Posts

A Deep Dive into Kroma's ZK Fraud Proof Design

This blog explores how Kroma implement a zk fraud proof system.Read Now

A Deep Dive into RIP-7560

This blog explores how RIP-7560 works, which is a native Account Abstraction proposal in Ethereum ecosystem.Read Now

Building a Cross-Chain Domain System with XCM

This article discusses how to build a unified cross-chain domain name system using Polkadot's XCM (Cross-Chain Messaging) protocol, exploring various approaches to handle domain transfers, namespace maintenance, and data consistency across multiple chains while highlighting the challenges and potential solutions in implementing such a system.Read Now

How to Develop ZK Fraud Proof with RISC0

This blog explores how to use Risc0 to build a zk fraud proof system.Read Now

A Deep Dive into Cannon

This blog explores how Cannons work in the op stack, which is a fraud proof system designed by Optimism.Read Now

Fraud Proof in OP Stack

This blog explores how fraud proofs work in the op stack.Read Now

Erasure Code Deep Dive

This article explains how Erasure Code works as a data redundancy technique in blockchain systems, exploring its mathematical principles (including checksum redundancy and Reed-Solomon Code), different encoding dimensions, and current challenges in providing efficient data availability and fault tolerance compared to traditional backup methods.Read Now

MultiLocation and MultiAsset Deep Dive

This article provides a comprehensive technical deep dive into Substrate's MultiLocation and MultiAsset data structures, which are fundamental components of XCM (Cross-Chain Message Passing) protocol that enable precise identification of locations and assets in cross-chain transactions within the Polkadot ecosystem.Read Now

Interoperable State Machine Protocol Deep Dive

The article explains how the Interoperable State Machine Protocol (ISMP) aims to improve Polkadot's cross-chain communication by offloading message routing from the relay chain through a HTTP-like protocol with state proofs, utilizing components like Merkle mountain range tries and various protocol roles (Host, Router, Modules, Dispatcher, and Consensus Client) to enable trustless parachain communication without relying on the relay chain.Read Now

Celestia Deep Dives

The article provides a detailed technical analysis of Celestia, a modular blockchain project built on Cosmos SDK that focuses on solving data availability challenges through innovative features like 2D Reed-Solomon Encoding, Namespace Merkle Trees, and a dual-network architecture consisting of Consensus and Data Availability networks, while also discussing its current limitations and challenges.Read Now

Introduction to Data Availability

The article explains data availability (DA) in blockchain systems, focusing on two main solutions - Data Availability Sampling (DAS) using Erasure Code and Data Availability Committee (DAC) - while discussing their implementations, comparative advantages, limitations, and critical importance for blockchain security and scalability.Read Now

Introduction to Light clients

The article explains light clients as resource-efficient alternatives to full nodes in blockchain networks, discussing their implementation across different consensus mechanisms (PoW, PoS, BFT), their potential to replace RPC services, and current challenges while highlighting their importance for network accessibility and decentralization.Read Now

ERC-4337 - From Zero To Hero

ERC-4337 introduces Account Abstraction through a system of smart contract wallets, bundlers, paymasters, and aggregators, evolving from basic EOA+CA model to a comprehensive solution that enables more flexible transaction handling and better user experience on Ethereum.Read Now

The Power of Meta Transactions (Written by Notion AI)

Meta transactions enable users to interact with blockchain applications without directly paying gas fees by utilizing relayers, making blockchain more accessible while discussing their benefits in gaming, finance, and identity management, along with their current limitations.Read Now

Jibber-Jabber On Meta Transactions

The article provides a comprehensive overview of meta transactions in Ethereum, explaining how they allow users to interact with the blockchain without directly paying gas fees by using relayers and various implementations like ERC-2612, ERC-2770/2771, and GSN, while also discussing their current limitations and challenges.Read Now

Shamir Secret Share Intros

The article explains Shamir Secret Sharing (SSS), a cryptographic protocol that uses polynomial interpolation to split a secret into multiple shares, requiring a predetermined number of shares to reconstruct the original secret, making it useful for secure key management and access control systems.Read Now

How to Provide Shared Security for Multiple Chains

The article compares different approaches to providing shared security across multiple chains, focusing on how Polkadot's parachain design and Cosmos' Interchain Security tackle this challenge, while also briefly discussing Ethereum's Rollup solutions for context.Read Now

How a Robust Account System Should Be Designed

The article presents Substrate's account system as a well-thought-out solution that addresses many of the limitations present in other blockchain account systems, particularly compared to Ethereum's ERC-4337.Read Now

Social Recovery in Substrate

The article explains Substrate's Social Recovery functionality, which allows users to regain access to their lost accounts through a system of pre-designated trusted friends who must reach a threshold consensus, enhancing wallet security and user experience while maintaining safeguards against malicious recovery attempts.Read Now

Batch calls in Substrate

The article explains how Substrate's batch calls functionality allows users to execute multiple transactions with a single signature through the utility.batch method, improving user experience by reducing the number of required signatures while maintaining security.Read Now

How to make our wallets more user-friendly

The article explains Substrate's Session Keys functionality, which improves wallet user experience and security by allowing users to set temporary hot keys for specific operations, eliminating the need for frequent password input.Read Now

A Strong Account in Substrate - Proxy Account

The article provides a comprehensive overview of Substrate's Proxy Account functionality, explaining how account security can be enhanced by splitting account functionalities into different proxy accounts with varying permissionsRead Now

MultiSig in Substrate

This blog explores how MultiSig works in Substrate.Read Now

© By Whisker —@whisker17