<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/">
    <channel>
        <title>BadBot</title>
        <link>https://paragraph.com/@badbot</link>
        <description>undefined</description>
        <lastBuildDate>Sun, 26 Apr 2026 12:28:52 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>https://github.com/jpmonette/feed</generator>
        <language>en</language>
        <image>
            <title>BadBot</title>
            <url>https://storage.googleapis.com/papyrus_images/d500435440a5c5be6a025c082c263881aa9972c8b13efd757c5e42190a9b8aa8.jpg</url>
            <link>https://paragraph.com/@badbot</link>
        </image>
        <copyright>All rights reserved</copyright>
        <item>
            <title><![CDATA[FHE: Guardians of Data Privacy]]></title>
            <link>https://paragraph.com/@badbot/fhe-guardians-of-data-privacy</link>
            <guid>RBJUaUb6W3tZ4RD4tr4B</guid>
            <pubDate>Sun, 16 Jun 2024 05:42:01 GMT</pubDate>
            <description><![CDATA[In the digital age, protecting data privacy has become more crucial than ever before. With the rapid advancement of big data, cloud computing, and Internet of Things technologies, the collection, storage, and analysis of personal information have become increasingly prevalent. However, this has also brought about the risks of data breaches and misuse. FHE, or Fully Homomorphic Encryption, allows direct computation on encrypted data, and the computed results are consistent with the results of ...]]></description>
            <content:encoded><![CDATA[<p>In the digital age, protecting data privacy has become more crucial than ever before. With the rapid advancement of big data, cloud computing, and Internet of Things technologies, the collection, storage, and analysis of personal information have become increasingly prevalent. However, this has also brought about the risks of data breaches and misuse.</p><p>FHE, or Fully Homomorphic Encryption, allows direct computation on encrypted data, and the computed results are consistent with the results of performing the same computation on the original data. This means that we can process and analyze data without exposing the original data, providing a new solution for protecting data privacy and integrity.</p><p>The theoretical foundation of FHE can be traced back to 1978 when Rivest et al. proposed the first homomorphic encryption problem. It wasn&apos;t until 2009 that Gentry, in his doctoral thesis, constructed the first realizable fully homomorphic encryption scheme, marking the beginning of the flourishing development of FHE research. Early FHE schemes had extremely low computational efficiency, unable to meet practical application requirements. With researchers continuously proposing optimization schemes, the performance of FHE has been significantly improved, propelling FHE research towards enhancing efficiency, reducing computational complexity, and expanding application scenarios.</p><h2 id="h-technical-implementation-paths-of-fhe" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Technical Implementation Paths of FHE</strong></h2><p><strong>Ideal Lattice-based FHE Schemes</strong></p><p>This is currently recognized as the most practical and efficient construction method for FHE. The main idea is to leverage the algebraic structure of ring operations, completing encryption and decryption through modular arithmetic and factorization of ideal factors in the ring. Representative schemes include BGV, BFV, and CKKS, among others. The advantage of these schemes lies in their high computational efficiency, while the drawback is the need for larger key and ciphertext spaces.</p><p><strong>Matrix-based FHE Schemes</strong></p><p>These schemes encode plaintext information into matrices and achieve homomorphic properties through matrix operations. Representative schemes include GSW and HiNC, characterized by high security but relatively low efficiency.</p><p><strong>NTRU-based FHE Schemes</strong></p><p>NTRU (Number Theory Research Unit) has a good algebraic structure and cyclic symmetry, enabling the construction of efficient FHE schemes such as YASHE and NTRU-FHE. The advantage of these schemes is their relatively small key and ciphertext sizes, making them suitable for resource-constrained environments.</p><p><strong>FHE Schemes based on Learning With Errors (LWE/LWR)</strong></p><p>These schemes are constructed based on the LWE/LWR hardness problems, such as FHEW and TFHE. These schemes prioritize theoretical innovation and can achieve extremely strong security, but their practicality is limited.</p><h2 id="h-fhe-vs-zkp" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>FHE vs. ZKP</strong></h2><p>FHE and ZKP are both cryptographic techniques, but they are more or less complementary.</p><p>ZKP allows a prover to demonstrate to a verifier that a statement is correct without revealing any details about the statement. The verifier can verify the correctness and completeness of the computation without needing to re-execute it. Although ZKP can prove correctness without revealing information, its inputs are typically in plaintext form, which may lead to privacy leaks.</p><p>The introduction of FHE solves this problem. FHE enables arbitrary computation on encrypted data without decryption, thereby protecting data privacy. However, FHE cannot independently ensure the correctness and reliability of the computation, which is precisely the problem that ZKP solves.</p><p>By combining FHE and ZKP, the advantages of both techniques can be leveraged. FHE protects the privacy of input data and the computation process, while ZKP provides an cryptographic proof of correctness, legality, and auditability for FHE computations. Ultimately, this combination achieves truly secure and trustworthy private computation, which is highly valuable for privacy-preserving applications such as sensitive data processing and multi-party computation.</p><h2 id="h-zama-the-fhe-pioneer" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>ZAMA: The FHE Pioneer</strong></h2><p>Zama is an open-source cryptography company building cutting-edge FHE solutions for blockchain and AI. They offer four major open-source solutions:</p><p><strong>TFHE-rs</strong> is a Rust implementation of fully homomorphic encryption over the Torus, used for performing Boolean and integer operations on encrypted data. The TFHE-rs library implements Zama&apos;s variant of TFHE, which enables all necessary homomorphic operations, such as addition and function evaluation through programmable bootstrapping.</p><p><strong>Concrete</strong> is an open-source FHE framework that includes a TFHE compiler as part of the framework. This compiler translates regular programming code into executable instructions that a computer can use with FHE, allowing developers to easily write FHE programs. Computations on FHE-encrypted data may introduce substantial noise, leading to errors. Concrete has a very low default error probability, and developers can flexibly modify the parameters of this error probability.</p><p><strong>Concrete ML</strong> is an open-source Privacy-Preserving Machine Learning (PPML) tool built on Concrete, enabling developers to integrate FHE into machine learning models without requiring cryptographic knowledge.</p><p><strong>fhEVM</strong> introduces FHE into the EVM ecosystem, allowing developers to execute encrypted smart contracts on-chain while still preserving the composability of smart contracts under the premise of protecting on-chain data privacy. fhEVM integrates TFHE-rs and introduces a new TFHE Solidity library, enabling developers to perform computations on encrypted data using Solidity.</p><h2 id="h-fhenix-the-first-fhe-rollup" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Fhenix: The First FHE-Rollup</strong></h2><p>Fhenix is the first Layer 2 Rollup based on FHE, built upon Zama&apos;s TFHE-rs. It has developed its own cryptographic computation library, fheOS, which includes precompiled opcodes for common encryption operations, enabling smart contracts to use FHE primitives on-chain. fheOS is also responsible for communication and authentication between the rollup and the Threshold Service Network (TSN) for decryption and re-encryption requests, while proving the legitimacy proof of the decryption requests. The fheOS library aims to be integrated as an extension into any existing EVM network, while being fully compatible with the EVM.</p><p>Fhenix&apos;s consensus mechanism uses Arbitrum&apos;s Nitro prover. The reason for choosing a fraud proof approach is that the underlying structures of FHE and zkSNARK are different, and using ZKP to verify FHE computations would be extremely computationally intensive, making it almost impossible to achieve at the current technological stage.</p><p>Fhenix has recently collaborated with EigenLayer to develop FHE coprocessors, introducing FHE computations into other public chains, L2s, and L3s. Since Fhenix employs fraud proofs with a 7-day challenge period, EigenLayer&apos;s services can help coprocessors achieve fast transaction confirmations, significantly improving performance.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/b2be983aabc8c1ec1878ec0d197de5665fc341d4f75e29d56d7af52d2c6a7b1a.png" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><h2 id="h-inco-network-confidentiality-as-a-service" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Inco Network: Confidentiality as a Service</strong></h2><p>Inco is a modular confidential computing Layer 1 that can serve as a universal confidentiality  layer for Web3. It supports fhEVM, enabling developers to rapidly build confidential DApps using the Solidity language and development tools within the Ethereum ecosystem. Additionally, Inco provides Confidentiality as a Service (CaaS) to EVM and Cosmos chains lacking native encryption through bridging and the IBC protocol. The CaaS service primarily offers three functionalities:</p><p><strong>On-chain encrypted state:</strong> Directly store encrypted data on-chain without off-chain storage.</p><p><strong>Composable encrypted state:</strong> Perform state transitions on encrypted data entirely on-chain without decryption.</p><p><strong>On-chain randomness:</strong> Generate randomness for applications on-chain without the need for external randomness services, allowing for direct on-chain application development.</p><p>Currently, Inco has several use cases, including gaming, NFTs, RWA, voting governance, and DID.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/fbb38efe8eca984d5a1d58bd474e6f311b49d5f3dc29a033c5905da0f7cfe8e3.png" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><h2 id="h-mind-network-fhe-restaking-layer" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Mind Network: FHE Restaking Layer</strong></h2><p>Mind Network is the first FHE Restaking Layer tailored specifically for AI and PoS networks. As a Restaking Layer, it accepts restaking tokens from ETH, BTC, and AI bluechips for staking. Simultaneously, as an FHE validation network, it utilizes FHE technology to validate node data and reach consensus, ensuring data integrity and security. Mind Network provides economic security guarantees for decentralized AI, DePIN, EigenLayer AVS, Babylon AVS, and critical PoS networks, maintaining the overall system&apos;s consensus and trustworthiness.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/d101a36746d8173556bf3d41de7913e75a9b8b4cb53afa22506b25c884979750.png" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><p><strong>Restaking Layer:</strong> Collaborating with EigenLayer, StakeStone, Renzo, Babylon, Ankr, and others, Mind Network derives security from the Ethereum and Bitcoin networks. It also collaborates with Chainlink CCIP, Connext, and others to enable cross-chain remote restaking.</p><p><strong>Security Layer:</strong> Mind Network introduces FHE-enhanced validators to ensure end-to-end encryption during the validation and consensus computation processes, and further enhance security by integrating the modular fhEVM of Fhenix and Inco.</p><p><strong>Consensus Layer:</strong> Mind Network introduces a Proof of Intelligence (PoI) consensus mechanism designed specifically for AI tasks, ensuring fair and secure reward distribution among FHE validators. Additionally, Mind Network is collaborating with AltLayer, EigenDA, and Arbitrum Orbit to launch a Rollup chain, enhancing consensus computation with lower costs and faster performance.</p><h2 id="h-privasea-proof-of-human" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Privasea: Proof of Human</strong></h2><p>Privasea is a DePIN+AI network for FHE machine learning, whose technical architecture includes the following core components:</p><p><strong>HESea Library</strong>: An advanced FHE library that provides secure computation capabilities on encrypted data. This library supports various FHE schemes such as TFHE, CKKS, BGV/BFV, and others.</p><p><strong>Privasea API</strong>: The application programming interface for the Privasea AI network, offering a suite of functionalities and endpoints to simplify data submission, model training, and prediction operations, while ensuring data encryption during transmission and processing.</p><p><strong>Privanetix</strong>: A decentralized computation network composed of multiple high-performance computing nodes capable of efficiently processing encrypted data. Each node integrates the HESea library to ensure data privacy and computational performance.</p><p><strong>Privasea Smart Contract Suite</strong>: A blockchain-based incentive mechanism that tracks the registration and contributions of Privanetix nodes through smart contracts, validates computations, and distributes rewards, ensuring participant engagement and fairness.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/6ca259bef1fb9c461251c64b2004d7b978e278417e85bc906f39934287e607aa.png" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>Privasea has launched the ImHuman application, which develops a Proof of Human based on FHE, aiming to prove that users are human beings to protect their digital identities from impersonation by bots and artificial intelligence. Users can verify their human identity through facial biometric recognition technology, generating a unique NFT as proof of their individual human identity. With the ImHuman application, users can securely attest their personal identities on Web3 and Web2 platforms without revealing personal details.</p><h2 id="h-conclusion" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Conclusion</strong></h2><p>In the DeFi domain, FHE enables transactions and fund flows to take place without disclosing sensitive financial information, thereby protecting user privacy and reducing market risks. It may also serve as one of the effective solutions to the MEV problem. For fully on-chain games, FHE ensures that player scores, game progress, and other data are protected in an encrypted state, while simultaneously allowing game logic to be executed on-chain without exposing the data, enhancing fairness and security of the games. In the AI field, FHE allows for the analysis and model training on encrypted data, not only protecting data privacy but also promoting cross-institutional data sharing and collaboration, driving the development of more secure and compliant AI applications.</p><p>While FHE still faces numerous challenges in practicality and efficiency, its unique theoretical foundation brings hope for overcoming these bottlenecks. In the future, FHE is expected to significantly enhance performance and expand application use cases through algorithm optimization, hardware acceleration, and other approaches, providing a more robust foundation for data privacy protection and secure computation.</p><h2 id="h-references" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">References</h2><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://github.com/zama-ai/tfhe-rs">https://github.com/zama-ai/tfhe-rs</a></p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://github.com/zama-ai/concrete">https://github.com/zama-ai/concrete</a></p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://github.com/zama-ai/concrete-ml">https://github.com/zama-ai/concrete-ml</a></p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://github.com/zama-ai/fhevm">https://github.com/zama-ai/fhevm</a></p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.fhenix.io/introducing-fhe-rollups-scaling-confidential-smart-contracts-on-ethereum-and-beyond/">https://www.fhenix.io/introducing-fhe-rollups-scaling-confidential-smart-contracts-on-ethereum-and-beyond/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.fhenix.io/fhe-coprocessors-fhenix-eigenlayer-join-forces-for-next-gen-onchain-confidentiality/">https://www.fhenix.io/fhe-coprocessors-fhenix-eigenlayer-join-forces-for-next-gen-onchain-confidentiality/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://docs.inco.org/">https://docs.inco.org/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://docs.mindnetwork.xyz/minddocs">https://docs.mindnetwork.xyz/minddocs</a></p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://mindnetwork.medium.com/fhe-secured-restaking-layer-scaling-security-for-ai-depin-networks-73d5c6e5dda3">https://mindnetwork.medium.com/fhe-secured-restaking-layer-scaling-security-for-ai-depin-networks-73d5c6e5dda3</a></p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://drive.google.com/file/d/1jbxWMgEziupt119gvM1n0Mu8sDdM7VWF/view">https://drive.google.com/file/d/1jbxWMgEziupt119gvM1n0Mu8sDdM7VWF/view</a></p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.privasea.ai/">https://www.privasea.ai/</a></p>]]></content:encoded>
            <author>badbot@newsletter.paragraph.com (BadBot)</author>
        </item>
        <item>
            <title><![CDATA[The Exploratory Journey of AI and Web3 Convergence and Innovation]]></title>
            <link>https://paragraph.com/@badbot/the-exploratory-journey-of-ai-and-web3-convergence-and-innovation</link>
            <guid>5F8ZAEYNAKDZMGCWrFvE</guid>
            <pubDate>Sun, 26 May 2024 09:26:55 GMT</pubDate>
            <description><![CDATA[Web3, as a decentralized, open, and transparent new paradigm of the internet, has an inherent synergy with AI. Under the traditional centralized architecture, AI computing and data resources are subject to strict control, facing numerous challenges such as computational bottlenecks, privacy breaches, and algorithmic black boxes. On the other hand, Web3, built on distributed technologies, can infuse new vitality into AI development through shared computing networks, open data markets, and priv...]]></description>
            <content:encoded><![CDATA[<p>Web3, as a decentralized, open, and transparent new paradigm of the internet, has an inherent synergy with AI. Under the traditional centralized architecture, AI computing and data resources are subject to strict control, facing numerous challenges such as computational bottlenecks, privacy breaches, and algorithmic black boxes. On the other hand, Web3, built on distributed technologies, can infuse new vitality into AI development through shared computing networks, open data markets, and privacy-preserving computation. Simultaneously, AI can empower Web3 with capabilities like optimizing smart contracts and anti-cheating algorithms, aiding in the ecosystem&apos;s construction. Therefore, exploring the convergence of Web3 and AI is crucial for building the next-generation internet infrastructure and unlocking the value of data and computing power.</p><h3 id="h-data-driven-the-solid-foundation-of-ai-and-web3" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><strong>Data-Driven: The Solid Foundation of AI and Web3</strong></h3><p>Data is the core driving force behind AI development, akin to fuel for an engine. AI models require ingesting vast amounts of high-quality data to gain profound understanding and robust reasoning abilities. Data not only provides the training foundation for machine learning models but also determines their accuracy and reliability.</p><p>In the traditional centralized AI data acquisition and utilization model, several key issues arise:</p><ul><li><p>Data acquisition costs are prohibitively high, making it challenging for small and medium-sized enterprises to participate.</p></li><li><p>Data resources are monopolized by tech giants, creating data silos.</p></li><li><p>Personal data privacy faces risks of leakage and misuse.</p></li></ul><p>Web3 offers a new decentralized data paradigm to address the pain points of traditional models:</p><ul><li><p>Through projects like Grass, users can sell their idle network capacity to AI companies, enabling decentralized web data crawling, cleaning, and transformation to provide real, high-quality data for AI model training.</p></li><li><p>Public AI adopts a &quot;label to earn&quot; model, incentivizing global workers with tokens to participate in data annotation, aggregating global expertise, and enhancing data analysis capabilities.</p></li><li><p>Blockchain data transaction platforms like Ocean Protocol and Streamr provide an open and transparent trading environment for data supply and demand, fostering data innovation and sharing.</p></li></ul><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/937c0c690aabfa848e6b127bbf845a7e452567f9a11469f1a3bfb07e8d392b37.jpg" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>Nevertheless, real-world data acquisition also faces challenges such as varying data quality, high processing complexity, and insufficient diversity and representativeness. Synthetic data may be the rising star in the Web3 data realm. Based on generative AI technologies and simulations, synthetic data can mimic the properties of real data, effectively complementing it and improving data usage efficiency. In domains like autonomous driving, financial market trading, and game development, synthetic data has already demonstrated its mature application potential.</p><h3 id="h-privacy-protection-the-role-of-fhe-in-web3" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><strong>Privacy Protection: The Role of FHE in Web3</strong></h3><p>In the data-driven era, privacy protection has become a global focal point, as evidenced by the enactment of regulations like the EU&apos;s General Data Protection Regulation (GDPR), reflecting the strict guardianship of personal privacy. However, this has also brought challenges: some sensitive data cannot be fully utilized due to privacy risks, undoubtedly limiting the potential and reasoning capabilities of AI models.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/e995db78136b983758a94bbc71f45d0062061a5891e7ed0d12b8ca0704a785a1.png" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>FHE, or Fully Homomorphic Encryption, allows direct computation on encrypted data without the need for decryption, while the computation results are consistent with performing the same operations on plaintext data.</p><p>FHE provides robust protection for AI privacy computation, enabling GPU computing power to execute model training and inference tasks without accessing the original data. This presents significant advantages for AI companies, as they can securely open API services while protecting trade secrets.</p><p>FHEML supports encrypted processing of data and models throughout the entire machine learning lifecycle, ensuring the security of sensitive information and preventing data leakages. In this way, FHEML reinforces data privacy and provides a secure computing framework for AI applications.</p><p>FHEML complements ZKML, where ZKML proves the correct execution of machine learning, while FHEML emphasizes computing on encrypted data to maintain data privacy.</p><h3 id="h-the-computing-revolution-ai-computation-in-decentralized-networks" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><strong>The Computing Revolution: AI Computation in Decentralized Networks</strong></h3><p>The computational complexity of current AI systems doubles every three months, leading to a surge in computing power demands that far exceeds the supply of existing computing resources. For instance, the training of OpenAI&apos;s GPT-3 model required immense computing power, equivalent to 355 years of training time on a single device. Such a shortage of computing power not only limits the progress of AI technology but also renders advanced AI models inaccessible to most researchers and developers.</p><p>Additionally, the global GPU utilization rate is below 40%, coupled with the slowdown in microprocessor performance improvements and supply chain and geopolitical factors contributing to chip shortages, exacerbating the computing power supply issue. AI practitioners find themselves in a dilemma: either purchasing hardware or renting cloud resources, desperately needing an on-demand, cost-effective computing service model.</p><p>IO.net is a decentralized AI computing power network based on Solana, aggregating idle GPU resources globally to provide AI companies with an economical and accessible computing power market. Entities demanding computing power can publish computation tasks on the network, and smart contracts will allocate tasks to contributing miner nodes. Miners execute the tasks, submit the results, and receive reward points upon successful verification. IO.net&apos;s approach improves resource utilization efficiency, helping to alleviate computing power bottlenecks in fields like AI.</p><p>In addition to general decentralized computing power networks, there are platforms dedicated to AI training, such as Gensyn and Flock.io, as well as specialized computing power networks focused on AI inference, like Ritual and Fetch.ai.</p><p>Decentralized computing power networks provide a fair and transparent computing power market, breaking monopolies, lowering application barriers, and improving utilization efficiency. Within the Web3 ecosystem, decentralized computing power networks will play a crucial role, attracting more innovative dApps and jointly driving the development and application of AI technologies.</p><h3 id="h-depin-web3-empowering-edge-ai" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><strong>DePIN: Web3 Empowering Edge AI</strong></h3><p>Imagine your smartphone, smartwatch, or even smart home devices possessing the ability to run AI – this is the allure of Edge AI. It enables computation to occur at the data source, realizing low latency and real-time processing while protecting user privacy. Edge AI technology has already been applied in critical domains such as autonomous driving.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/29c61fcff80932d6b02bf359ee09cf3d1837097878a9a7f6f19a8f2c09bb08eb.png" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>In the Web3 realm, we have a more familiar name – DePIN. Web3 emphasizes decentralization and user data sovereignty, and DePIN enhances user privacy protection by processing data locally, reducing the risk of data leakages. Web3&apos;s native token economy can incentivize DePIN nodes to provide computing resources, building a sustainable ecosystem.</p><p>Currently, DePIN is rapidly developing in the Solana ecosystem, becoming one of the preferred public chain platforms for project deployment. Solana&apos;s high throughput, low transaction fees, and technological innovations have provided strong support for DePIN projects. At present, the market capitalization of DePIN projects on Solana exceeds $10 billion, with notable projects like Render Network and Helium Network achieving significant progress.</p><h3 id="h-imo-a-new-paradigm-for-ai-model-publishing" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><strong>IMO: A New Paradigm for AI Model Publishing</strong></h3><p>The concept of IMO (Initial Model Offering) was first introduced by the Ora protocol, tokenizing AI models.</p><p>In the traditional model, due to the lack of a revenue-sharing mechanism, once an AI model is developed and released to the market, developers often struggle to obtain continuous revenue from the subsequent use of the model. Especially when the model is integrated into other products and services, it becomes challenging for the original creators to track usage and, consequently, generate revenue. Additionally, the performance and effectiveness of AI models often lack transparency, making it difficult for potential investors and users to evaluate their true value, limiting market acceptance and commercial potential.</p><p>IMO provides a novel method of funding and value-sharing for open-source AI models. Investors can purchase IMO tokens to share in the subsequent revenue generated by the model. Ora Protocol utilizes the ERC-7641 and ERC-7007 ERC standards, combined with an Onchain AI Oracle and OPML technology, to ensure the authenticity of AI models and enable token holders to share in the revenue.</p><p>The IMO model enhances transparency and trust, encourages open-source collaboration, aligns with crypto market trends, and injects momentum into the sustainable development of AI technology. While IMO is still in its early experimental stage, as market acceptance and participation expand, its innovative nature and potential value are worth anticipating.</p><h3 id="h-ai-agents-a-new-era-of-interactive-experiences" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><strong>AI Agents: A New Era of Interactive Experiences</strong></h3><p>AI Agents can perceive their environment, engage in independent thinking, and take appropriate actions to achieve predefined goals. With the support of large language models, AI Agents not only understand natural language but can also plan, make decisions, and execute complex tasks. They can function as virtual assistants, learning user preferences through interactions and providing personalized solutions. Even without explicit instructions, AI Agents can autonomously solve problems, enhance efficiency, and create new value.</p><p>Myshell is an open AI-native application platform offering a comprehensive and user-friendly toolset for configuring bot functionalities, appearances, voices, and connecting to external knowledge bases. It strives to create a fair and open AI content ecosystem, empowering individuals to become super creators by leveraging generative AI technologies. Myshell has trained specialized large language models to make role-playing more humanized. Its voice cloning technology can accelerate personalized AI product interactions, reducing voice synthesis costs by 99%, with voice cloning achievable in just 1 minute. Customized AI Agents created with Myshell can currently be applied to various domains, including video chatting, language learning, and image generation.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/cfd12ba26ea2d3ab64b83d88e9abe2ffb58249ba62346483df4b135ed7feab01.webp" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>In the convergence of Web3 and AI, the current focus is primarily on exploring the infrastructure layer, addressing critical issues such as acquiring high-quality data, protecting data privacy, hosting models on-chain, improving the efficient utilization of decentralized computing power, and verifying large language models. As these infrastructural components gradually mature, we have reason to believe that the fusion of Web3 and AI will give birth to a series of innovative business models and services.</p>]]></content:encoded>
            <author>badbot@newsletter.paragraph.com (BadBot)</author>
        </item>
        <item>
            <title><![CDATA[跨越复杂性：Intent-centric构筑用户友好新世界]]></title>
            <link>https://paragraph.com/@badbot/intent-centric</link>
            <guid>sQIsS9KUYYkJ4Bq6A68F</guid>
            <pubDate>Wed, 23 Aug 2023 07:06:48 GMT</pubDate>
            <description><![CDATA[想象这样一个场景：如果你在Ethereum主网上拥有1000 USDT，并且想要在Optimism二层网络的DEX购买$OP，应该怎么做？ 首先需要选择一个支持Optimism的钱包，并添加相应的网络设置；然后，通过安全的跨链桥，你可以将1000 USDT和一些用作gas费的ETH桥接至Optimism，进而在相应的DEX连接钱包并执行交易。整个过程虽然直观，但涉及多次交互和等待确认时间，以及潜在的网络费用和交易滑点等不确定因素。对于链上交易新手来说，每一步都可能是挑战，这也限制了链上应用的大规模推广。那么，能否将链上交互的复杂性降至与中心化交易所（CEX）操作同等的简单级别呢？ Intent-centric即“以意图为中心”，不同于前述场景，intent-centric只关注结果，不关注过程。用户只需要发出“我想要在Optimism购买$OP“的指令并签名，Intent-centric协议会协同第三方完成所有必要步骤，从而降低操作门槛，为用户带来类似Cefi的无缝体验。 目前已有多个项目围绕intent-centric进行探索。Bob the SolverBob the Sol...]]></description>
            <content:encoded><![CDATA[<p>想象这样一个场景：如果你在Ethereum主网上拥有1000 USDT，并且想要在Optimism二层网络的DEX购买$OP，应该怎么做？</p><p>首先需要选择一个支持Optimism的钱包，并添加相应的网络设置；然后，通过安全的跨链桥，你可以将1000 USDT和一些用作gas费的ETH桥接至Optimism，进而在相应的DEX连接钱包并执行交易。整个过程虽然直观，但涉及多次交互和等待确认时间，以及潜在的网络费用和交易滑点等不确定因素。对于链上交易新手来说，每一步都可能是挑战，这也限制了链上应用的大规模推广。那么，能否将链上交互的复杂性降至与中心化交易所（CEX）操作同等的简单级别呢？</p><p>Intent-centric即“以意图为中心”，不同于前述场景，intent-centric只关注结果，不关注过程。用户只需要发出“我想要在Optimism购买$OP“的指令并签名，Intent-centric协议会协同第三方完成所有必要步骤，从而降低操作门槛，为用户带来类似Cefi的无缝体验。</p><p>目前已有多个项目围绕intent-centric进行探索。</p><h2 id="h-bob-the-solver" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Bob the Solver</strong></h2><p>Bob the Solver 是基于意图交易的基础设施，可以集成到账户抽象钱包和去中心化应用中。在ETHGlobal Paris黑客松表现亮眼，并获得了1inch的最佳用例奖。它由两部分构成：</p><p><strong>Solver(求解器):</strong> Solver配备ML来识别用户意图，并对意图进行分类，规划实现意图的最优路径。确定路径后，solver构建实现用户意图所需交易并转发至账户抽象钱包。</p><p>**账户抽象钱包(AA钱包)：**负责交易的执行，由bundler和paymaster组成。其中，bundler负责接收并规划solver发送的交易，而paymaster则负责管理与这些交易相关的gas费。</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/1fcfa65828ec16263228077d0e80b8fd4a920d5524ad9e05b6482c19b1ec9d1d.png" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><h2 id="h-anoma" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Anoma</strong></h2><p>Anoma是一个以意图为中心的隐私保护协议，用于去中心化交易对手发现、解析和多链原子计算(atomic settlement)。核心流程包括以下几个步骤：</p><ol><li><p><strong>用户交互</strong>：用户可以向Anoma的intent gossip网络（P2P网络层）发送透明、私有或有保护的意图。</p></li><li><p><strong>意图收集与匹配</strong>：网络中的solver（可以是searcher等角色）收集意图，进行平衡状态转换，以实现交易对手的匹配。</p></li><li><p><strong>交易处理</strong>：匹配后的交易提交到加密的mempool，validator将proposer打包的区块发送到执行层，完成执行并验证有效性，最终完成状态根更新。</p></li></ol><p>Anoma的执行层构建在Taiga上，这是一个基于Halo2的zk-circuit，使得Anoma可以用以部署以太坊的zk-rollup，共享以太坊的部分安全性。</p><p>除了zk-rollup，Anoma还可以用于op-rollup、NFT Marketplace、Dex等的完全去中心化开发。它提供了一种简化的方式来构建和操作这些应用，同时保护用户的隐私和安全。</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/137d5000b156750c39ca8e3c4f2dce70a36fba2faebc8a77ed00385f7f72ee97.png" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><h2 id="h-essential" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Essential</strong></h2><p>Essential专注于构建基于意图的基础设施和工具，以解决MEV（矿工可提取价值）问题。其核心目标是减少MEV所带来的负外部性，使用户能够以最低的成本实现意图。Essential计划建立一个solver网络，捕获用户的意图，并竞争寻找最佳解决方案，将以获取利润为目的的searcher转化为寻求用户最佳解决方案的solver。</p><p>为了实现这一目标，Essential正在开发一系列产品：</p><p>意图表达的通用领域特定语言(DSL)：实际上是标准化的意图语言，使solver更容易理解和推理用户意图。</p><p>以太坊和EVM的intent-centric的账户抽象标准：Solver需要执行链上操作的权限，因此需要账户抽象。新标准将引入ERC-4337，委托solver构建有效交易以满足意图。</p><p>模块化意图层：为解决intent-centric架构与底层兼容时不可避免的设计牺牲。其好处包括：</p><ul><li><p>简化架构：Intent- only放弃transaction的概念，使solver专注于提供解决方案，无需理解意图与事务之间的依赖；</p></li><li><p>订单流聚合：所有订单通过同一个solver网络分发，确保透明并利用多个流动性来源优化用户结果；</p></li><li><p>MEV阻力：激励solver更多地将价值回馈给用户，以提供最佳结果；</p></li><li><p>模块化设计：允许在多个堆栈和生态系统中部署协议，促进跨链意图执行。</p></li></ul><h2 id="h-flashbots-suave" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Flashbots Suave</strong></h2><p>值得一提的是，Flashbots推出的suave正是聚焦于基于intent-centric的跨链MEV提取。<a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://mirror.xyz/0xa7a3432c3E4652129b61E8f282c4d778a3f19688/K1pwXB2X8bv1CNH65CcV4ZpvLTXKOBEgD_eh2Tcexho">正如之前提到的，suave的架构围绕用户交易偏好组成，分别为对偏好的表达、执行及结算。</a>这里的“偏好”可以理解为带有条件和约束的用户意图。意图的执行者充分竞争，返还部分MEV收益给用户，以使用户利益最大化。</p><p>上个月，flashbots推出了MEVM，为MEV提供了新的预编译，允许任何集中式MEV基础设施转换为去中心化区块链上的智能合约。此外，MEVM通过将敏感数据的计算移动到链下运行的执行节点来提供隐私和效率。MEVM将大大丰富suave链生态，带来更多订单流，用户将获得更好的结果，提议者将获得更优质的区块。</p><h2 id="h-intent-centric" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Intent-centric未来有哪些机会？</strong></h2><p>**意图语言与AI的结合：**大多数情况下，用户的意图是复杂的，意图表达是不充分的，这可能导致solver对意图理解更困难，从而无法规划出最优解决路径。可利用AI更精确识别用户意图，例如利用机器学习构建意图识别模型，根据用户的交易请求来源、交易数据等推断潜在的目的和需求。</p><p>**第三方执行层：**Solver识别意图后，会把交易过程打包给第三方执行层。执行过程往往会涉及复杂的交易流程及多方参与者，能够快速响应、准确处理交易流程且安全、稳定的第三方执行层，是实现用户意图的关键之一。但也要警惕第三方执行层的中心化问题及DOS攻击等。</p><p>**Defi的大规模采用：**其实当前已有Defi项目采用intent-centric，例如Cowswap、1inch Fusion、UniswapX等。Cowswap推出Cow Hooks以进行基于意图的AMM交换；UniswapX允许用户签署意图，solver在链下执行订单并在链上结算。未来随着intent-centric在Defi领域的大规模采用，有可能改善资本效率和流动性提供。</p><p>**全链游戏的发展：**全链游戏的全部游戏逻辑及数据等都以智能合约的形式存储在链上，受限于区块链速度、可扩展性等瓶颈，目前无法支持游戏策略复杂、画面精美等的游戏。全链游戏通过intent-centric可以降低玩家操作的复杂度，玩家只需发出意图指令并签名，即可完成游戏操作，而不是对意图操作的每一步都approve并签名，提高玩家游戏体验。</p><p>随着Web3不断发展，用户体验和交互效率逐渐成为焦点，intent- centric使我们能够以全新的方式构建和操作复杂系统，期待一个更加用户友好、效率和透明的去中心化世界。</p><p><strong>参考链接：</strong></p><div data-type="youtube" videoId="lsfHYsocZjI">
      <div class="youtube-player" data-id="lsfHYsocZjI" style="background-image: url('https://i.ytimg.com/vi/lsfHYsocZjI/hqdefault.jpg'); background-size: cover; background-position: center">
        <a href="https://www.youtube.com/watch?v=lsfHYsocZjI">
          <img src="{{DOMAIN}}/editor/youtube/play.png" class="play"/>
        </a>
      </div></div><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://medium.com/anomanetwork/an-overview-of-anoma-s-architecture-26b72e8c9be5">https://medium.com/anomanetwork/an-overview-of-anoma-s-architecture-26b72e8c9be5</a></p><div data-type="youtube" videoId="mdYwfW6tMJ8">
      <div class="youtube-player" data-id="mdYwfW6tMJ8" style="background-image: url('https://i.ytimg.com/vi/mdYwfW6tMJ8/hqdefault.jpg'); background-size: cover; background-position: center">
        <a href="https://www.youtube.com/watch?v=mdYwfW6tMJ8">
          <img src="{{DOMAIN}}/editor/youtube/play.png" class="play"/>
        </a>
      </div></div><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://blog.essential.builders/introducing-essential/">https://blog.essential.builders/introducing-essential/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://writings.flashbots.net/mevm-suave-centauri-and-beyond">https://writings.flashbots.net/mevm-suave-centauri-and-beyond</a></p>]]></content:encoded>
            <author>badbot@newsletter.paragraph.com (BadBot)</author>
        </item>
        <item>
            <title><![CDATA[从FlashBots看MEV去中心化之路]]></title>
            <link>https://paragraph.com/@badbot/flashbots-mev</link>
            <guid>vugncOSHEJZISsL6rDYG</guid>
            <pubDate>Thu, 25 May 2023 14:21:02 GMT</pubDate>
            <description><![CDATA[MEV（Miner / Maximum Extractable Value）是指在区块链交易中，矿工或验证者能够获取的潜在价值，是由交易顺序和打包的选择方式所产生的利润，MEV的来源有Front Running、Back Running、三明治攻击等等。 Flashbots推出一系列关于MEV的解决方案，致力于建立一个公平、透明、安全的交易环境，本文将盘点Flashbots为MEV去中心化所做的努力。Flashbots Auction——矿工去中心化在PoW时代，MEV的主要参与者包括搜索者和矿工，其中矿工拥有出矿权，并且在交易排序、插队和篡改方面具有特权，从而占据利润的大头。同时，搜索者愿意支付高昂的Gas费用，以确保自己的交易被包含在区块中，某些情况下，搜索者可能会拿出MEV的90%甚至更多作为奖励支付给矿工。 显而易见，这种特权地位对交易的隐私以及安全造成了威胁，带来了包括网络拥堵、Gas竞争等负外部性。 Flashbots Auction 提供了以太坊用户和矿工之间的私密通信渠道，通过透明和公平的方式来协商交易的执行顺序和价格。提交拍卖：搜索者将交易打包成Bundles提...]]></description>
            <content:encoded><![CDATA[<p>MEV（Miner / Maximum Extractable Value）是指在区块链交易中，矿工或验证者能够获取的潜在价值，是由交易顺序和打包的选择方式所产生的利润，MEV的来源有Front Running、Back Running、三明治攻击等等。</p><p>Flashbots推出一系列关于MEV的解决方案，致力于建立一个公平、透明、安全的交易环境，本文将盘点Flashbots为MEV去中心化所做的努力。</p><h2 id="h-flashbots-auction" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Flashbots Auction——矿工去中心化</h2><p>在PoW时代，MEV的主要参与者包括搜索者和矿工，其中矿工拥有出矿权，并且在交易排序、插队和篡改方面具有特权，从而占据利润的大头。同时，搜索者愿意支付高昂的Gas费用，以确保自己的交易被包含在区块中，某些情况下，搜索者可能会拿出MEV的90%甚至更多作为奖励支付给矿工。</p><p>显而易见，这种特权地位对交易的隐私以及安全造成了威胁，带来了包括网络拥堵、Gas竞争等负外部性。</p><p>Flashbots Auction 提供了以太坊用户和矿工之间的私密通信渠道，通过透明和公平的方式来协商交易的执行顺序和价格。</p><ul><li><p>提交拍卖：搜索者将交易打包成Bundles提交到Flashbots拍卖系统中，同时指定一个最低价格展示交易的潜在价值；</p></li><li><p>矿工竞价：矿工在拍卖系统中对感兴趣的 Bundle 进行竞价，指定自己愿意接受的最低价格；</p></li><li><p>构建区块：矿工从拍卖系统中选择一个或多个竞价最高的Bundle，将其包含在区块中；</p></li><li><p>结算和执行：区块中包含的交易和 Bundle将按照拍卖中达成的顺序和价格进行执行。</p></li></ul><p>通过Flashbots Auction，搜索者不再需要通过Gas War的方式来确保自己的交易被优先打包，也无需支付失败交易的费用，这样使MEV分配更加公平合理，大大提高以太坊网络的安全性和执行效率。</p><h2 id="h-mev-boost" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">MEV-Boost——验证者去中心化</h2><p>PoS时代，PoW矿工被验证者替代（在信标链质押32个ETH并运行以太坊客户端即可成为验证者），在每一个Epoch里会随机选择一个验证者作为proposer打包交易并提交至以太坊主网。</p><p>Flashbots Auction推出MEV-Boost，引入一个新角色——Builder，负责构建区块。通过PBS（Proposer-Builder Separation）将提议者和构建者分离，促进验证者竞争、去中心化和抗审查。同时验证者接入MEV-Boost，降低寻找利润最大交易的门槛，可大幅增加质押收益。</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/331a78a28537c13a83d729d1e5a8f301a075712c960fbf7f65e651fe1909ac73.png" alt="图片来源：Flashbots" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="">图片来源：Flashbots</figcaption></figure><p>搜索者通过mempool等渠道寻找有套利机会的交易，将其与自己的交易打包成bundle，发送给区块构建者；</p><p>构建者试图挑选最有利可图的bundles打包成区块，发送给Relay；</p><p>Relay实际上是为验证者托管构建者打包的区块，relay转发区块头至MEV-Boost，验证者签署区块头来锁定打包区块的承诺后，relay将完整区块转发给验证者；</p><p>验证者签署承诺成为区块提议者，负责提议区块到网络中，并将区块添加到链上。</p><h2 id="h-suave" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Suave——构建者去中心化</h2><p>虽然MEV-Boost带来种种好处，但也面临着构建者中心化的问题，当前少数构建者垄断了大部分的区块构建。</p><p>构建者中心化的原因主要有两个：</p><ul><li><p>EOF（独家订单流），例如构建者跟钱包、Dapp等建立合作，通过修改用户默认RPC获取独家订单流；</p></li><li><p>跨域MEV，跨域构建者捕获多链交易，导致整个区块链网络更加中心化。</p></li></ul><p>为此，Flashbots推出Suave，一个高度专业化的即插即用的独立网络，把mempool和构建者与现有的链分开，多链共享同一排序层来保证去中心化。</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/ad1210823e2ef16315a974d0faf6f9b1fe151f59fa48eff1eca435b1b7d27a6c.png" alt="图片来源：Flashbots" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="">图片来源：Flashbots</figcaption></figure><p>Suave的架构围绕用户交易偏好组成，分别为对偏好的表达、执行及结算。</p><p>通用的偏好表达：Suave的mempool中，公开透明的展示所有EVM链用户的交易。用户在发起交易时，可以表达自己的交易偏好；</p><p>最佳的执行市场：执行者监听mempool中的交易，充分竞争提出最优执行价格，执行者会返还部分MEV给用户；</p><p>去中心化区块构建：超越单体区块构建者，形成一个去中心化的区块构建网络，网络之间共享订单流和Bundles，在不泄漏交易具体内容的情况下，协作完成区块构建；由于构建者能够打包多链产生的MEV，这也使构建者和验证者能够获得更高的MEV收入。</p><h2 id="h-relay" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Relay去中心化</h2><p>目前在MEV-Boost的生态系统中，Relay中心化的问题还没有完全的解决方案，而Relay在整个MEV链条中扮演着受信任的角色。Flashbots作为市场上最大的Relay运营商之一，对验证者提供免费使用，这导致新的Relay运营商缺乏进入市场的动力。目前Relay高度集中可能会造成例如单点故障、交易审查等问题，部分Relay会与Builder勾结，优先转发合作Builder的区块，拒绝或延迟处理某些正常交易，从而影响市场的充分竞争。</p><p>如果Falshbots等头部Relay运营商持续提供补贴，Relay很难形成市场规模以推动去中心化。</p><p>值得注意的是，目前Flashbots已不是最大的Relay提供商。Ultra Sound是一个乐观的Relay，无需许可、中立且抗审查。我们很高兴看到Relay多样性的提高，当然这也少不了Flashbots为Ultra Sound、Agnostic Gnosis这样的新Relay提供开源支持。</p><p>IOBC已投项目<strong>Bloxroute</strong>的Relay也接入Flashbots，转发交易至MEV-Boost。Bloxroute BDN网络有分布在全球的Relay，因此使用Bloxroute Relay成功率及速度会更高。2022年，Bloxroute与Flashbots 白帽团队达成合作，允许BNB Chain上的 Flashbots 客户使用BloXroute BDN，实现快速可靠的交易体验。</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/6eb5ee99ca31910dfb2b67034629035789821ae3b8620023bcbd3b0119d36c03.png" alt="图片来源：mevboost.pic" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="">图片来源：mevboost.pic</figcaption></figure><h2 id="h-mev" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">MEV将“卷”向哪里？</h2><p>Mempool：有利可图的订单是MEV的起点，这部分创业者主要是卷BD，寻找更多钱包、Dapps等接入自己的RPC，以保护交易隐私并获取独家订单流。有些项目还会通过协议层面将部分MEV收入返还给用户，例如Flashbots的MEV-share。</p><p>Builder：这部分创业者主要卷硬件及策略，安全稳定地提供服务，是一个builder被选择的基本因素，而策略则直接影响MEV利润；其中一部分创业者也盯上了跨域MEV的蛋糕，毕竟单链能提取的MEV价值有限。</p><p>Validator：验证者的门槛不断降低，成为散户参与MEV的最佳方式之一，针对Validator的创业者主要卷质押ETH的流动性，也就是LSDfi赛道，目前LSDfi赛道也比较拥挤。</p><p>未来MEV的发展，仍然面临着一些挑战：</p><p>1、跨域MEV。随着Layer2的发展，越来越多的交易从Layer1流向Layer2，但是Rollup的出块及排序是由Sequencer处理，MEV排他性地被Sequencer提取，成为Rollup的重要利润来源之一。共享排序器的出现可能会解决这个问题。</p><p>2、MEV利润再分配。目前MEV大部分被验证者提取，各方利益不公平会导致做恶意愿更强。</p><p>虽然MEV赛道头部效应明显，但仍然不断吸引更多开发者进入黑暗森林。事实上，MEV还有很多值得深入探讨的地方，例如模块化区块链中MEV的捕获、再质押对MEV供应链的影响等等，也期待能够出现更好的解决方案。</p>]]></content:encoded>
            <author>badbot@newsletter.paragraph.com (BadBot)</author>
        </item>
    </channel>
</rss>