defiignas (@defiignas) • Hey
What are you thinking
Publications
- Zero-knowledge proof paradigm: What is zkVM
“In the next 5 years, we will be talking about the adoption of zero-knowledge protocols as much as we are about the adoption of blockchain protocols. The potential unlocked by the breakthroughs of the past few years will sweep the crypto mainstream.”
— Jill, CSO of Espresso Systems, May 2021
Since 2021, the zero-knowledge proof (ZK) landscape has evolved into a diverse ecosystem of primitives, networks, and applications across multiple domains. However, while ZK is gradually gaining momentum, with the launch of ZK-powered rollups like Starknet and zkSync Era marking the latest advances in the space, much of ZK remains a mystery to ZK users and the crypto space as a whole.
But times are changing. We believe that zero-knowledge crypto is a powerful, pervasive tool for scaling and securing software. Simply put, ZK is the bridge to crypto mass adoption. To quote Jill again, anything involving zero-knowledge proofs (ZKPs) will create tremendous value (both fundamental and speculative) in both web2 and web3. The best minds in crypto are working hard to iterate and make ZK economically viable and production-ready. Even so, there is still much that needs to be done before the model we envision becomes a reality.
Compare ZK adoption to Bitcoin adoption, where one reason Bitcoin evolved from an internet currency on fringe enthusiast forums to “digital gold” approved by BlackRock was the proliferation of developer and community-generated content that fostered interest. For now, ZK exists in a bubble within a bubble. Information is fragmented and polarized, with articles either filled with arcane terms or too layman-like to convey any meaningful information beyond repetitive examples. It seems that everyone (experts and laymen) knows what zero-knowledge proofs are, but no one can describe how it actually works.
As one of the teams contributing to the zero-knowledge paradigm, we hope to demystify our work and help a wider audience establish a canonical foundation for understanding and analyzing ZK systems and applications, in order to promote education and discussion among relevant parties and enable the spread of relevant information.
In this article, we will introduce the basics of zero-knowledge proofs and zero-knowledge virtual machines, provide a high-level summary of the operation process of zkVM, and finally analyze the evaluation criteria of zkVM.
1\. Zero-knowledge proof basics
What is a zero-knowledge proof (ZKP)?
In short, a ZKP enables one party (the prover) to prove to another party (the verifier) that they know something without revealing the specific content of that thing or any other information. More specifically, a ZKP proves knowledge of a piece of data or the result of a calculation without revealing that data or the input. The process of creating a zero-knowledge proof involves a series of mathematical models that convert the result of a calculation into otherwise meaningless information that proves that the code was successfully executed, which will be verified later.
In some cases, the amount of work required to verify a proof that has been constructed through multiple rounds of algebraic transformations and cryptography is less than the amount of work required to run the calculation. It is this unique combination of security and scalability that makes zero-knowledge cryptography such a powerful tool.
zkSNARK: Zero-Knowledge Succinct Non-Interactive Argument of Knowledge
· Relies on an initial (trusted or untrusted) setup process to establish parameters for verification
· Requires at least one interaction between the prover and verifier
· Proofs are small and easy to verify
· Rollups like zkSync, Scroll, and Linea use SNARK-based proofs
zkSTARK: Zero-Knowledge Scalable Transparent Argument of Knowledge
· No trusted setup required
· Provides high transparency by using publicly verifiable randomness to create a trustless verifiable system, i.e. generating provable random parameters for proofs and verification.
· Highly scalable, as they can quickly (not always) generate and verify proofs, even if the underlying witness (data) is large.
· No interaction is required between the prover and verifier
· The trade-off is that STARKs generate larger proofs, which are harder to verify than SNARKs.
· Proofs are harder to verify than some zkSNARK proofs, but relatively easier to verify than others.
· Starknet and zkVMs such as Lita, Risc Zero, and Succinct Labs all use STARKs.
(Note: Succinct bridge uses SNARKs, but SP1 is a STARK-based protocol)
It is worth noting that all STARKs are SNARKs, but not all SNARKs are STARKs.
2\. What is zkVM?
A virtual machine (VM) is a program that runs programs. In context, a zkVM is a virtual computer that is implemented as a system, general circuit, or tool for generating zero-knowledge proofs, used to generate zkVMs for any program or computation.
zkVM does not require learning complex mathematics and cryptography to design and code ZK, allowing any developer to execute programs written in their favorite language and generate ZKPs (zero-knowledge proofs), making it easier to integrate and interact with zero-knowledge. Broadly speaking, most zkVMs mean a compiler toolchain and a proof system that are attached to the virtual machine that executes the program, not just the virtual machine itself. Below, we summarize the main components of zkVM and their functions
The design and implementation of each component is governed by the choice of proofs (SNARKs or STARKs) and instruction set architecture (ISA) for the zkVM. Traditionally, an ISA specifies the capabilities of a CPU (data types, registers, memory, etc.) and the order of operations that the CPU performs when executing a program. In context, an ISA determines the machine code that can be interpreted and executed by a VM. The choice of ISA can make a fundamental difference in the accessibility and usability of a zkVM, as well as the speed and efficiency of the proof generation process, and supports the construction of any zkVM.
Below are some examples of zkVMs and their components for reference only.
For now, we will focus on the high-level interactions between each component to provide a framework for understanding the algebraic and cryptographic processes and design trade-offs of zkVM in later articles.
3\. Abstract zkVM flow
The following figure is an abstract and generalized zkVM flow chart, splitting and classifying the format (input/output) as the program moves between zkVM components.
The general process of zkVM is as follows:
(1) Compilation phase
The compiler first compiles the program written in traditional languages (C, C++, Rust, Solidity) into machine code. The format of the machine code is determined by the selected ISA.
(2) VM phase
The VM executes the machine code and generates an execution trace, which is a series of steps of the underlying program. Its format is determined by the choice of algorithm and the set of polynomial constraints. Common algorithm schemes include R1CS in Groth16, PLONKish algorithm in halo2, and AIR in plonky2 and plonky3.
(3) Verification phase
The prover receives the trace and represents it as a set of polynomials subject to a set of constraints, essentially converting the computation into algebra by mathematically mapping facts.
The prover submits these polynomials using a polynomial commitment scheme (PCS). A commitment scheme is a protocol that allows the prover to create a fingerprint of some data X, which is called a commitment to X, and then use the commitment to X to prove facts about X without revealing the content of X. PCS is a fingerprint, a "preprocessed" concise version of the computational constraints. This allows the prover to use the random values that the verifier proposes in the next step to prove facts about the computation, now represented by a polynomial equation.
The prover runs a Polynomial Interactive Oracle Proof (PIOP) to prove that the submitted polynomial represents an execution trace that satisfies the given constraints. PIOP is an interactive proof protocol where the prover sends a commitment to a polynomial, the verifier responds with random field values, and the prover provides an evaluation of the polynomial, similar to "solving" a polynomial equation using random values to convince the verifier in a probabilistic manner.
Application of the Fiat-Shamir heuristic; the prover runs PIOP in non-interactive mode, where the verifier's actions are limited to sending anonymous random challenge points. In cryptography, the Fiat-Shamir heuristic converts an interactive proof of knowledge into a digital signature for verification. This step encrypts the proof and makes it a zero-knowledge proof.
The prover must convince the verifier that the polynomial evaluation it sends to the verifier is correct, regarding the polynomial commitment it sends to the verifier. To do this, the prover produces an "evaluation" or "opening" proof, provided by the polynomial commitment scheme (fingerprint).
(4) Verifier Phase
The verifier checks the proof by following the verification protocol of the proof system, either using constraints or commitments. The verifier accepts or rejects the result based on the validity of the proof.
In summary, a zkVM proof can prove that for a given program, a given result, and a given initial condition, there exists some input that causes the program to produce the given result when executed from the given initial condition. We can combine this statement with the flow to get the following description of zkVM.
A zkVM proof will prove that for a given VM program and a given output, there exists some input that causes the given program to produce the given output when executed on the VM.
4\. Evaluating zkVM
What is the criterion for evaluating zkVM? In other words, under what circumstances should we say that one zkVM is better than another? In practice, the answer depends on the use case.
Lita's market research shows that for most commercial use cases, between speed, efficiency, and simplicity, the most important attribute is either speed or kernel time efficiency, depending on the application. Some applications are price-sensitive and want to optimize the proof process to be low-energy and low-cost. For these applications, kernel time efficiency may be the most important optimization metric. Other applications, especially those related to finance or trading, are very sensitive to latency and need to optimize for speed.
Most public performance comparisons focus only on speed, which is certainly important, but is not a comprehensive measure of performance. There are also several important properties that measure the reliability of zkVM, most of which are not up to production standards, even for market-leading incumbents.
We recommend evaluating zkVMs on the following criteria, divided into two subcategories:
Baseline: used to measure the reliability of zkVM
· Correctness
· Security
· Trust assumptions
Performance: used to measure the capabilities of zkVM
· Efficiency
· Speed
· Simplicity
(1) Baseline: Correctness, Security, and Trust Assumptions
Correctness and security should be used as baselines when evaluating zkVM for mission-critical applications. There needs to be sufficient reason to be confident in the correctness, and the security claims need to be strong enough. In addition, the trust assumptions need to be weak enough for the application.
Without these properties, zkVM may be worse than useless for the application, as it may not perform as specified and expose users to hacker attacks and exploits.
Correctness
· The VM must perform the computation as expected
· The proof system must satisfy the security properties it claims
Correctness contains three major properties:
· Robustness: The proof system is true, so everything it proves is true. The verifier rejects evidence of false statements and only accepts computational results where the input produces the actual computational result.
· Completeness: The proof system is complete, able to prove all true statements. If the prover claims that it can prove the result of a computation, it must be able to produce a proof acceptable to the verifier.
· Zero-knowledge proofs: Having a proof does not reveal more about the inputs to a computation than knowing the result itself.
You can have completeness without soundness, if the proof system proves everything including false statements, it is obviously complete but not sound. And you can have soundness without completeness, if the proof system proves the existence of a program but cannot prove the computation, it is obviously sound (after all, it has never proved any false statements) but not complete.
Security
· Related to tolerances of soundness, completeness, and zero-knowledge proofs
In practice, all three correctness properties have non-zero tolerances. This means that all proofs are statistical probabilities of correctness, rather than absolute certainty. Tolerance refers to the maximum tolerable probability that a property fails. Zero tolerance is of course ideal, but in practice zkVM does not achieve zero tolerance on all of these properties. Perfect robustness and completeness seem incompatible with simplicity, and there is no known way to achieve perfect zero-knowledge proofs. A common way to measure security is in bits of security, where a tolerance of 1/(2^n) is called n-bit security. The higher the bit, the better the security.
If a zkVM is completely correct, this does not necessarily mean that it is reliable. Correctness only means that the zkVM satisfies its claimed security properties within the tolerance. It does not mean that the claimed tolerance is low enough to enter the market. Furthermore, if a zkVM is sufficiently secure, it does not mean that it is correct, and security refers to the claimed tolerance, not the tolerance actually achieved. Only when a zkVM is both completely correct and sufficiently secure can it be said that the zkVM is reliable within the claimed tolerance.
Trust Assumptions
· Assume the honesty of the prover and verifier to conclude that the zkVM operates reliably.
When a zkVM has trust assumptions, it usually takes the form of a trusted setup process. The setup process of a ZK proof system is run once to generate some information called "setup data" before the first proof is generated using this proof system. In the trusted setup process, one or more individuals generate some randomness, which is incorporated into the setup data, and it is necessary to assume that at least one of these individuals removes the randomness they incorporated into the setup data.
There are two common trust assumption models in practice.
The "honest majority" trust assumption states that more than half of a group of N people behave honestly in certain specific interactions with the system, which is a trust assumption commonly used in blockchains.
The "1/N" trust assumption states that at least one of a group of N people behaves honestly in certain specific interactions with the system, which is a trust assumption commonly used by MPC-based tools and applications.
It is generally believed that zkVM without trust assumptions is more secure than zkVM with trust assumptions, all other things being equal.
(2) zkVM trilemma: the balance between speed, efficiency, and simplicity in zkVM
9o0f7GPLNhZhjTlfyOmOcoXZvgbWjH5qf7L2Nk04.png
Speed, efficiency, and simplicity are all scalable properties. All of these factors contribute to the end-user cost of zkVM. How to weigh them in the evaluation depends on the application. In general, the fastest solution is not the most efficient or the most concise, the concise solution is not the fastest or the most efficient, and so on. Before explaining how they relate, let's define the various properties.
Speed
· How fast the prover can generate a proof
· Measured in wall-clock time, i.e., the time it takes to compute from start to finish
Speed should be defined and measured based on the specific test program, input, and system to ensure that it can be quantitatively evaluated. This metric is critical for latency-sensitive applications where timely availability of proofs is essential, but it also comes with higher overhead and larger proofs.
Efficiency
· The resources consumed by the prover, the less the better.
· Approximate user time, i.e., the computer time spent by the program code.
The prover consumes two resources: kernel time and space. Therefore, efficiency can be broken down into kernel time efficiency and space efficiency.
Kernel time efficiency: the average time the prover runs across all cores multiplied by the number of cores running the prover.
For a single-core prover, kernel time consumption and speed are the same thing. For a multi-core function prover running in multi-core mode on a multi-core system, kernel time consumption and speed are not the same thing. If a program fully utilizes 5 cores or threads for 5 seconds, this would be 25 seconds of user time and 5 seconds of wall clock time.
Space efficiency: refers to the amount of storage capacity used, such as RAM.
It is very interesting to use user time as a proxy for the energy consumed to run a computation. In the case where almost all cores are fully utilized, the energy consumption of the CPU should remain relatively constant. In this case, the user time spent on a CPU-bound, mostly user-mode code execution should be roughly linearly proportional to the watt-hours (i.e. energy) consumed by the code execution.
From the perspective of any proof operation of sufficient scale, saving energy consumption or the use of computing resources should be an interesting question, because the energy bill for proof (or cloud computing bill) is a significant cost of operation. For these reasons, user time is an interesting metric. Lower proof costs allow service providers to pass on lower proof prices to cost-sensitive customers.
Both efficiencies are related to the energy consumption of the proof process and the amount of money used by the proof process, which in turn is related to the financial cost of the proof. In order for a definition of measuring efficiency to be operational, the definition must be related to one or more test programs, one or more test inputs for each program, and one or more test systems.
Simplicity
· Size of the proofs generated and the complexity of verifying them
Simplicity is a combination of three different metrics, further broken down by the complexity of proof verification:
· Proof size: The physical size of the proof, typically in kilobytes.
· Proof verification time: The time required to verify the proof.
· Proof verification space: The memory usage during proof verification.
Verification is typically a single core operation, so speed and core time efficiency are often the same thing in this context. As with speed and efficiency, a definition of simplicity requires specifying the test program, test inputs, and test system.
Once each performance attribute is defined, we will demonstrate the impact of optimizing one attribute over the others.
· Speed: Fast proof generation results in larger proofs, but slower proof verification. The more resources consumed in generating proofs, the less efficient it is.
· Simplicity: Prover needs more time to compress the proof. But proof verification is fast. The more concise the proof, the more computational overhead it has.
· Efficiency: Minimizing resource usage will slow down proof generation and reduce proof simplicity.
Generally, optimizing for one aspect means not optimizing for another, so a multi-dimensional analysis is needed to select the best solution on a case-by-case basis.
A good way to weigh these attributes in an evaluation might be to define an acceptable level for each attribute and then determine which attributes are the most important. The most important attributes should be optimized while maintaining a good enough level on all other attributes.
Below we summarize the attributes and their key considerations:
- Take a souvenir of the beautiful scenery you pass by
- It goes to another beautiful world
- The trading and marketing sector (rather than the member of the agency) of the US Securities and Exchange Commission decided to approve a large number of Ethereum spot ETF forms. In the commands of Berlaide, Fidelity, Gray, Bitwise, VANECK, ARK, Jingshun Galaxy, and Franklin's Ethereum Etf 19B-4 form, a line of words revealed how the decision made the decision made of.
The order wrote that the committee will be responsible for the implementation of the trade and market departments in accordance with the authorization. This means that the trading and marketing sector of the US Securities and Exchange Commission, rather than the US Securities and Exchange Commission Chairman Gary Gensler or other four members made a decision to approve the spot Ethereum ETF.
- Maybe you can't go to the world, but you are worth seeing
- The importance of social networking
Social networking has a vital role in better adapting to society. First of all, through social networking, people can understand different cultures, concepts, and lifestyles, thereby broaden their horizons and enhance their understanding of society. This cross -cultural communication helps to cultivate tolerance and adaptability. Secondly, social networking is also an important way to obtain information and resources. Establishing a connection with others can allow us to get valuable information more quickly, which is essential to make wise decisions in the workplace or daily life. Finally, social networking helps to establish a support system. In the face of challenges and difficulties, there is a powerful social network that can provide emotional support and actual help.
Socially plays a vital role in promoting the development of the cause. First of all, social activities can help people build connections and expand business cooperation. By establishing contact with professionals inside and outside the industry, you can get more information and resources, so as to create more opportunities for your own cause. Secondly, social activities also help the construction of personal brands. Showing your professional knowledge and personal charm in social occasions can enhance the trust and favors of others on yourself, and then promote the development of the cause. Therefore, attaching importance to social networking not only helps individual growth, but also pave the way for the success of the cause.
Sincerity is an indispensable element in social. In the interaction between people, sincerity is true, frank and unpretentious. It establishes a foundation for trust and understanding, so that both parties can truly express their ideas and feelings. Sincere communication will not only help build a deep interpersonal relationship, but also promote better communication and understanding. Lack of sincere social networking often leads to misunderstandings and gaps. Therefore, sincerity is one of the most important quality in social networking.
- On May 18, the US SEC announced in a statement that the well -known cryptocurrency critic, Heather Slavkin Corzo, will resign from his policy director. SEC Chairman Gary Gensler appointed Corzo in April 2021. During his tenure, Corzo played a key role Protecting and simplifying capital formation process is praised. The subsequent SEC financial adviser Corey Klemmer will take over CORZO, and it is expected that SEC will maintain a doubt about cryptocurrencies.
- In the encryption industry, of course, I hope that the next president will make the crypto industry a more healthy and complete development
So voting is very important
- FTX situation latest progress
The cryptocurrency exchange FTX has accumulated billions of dollars of funds, exceeding customers who lost their losses in November 2022, which enables them to get full compensation after the company's bankruptcy. Additional cash will be used to pay the interest of the company's more than 2 million customers. This is a rare result, because in the United States bankruptcy, creditors can usually only get very little money.
According to the company's statement, once the sale of all assets is completed, the company will have as many as $ 16.3 billion in cash to distribute. It owes clients and other non -governmental creditors about $ 11 billion.
According to the court documents submitted by the Tuesday evening that the FTX case is dealing with the FTX case, the Fedeumi Federal Court of Fedeum, although all the debts will be repaid in full and the interest will be added, and the shareholders will not leave anything.
According to the type of debt in the case, some creditors can get up to 142%of the arrears. However, the vast majority of customers may receive 118%compensation obtained on the FTX platform on the day of chapter 11 bankruptcy.
The company is currently operated by a restructuring consultant and proposed to set up a fund to pay funds to some creditors (including creditors who borrowed FTX cryptocurrencies), otherwise these funds will flow to government regulators.
As FTX gradually enters the final stage of the bankruptcy case, payment may take several months.
- my head will explode if i have to endure a pritchard v mcconnell series please basketball gods no
- FTX situation latest progress
The cryptocurrency exchange FTX has accumulated billions of dollars of funds, exceeding customers who lost their losses in November 2022, which enables them to get full compensation after the company's bankruptcy. Additional cash will be used to pay the interest of the company's more than 2 million customers. This is a rare result, because in the United States bankruptcy, creditors can usually only get very little money.
According to the company's statement, once the sale of all assets is completed, the company will have as many as $ 16.3 billion in cash to distribute. It owes clients and other non -governmental creditors about $ 11 billion.
According to the court documents submitted by the Tuesday evening that the FTX case is dealing with the FTX case, the Fedeumi Federal Court of Fedeum, although all the debts will be repaid in full and the interest will be added, and the shareholders will not leave anything.
According to the type of debt in the case, some creditors can get up to 142%of the arrears. However, the vast majority of customers may receive 118%compensation obtained on the FTX platform on the day of chapter 11 bankruptcy.
The company is currently operated by a restructuring consultant and proposed to set up a fund to pay funds to some creditors (including creditors who borrowed FTX cryptocurrencies), otherwise these funds will flow to government regulators.
As FTX gradually enters the final stage of the bankruptcy case, payment may take several months.
- Excited about this one
- **A Nice Drive™ #19**
Traits :
💎 **CAR** - Classic GT
💎 **ROAD** - Monaco Tunnel
💎 **SKY** - Rouge Night
Rarity: **201**/333
---------------
Each day on @club/lens I'll be sharing an unminted one-of-one from my recent **A Nice Drive™** Collection. The prices will change depending on rarity, but I want the bulk of the collection to be accessible to all 💎 The collection is based on my travels as a journalist, each piece giving collectors a unique portal to an imaginary exotic escape ✨️ Enjoy! 🙏🏾
- Fuck it, I'm bringing back Crypto Almonds.
Almonds 2024
- Tell me that you like that type of kitten
- Everything is very beautiful
- future?
Free collection
- Can cz really predict the future
CZ is really sentenced to four months
What else is there in this world that is not controlled
- So you should be careful of this person, because if you take a photo with him, you may enter prison 😂😂
- If you like it, collect it, open it for free
- 2024 Public chain financial report in the first quarter: How many chains are making money?
Last week, U.S. stocks ushered in the busiest "financial report" in the first quarter. Nearly half of US -listed companies chose to announce their financial reports this week. After the experience of a big plunge last Friday, the market's attention was staring at the financial reports that the technology giants would have published this week.
Under the "Financial Report Hot", the blockchain data analysis company Token Terminal's "Public Chain Financial Report" data chart released on the official Twitter account two days ago also attracted the attention and discussion of the encrypted community. After several sets of data, the "financial status" of L1 and L2 public chains such as ETH, Solana, Base, etc. are a lot of intuition. However, the first reaction of more people to the "public chain financial report" is: Is this concept really reasonable?
The term "financial report" has always been far from the encryption industry. In this business model, it has not yet been clear. The team's realization is still based on token issuance. The number of active addresses, TVL, and market value seems to be more intuitive and transparent. And is the traditional sense of financial report logic applied to the encryption market? Is the subjective subject agreement or a team? What statistical indicators should be used? These issues make the "chain" business incompatible compared to traditional business. The mouth shouted "Mass Adoption", and his heart was clear about the "Ponzi Game" door.
So is the concept of the financial report appropriate in the encryption industry? I prefer a positive answer. Although there are many logical and logical differences in specific indicators, the public chain (especially universal public chains such as Ethereum and Solana) as a decentralized network, which essentially need to make hematopoietic hematopoietic as traditional companies, it is essentially the same as traditional companies. Ability, otherwise it will become real Ponzi.
So for a chain, how can it be called "the ability to make hematopoiesis"?
Crazy public chain
In fact, in the current crypto industry, except for Bitcoin's decentralized account book, almost all public chains need to have the ability to make hematopoietic in order to survive for a long time and safely.
For BTC, its market value and price reflect the volume of the external world to put their wealth into the Bitcoin account book. In order to obtain the security of the Bitcoin network, these wealth is willing to pay to the miners who can make it satisfied with Storage costs. But this set of common public chains such as Ethereum and Solana seem to be unreasonable. Because the miner is a group of profit -seeking, wherever you make money, and the "World Computer" that the general public chain wants to maintain is not much attractive to the wealth of the outside world. Therefore, from the perspective of supply and demand relationship Miners (of course are mostly verified as verifiedrs) to see the house, and the burden of paying costs is generally on the shoulders on the Internet.
To put it simply, the general public chain needs to find a way to "create revenue" to pay the authentication of the maintenance network. Basic hematopoietic ability. Of course, hematopoietic is not all for "alive." In the stock market, the stronger the revenue ability means the stronger the repurchase strength and stock price expectations, and the same is true of the public chain business.
According to this logic, what data should be in a "public chain financial report" is actually clear at a glance.
First of all, it is naturally operating income. For the public chain, all of this part comes from network costs, and the destruction parts in the cost can be regarded as network revenue (equivalent to repurchase). The more online activities, the higher the cost income. The second is operating costs, including parts paid to the verifications in each network cost (supply fee; SUPPLY-SIDE Fees) and tokens issued by the network. Finally, it is gross profit, that is, to destroy the tos to the tokens (and the cost of the verification), which is the ultimate manifestation of a public chain hematopoietic ability and network value. It is not difficult to see that for a public chain, GAS destruction and block motivation distribution largely determine its revenue ability and self -sustainability.
So in the first quarter of this year, how did the universal public chain's revenue perform? We have selected three representative cases for a comparative analysis, which are based on the Ethereum of the GAS repurchase based on the basic cost of the block, the 50% cost to repurchase the destroyed Solana, and all the 100% costs all Destroyed Avalanche.
Judging from the final "quarterly statement", Ethereum is still the most powerful general chain in the current crypto world. In the first quarter of 2024, it achieved a revenue of $ 1.17 billion, and its net profit reached US $ 369 million. Although Solana has a strong ecological momentum in the past six months, because of advocating ultra -low GAS concepts and lack of dynamic cost mechanisms, only less than $ 100 million in revenue in the first quarter, while its network operating costs (ie token inspiration) are as high as high. 844 million US dollars, a total of $ 796 million. The avalanche network has almost no revenue in the first quarter, and the cost loss loss is 179 million US dollars
- Consensys proposes four key reasons to support Ethereum non -securities status
The US SEC re -examine whether Ethereum belongs to the securities category. Consensys proposed four major reasons to support Ethereum non -securities status:
1. Historical position: Former SEC supervisor said in 2018 that Ethereum does not belong to securities. This historic position provides a solid foundation for its non -securities position.
2. CFTC Category: The Commodity Futures Trading Commission (CFTC) has been regarded as Ethereum as a commodity commodity for a long time, which is consistent with the position of SEC.
3. Decentralization and openness: Ethereum's decentralized architecture makes it different from securities. All information is open and accessible, and it does not have the characteristics of inside information asymmetry.
4. Consensus mechanism transformation is irrational: The transformation from the recent consensus mechanism from POW to POS does not affect the core nature of Ethereum, so it should not be a reason for re -classification.
These factors jointly support the non -securities status of Ethereum in the regulatory world. For the re -examining SEC, the industry and communities continue to pay attention to the positioning of Ethereum.
- My favorite athlete Zlatan Ibrahimović
- Everyone's lifestyle and love things are different
May you bring you all the beauty in the new day, explore the future together, friends
#Lens #NFT
- With Starknet as a reference, have you reached the ZKSYNC airdrop standard?
So far, more than 6 million active addresses have been on ZKSYNC (even if you only consider the positive interaction address on ZKSYNC Era), the ZK -series L2 star project like StarkNet has implemented the token airdrop plan and rewarded about 500,000 independent independent independence Users, then what will ZKSYNC deal with airdrops?
Simulation StarkNet token allocation
The tokens allocation rules of the StarkNet Foundation In addition to requiring at least 0.005 ETH, the following conditions also include the following conditions:
· At least 3 different months have active records;
· Complete at least 6 interactions;
· The total transaction volume is not less than 100 US dollars;
We used these three rules for the active address of ZKSYNCRA, and we simulated two types of airdrop scenes based on different parameters.
Plan A: screening 2.78 million conditions that meet the conditions:
· At least 4 different months have active records;
· Complete at least 10 interactions;
· The total transaction volume is not less than 100 US dollars;
Plan B: Filtering 2.05 million conditions that meet the conditions:
· At least 4 different months have active records;
· Complete at least 30 interactions;
· The total transaction volume is not less than 500 US dollars;
- Zhao Changpeng (CZ) was born in Lianyungang, Jiangsu in 1977. He has a deep technical background and served as technical director in Bloomberg. Binance was founded in 2017. With its excellent operation and innovation concept, Binance has developed rapidly, and CZ has become a well -known figure in the cryptocurrency field.
With the vigorous development of the cryptocurrency market, regulatory issues gradually surfaced. The U.S. government began investigating CZ's business activities, accusing them of not applying for all income to the government, and conducting money laundering activities through the virtual currency trading platform. After that, the regulatory agency fined Binance $ 4.3 billion (including criminal allegations and civil allegations) and frozen CZ's assets in the United States. CZ pleaded guilty to suspected money laundering and paid a fine of 50 million US dollars. Since then, he was allowed to bail for $ 175 million and was once allowed to return to the UAE during the bail. However, with the development of the case, the US court has repeatedly overturned the previous decision to prohibit CZ from traveling.
In April 2024, the U.S. prosecutors formally proposed criminal accusations against CZ, suggesting that it was sentenced to 36 months in prison. Prosecutors pointed out that the CZ Binance platform has serious compliance issues, and has not reported suspicious transactions related to terrorist organizations, and supports sales of children's sexual abuse and receiving extortion software ransom. Prosecutors believe that these behaviors seriously violate the anti -money laundering regulations in the United States and must be severely punished.
CZ's criminal trial was conducted in the Seattle Federal Court on April 30, 2024. At that time, the court will finally decide the fate of CZ. Regardless of the results, this incident will have a profound impact on the cryptocurrency industry, and promote the industry's more standardized and transparent development. BlockBeats organizes the past relevant information as the timeline as follows, so that readers can understand the process of the CZ event:
- Bitcoin Odyssey Summit will be held in Hong Kong on May 9
May 09th, 16:30 to May 09, 20:30
20th floor of California Building, Central
Organizer: Yala, Alex, Stacks, Botanix, Spartan
Guest:/
About activities
The Bitcoin ecosystem is rapidly evolving, bringing new opportunities and challenges to developers, entrepreneurs and enthusiasts.
The purpose of this event is to promote the common concept of Bitcoin and many of its future applications.
Join us, discuss the rise of the second -level solution of Bitcoin to the topic of Bitcoin DEFI and more potential, and explore and discuss the pattern of continuous evolution of the Bitcoin ecosystem.
- Is A16Z Angry criticizing Memecoin? Is the currency?
PEPE, WIF, MEW, BOME ... the coin sector seems to always emerge a new wealth password, but is this really good for the currency circle?
On April 25th, A16Z Crypto CTO Eddy Lazzarin publicly criticized Memecoin publicly, saying that it destroyed the "long -term vision" of cryptocurrencies, defiled the view of "public, regulators and entrepreneurs", and served as "relatively small groups of people. "Casino.
Prior to the A16Z partner and A16Z Crypto director Chris Dixon, Chris Dixon also posted that due to the lagging regulatory, MEME coins were booming, but these currency also made more efficient encryption companies and blockchain tokens.
For Meme currency believer, especially investors, the above A16Z remarks are severe, because the so -called blue -chip projects in some currency circle are also cut countless. There are even opinions that the currency circle is the casino. The chips are not high and low, and winning money is the king. So in the eyes of professional professionals in various ways, what will the coin exist?
- Perseverance insight into EIGENLAYER ecology
Summary
1. EIGENLAYER's core technologies are pledged by pledged RESTAKING to allow decentralized services (AVS) to reuse Ethereum pledged funds and enhance the trust mechanism. When ETH's withdrawal vouchers are redirected to the EIGENLAYER contract, AVS can set a reward and punishment mechanism to attract low -cost verification and participation, improve the use rate of verifications, and enhance the overall network security.
2. EIGENLAYER introduced new micro and macro security challenges in the "Consensus Trafficking Market". The main body of the market: ETH verification, the service items (AVS) that require decentralized POS trust, and the EIGENLAYER platform itself, forms an interactive structure in the ecosystem. Each part may face security threats, affecting the stability of the entire ecosystem. Malicious operator may attack multiple services at a lower cost under the RestAKING mechanism; malicious AVS may use surface publicity and seemingly credible return to attract the unknown OPATOR to join its service system, causing it to suffer from Slashing and irreversible Losses; rapid development of ecology put forward higher requirements to the security of the EIGENLAYER protocol.
3. Professional audit and reliable dynamic protection measures are the cornerstones of ensuring platforms and users' security. Eigenlayer ecology needs to be able to cope with a powerful security framework in addition to innovation. Blocksec continues to build BUILD in the field of blockchain security, providing the project party with professional code audit and dynamic security protection after launch, and supports the continuous growth of this ecosystem.
introduction
Based on Ethereum Agreement EIGENLAYER innovatively proposed the re -pledge function, allowing participants to further use their pledged ETH to support other protocols while maintaining the original pledge and income, so as to maximize the potential value of capital.
From $ 1 billion in 2024 to $ 15.3 billion now, Eigenlayer's TVL is second only to Lido in the entire DEFI ecosystem. The explosive growth not only shows the strong interest in the market, but also verifies the practicality and influence of its technology. With this growth, projects based on Eigenlayer ecology, such as Puffer Finance and Renzo, also quickly won the favor of capital and users. The re -pledge track with Eigenlayer as the core is undoubtedly one of the most watched narratives in the Defi ecosystem this year.
As a company focusing on blockchain security, we will analyze and explore the operating mechanism of Eigenlayer from a macro to micro security perspective, while innovating the Defi ecosystem, it will bring new security challenges and tests.
Top -level design and macro security
RestAKING is essentially a basic means to further solve specific problems by reusing the trust provided by the PROOF of Stake (POS) pledged fund pool. Eigenlayer, as the founder of RESTAKING technology, provides a newly free trafficking of Ethereum fund pool to a new market, provides a consensus market for sale. Eigenlayer claims that the current Ethereum ecology is suffering a macro security problem of trust division, and Eigenlayer can solve this problem well. Next, we will start from the design and motivation of Eigenlayer to understand what is trust division, and how Eigenlayer solves trust division.
1. Who is the service target of the consensus market? Who is the two parties involved in two -way freedom?
Eigenlayer sells the trust provided by Ethereum Ethereum's pledged fund pool, so the consensus seller is the Validator of Ethereum verification node. The buyer, the active verification service, ACTIVELY VALIDATED Services (AVSS). In simple terms, it can be understood as one of the services that need to build a distributed trust network. AVS is a buyer, and their demand is to buy distributed trust.
- The burned tokens were not even from whitelisted wallets. $BRETT's deployer kept 1 billion (10%) tokens when the contract was made and sent 500m tokens (5%) to the marketing wallet.
This also means that the insiders and the deployer controlled over 96% of the coin at launch.
- In today's guide, we'll cover how to build a crypto Telegram bot using Python, that delivers real-time updates on cryptocurrencies. This bot is engineered not only to furnish you with the latest price of any selected cryptocurrency but also to supply additional data. This includes, but is not limited to, changes in price over a 24-hour period, market capitalization, trading volume, and even historical crypto price data. This wealth of information at your fingertips can empower you to make well-informed decisions in your cryptocurrency ventures.
Let's dive in!
Level of Functionality
In this section, we’ll break down the key functionalities of our crypto Telegram bot, and how these features will provide users with a comprehensive and real-time overview of the crypto market.
**Fetching and displaying real-time crypto market data** – Our bot is already equipped to fetch and display real-time market data for various cryptocurrencies. This includes data such as current price, market cap, volume, and price change percentage. We achieve this by making a GET request to the **/coins/markets** endpoint of the CoinGecko API.**Displaying the 24h highest and lowest prices** – The bot can fetch and display the highest and lowest prices of a specific cryptocurrency in the last 24 hours. This information can be crucial for users who are actively trading or monitoring specific cryptocurrencies. We fetch this data from the same **/coins/markets** endpoint.**Fetching and displaying supply information –** Our bot can fetch and display the circulating supply and total supply of a specific cryptocurrency. This information can be useful for users who want to understand the scarcity of a particular cryptocurrency. Again, this data is fetched from the **/coins/markets** endpoint.**Fetching and Displaying Top Cryptocurrencies** – The bot can fetch and display the top 10 cryptocurrencies based on market cap. This feature provides users with a quick overview of the leading cryptocurrencies in the market. We fetch this data by making a GET request to the same **/coins/markets** endpoint, but with specific parameters to order the results by market cap and limit the number of results.**Fetching and Displaying On-Chain DEX Pool Data** – Our bot also includes the functionality to fetch and display on-chain DEX crypto liquidity pool data. This feature allows users to search for pools on a network, providing valuable insights into the decentralized exchange (DEX) market. We achieve this by making a GET request to the **/onchain/search/pools** endpoint.***💡 Pro-tip:** Onchain endpoints are exclusively available for paid plan subscribers only. Unlock access to all 20 new /onchain endpoints for on-chain token and liquidity pool data for cryptocurrencies not listed on CoinGecko, by subscribing now.*
Prerequisites
Before we start, ensure you have the following:
**Python 3.7** or higher installed on your system. Python is a powerful, easy-to-learn programming language that we will use to build our bot.**A Telegram account**. Telegram is a cloud-based instant messaging app where our bot will live.**Basic understanding of Python programming**. While this guide will be detailed, having a basic understanding of Python syntax and programming concepts will be beneficial.**A text editor**: You will need a text editor or an Integrated Development Environment (IDE) to write your code. Some popular options include Visual Studio Code, Sublime Text, and Atom.**CoinGecko API**: We will be using the CoinGecko API to fetch the crypto market data for cryptocurrencies. The CoinGecko API has a free Demo plan accessible to all users with a 30 calls/min rate limit and a monthly cap of 10,000 calls. Sign up for a CoinGecko account and apply for the Demo plan to get your complimentary Demo API key.We will be using CoinGecko API to fetch the market chart data for cryptocurrencies. The CoinGecko API has a free Demo plan accessible to all users with a 30 calls/min rate limit and a monthly cap of 10,000 calls.
- how the ETH2 deposit contract could have saved 18+ ETH ($ 56,000+) & more with this minor optimization trick on sparse merkle trees, and on SSTORE2
some context: an incremental Merkle Tree (MT) is a MT of fixed depth where each leaf starts as a Zero value.
the non-zero values are added from the left-most to the right-most leaf, one by one.
a well-known optimization is to pre-compute & the store Zero hashes
all subtrees to the right of the newest member consist of Merkle subtrees with all zero leaves)
notice below for a tree (h=5); the proof path for 2e7 is in orange; 13 & 87 (violet) are trees of all zero leaves of height 3 & 4 respectively - we can cache this!
eth2 deposit calculates, & caches this in storage, (SLOAD for lookup, initial storage cost)
https://github.com/tornadocash/tornado-core/blob/master/contracts/MerkleTreeWithHistory.sol#L125-L159…
(zerosFromStorage^)
tornado cache deposit contract uses a big switch statement, (JUMPI's for lookup, bytecode bloat)
https://github.com/tornadocash/tornado-core/blob/master/contracts/MerkleTreeWithHistory.sol#L125-L159…
(zerosFromSwitch^)
- The cryptocurrency spring report released by ChainaLetsis, the use rate and market importance of stablecoin will grow rapidly in 2024. The number of addresses holding stablecoin and the use of the use on the chain will increase significantly, making it a global nature Financial assets. The legislative work in the United States, such as "Lummis-Gillibrand Payment Stability Act", aims to establish a regulatory framework for stablecoins. By providing more secure and clearer guidance for the use of stable coins, enhancing people's confidence, encouraging people to further adopt adoption Stable currency. The global demand for stablecoins, especially the stable currency linked to the US dollar, highlights its role in financial tolerance and the role of bridges between traditional finance and cryptocurrencies, although the discussion around its supervision is still continuing.
- Everything is very good
NFT has been silent for a while, it takes more time to improve and improve
- The Hong Kong Investor and Financial Education Commission stated that the investment scope of spot virtual asset ETF investment is limited to virtual assets provided to Hong Kong public on the virtual asset trading platform holding the securities commission license (currently limited to Bitcoin and Ethereum), trading The opponent must buy and sell virtual assets through licensed virtual asset trading platforms to reduce the risk of trading. Asset custody must be entrusted to keep virtual assets in the designated institutions regulated in Hong Kong, such as licensed virtual asset trading platforms, banks, or subsidiaries registered in Hong Kong to reduce the risk of custody. Investors can buy and sell virtual asset spot ETFs through securities banks or banks. Some virtual asset spot ETFs also provide non -listed fund units categories. Submitting and redemption.
- Politics is Bullshit
- In the past few days, demonstrations, including several well -known institutions, have a demonstration in the campus of many universities in the United States, demanding permanent ceasefire in the Gaza Strip, and stopping military assistance in the United States. Although some American politicians label the "anti -Semit" label, the anti -war movement still shows a strongest momentum.
Mike Johnson, Speaker of the Republican House of Representatives of the United States Congress, went to Columbia University on April 24 to ask students to end anti -war protests and say that when necessary, the National Guard will be dispatched.
- On April 27th, according to official news, the Point NFT Loan Loan Agreement NFTFI Foundation announced that the NFTFI airdrop application will be opened at 20:30 on April 30, Beijing time, and lasts 41 days until June 10. Until -applied tokens will be returned to community and reward allocation and are used for future rewards.
The total supply of tokens of NFTFI is 2 billion yuan, and the initial circulation supply is expected to be 220 million pieces. As an Ethereum main network on Ethereum, ERC-20 token is distributed. Tokens will be assigned: community and rewards, foundation and ecosystems, core contributors and strategic supporters. 84.5% of the NFTFI token supply was initially locked and unlocked within four years.
7.00%(140 million) supplied by NFTFI has been assigned to more than 3,000 qualified wallets from community and reward categories. This traceability airdrop is aimed at recognizing and rewarding the contribution of NFTFI users.
- A pleasant day started, friends
Share it with a very interesting picture, I admit that I saw this picture laughed for a long time, so that my stomach hurts a bit 🤣
When you wake up very happy, you feel that this is the meaning of living
- Data fixed
Snapshot complete
We've locked in points balances and unlinking or relinking your Twitter will no longer transfer points. Join us next week for when points go onchain.
If you see any issues with your balance in-app, please contact us at support@frie@lens/friendtech
- This is the professional knowledge shared by security experts. It is related to everyone's asset safety.
https://github.com/slowmist/Blockchain-dark-forest-selfguard-handbook/blob/main/README_CN.md
Black Handbook (Blockchain Black Dark Forest Self -rescue Manual) V1.2 Edition V1.2 is first released. This difference is a bit difficult ... New "Those Tools" chapters and update "contributors" network ".
- Renzo officially issued a post on social media that the first quarter of the integral integral airdrop receipt will be launched at 19:00 on April 30th, Beijing time, that is, one hour before the launch of Binance will be opened. The user will receive Rez for 30 days, and any unmanned token will be added to the second quarter airdrop reward.
The official said that the second quarter of the integral integral airdrop activity is about to begin. This event will run for 3 months to allocate to token with a total supply of 5%of the participants. Participants in the first quarter will get 10%of points of points. After upgrading, Renzo will also launch several times more multiple points to earn a lot of points for decentralized financial partners.
- Greg Solano, co -founder of Yuga Labs, has released a memorandum of announcing the company's reorganization since the CEO of the company in February.
Regarding the reorganization announcement, Solano said: "Today is a very difficult day. I am determined to change Yuga and let us return to the original original intention, which means making difficult decisions. So far, the hardest decision is to say goodbye to some talents. team member."
In the memorandum, Solano said that Yuga Labs "lost direction" will focus on the establishment of "a smaller, more flexible, and more encrypted team"
- Suspicious narratives, understanding narratives, becoming a narrative, a three -step walking in encryption hype.
But the emergence of a narrative often originally originated from a tall word, such as intention, modularization, parallelization ... sounds short and powerful, people seem to understand that this kind of sexy is this sexy. Technical view.
But if you want to ask where these words come from, the top VC Paradigm must be worthy of the highest titles of the "masterpiece master".
In July last year, Paradigm introduced the top ten trends that he was concerned about, which was the first time that the concept of Intent-CENTRIC was first mentioned.
So the concept of intention was quickly popular, and the projects leaned on the hot words, and the common appeal of "make the user experience better" can only be packed in the word "intention". New projects must have a must -have footnote.
Recently, Paradigm, a master of words, took another shot. Its CTO released an article entitled "Reth's Path to 1 Gigagas Per Second, and Beyond" (literal translation of Reth to 1 Gigagas Road). The keywords are naturally It's "gigagas".
Giga literally translates as a common number unit, which is one billion or gigabit; and GAS is obviously a well -known GAS fee.
But the two words are combined with one billion GAS?
Well, it is still the kind of familiar, powerful, simple, and unknown and unknown.
From TPS to GPS, the new standard
In fact, Paradigm's newly proposed Gigagas is related to the performance of the blockchain.
Under the inherent thinking, we say that a blockchain is not fast, and we are measured with TPS (transaction that can be processed per second, that is, the number of transactions that can be processed per second.
But Paradigm's CTO believes that "GAS Per Second (GPS) that can consume per second is a more accurate measurement standard. This is because:
1. Measurement of calculating workload: GAS is a unit that measures the workload required for executing operations (such as transaction or smart contracts). Therefore, GPS can more accurately reflect the calculation amount that the network can process per second.
2. The embodiment of capacity and efficiency: The use of GPS as a performance indicator can more clearly understand the capacity and efficiency of the blockchain and help evaluate the cost of the system.
3. Resistance of DOS attack: Standardizing performance indexes into GPS can better prevent potential service rejection (DOS) attack, which may use less accurate measurement for use.
4. Cross -chain performance comparison: The use of GPS helps to compare different EVM and capable chains, because different chains may have different computing complexity in terms of transaction processing.
Therefore, it will be better to measure the performance of the blockchain with GPS instead of TPS, and Paradigm recommends that the EVM community uses the GAS amount per second as the standard indicator in the article, and at the same time combined with other GAS pricing dimensions to create a comprehensive performance standard.
If Paradigim's idea is used to comprehensively evaluate the EVM network performance with the amount of GAS consumed per second, and at the same time capture calculation and storage costs, then the current mainstream L1 and L2 ranking should be the ranking of GPS:
- On April 26, according to official news, the Solana ecological combination of automated liquidity management agreement Kamino Finance announced the KMNO token economics, with a total amount of KMNO of 10 billion pieces. 100 million pieces, the TGE date is April 30, 2024. KMNO token economics is:
Community and gift funds: 35% (including 7.5% creation distribution);
Liquidity and Library: 10%; 10%;
Core contribution: 20%;
Critical stakeholders and consultants: 35%
- The key data that needs to be followed in the near future
Data show that the 96,000 BTC options are about to expire. The Put Call Ratio is 0.68, with a maximum pain point of $ 61,000, with a nominal value of $ 6.2 billion. The 990,000 ETH options are about to expire. The Put Call Ratio is 0.51, with a maximum pain point of $ 3100, with a nominal value of $ 3.1 billion.
Greeks.live said that the transaction volume of the encryption market has declined significantly this week, Bitcoin and Ethereum lowered, and the market weakness caused the major period IV to decrease significantly. Fluctuations lead to accelerated sales of a large number of options sellers.
Recently, ETF funds have flowed out, and the market emotions are relatively sluggish. Last week, it was mentioned that the giant whale lacked confidence in the market outlook. At present, it has not changed this trend.
- I think this should be shared with you
**Unpopular opinion:**
We have seen a **huge dispersion of returns** this cycle in crypto. Few cryptos have outperformed BTC since Oct 23 cycle low and on a YTD basis. Many market participants have referred to the altcoins market now as a "PVP" market.
Snapshot of the top 20 crypto returns across different periods (190D is cycle low) below from Messari Screener: Notice some have **negative YTD returns** despite BTC hitting ATH!
**But this is healthier and better for the crypto market in the long run.**
We don't need another 2021-like crazy bull run where everything pumps off the roof regardless of their fundamentals *(for lack of better terminology, my definition of fundamentals doesn't just refer to fees/earnings/revenue multiple, etc but includes a lot more other factors that we look at)*.
The high dispersion market situation also significantly rewards better token selection, especially for investing in crypto besides BTC. This creates a much stronger case of active investment management in crypto as the performance between good and bad liquid crypto investors will be even more apparent.
The market has become more efficient thus making it harder now to make generational wealth just by being lucky and I am all for it.
Will this continue? We can obviously have another round of crazy bull markets given a huge number of positive surprises ahead and the structural bull market in crypto. But would we be fine if a 2021-like bull run never happened again?
Yes, and that is actually better for the market in the long term.
- Fighting for the industry's freedom is worthy of respect for people
Consensys filed a lawsuit against the Securities and Exchange Commission.
The goal behind this is to ensure that Ethereum remains a vibrant and indispensable blockchain platform and to preserve access for the countless developers, market participants, and institutions who have a stake in the world’s second largest blockchain.
- The Renaissance is a topic of everyone talking about. Many project parties put themselves under this banner to explain their current behavior. At present, this wave refers to more gathers to Bitcoin ecosystems in funds, consensus, and developers. But maybe we can think more about this wave: What is it? What will it leave?
I think Bitcoin Renaissance is the revival of two basic value claims, one is POW and the other is UTXO. The former is opposite to POS, and the latter and the account model are opposite, while the representative of the POS+Account model is Ethereum. This Bitcoin Renaissance will mean that after 15 years of development in the blockchain industry, it is realizing the return+UTXO route led by Bitcoin to Bitcoin.
- I want to know if anyone is discussing the World of Warcraft games here. Let's talk about my situation first. I have been playing this game since I was a teenager. It has been more than ten years now. I like this game very much.
Of course, my favorite race is the undead and bulls. Because of giving me a different experience, can I find similar players here?
Welcome everyone to express their opinions, let's discuss together