Posts
-
How do privacy pools like Tornado Cash work?
-
Comparing IPFS and BitTorrent in 2023.
-
How do contract creation and constructors work in the EVM?
-
Optimistic rollups / STARK-based validity rollups and binary partitioning.
-
Google Bigtable as a B-Tree over networked nodes, or - how to scale a database.
-
On Cryptonetworks versus Federated Hubs and P2P — a taxonomy.
-
Detecting Ethereum RPC censorship programmatically.
-
Loot Fog of War, private-information games, and ZK STARK’s.
-
What is the anatomy of a STARK proof?
-
Understanding recursive ZK proofs through memoization.
-
A deep dive into Starkware: blockchains, state machines, VM's, provable CPU's.
-
Understanding the simulated liquidity AMM mechanism in Synthetix.
-
Stateless SPV proofs and economic security.
-
ZBTC: Zero-trust wrapped Bitcoin on Ethereum.
subscribe via RSS