beware of tokenizing everything
Chasing the goal of tokenizing every “real-world” asset relegates blockchains as secondary ledgers of truth rather than fulfilling their greater potential as the foundation for the future of internet finance. The attempt to tokenize everything is futile because we are in the business of developing net-new financial products that take advantage of being onchain rather than replicating existing assets. Furthermore, we should tokenize assets that supply some inherent value in being onchain - ass...
let's build something people can use
Thanks to the Placeholder investment team and Tim Robinson for the discussions here, our conversations inspired some of these takeaways. Programmable and verifiable on-chain actions should make applications easier, more intuitive, and safer to use for consumers since they remove any ambiguity that is associated with human middlemen. However, we consistently see the opposite result, as is evident by how infrastructure-heavy the industry is. The reason web3 is harder, less intuitive, and percei...
flexible programmable sequencing
Much of this piece is inspired by and, in part, a reflection of "SoK: Cross-Domain MEV" by Conor McMenamin. There is an obvious rise of shared sequencers, settlement layers, and superbuilders. This shift has brought the concept of cross-chain extractable value to the forefront, challenging us to quantify and mitigate its impact across multiple domains. I wanted to utilize this piece to document and discuss some key learning from Conor’s piece, “SoK: Cross-Domain MEV”. One of the most pressing...
<100 subscribers
beware of tokenizing everything
Chasing the goal of tokenizing every “real-world” asset relegates blockchains as secondary ledgers of truth rather than fulfilling their greater potential as the foundation for the future of internet finance. The attempt to tokenize everything is futile because we are in the business of developing net-new financial products that take advantage of being onchain rather than replicating existing assets. Furthermore, we should tokenize assets that supply some inherent value in being onchain - ass...
let's build something people can use
Thanks to the Placeholder investment team and Tim Robinson for the discussions here, our conversations inspired some of these takeaways. Programmable and verifiable on-chain actions should make applications easier, more intuitive, and safer to use for consumers since they remove any ambiguity that is associated with human middlemen. However, we consistently see the opposite result, as is evident by how infrastructure-heavy the industry is. The reason web3 is harder, less intuitive, and percei...
flexible programmable sequencing
Much of this piece is inspired by and, in part, a reflection of "SoK: Cross-Domain MEV" by Conor McMenamin. There is an obvious rise of shared sequencers, settlement layers, and superbuilders. This shift has brought the concept of cross-chain extractable value to the forefront, challenging us to quantify and mitigate its impact across multiple domains. I wanted to utilize this piece to document and discuss some key learning from Conor’s piece, “SoK: Cross-Domain MEV”. One of the most pressing...
Share Dialog
Share Dialog
Thanks for the discussions Mario and Aadharsh, our conversations inspired some of these takeaways.
There’s an interesting tug-of-war at play with privacy-first projects and optionally-private incumbents. By principle, blockchain infrastructure is designed to be public, but the limitations of this design principle when deploying applications has become glaring obvious. Hence, the reason for implementing privacy-enhancing technologies within the blockchain stack.
On one side of this tug-of-war, you have privacy purists who are implementing alternatives to pre-existing infrastructure and applications, but with privacy technology in-built. These players are exemplifying core Internet security design principles, as stated in my CS textbook from college:
“Trying to retrofit security to an existing application after it has already been spec’ed, designed, and implemented is usually a very difficult proposition. Backwards compatibility is often particularly painful, because you can be stuck with supporting the worst insecurities of all previous versions of the software.” - UC Berkeley CS161
The other side acknowledges the network effects at play with incumbent blockchain infrastructure solutions and is approaching privacy as an important plug-and-play feature to exist on top of the existing stack. This is effectively treating privacy as a commodity.
While I acknowledge the strength of the first argument and the importance of privacy as an in-built design feature, recent advancements have demonstrated the validity of the second approach as well.
For example, going “full ZK” has become easier with Optimistic rollups gaining the ability to implement this PET. I recall not long ago when folks regarded the OP stack as a dead model given the eventual proliferation of native ZK rollups. We’re also seeing modular execution networks layer on top of existing VMs, equipping developers with confidential compute and privacy features without leaving their native development language or familiar execution environment.
Current infrastructure and application products are relatively popular without having privacy as a get-go feature. They’ve reached a certain scale of network effects. While they may be de-throned, it seems an upward battle to compete with incumbents on the principle of privacy. Like it or not, privacy may be an important add-on feature, but people seem to be comfortable with alternative solutions that offer better user experience or have reached a sufficient scale.
The views and opinions expressed on this article are solely those of the original author and mentioned contributors. These views and opinions do not necessarily represent those of Placeholder Management LLC or its team.
Thanks for the discussions Mario and Aadharsh, our conversations inspired some of these takeaways.
There’s an interesting tug-of-war at play with privacy-first projects and optionally-private incumbents. By principle, blockchain infrastructure is designed to be public, but the limitations of this design principle when deploying applications has become glaring obvious. Hence, the reason for implementing privacy-enhancing technologies within the blockchain stack.
On one side of this tug-of-war, you have privacy purists who are implementing alternatives to pre-existing infrastructure and applications, but with privacy technology in-built. These players are exemplifying core Internet security design principles, as stated in my CS textbook from college:
“Trying to retrofit security to an existing application after it has already been spec’ed, designed, and implemented is usually a very difficult proposition. Backwards compatibility is often particularly painful, because you can be stuck with supporting the worst insecurities of all previous versions of the software.” - UC Berkeley CS161
The other side acknowledges the network effects at play with incumbent blockchain infrastructure solutions and is approaching privacy as an important plug-and-play feature to exist on top of the existing stack. This is effectively treating privacy as a commodity.
While I acknowledge the strength of the first argument and the importance of privacy as an in-built design feature, recent advancements have demonstrated the validity of the second approach as well.
For example, going “full ZK” has become easier with Optimistic rollups gaining the ability to implement this PET. I recall not long ago when folks regarded the OP stack as a dead model given the eventual proliferation of native ZK rollups. We’re also seeing modular execution networks layer on top of existing VMs, equipping developers with confidential compute and privacy features without leaving their native development language or familiar execution environment.
Current infrastructure and application products are relatively popular without having privacy as a get-go feature. They’ve reached a certain scale of network effects. While they may be de-throned, it seems an upward battle to compete with incumbents on the principle of privacy. Like it or not, privacy may be an important add-on feature, but people seem to be comfortable with alternative solutions that offer better user experience or have reached a sufficient scale.
The views and opinions expressed on this article are solely those of the original author and mentioned contributors. These views and opinions do not necessarily represent those of Placeholder Management LLC or its team.
curiousgurnoor
curiousgurnoor
No comments yet