Posts
- 
            
How do privacy pools like Tornado Cash work?
 - 
            
Comparing IPFS and BitTorrent in 2023.
 - 
            
How do contract creation and constructors work in the EVM?
 - 
            
Optimistic rollups / STARK-based validity rollups and binary partitioning.
 - 
            
Google Bigtable as a B-Tree over networked nodes, or - how to scale a database.
 - 
            
On Cryptonetworks versus Federated Hubs and P2P — a taxonomy.
 - 
            
Detecting Ethereum RPC censorship programmatically.
 - 
            
Loot Fog of War, private-information games, and ZK STARK’s.
 - 
            
What is the anatomy of a STARK proof?
 - 
            
Understanding recursive ZK proofs through memoization.
 - 
            
A deep dive into Starkware: blockchains, state machines, VM's, provable CPU's.
 - 
            
Understanding the simulated liquidity AMM mechanism in Synthetix.
 - 
            
Stateless SPV proofs and economic security.
 - 
            
ZBTC: Zero-trust wrapped Bitcoin on Ethereum.
 
subscribe via RSS