Posts
A Deep Dive into Kroma's ZK Fraud Proof Design
This blog explores how Kroma implement a zk fraud proof system.Read Now
A Deep Dive into RIP-7560
This blog explores how RIP-7560 works, which is a native Account Abstraction proposal in Ethereum ecosystem.Read Now
Building a Cross-Chain Domain System with XCM
This article discusses how to build a unified cross-chain domain name system using Polkadot's XCM (Cross-Chain Messaging) protocol, exploring various approaches to handle domain transfers, namespace maintenance, and data consistency across multiple chains while highlighting the challenges and potential solutions in implementing such a system.Read Now
How to Develop ZK Fraud Proof with RISC0
This blog explores how to use Risc0 to build a zk fraud proof system.Read Now
A Deep Dive into Cannon
This blog explores how Cannons work in the op stack, which is a fraud proof system designed by Optimism.Read Now
Fraud Proof in OP Stack
This blog explores how fraud proofs work in the op stack.Read Now
Erasure Code Deep Dive
This article explains how Erasure Code works as a data redundancy technique in blockchain systems, exploring its mathematical principles (including checksum redundancy and Reed-Solomon Code), different encoding dimensions, and current challenges in providing efficient data availability and fault tolerance compared to traditional backup methods.Read Now
MultiLocation and MultiAsset Deep Dive
This article provides a comprehensive technical deep dive into Substrate's MultiLocation and MultiAsset data structures, which are fundamental components of XCM (Cross-Chain Message Passing) protocol that enable precise identification of locations and assets in cross-chain transactions within the Polkadot ecosystem.Read Now
Interoperable State Machine Protocol Deep Dive
The article explains how the Interoperable State Machine Protocol (ISMP) aims to improve Polkadot's cross-chain communication by offloading message routing from the relay chain through a HTTP-like protocol with state proofs, utilizing components like Merkle mountain range tries and various protocol roles (Host, Router, Modules, Dispatcher, and Consensus Client) to enable trustless parachain communication without relying on the relay chain.Read Now
Celestia Deep Dives
The article provides a detailed technical analysis of Celestia, a modular blockchain project built on Cosmos SDK that focuses on solving data availability challenges through innovative features like 2D Reed-Solomon Encoding, Namespace Merkle Trees, and a dual-network architecture consisting of Consensus and Data Availability networks, while also discussing its current limitations and challenges.Read Now
Introduction to Data Availability
The article explains data availability (DA) in blockchain systems, focusing on two main solutions - Data Availability Sampling (DAS) using Erasure Code and Data Availability Committee (DAC) - while discussing their implementations, comparative advantages, limitations, and critical importance for blockchain security and scalability.Read Now
Introduction to Light clients
The article explains light clients as resource-efficient alternatives to full nodes in blockchain networks, discussing their implementation across different consensus mechanisms (PoW, PoS, BFT), their potential to replace RPC services, and current challenges while highlighting their importance for network accessibility and decentralization.Read Now
ERC-4337 - From Zero To Hero
ERC-4337 introduces Account Abstraction through a system of smart contract wallets, bundlers, paymasters, and aggregators, evolving from basic EOA+CA model to a comprehensive solution that enables more flexible transaction handling and better user experience on Ethereum.Read Now
The Power of Meta Transactions (Written by Notion AI)
Meta transactions enable users to interact with blockchain applications without directly paying gas fees by utilizing relayers, making blockchain more accessible while discussing their benefits in gaming, finance, and identity management, along with their current limitations.Read Now
Jibber-Jabber On Meta Transactions
The article provides a comprehensive overview of meta transactions in Ethereum, explaining how they allow users to interact with the blockchain without directly paying gas fees by using relayers and various implementations like ERC-2612, ERC-2770/2771, and GSN, while also discussing their current limitations and challenges.Read Now
Shamir Secret Share Intros
The article explains Shamir Secret Sharing (SSS), a cryptographic protocol that uses polynomial interpolation to split a secret into multiple shares, requiring a predetermined number of shares to reconstruct the original secret, making it useful for secure key management and access control systems.Read Now
How to Provide Shared Security for Multiple Chains
The article compares different approaches to providing shared security across multiple chains, focusing on how Polkadot's parachain design and Cosmos' Interchain Security tackle this challenge, while also briefly discussing Ethereum's Rollup solutions for context.Read Now
How a Robust Account System Should Be Designed
The article presents Substrate's account system as a well-thought-out solution that addresses many of the limitations present in other blockchain account systems, particularly compared to Ethereum's ERC-4337.Read Now
Social Recovery in Substrate
The article explains Substrate's Social Recovery functionality, which allows users to regain access to their lost accounts through a system of pre-designated trusted friends who must reach a threshold consensus, enhancing wallet security and user experience while maintaining safeguards against malicious recovery attempts.Read Now
Batch calls in Substrate
The article explains how Substrate's batch calls functionality allows users to execute multiple transactions with a single signature through the utility.batch method, improving user experience by reducing the number of required signatures while maintaining security.Read Now
How to make our wallets more user-friendly
The article explains Substrate's Session Keys functionality, which improves wallet user experience and security by allowing users to set temporary hot keys for specific operations, eliminating the need for frequent password input.Read Now
A Strong Account in Substrate - Proxy Account
The article provides a comprehensive overview of Substrate's Proxy Account functionality, explaining how account security can be enhanced by splitting account functionalities into different proxy accounts with varying permissionsRead Now
MultiSig in Substrate
This blog explores how MultiSig works in Substrate.Read Now
© By Whisker —@whisker17