Binance Square

Bluue

Open Trade
High-Frequency Trader
4.6 Years
天天学习 天天快乐 https://twitter.com/deepbluuest
26 Following
291 Followers
1.6K+ Liked
155 Shared
All Content
Portfolio
--
See original
AI Agents and Web3: Preventing Westworld-style Defections"Have you ever questioned the nature of your reality?" (Westworld) 1. The role of AI Agent in Web3 The rise and trend of decentralized AI With the development of blockchain and artificial intelligence, decentralized AI is becoming an emerging trend. Traditional AI is controlled by a few giants and data, but under the decentralized approach, multiple parties can collaborate to contribute computing power and data, alleviate data monopoly and enhance security and inclusiveness. For example, public chain ecosystems such as BNB Chain are actively exploring decentralized AI infrastructure, gathering idle GPU and other computing resources through incentive mechanisms, and creating distributed "supercomputers" to train large models. In this model, individuals and organizations can contribute idle resources to obtain returns, which is more cost-effective than centralized cloud computing. At the same time, there are also attempts to split large models and have multiple nodes jointly host reasoning (similar to the Petals project that distributes each layer of the LLM model to different nodes) to reduce single-point pressure. These explorations show that decentralized AI infrastructure is taking shape, providing a new path for open innovation of AI models.

AI Agents and Web3: Preventing Westworld-style Defections

"Have you ever questioned the nature of your reality?"

(Westworld)
1. The role of AI Agent in Web3
The rise and trend of decentralized AI
With the development of blockchain and artificial intelligence, decentralized AI is becoming an emerging trend. Traditional AI is controlled by a few giants and data, but under the decentralized approach, multiple parties can collaborate to contribute computing power and data, alleviate data monopoly and enhance security and inclusiveness.
For example, public chain ecosystems such as BNB Chain are actively exploring decentralized AI infrastructure, gathering idle GPU and other computing resources through incentive mechanisms, and creating distributed "supercomputers" to train large models. In this model, individuals and organizations can contribute idle resources to obtain returns, which is more cost-effective than centralized cloud computing. At the same time, there are also attempts to split large models and have multiple nodes jointly host reasoning (similar to the Petals project that distributes each layer of the LLM model to different nodes) to reduce single-point pressure. These explorations show that decentralized AI infrastructure is taking shape, providing a new path for open innovation of AI models.
See original
Citizen Z Manifesto: A New Digital Age Proposed by FHE Leaders<br /><br />https://medium.com/@mindnetwork/citizen-z-manifesto-fhe-leaders-propose-a-new-digital-age-db5d24c71039 <br /><br /> "What would it look like if we could maintain human rights through mathematics, technology, and means beyond control? That is the power of cryptographic technology." ——Edward Snowden, Token2049 2024 "Citizen Z puts forward a future that aligns with Zama's vision, and we are realizing this vision through our FHE products and services. The biggest obstacle to an open data economy is the lack of security and sovereignty protection for data. FHE eliminates this barrier, bringing superior AI, superior asset ownership, superior healthcare, and superior transactions."

Citizen Z Manifesto: A New Digital Age Proposed by FHE Leaders

<br /><br />https://medium.com/@mindnetwork/citizen-z-manifesto-fhe-leaders-propose-a-new-digital-age-db5d24c71039 <br /><br />
"What would it look like if we could maintain human rights through mathematics, technology, and means beyond control? That is the power of cryptographic technology."

——Edward Snowden, Token2049 2024
"Citizen Z puts forward a future that aligns with Zama's vision, and we are realizing this vision through our FHE products and services. The biggest obstacle to an open data economy is the lack of security and sovereignty protection for data. FHE eliminates this barrier, bringing superior AI, superior asset ownership, superior healthcare, and superior transactions."
See original
When will AI Hallucinations and Bias cease? Mira Network strikes back: Reshaping the foundation of AI trust with blockchainThe wave of AI sweeps across the globe, from poetry and painting to code generation; beneath the omnipotent facade lies a fatal Achilles' heel—reliability. ‘AI Hallucinations’ (seriously nonsensical) and ‘Bias’ (colored by training data) haunt us, limiting AI's application in high-risk fields like healthcare, finance, law, and fostering doubt. As AI becomes stronger, the reliance on human verification deepens, which is undoubtedly a paradox and a significant bottleneck hindering AI's progress towards true autonomous intelligence.

When will AI Hallucinations and Bias cease? Mira Network strikes back: Reshaping the foundation of AI trust with blockchain

The wave of AI sweeps across the globe, from poetry and painting to code generation; beneath the omnipotent facade lies a fatal Achilles' heel—reliability.
‘AI Hallucinations’ (seriously nonsensical) and ‘Bias’ (colored by training data) haunt us, limiting AI's application in high-risk fields like healthcare, finance, law, and fostering doubt.
As AI becomes stronger, the reliance on human verification deepens, which is undoubtedly a paradox and a significant bottleneck hindering AI's progress towards true autonomous intelligence.
See original
Mind Network Fully Homomorphic Encryption FHE Reshaping the Future of AITL; DR In simple terms: What is Mind Network? Imagine if all your data was like a safe that never opens, yet you could still use the contents inside without opening it. This is what Mind Network aims to achieve. Mind Network has developed a technology called 'Fully Homomorphic Encryption' (FHE) that keeps your data encrypted throughout the entire process while still allowing it to be computed and processed. A table to understand the information flow processing of Mind Network: Pain points in the AI era: privacy protection and data rights The modern internet communication process is like sending a letter: the envelope is sealed during transit (which is what the HTTPS protocol does), but upon arrival, the recipient must open the envelope to read the contents.

Mind Network Fully Homomorphic Encryption FHE Reshaping the Future of AI

TL; DR
In simple terms: What is Mind Network?

Imagine if all your data was like a safe that never opens, yet you could still use the contents inside without opening it. This is what Mind Network aims to achieve.
Mind Network has developed a technology called 'Fully Homomorphic Encryption' (FHE) that keeps your data encrypted throughout the entire process while still allowing it to be computed and processed.

A table to understand the information flow processing of Mind Network:

Pain points in the AI era: privacy protection and data rights

The modern internet communication process is like sending a letter: the envelope is sealed during transit (which is what the HTTPS protocol does), but upon arrival, the recipient must open the envelope to read the contents.
See original
Mobile phones become AI hosts, PIN AI competes with Siri and Xiao AiImagine this: An AI that’s truly yours, one that knows everything about you without sharing your secrets with tech giants. This is the vision of PIN AI, a future where you control your own data and personalized AI. Core Concept: PIN AI believes that your data should work for you, not be used by big companies. They are building a platform that allows you to have your own private AI model, which is like a super intelligent assistant that can understand your needs and provide you with tailored services. How does it work? Dedicated AI / Personalized AI Model

Mobile phones become AI hosts, PIN AI competes with Siri and Xiao Ai

Imagine this:
An AI that’s truly yours, one that knows everything about you without sharing your secrets with tech giants.
This is the vision of PIN AI, a future where you control your own data and personalized AI.

Core Concept:

PIN AI believes that your data should work for you, not be used by big companies. They are building a platform that allows you to have your own private AI model, which is like a super intelligent assistant that can understand your needs and provide you with tailored services.

How does it work?

Dedicated AI / Personalized AI Model
See original
Some common English abbreviations of Web3 ngmi = not gonna make it, "Not gonna make it", often used to tease or self-deprecate, to express pessimism about the prospects of someone or something. anon = anonymous, Anonymous community members, often used to refer to netizens who do not want to reveal their true identities. fr fr = for real for real, Emphasis that something is true, very sincere or not exaggerated. bussin = great meaning "Great" or "extremely good", used to describe something super awesome and attractive IYKYK = if you know you know It means "you know", often used to imply an internal joke or information, and only insiders can understand the meaning.
Some common English abbreviations of Web3

ngmi = not gonna make it,

"Not gonna make it", often used to tease or self-deprecate, to express pessimism about the prospects of someone or something.

anon = anonymous,

Anonymous community members, often used to refer to netizens who do not want to reveal their true identities.

fr fr = for real for real,

Emphasis that something is true, very sincere or not exaggerated.

bussin = great meaning

"Great" or "extremely good", used to describe something super awesome and attractive

IYKYK = if you know you know

It means "you know", often used to imply an internal joke or information, and only insiders can understand the meaning.
See original
Argentine President issues LIBRA, you must know about Javier MileiOn February 15, Argentine President Javier Milei announced the launch of a Meme coin called LIBRA through his official X and Instagram accounts to promote the growth of the Argentine economy, and published the relevant contract address. The token is currently experiencing wild price fluctuations, with its market value having fallen from a high of nearly $5 billion to $1.1 billion. Here is an introduction to Javier Milei Milley is considered to hold right-wing libertarian economic views, and some even consider him to be far-right. He advocates reducing taxes, relaxing business regulations, and cutting government services to allow the private sector to play a greater role in the economy.

Argentine President issues LIBRA, you must know about Javier Milei

On February 15, Argentine President Javier Milei announced the launch of a Meme coin called LIBRA through his official X and Instagram accounts to promote the growth of the Argentine economy, and published the relevant contract address.

The token is currently experiencing wild price fluctuations, with its market value having fallen from a high of nearly $5 billion to $1.1 billion.

Here is an introduction to Javier Milei

Milley is considered to hold right-wing libertarian economic views, and some even consider him to be far-right. He advocates reducing taxes, relaxing business regulations, and cutting government services to allow the private sector to play a greater role in the economy.
See original
Mind Network's FHE Hub and voting features are about to launch, participate in FHE consensus and earn rewards.Original link: https://mindnetwork.medium.com/get-set-mind-network-fhe-hub-launching-soon-eaf9aace1791 Mind Network is pleased to announce that following the successful launch of the MindV product in September, FHE Hubs (MindV Hubs) will launch next Monday at 16:00 Beijing time. The previous version of MindV brought $vFHE to the market and completely transformed voting rights in blockchain. This is not just about voting itself; it is also about the practical application of FHE technology, achieving fair and cryptographically secure consensus through a decentralized model. The launch of this voting and delegation feature of Hubs marks a key step towards the goal of HTTPZ (an era of fully encrypted internet) infrastructure.

Mind Network's FHE Hub and voting features are about to launch, participate in FHE consensus and earn rewards.

Original link: https://mindnetwork.medium.com/get-set-mind-network-fhe-hub-launching-soon-eaf9aace1791
Mind Network is pleased to announce that following the successful launch of the MindV product in September, FHE Hubs (MindV Hubs) will launch next Monday at 16:00 Beijing time.
The previous version of MindV brought $vFHE to the market and completely transformed voting rights in blockchain. This is not just about voting itself; it is also about the practical application of FHE technology, achieving fair and cryptographically secure consensus through a decentralized model.
The launch of this voting and delegation feature of Hubs marks a key step towards the goal of HTTPZ (an era of fully encrypted internet) infrastructure.
See original
First Release! Ethereum Releases Future Plans Part 5: Cleanup Background A major challenge facing Ethereum is the expansion and complexity of the blockchain protocol. This issue is primarily reflected in two aspects: 1. Historical Data Bloat: All nodes must permanently store all historical data (such as transaction records, account information), which increases synchronization and storage burden. 2. Increasing Protocol Features: New features are continuously added, but old features are difficult to remove, leading to increased code complexity. Cleanup Goals 1. Reduce Client Storage Requirements: Decrease or eliminate each node's permanent storage requirement for all historical data. 2. Reduce Protocol Complexity: Remove unnecessary features. Cleanup Methods 1. Historical Data Cleanup 1) By establishing a distributed storage network, each node only needs to store a portion of historical data (similar to a seed network). 2) The proposed EIP-4444 introduces a one-year historical data storage limit and plans to gradually transition to a model that only retains the latest data. 2. State Cleanup 1) Store data through sharding, retaining only the most recently accessed data. 2) Address-Period State Cleanup: Introduce an expiration period for each address, storing only the recently accessed state within a specific period. 3. Feature Streamlining Gradually remove seldom-used or unnecessary features (such as SELFDESTRUCT opcode, old transaction types, synchronization committee mechanisms, etc.) Future Plans and Possible Radical Schemes 1. Radical Scheme: Move a large number of protocol features into contract code. For example, only retain the beacon chain as the base layer, with the execution environment as an independent rollup, similar to past proposals for an “execution environment,” but made possible through SNARKs technology. 2. Change Virtual Machine: For instance, use RISC-V or Cairo as the new Ethereum Virtual Machine (EVM) and transpile EVM contracts into new virtual machine code, simplifying the protocol and improving efficiency.
First Release! Ethereum Releases Future Plans Part 5: Cleanup

Background

A major challenge facing Ethereum is the expansion and complexity of the blockchain protocol.
This issue is primarily reflected in two aspects:

1. Historical Data Bloat: All nodes must permanently store all historical data (such as transaction records, account information), which increases synchronization and storage burden.

2. Increasing Protocol Features: New features are continuously added, but old features are difficult to remove, leading to increased code complexity.

Cleanup Goals

1. Reduce Client Storage Requirements: Decrease or eliminate each node's permanent storage requirement for all historical data.

2. Reduce Protocol Complexity: Remove unnecessary features.

Cleanup Methods

1. Historical Data Cleanup

1) By establishing a distributed storage network, each node only needs to store a portion of historical data (similar to a seed network).
2) The proposed EIP-4444 introduces a one-year historical data storage limit and plans to gradually transition to a model that only retains the latest data.

2. State Cleanup

1) Store data through sharding, retaining only the most recently accessed data.
2) Address-Period State Cleanup: Introduce an expiration period for each address, storing only the recently accessed state within a specific period.

3. Feature Streamlining

Gradually remove seldom-used or unnecessary features (such as SELFDESTRUCT opcode, old transaction types, synchronization committee mechanisms, etc.)

Future Plans and Possible Radical Schemes

1. Radical Scheme: Move a large number of protocol features into contract code. For example, only retain the beacon chain as the base layer, with the execution environment as an independent rollup, similar to past proposals for an “execution environment,” but made possible through SNARKs technology.

2. Change Virtual Machine: For instance, use RISC-V or Cairo as the new Ethereum Virtual Machine (EVM) and transpile EVM contracts into new virtual machine code, simplifying the protocol and improving efficiency.
See original
Ethereum Announces Future Development Plans: The Verge Main Goals: 1. Enable light clients: verification nodes and staking nodes only need a few GB of storage space 2. Long-term goal: be able to fully verify the blockchain on smartwatches (including consensus and execution layers) Core Technology Roadmap: Verkle Tree: uses elliptic curve-based vector commitments to achieve shorter proofs, but lacks quantum resistance STARK + Binary Hash Tree: uses STARK proofs to verify binary trees, has quantum resistance but requires more computational resources Main Challenges: 1. Currently, nodes need to store hundreds of GB of state data to validate blocks, and it continues to grow 2. Initial synchronization of nodes requires a lot of time to download state, making it difficult for light clients and wallets to verify Future Plans: 1. Further analyze and optimize gas costs 2. Improve and test state transition programs 3. Strengthen security analysis of new hash functions (such as Poseidon) 4. Develop more efficient STARK proof protocols {spot}(ETHUSDT) {future}(BNBUSDT)
Ethereum Announces Future Development Plans: The Verge

Main Goals:

1. Enable light clients: verification nodes and staking nodes only need a few GB of storage space

2. Long-term goal: be able to fully verify the blockchain on smartwatches (including consensus and execution layers)

Core Technology Roadmap:

Verkle Tree: uses elliptic curve-based vector commitments to achieve shorter proofs, but lacks quantum resistance

STARK + Binary Hash Tree: uses STARK proofs to verify binary trees, has quantum resistance but requires more computational resources

Main Challenges:

1. Currently, nodes need to store hundreds of GB of state data to validate blocks, and it continues to grow
2. Initial synchronization of nodes requires a lot of time to download state, making it difficult for light clients and wallets to verify

Future Plans:

1. Further analyze and optimize gas costs
2. Improve and test state transition programs
3. Strengthen security analysis of new hash functions (such as Poseidon)
4. Develop more efficient STARK proof protocols

See original
October 25 Financing Situation 1. Social media startup Bluesky completed a $15 million Series A financing, led by Blockchain Capital, with participation from SevenX, True Ventures, and Alumni Ventures. 2. Web3 fitness app Moonwalk completed a $3.4 million seed round financing, led by Hack VC, with participation from Binance Labs, Reciprocal Ventures, and Solana co-founder Raj Gokal. 3. AI-powered crypto payment network Skyfire, founded by two former Ripple executives, completed a new seed round of financing, with investments from Coinbase Ventures and a16z Crypto Startup Accelerator (CSX), increasing its total seed funding from $8.5 million to $9.5 million. Related type projects: {spot}(MASKUSDT) {spot}(GMTUSDT) {spot}(WLDUSDT)
October 25 Financing Situation

1. Social media startup Bluesky completed a $15 million Series A financing, led by Blockchain Capital, with participation from SevenX, True Ventures, and Alumni Ventures.

2. Web3 fitness app Moonwalk completed a $3.4 million seed round financing, led by Hack VC, with participation from Binance Labs, Reciprocal Ventures, and Solana co-founder Raj Gokal.

3. AI-powered crypto payment network Skyfire, founded by two former Ripple executives, completed a new seed round of financing, with investments from Coinbase Ventures and a16z Crypto Startup Accelerator (CSX), increasing its total seed funding from $8.5 million to $9.5 million.

Related type projects:


See original
Single financing of $552 million, perhaps the largest single financing project in blockchain: Network State Praxis1. Introduction Praxis is defined as the world's first network state, a global online community with a national consciousness, and will crowdfund a physical city. The core goal of Praxis is to establish a city involving major concepts including: AI: Scalable power and data centers, loose model regulation Cryptocurrency: Increasing consumer access and efficiency Energy: Primarily focusing on nuclear fission, nuclear fusion, etc. Vision: The Network State 2. Key points of the Network State Background: The Network State is a new political paradigm formed by on-chain communities, seeking diplomatic recognition for statehood through crowdfunding global territory.

Single financing of $552 million, perhaps the largest single financing project in blockchain: Network State Praxis

1. Introduction
Praxis is defined as the world's first network state, a global online community with a national consciousness, and will crowdfund a physical city.

The core goal of Praxis is to establish a city involving major concepts including:

AI: Scalable power and data centers, loose model regulation

Cryptocurrency: Increasing consumer access and efficiency

Energy: Primarily focusing on nuclear fission, nuclear fusion, etc.

Vision: The Network State

2. Key points of the Network State

Background:

The Network State is a new political paradigm formed by on-chain communities, seeking diplomatic recognition for statehood through crowdfunding global territory.
See original
$BTC Address classification and basic understanding Legacy address P2PKH (Pay-to-PubKey Hash): Pay public key hash address Bitcoin native address, the earliest Bitcoin address type, starts with 1 For example: 17XZKS************************yshGt88t3 Advantages: simple, widely supported Disadvantages: large transactions, prone to higher Gas P2SH address P2SH (Pay-to-Script Hash) Pay script hash address Compared with the traditional address starting with 1, P2SH allows users to create scripts, generally used in multi-signature wallets. Starts with 3 For example: 34UZyH***************Y2PYckQ68 Advantages: Supports more complex transaction types, such as multi-signature and scripts, and has cheaper fees Disadvantages: More complex than P2PKH P2WPKH and P2WSH addresses An improvement on Segwit transactions, P2WPKH is optimized for P2PKH and can be used for simple payment public key hash transactions. P2WSH is optimized for P2SH and can be used for more complex script transactions, similar to P2SH, but takes advantage of Segwit. Also starts with bc1 and consists entirely of lowercase letters and numbers For example: bc1qg7*******************m450y42mcn Advantages: Further reduce data, reduce fees, and increase speed Disadvantages: Requires support from wallets and infrastructure that support Segwit Taproot main root address Also based on Segwit, combined with Schnorr signatures and Mast technology, it improves privacy, efficiency and flexibility. Starts with bc1p and consists entirely of lowercase letters and numbers For example: bc1p********************erss0mvvnm Advantages: more privacy and efficiency Disadvantages: requires wallet and infrastructure support, may lack compatibility
$BTC Address classification and basic understanding

Legacy address

P2PKH (Pay-to-PubKey Hash): Pay public key hash address

Bitcoin native address, the earliest Bitcoin address type, starts with 1

For example: 17XZKS************************yshGt88t3

Advantages: simple, widely supported

Disadvantages: large transactions, prone to higher Gas

P2SH address

P2SH (Pay-to-Script Hash) Pay script hash address

Compared with the traditional address starting with 1, P2SH allows users to create scripts, generally used in multi-signature wallets.

Starts with 3

For example: 34UZyH***************Y2PYckQ68

Advantages: Supports more complex transaction types, such as multi-signature and scripts, and has cheaper fees

Disadvantages: More complex than P2PKH

P2WPKH and P2WSH addresses

An improvement on Segwit transactions, P2WPKH is optimized for P2PKH and can be used for simple payment public key hash transactions.

P2WSH is optimized for P2SH and can be used for more complex script transactions, similar to P2SH, but takes advantage of Segwit.

Also starts with bc1 and consists entirely of lowercase letters and numbers

For example: bc1qg7*******************m450y42mcn

Advantages: Further reduce data, reduce fees, and increase speed

Disadvantages: Requires support from wallets and infrastructure that support Segwit

Taproot main root address

Also based on Segwit, combined with Schnorr signatures and Mast technology, it improves privacy, efficiency and flexibility.

Starts with bc1p and consists entirely of lowercase letters and numbers

For example: bc1p********************erss0mvvnm

Advantages: more privacy and efficiency

Disadvantages: requires wallet and infrastructure support, may lack compatibility
See original
Let's talk about voting today Voting behavior exists in many scenarios in the blockchain. The narrow sense of protocol proposal governance and the broad sense of PoS consensus achievement all involve voting But in reality, because the blockchain is open and transparent, voting is actually completely open. We can see which voting options have more attention, and we can also see which options the "big players" have chosen. This leads to a problem. We are not actually voting for real, but are affected by the environment. Whether it is bribed or coerced, once the vote cannot express the truth, it may cause damage. For example, in decentralized AI projects, nodes can control voting and screen out the desired large model, thereby replacing the fair iteration of the large model itself. In order to avoid this problem, encrypted voting appears. Encrypted voting is more suitable for application on blockchain. Because the blockchain cannot be tampered with, we can accurately and in detail the results of each vote. Add cryptography, encrypt voting behavior, we can do encrypted voting without permission, maintain relative fairness, but it is essentially a procedural justice. Voting mainly includes: determining voting rights, voting, counting votes, publishing and other main results 1. The most direct manifestation of voting rights in blockchain is PoS, that is, obtaining voting rights by staking certain tokens. 2. Participating in voting is more about entrusting to nodes, etc. 3. Counting votes mainly uses FHE technology, because only FHE can calculate encrypted data 4. After the counting is completed, since the ciphertext results are published, it is also necessary to decide whether to use the key to decrypt and publish the plaintext results. Of course, ZK technology can be considered here to prove the voting results without revealing the number of votes and specific details. To sum up: 1. Voting is an interaction that is often seen but ignored in blockchain 2. Cryptography methods such as ZK and FHE can help encrypt voting behavior 3. Encrypted voting seems to only encrypt voting, but it actually provides support for the entire system security
Let's talk about voting today

Voting behavior exists in many scenarios in the blockchain. The narrow sense of protocol proposal governance and the broad sense of PoS consensus achievement all involve voting

But in reality, because the blockchain is open and transparent, voting is actually completely open. We can see which voting options have more attention, and we can also see which options the "big players" have chosen.

This leads to a problem. We are not actually voting for real, but are affected by the environment.

Whether it is bribed or coerced, once the vote cannot express the truth, it may cause damage.

For example, in decentralized AI projects, nodes can control voting and screen out the desired large model, thereby replacing the fair iteration of the large model itself.

In order to avoid this problem, encrypted voting appears.

Encrypted voting is more suitable for application on blockchain. Because the blockchain cannot be tampered with, we can accurately and in detail the results of each vote.

Add cryptography, encrypt voting behavior, we can do encrypted voting without permission, maintain relative fairness, but it is essentially a procedural justice.

Voting mainly includes: determining voting rights, voting, counting votes, publishing and other main results

1. The most direct manifestation of voting rights in blockchain is PoS, that is, obtaining voting rights by staking certain tokens.

2. Participating in voting is more about entrusting to nodes, etc.

3. Counting votes mainly uses FHE technology, because only FHE can calculate encrypted data

4. After the counting is completed, since the ciphertext results are published, it is also necessary to decide whether to use the key to decrypt and publish the plaintext results.

Of course, ZK technology can be considered here to prove the voting results without revealing the number of votes and specific details.

To sum up:

1. Voting is an interaction that is often seen but ignored in blockchain

2. Cryptography methods such as ZK and FHE can help encrypt voting behavior

3. Encrypted voting seems to only encrypt voting, but it actually provides support for the entire system security
See original
Learn Nervos $CKB NC-MAX is a consensus protocol in the Nervos Network that aims to improve the throughput and network latency of the blockchain while maintaining decentralization and security. The main design goals of NC-MAX are: Increase throughput: increase the transaction processing capacity of the blockchain. Reduce latency: reduce block confirmation time. Maintain decentralization: ensure that the decentralization and security of the network are not affected. NC-MAX is an improvement on Bitcoin's Nakamoto consensus (NC). Several key mechanisms are introduced: a. Two-layer block structure NC-MAX uses a two-layer block structure, including the main block (Main Block) and the secondary block (Secondary Block). The main block contains all transaction data, while the secondary block is a reference to the main block and records the hash value of the main block. b. Secondary block reward Miners can not only get rewards by mining the main block, but also get additional rewards through the secondary block. Encourage miners to continue mining secondary blocks based on the main block to increase network throughput. Two-step transaction process Propose: In this stage, miners propose a candidate block containing unconfirmed transactions. Commit: In this stage, miners verify and confirm the proposed block to ensure its validity and consistency. Dynamic block interval adjustment Mechanism: Dynamically adjust the block generation interval based on network performance. Purpose: Keep the number of orphan blocks low while increasing transaction throughput. Difficulty adjustment Include all blocks (including orphan blocks) in the difficulty adjustment calculation. Purpose: Defend against selfish mining attacks, that is, a group of miners increase their own profits by privately mining and weaken the interests of other miners.
Learn Nervos $CKB

NC-MAX is a consensus protocol in the Nervos Network that aims to improve the throughput and network latency of the blockchain while maintaining decentralization and security.

The main design goals of NC-MAX are:

Increase throughput: increase the transaction processing capacity of the blockchain.

Reduce latency: reduce block confirmation time.

Maintain decentralization: ensure that the decentralization and security of the network are not affected.

NC-MAX is an improvement on Bitcoin's Nakamoto consensus (NC). Several key mechanisms are introduced:

a. Two-layer block structure
NC-MAX uses a two-layer block structure, including the main block (Main Block) and the secondary block (Secondary Block). The main block contains all transaction data, while the secondary block is a reference to the main block and records the hash value of the main block.

b. Secondary block reward
Miners can not only get rewards by mining the main block, but also get additional rewards through the secondary block. Encourage miners to continue mining secondary blocks based on the main block to increase network throughput.

Two-step transaction process
Propose: In this stage, miners propose a candidate block containing unconfirmed transactions.
Commit: In this stage, miners verify and confirm the proposed block to ensure its validity and consistency.

Dynamic block interval adjustment
Mechanism: Dynamically adjust the block generation interval based on network performance.
Purpose: Keep the number of orphan blocks low while increasing transaction throughput.

Difficulty adjustment
Include all blocks (including orphan blocks) in the difficulty adjustment calculation.
Purpose: Defend against selfish mining attacks, that is, a group of miners increase their own profits by privately mining and weaken the interests of other miners.
See original
FHE+Restaking+AI: Mind Network under the perfect narrative (Three Days in the Sky)TL;DR Mind's Restaking accommodates almost everything, including BTC, ETH, and even LST/LRT assets of all other network tokens Mind business logic is similar to EigenLayer's AVS, but can also cooperate with Eigen and even all other networks Mind is still in its early stages, so not many people can participate, but you can try it out, maybe there will be surprises in the future Mind’s current main solutions focus on AI and Depin, +FHE, +Restaking narrative Mind is like an abstract player. It is on the FHE track, but does not compete with other FHE projects. It is on the AVS track, but does not compete with AVS projects. It is on the Restaking track, but does not compete with Restaking projects. On the AI ​​and Depin tracks, okay, serve them!

FHE+Restaking+AI: Mind Network under the perfect narrative (Three Days in the Sky)

TL;DR
Mind's Restaking accommodates almost everything, including BTC, ETH, and even LST/LRT assets of all other network tokens
Mind business logic is similar to EigenLayer's AVS, but can also cooperate with Eigen and even all other networks

Mind is still in its early stages, so not many people can participate, but you can try it out, maybe there will be surprises in the future
Mind’s current main solutions focus on AI and Depin, +FHE, +Restaking narrative
Mind is like an abstract player. It is on the FHE track, but does not compete with other FHE projects. It is on the AVS track, but does not compete with AVS projects. It is on the Restaking track, but does not compete with Restaking projects. On the AI ​​and Depin tracks, okay, serve them!
See original
Understanding FHE Fully Homomorphic EncryptionFHE Fully Homomorphic Encryption What is FHE In simple terms, while keeping the data encrypted, you can perform arbitrary calculations on the data. F Fully: Compared with HE (homomorphic encryption, which is limited by the calculation method), FHE supports almost any calculation logic H Homomorphic: When we say that an encryption scheme is homomorphic, it means that the ciphertext calculation and the plaintext calculation have the same result. E stands for Encryption. Encryption is easy to understand and is one of the core concepts of cryptography. Problem: FHE is usually computationally inefficient, since processing encrypted data is certainly not as fast as direct computation.

Understanding FHE Fully Homomorphic Encryption

FHE Fully Homomorphic Encryption

What is FHE

In simple terms, while keeping the data encrypted, you can perform arbitrary calculations on the data.
F Fully: Compared with HE (homomorphic encryption, which is limited by the calculation method), FHE supports almost any calculation logic
H Homomorphic: When we say that an encryption scheme is homomorphic, it means that the ciphertext calculation and the plaintext calculation have the same result.
E stands for Encryption. Encryption is easy to understand and is one of the core concepts of cryptography.
Problem: FHE is usually computationally inefficient, since processing encrypted data is certainly not as fast as direct computation.
See original
Maximum extractable value MEV What is MEV? MEV, or Maximum Extractable Value, refers to the additional benefits that miners or validators can obtain in the blockchain by adjusting the order of transactions, including or excluding certain transactions. Why do MEVs exist? In a blockchain, miners or validators are responsible for packaging transactions into new blocks. Since they have the power to choose which trades are included and in which order, they can use this position to obtain additional benefits, such as through arbitrage. The impact of MEV MEV may cause transactions to be delayed or not included, as miners may prioritize transactions that bring them greater benefit. This can also lead to unfairness and centralization of the network.
Maximum extractable value MEV

What is MEV?

MEV, or Maximum Extractable Value, refers to the additional benefits that miners or validators can obtain in the blockchain by adjusting the order of transactions, including or excluding certain transactions.
Why do MEVs exist?

In a blockchain, miners or validators are responsible for packaging transactions into new blocks. Since they have the power to choose which trades are included and in which order, they can use this position to obtain additional benefits, such as through arbitrage.

The impact of MEV

MEV may cause transactions to be delayed or not included, as miners may prioritize transactions that bring them greater benefit. This can also lead to unfairness and centralization of the network.
See original
social experiment "p":"squ-20""op":"mint""tick": "square""amt:"1000"
social experiment

"p":"squ-20""op":"mint""tick": "square""amt:"1000"
See original
About Ethereum’s Gas Definition of Gas: Gas is a unit used in Ethereum to measure the computing resources required for transactions or contract operations. The composition of Gas: includes Gas Price and Gas Used, where Gas Price is the amount of Ether coins that users are willing to pay for each unit of Gas, and Gas Used is the amount of Gas actually consumed by transactions or contract operations. Calculation of transaction fees: Transaction Fee = Gas Used × Gas Price. The role of Gas: By assigning a Gas cost to each operation, Ethereum ensures fair use of network resources and protects network security by incentivizing miners. Network congestion and Gas: When the network is congested, users may need to pay a higher Gas Price to ensure that their transactions are processed with priority.
About Ethereum’s Gas
Definition of Gas: Gas is a unit used in Ethereum to measure the computing resources required for transactions or contract operations.
The composition of Gas: includes Gas Price and Gas Used, where Gas Price is the amount of Ether coins that users are willing to pay for each unit of Gas, and Gas Used is the amount of Gas actually consumed by transactions or contract operations.
Calculation of transaction fees: Transaction Fee = Gas Used × Gas Price.
The role of Gas: By assigning a Gas cost to each operation, Ethereum ensures fair use of network resources and protects network security by incentivizing miners.
Network congestion and Gas: When the network is congested, users may need to pay a higher Gas Price to ensure that their transactions are processed with priority.
Login to explore more contents
Explore the latest crypto news
⚡️ Be a part of the latests discussions in crypto
💬 Interact with your favorite creators
👍 Enjoy content that interests you
Email / Phone number

Latest News

--
View More

Trending Articles

MDTazrian
View More
Sitemap
Cookie Preferences
Platform T&Cs