"In cryptography, zero knowledge proofs let you convince me that you know something, or have done something, without revealing to me what your secret thing was."
Links to the best articles, videos and podcasts about blockchain and cryptocurrency Protocols.
"Since both Hummingbot and Uniswap are both open source projects that allow users to make money by providing liquidity, many people have asked how they compare to each other. Below, we shed more light on their similarities and differences and explain why the two projects are highly complementary."
"If Layer 1 should be focused on state rather than computation, then we need to understand what the state of the blockchain is when designing Layer 1. Only by understanding what the state is, can we understand what the state explosion is."
"Over the last few years there has been an increasing interest in using deliberately engineered economic incentives and mechanism design to align behavior of participants in various contexts."
"Firstly, it’s important to know why interoperability matters. In the existing internet, we can access and modify numerous data sets through APIs (application specific interfaces). However with blockchains, data is siloed by the chain that it exists on. So what does it mean to have interoperability?"
"To expect a multi-chain future in crypto is to expect interoperability. Currently, a few projects are working to tackle this, with the two highest-profiles ones being Cosmos and Polkadot."
"Bitcoin is often referred to as a secure timestamping service. We never had a global record of truth with trustworthy timestamps, so how did this come about? It’s generally due to Proof of Work being combined to a few simple rules by which miners must abide."
"Read on for the MEW explanation and be the coolest guy or gal at your next crypto gathering."
"In this post, we’d like to provide a deep dive into how we built our Cosmos validator, the experiences that shaped our decisions, and hopefully offer some general insights into how to build a high availability datacenter networks and hybrid clouds in general."
"MimbleWimble is a privacy-enhancing and scalable blockchain protocol. It verifies that all transactions are valid without storing the blockchain’s entire history."
"While not a perfect mapping to traditional use of the term middleware, these protocols can be thought of as anything sitting just below the interface layer (i.e., the applications the end user interacts with), but leveraging the lower-level functionality provided by layer-1 blockchains and interoperability protocols."
"SNARKs allow a Prover to prove to a Verifier that she/he has a solution W to the problem F with shared/known inputs X, without revealing W."
"Bitcoin users may, before long, be able to benefit from a trick called “Taproot.” First proposed by Bitcoin Core contributor and former Blockstream CTO Gregory Maxwell, Taproot would expand on Bitcoin’s smart contract flexibility, while offering more privacy in doing so. Even the most complex smart contracts would, on the blockchain, typically be indistinguishable from regular transactions."
"One problem that concerns many is the centralization of mining within the Bitcoin ecosystem. Fortunately, there are talented developers working to solve this problem and Matt Corallo, full-time Bitcoin developer at Chaincode Labs, is one of them. His BetterHash Mining Protocol is intended to significantly decrease the problems associated with mining pool centralization."
"Sharding is one of several popular methods being explored by developers to increase transactional throughput."
"One of FLETA’s major innovations to the blockchain space is the new and novel “Proof-of-Formulation” consensus algorithm that prevents forks by providing real-time confirmation of blocks and transactions."
"Least Authority has recently designed a protocol called the Private Periodic Payment Protocol, or P4, which aims to define the way in which subscription services can be funded using end-to-end private cryptocurrency payments."
"In a permissionless cryptocurrency network, peers must not be trusted. So, to prevent against resource exhaustion attacks, Bitcoin nodes first check the PoW for any received blocks before committing more resources, such as storing the block in RAM or on disk. However, it turns out that checking a Proof-of-Stake is a lot more complicated and context-sensitive than validating a Proof-of-Work."