Posts
How do privacy pools like Tornado Cash work?
Comparing IPFS and BitTorrent in 2023.
How do contract creation and constructors work in the EVM?
Optimistic rollups / STARK-based validity rollups and binary partitioning.
Google Bigtable as a B-Tree over networked nodes, or - how to scale a database.
On Cryptonetworks versus Federated Hubs and P2P — a taxonomy.
Detecting Ethereum RPC censorship programmatically.
Loot Fog of War, private-information games, and ZK STARK’s.
What is the anatomy of a STARK proof?
Understanding recursive ZK proofs through memoization.
A deep dive into Starkware: blockchains, state machines, VM's, provable CPU's.
Understanding the simulated liquidity AMM mechanism in Synthetix.
Stateless SPV proofs and economic security.
ZBTC: Zero-trust wrapped Bitcoin on Ethereum.
subscribe via RSS