$BTC $ETH #
Let’s talk about the security of#Merlinchaintoday
Merlin Chain is undoubtedly the hottest Bitcoin-native second-layer network at the moment. The mainnet reached an astonishing TVL of $3.5 billion within 30 days of its launch, attracting more than 200 projects to enter construction. After Merlin launched second-layer mapped assets, multiple ecological projects successively released major updates, and hundreds of millions of dollars of liquidity poured in. The unprecedented popularity once caused congestion on the Bitcoin network. But if an ecosystem takes on billions of funds, in addition to bringing a prosperous ecosystem and liquidity, it also means being exposed to the dangerous dark forest of blockchain.
As an emerging #BTCL2, Merlin has considered security in every aspect of its architecture design, and has joined forces with multiple security teams such as SlowMist, adding layers of plug-ins to jointly build a solid line of defense for fund security.
Merlin Chain uses a multi-token pledge Oracle node system. The sequence node is responsible for collecting and batch processing transactions, generating compressed transaction data, ZK state roots and proofs. This data is compiled by the Oracle Network Execution Circuit and uploaded into Taproot on the Bitcoin mainnet, making it publicly accessible to the entire network.
Diversified assets: Supports the pledge of
$BTC , $MERL and other mainstream brc20 assets, improving flexibility and risk resistance.
Agent pledge: Not only allows users to directly pledge assets to become Oracle nodes, but also provides more flexible agent pledge options, allowing users to entrust assets to existing and reputable Oracle nodes for management
Real-time monitoring: Users can view their agent pledge status and income in real time, as well as the performance records of agent nodes
Exit mechanism: Provide a flexible exit mechanism, users can withdraw their assets at any time to ensure the liquidity of funds
By decentralizing power and data, Merlin Chain resists the risks of single points of failure and centralization.
Share DA layer security with Celestia
The data storage layer (DA) is similar to a database, where all original transactions of the execution layer are stored for subsequent verification and confirmation. For Layer2, the openness, transparency and on-chain storage of DA are extremely important. If the latest transaction data is refused to be uploaded to a trusted platform, data withholding attacks will lead to network scrapping and may prevent users from successfully withdrawing funds.#Merlin#MerlinSwap
#btc生态