a modified version of the Conditional Token Framework (CTF). Each purchased share&#8212;backed by USDC stablecoins&#8212;emerges as a verifiable ERC-1155 token redeemable if the user's prediction proves correct.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-6" href="#footnote-6" target="_self">6</a> Lastly, Polymarket's oracle system (UMA Optimistic Oracle) settles outcomes efficiently <em>(read more here: </em><a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-7" href="#footnote-7" target="_self">7</a><em>)</em>. Thus, each trade, position, and resolution exists on a transparent, trust-minimized ledger.</p><h3><strong>Election Key Events</strong></h3><p>That&#8217;s enough about how it works. The Polymarket timeline of events surrounding the 2024 election provides a fascinating case study on prediction markets in action. Throughout the campaign, odds fluctuated as traders responded to news, polls, and even large, idiosyncratic bets from &#8220;whale&#8221; accounts:</p><h4><strong>Between August 8 &#8211; October 6, 2024:</strong></h4><p>Polymarket data shows Donald Trump vs Kamala Harris as essentially a coin flip, each candidate sitting within a 2% lead on any given day.</p><h4><strong>By October 24, 2024:</strong></h4><p>Trump&#8217;s odds climb to a significant lead. Researchers identify four accounts&#8212;Fredi9999, Theo4, PrincessCaro, and Michie&#8212;as belonging to a single French trader who has placed $28 million in total on Trump. When questioned, the Polymarket team stated that they don&#8217;t believe this to be market manipulation but rather a single high-stakes bettor operating on personal conviction.</p><h4><strong>On October 25, 2024:</strong></h4><p><em>The New York Times</em> runs a story about the French trader, driving increased traffic to Polymarket&#8217;s election markets <em>(see here: </em><a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-8" href="#footnote-8" target="_self">8</a><em>)</em></p><h4><strong>On October 30, 2024:</strong></h4><p>Trump&#8217;s odds peak at 67% on Polymarket, spurred by growing speculation and broader news coverage.</p><h4><strong>On November 3, 2024:</strong></h4><p>News reports poll shows Harris leading in Iowa, causing Trump&#8217;s odds to slip to 53%. Regulated betting sites like Kalshi report similar volatility.</p><h4><strong>On November 4, 2024 (Pre-Election Day):</strong></h4><p>Trump&#8217;s odds stand at 58%, Harris at 42%. Total betting volume hits $3.01 billion on Polymarket.</p><h4><strong>On November 5, 2024 (Election Day):</strong></h4><p>Trump&#8217;s odds close at 61%, Harris at 39%. Overall volume tops $3.4 billion on Polymarket. Bitcoin also rises by 4%, reflecting a surge in crypto sentiment tied to the election.</p><h4><strong>On November 6, 2024:</strong></h4><p>Polymarket settles its election market, and payouts are sent to those who bought Trump. Daily active users remain high as new participants rush in to make post-election bets on cabinet appointments and other upcoming political decisions. </p><h4><strong>On November 7&#8211;10, 2024:</strong></h4><p>Widespread discussions erupt on social media and mainstream outlets about Polymarket&#8217;s accuracy and potential demographic bias. Ongoing debates highlight the possibility of larger players influencing these markets, but also validate the platform&#8217;s speed in &#8220;calling&#8221; election outcomes ahead of most traditional channels.</p><h4><strong>Throughout December 2024:</strong></h4><p>Polymarket rolls out markets for Senate races and global sporting events, extending the model of decentralized prediction into a broader range of real-world outcomes. Bitcoin&#8217;s price hits new all-time highs (ATHs) every day, sustaining the post-election rally within crypto markets. Bitcoin hits $100K.</p><h3><strong>Bias Concerns</strong></h3><p>Critics wonder if Polymarket&#8217;s odds genuinely reflect collective sentiment, or if they merely reveal the biases of a niche demographic. Because of the Ethereum wallet plus VPN barrier to entry, the users of Polymarket are restricted to the subset of people who could overcome it, generally younger, crypto-savvy, and politically homogeneous. Initial inefficiencies definitely exist, either due to these demographic concentrations or whale traders, but research on prediction markets by Wolfers and Zitzewitz (2004) on profit-driven arbitrage argues that there only needs to be a handful of knowledgeable traders to correct biases like these. In theory, prediction markets are the best aggregators of diverse information&#8212;pulling info from its participants by incentivizing them financially to reveal their true beliefs. This aggregation process should, ideally, generate forecasts that approximate the &#8220;true&#8221; probabilities of events more accurately than any single expert could.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-9" href="#footnote-9" target="_self">9</a> Although Polymarket&#8217;s early user base is more on the homogeneous side, the financial incentives trump biases and will continue to beat concerns with the growth of crypto. And as the market size of crypto grows (on the optimistic side, having Bitcoin market size overtake gold) and network effects pull more people into the ecosystem, the deeper liquidity will also combat these skews.</p><p>Coplan also built Polymarket on the belief that a large enough group of uninformed traders can collectively provide more accurate predictions than any single expert. This builds on prior research about market efficiency&#8212;even if individual traders lack complete information, the aggregation of their behaviors will reveal meaningful probabilities.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-10" href="#footnote-10" target="_self">10</a> The platform's decentralized architecture adds another dimension to this dynamic. While blockchain technology ensures unprecedented transparency in betting patterns and market movements, it also enables holders of typically unavailable information to trade anonymously, leaking inaccessible information into the market without revealing their identity.</p><h3><strong>Hedging Use Cases and Future Applications</strong></h3><p>The platform's potential extends far beyond political betting into risk management tools. We can consider how companies might use prediction markets to hedge against geopolitical risks. Here is one example: semiconductor manufacturers and tech companies heavily dependent on Taiwan Semiconductor Manufacturing Company (TSMC) could use prediction markets to hedge against potential disruption risks. If a company expects to lose $50 million in revenue from supply chain disruptions in the event of increased Taiwan-China tensions, they could offset this by taking positions in prediction markets tied to regional stability indicators. This creates a natural hedge&#8212;if tensions escalate and disrupt chip supply, the prediction market positions would pay out, helping to offset business losses.</p><p>Cross-chain expansion and ongoing smart contract enhancements could further bolster Polymarket's user base and reliability. Integrating other blockchains (e.g., Arbitrum or zkSync) might help bypass Polygon's occasional congestion, while refined contract designs could introduce advanced risk management features like stop-loss orders or partial share selling. These technical improvements, combined with a more welcoming regulatory environment, stand to transform Polymarket from a niche crypto curiosity into a robust financial instrument that everyday investors would consider alongside their stocks, bonds, and ETFs.</p><p>Looking ahead, these markets could become integral to how organizations manage complex geopolitical and environmental uncertainties. The combination of transparent blockchain infrastructure, sophisticated market mechanisms, and real-world applications positions platforms like Polymarket to potentially reshape how we collectively predict and prepare for future events. If prediction markets can secure regulatory certainty while maintaining their decentralized benefits, they could evolve into sophisticated tools for both information aggregation and risk management. Success will require balancing technical innovation with regulatory compliance, and demographic diversity with market efficiency. As the Web3 space continues to evolve, prediction markets may serve as an important testing ground for broader applications of blockchain technology in financial markets.</p><p>The Harris-Trump election demonstrated Polymarket&#8217;s potential to outperform traditional forecasting methods. However, the FBI raid on Coplan's home afterwards pinpointed the gray regulatory environment the platform must navigate. For decentralized prediction markets to fulfill their promise of democratizing information aggregation and risk management, they must first resolve these fundamental tensions between innovation and oversight. Only then can they truly evolve into mainstream financial instruments that reshape how we collectively prepare our financial strategies with future events.</p><div><hr></div><p><em>Huge thank you to <a href="https://x.com/kolelee_">Kole Lee</a> and <a href="https://x.com/shaunmmaguire">Shaun Maguire</a> for thoughts and conversations that inspired me to research Polymarket and write this piece. </em></p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>Haseeb. (n.d.). <em>The wisdom of the market: Why polymarket outperforms traditional polls in election predictions?</em>. ChainCatcher. <a href="https://www.chaincatcher.com/en/article/2150776">https://www.chaincatcher.com/en/article/2150776</a>. </p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-2" href="#footnote-anchor-2" class="footnote-number" contenteditable="false" target="_self">2</a><div class="footnote-content"><p>Wisnefski, S. (n.d.). <em>Markets News, November 7, 2024: Stocks extend post-election rally as fed cuts rates; S&amp;P 500, nasdaq close at record highs</em>. Investopedia. <a href="https://www.investopedia.com/dow-jones-today-11072024-8741258">https://www.investopedia.com/dow-jones-today-11072024-8741258</a>. </p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-3" href="#footnote-anchor-3" class="footnote-number" contenteditable="false" target="_self">3</a><div class="footnote-content"><p>Pargas, S., Atkins, C., &amp; Winter, T. (2024, November 14). FBI raids polymarket CEO Shayne Coplan&#8217;s apartment, Seizes Phone: Source. NBCNews.com. <a href="https://www.nbcnews.com/tech/tech-news/fbi-raids-polymarket-ceo-shayne-coplans-apartment-seizes-phone-source-rcna180180">https://www.nbcnews.com/tech/tech-news/fbi-raids-polymarket-ceo-shayne-coplans-apartment-seizes-phone-source-rcna180180</a>.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-4" href="#footnote-anchor-4" class="footnote-number" contenteditable="false" target="_self">4</a><div class="footnote-content"><p><em>Release number 8478-22</em>. CFTC. (n.d.). <a href="https://www.cftc.gov/PressRoom/PressReleases/8478-22">https://www.cftc.gov/PressRoom/PressReleases/8478-22</a>.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-5" href="#footnote-anchor-5" class="footnote-number" contenteditable="false" target="_self">5</a><div class="footnote-content"><p>@shayne_coplan. (2024, May 2). Twitter.<a href="https://x.com/shayne_coplan/status/1854229669077307583"> https://x.com/shayne_coplan/status/1854229669077307583</a>. </p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-6" href="#footnote-anchor-6" class="footnote-number" contenteditable="false" target="_self">6</a><div class="footnote-content"><p>Rock&#8217;n&#8217;Bock. (2024, November 26). <em>Crypto prediction market development like Polymarket</em>. RSS. <a href="https://rocknblock.io/blog/crypto-prediction-market-development-like-polymarket?t">https://rocknblock.io/blog/crypto-prediction-market-development-like-polymarket?t</a>.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-7" href="#footnote-anchor-7" class="footnote-number" contenteditable="false" target="_self">7</a><div class="footnote-content"><p>How are preduction markets resolved? - Polymarket Learn. (n.d.). <a href="https://learn.polymarket.com/docs/guides/markets/how-are-markets-resolved/?t">https://learn.polymarket.com/docs/guides/markets/how-are-markets-resolved/?t</a>.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-8" href="#footnote-anchor-8" class="footnote-number" contenteditable="false" target="_self">8</a><div class="footnote-content"><p>Sorkin, A. R., Mattu, R., Warner, B., Kessler, S., Merced, M. J. D. L., &amp; Hirsch, L. (2024a, October 24). <em>The French Connection to online bets on trump</em>. The New York Times. <a href="https://www.nytimes.com/2024/10/24/business/dealbook/polymarket-trump-trader.html">https://www.nytimes.com/2024/10/24/business/dealbook/polymarket-trump-trader.html</a>.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-9" href="#footnote-anchor-9" class="footnote-number" contenteditable="false" target="_self">9</a><div class="footnote-content"><p>Wolfers, Justin, and Eric Zitzewitz. 2004. "Prediction Markets." <em>Journal of Economic Perspectives</em>, 18 (2): 107&#8211;126<strong>.</strong>DOI: 10.1257/0895330041371321. </p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-10" href="#footnote-anchor-10" class="footnote-number" contenteditable="false" target="_self">10</a><div class="footnote-content"><p>Chayka, K. (2024a, October 23). <em>The crypto betting platform predicting a Trump win</em>. The New Yorker. <a href="https://www.newyorker.com/culture/infinite-scroll/the-crypto-betting-platform-predicting-a-trump-win?t">https://www.newyorker.com/culture/infinite-scroll/the-crypto-betting-platform-predicting-a-trump-win?t</a>.</p></div></div>]]></content:encoded></item></channel></rss>