<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/">
    <channel>
        <title>Bool Network</title>
        <link>https://paragraph.com/@boolnetwork</link>
        <description>Permissionless, decentralized, secure #Bitcoin verification layer. | #DHC, Ring VRF, #MPC, #DA, Forced Withdraw</description>
        <lastBuildDate>Thu, 30 Apr 2026 16:23:02 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>https://github.com/jpmonette/feed</generator>
        <language>en</language>
        <image>
            <title>Bool Network</title>
            <url>https://storage.googleapis.com/papyrus_images/f28c668614b3c14b1b2a368e63a916c27687d674cbff11e44f7e274ae6c4314a.jpg</url>
            <link>https://paragraph.com/@boolnetwork</link>
        </image>
        <copyright>All rights reserved</copyright>
        <item>
            <title><![CDATA[ScaleBit Report: Bool Network's Terrific Work on Extending Bitcoin]]></title>
            <link>https://paragraph.com/@boolnetwork/scalebit-report-bool-network-s-terrific-work-on-extending-bitcoin</link>
            <guid>oXhCEvOTs6zfLuF7n1Ru</guid>
            <pubDate>Mon, 29 Apr 2024 08:17:05 GMT</pubDate>
            <description><![CDATA[During a long period, the transaction throughput of Bitcoin has always been a focal point of user concern. Despite Bitcoin&apos;s excellent performance in security and decentralization, its limited transaction speed restricts its ability to process a large volume of transactions. Recently, Layer 2 solutions based on Bitcoin have brought new perspectives to address this issue. Due to Bitcoin&apos;s lack of smart contracts, current L2 solutions are generally affected by issues related to centra...]]></description>
            <content:encoded><![CDATA[<p>During a long period, the transaction throughput of Bitcoin has always been a focal point of user concern. Despite Bitcoin&apos;s excellent performance in security and decentralization, its limited transaction speed restricts its ability to process a large volume of transactions. Recently, Layer 2 solutions based on Bitcoin have brought new perspectives to address this issue.</p><p>Due to Bitcoin&apos;s lack of smart contracts, current L2 solutions are generally affected by issues related to centralization. In response to these challenges, some projects have started to focus on the infrastructure aspect. Bool Network, introduced by us, is one such representative project. It is a permissionless, decentralized, and secure Bitcoin verification layer aimed at extending Bitcoin securely and decentralizedly without altering Bitcoin&apos;s consensus rules, thereby promoting the prosperity of the Bitcoin ecosystem.</p><p>We are honored to have the blockchain security team ScaleBit, under BitsLab, which specializes in providing secure solutions for ZKP, Bitcoin Layer 2, and cross-chain applications, conduct an in-depth analysis and evaluation of Bool Network from three dimensions: framework, modules, and attack surfaces. They fully considered potential risks to ensure its capability to execute tasks correctly, efficiently, and reliably. Finally, ScaleBit compared Bool Network with other Bitcoin Layer 2 solutions and concluded the information into a technical feasibility analysis report of Bool Network. Click &quot;Read Original Article&quot; or visit the following link to view the detailed report: <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://github.com/boolnetwork/audit-reports">https://github.com/boolnetwork/audit-reports</a></p><p>In the report, ScaleBit points out that Bool Network&apos;s solution focuses on the verification service for Bitcoin L2s. One key aspect is the integration of the Data Availability Layer (DA Layer) with the validator network, which supports direct asset staking and verification, ensuring the management of Bitcoin L2s’ transactions in a simplified and secure manner. On the other hand, the integrated solution enhances the security and trustworthiness of the system by using Zero-Knowledge-Proof based Verifiable Random Function (ZKP-VRF) and Trusted Execution Environment (TEE) technology, making collusion and malicious behavior among validator network nodes extremely difficult. Additionally, Bool Network innovatively introduces the Dynamic Hidden Committee (DHC) mechanism, which solves security computation challenges in a decentralized environment by hiding node identities and privacy data. It ensures that only dynamically selected and unpredictable subsets of validators participate in each round of consensus and verification, significantly enhancing transaction security and integrity. Moreover, DHC is responsible for controlling cross-chain bridges and generating blocks for recording asset changes in each round while operating assets in the L1 bridge. To protect the identities of committee members, Bool Network also adopts the Ring-Verifiable Random Function (Ring-VRF) protocol and introduces ZKP in the communication process to ensure that random numbers cannot be known or manipulated, thus preventing collusion and malicious behavior within the network. Last but not least, to ensure the privacy and integrity of critical components, all key management processes are carried out in a Trusted Execution Environment (TEE). This proposal aims to allow nodes to operate normally but cannot access critical privacy data, thus preventing malicious activities while maintaining decentralization and security.</p><p>In the final section of the report, ScaleBit compares Bool Network with other Bitcoin Layer 2 solutions, analyzing the reliability of Bool Network in cross-chain asset protection and the good development prospects of its comprehensive technical solution. Meanwhile, ScaleBit also emphasizes the importance of security aspects and raises some thoughtful considerations. Among these considerations, particular emphasis is placed on the crucial role of TEE environment and data availability in Bool Network&apos;s security assumptions, which must undergo strict scrutiny to ensure they function as expected.</p><p>In the future, Bool Network will continue to invest in communication and cooperation with the ScaleBit team, committed to building a more perfect ecosystem, providing real-time support and solutions to ensure its security and stability are continually strengthened. We firmly believe that through continuous efforts from both sides, a secure and reliable Bool Network ecosystem can be jointly created, bringing more value and possibilities to the entire blockchain industry.</p>]]></content:encoded>
            <author>boolnetwork@newsletter.paragraph.com (Bool Network)</author>
            <enclosure url="https://storage.googleapis.com/papyrus_images/078fcc91577b15e71b350d1fd098921e36f4ecccea348e5feeccdf9e99e98857.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[Unlocking the Essentials: Exploring DHC Nodes in the Alpha Testnet]]></title>
            <link>https://paragraph.com/@boolnetwork/unlocking-the-essentials-exploring-dhc-nodes-in-the-alpha-testnet</link>
            <guid>MVYpWYBy5oD7IsLAqnuG</guid>
            <pubDate>Mon, 08 Apr 2024 08:27:30 GMT</pubDate>
            <description><![CDATA[Incentives for DHC Node 10%(100M) of BOOL tokens will be distributed as incentives for Testnet Nodes, with 50 million dedicated to DHC nodes.DHC Node IntroductionDynamic Hidden Committee (DHC) stands as one of the central and pivotal concepts within Bool Network, enabling it to achieve a security level equivalent to or surpassing that of Bitcoin. DHC Nodes are a set of nodes in Bool Network that have been chosen among thousands of TEE Nodes by Ring VRF algorithm built upon ZKP and VRF.How to ...]]></description>
            <content:encoded><![CDATA[<p><strong>Incentives for DHC Node</strong></p><p>10%(100M) of BOOL tokens will be distributed as incentives for Testnet Nodes, with 50 million dedicated to DHC nodes.</p><h3 id="h-dhc-node-introduction" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0">DHC Node Introduction</h3><p>Dynamic Hidden Committee (DHC) stands as one of the central and pivotal concepts within Bool Network, enabling it to achieve a security level equivalent to or surpassing that of Bitcoin.</p><p>DHC Nodes are a set of nodes in Bool Network that have been chosen among thousands of TEE Nodes by Ring VRF algorithm built upon ZKP and VRF.</p><h3 id="h-how-to-understand-dhc-in-an-easy-manner" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0">How to Understand DHC in an Easy Manner</h3><p>Let’s illustrate what “Dynamic Hidden Committees” mean with an example.</p><p>Imagine you are a general commanding 1,000 soldiers tasked with guarding 50 granaries. How would you organize your soldiers?</p><p>Assuming all granaries are equally important, the best arrangement would be to divide the 1,000 soldiers into 50 teams of 20, with each team responsible for guarding a granary.</p><p>However, dividing the soldiers brings a risk: if more than half of the soldiers in any team collude, the corresponding granary may be compromised. In other words, if 11 soldiers in a team collude, they could betray you and seize the granary.</p><p>To prevent such collusion and ensure the granaries’ safety, you can take the following measures:</p><p><strong>Dynamic</strong>: Reorganize all soldiers into new groups and reshuffle the teams every day, so each soldier’s assigned granary and teammates become unpredictable.</p><p><strong>Hidden</strong>: Blindfold the soldiers, preventing them from knowing which granary they are guarding or who their teammates are.</p><p>By doing this, rebellious soldiers won’t know with whom to collude. Even if some betrayal is prearranged, they won’t be able to control or know if the turncoats are in the same team.</p><p>It is assumed that a high probability of collusion success requires a majority of the 1,000 soldiers to collude. Through the “dynamic” and “hidden” approach, you ensure the reliability of each team reaches the level of the entire troop.</p><p>This is precisely the approach adopted by Bool Network.</p><h3 id="h-dhc-node-functionality" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0">DHC Node Functionality</h3><p>DHC nodes serve the purpose of storing the distributed private keys of specific blockchains, including Bitcoin, for the verification of messaging security, while validators maintain transaction records and append new blocks to the Bool chain. DHC nodes play a critical role in ensuring the network’s security.</p><h3 id="h-dhc-node-significance" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0">DHC Node Significance</h3><p>As Bool Network’s verification nodes, DHC Nodes not only execute Bool Network’s core programs but also run Bitcoin full nodes, serving as the data availability layer for Bitcoin.</p><p>Bool Network provides services for Layer 2 through the original Dynamic Committee (DHC). Between Bitcoin and Layer2, Bool Network establishes payment channels based on DHC, facilitating the movement of BTC assets to Layer2.</p><h3 id="h-how-dhc-nodes-ensure-security-of-asset-custody" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0">How DHC Nodes Ensure Security of Asset Custody?</h3><p>Ensuring the security of asset custody and allowing users to retrieve assets on the Bitcoin network if Layer2 come across any downtime are the two key goals of Bool Network.</p><p>Bool Network boasts thousands of nodes. Suppose a Bitcoin Layer2 project wishes to custody user assets in DHC. Here’s how DHC is created and how it ensures security:</p><ul><li><p>The project selects 21 nodes to custody Bitcoin assets, setting the threshold signature at 11, considering the thousands of nodes in Bool Network.</p></li><li><p>Bool Network uses the Ring-VRF algorithm to randomly select 21 nodes from thousands to form a Committee.</p></li><li><p>Asset management private keys are split into 21 key shards using MPC, and all 21 key shards are stored in nodes’ TEE environments.</p></li><li><p>When a user needs to transfer assets, 11 nodes from the Committee can release the user’s assets by using TSS signatures.</p></li></ul><p>Throughout this process, the ringVRF algorithm ensures node hiding, preventing malicious behavior in the Committee and increasing the cost of external attacks. Additionally, the nodes in the dynamic committee use MPC’s threshold signature technology to prevent single-point failures.</p><p>For example, 11–21 can continue to provide services even if 10 nodes are offline. The Committee also features a copy function, allowing the project to create multiple copies for stronger fault tolerance.</p><p>All DHC nodes run in a TEE environment. Hence, TEE node operators are unaware of the internal program operation, cannot alter the program, and cannot access private key shards. The only action TEE node operators can take is to stop the node service.</p><p>However, from the Game Theory perspective, node operators need to stake tokens. Stopping a node without gaining profits becomes an irrational action.</p><p>In addition to the feature of Hidden, the Committee also boasts Dynamic feature. Over time, the nodes forming the Committee change to another set of nodes, making it more challenging for hackers to attack.</p><p>For example, as the epoch round only lasts for 10 mins, it’s ABC nodes on this round, but it might change to be DEF nodes on the next round. This dynamic change increases the cost of hacking, as a hacker would need to find hidden nodes in thousands of nodes simultaneously and break TEE environments from a hardware level, making it nearly impossible.</p><p>Through these security designs, DHC ensures the security of asset custody and addresses cross-chain security issues. However, to inherit Bitcoin’s security, Bool Network also considers potential issues in Layer2 networks.</p><p>For regular users, after transferring assets to Layer2, they seldom move them back to Layer1. To prevent issues with Layer2 networks, Bool Network introduces the DA module, combined with DHC, and introduces the Forced Exit.</p><p>Bool Network submits the transaction data state generated by the Layer2 network to the DA layer.</p><p>In case of a Layer2 network exit, users can submit a Merkle proof proving their remaining assets in Layer2. DHC then verifies the user’s submission, Merkle proof, and DA layer data. If they are correct, DHC triggers an event, transferring the user’s assets on Bitcoin to them.</p><p>Through DHC, DA, and Forced Exit, Bool Network ensures that Layer2 built on its framework can inherit Bitcoin’s security.</p><h3 id="h-how-to-become-a-dhc-node" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0">How to become a DHC Node</h3><p>By following the step-by-step guidance on<a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://boolnetwork.gitbook.io/docs/user-guide/alpha-testnet/getting-started"> Gitbook</a></p><p>If you are new to this, please visit <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://medium.com/@boolnetwork/how-to-get-tbol-faucet-guide-for-bool-network-alpha-testnet-39426ae22644">Here</a> on how to get faucet.</p><h3 id="h-crucial-components-of-bool-stack" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0">Crucial Components of Bool Stack</h3><p>Bool Network envisions bringing Bitcoin’s interoperability and programmability to all blockchains. To realize this goal, Bool Network adopts a modular and open-source approach, culminating in the creation of the comprehensive developer framework known as Bool Stack.</p><p>With Bool Stack, individuals can effortlessly establish Bitcoin Layer2 leveraging Bool Network’s one-stop developer framework. This not only allows developers to quickly set up Bitcoin Layer2 but also ensures the inheritance of Bitcoin’s security and the sharing of Layer2 security.</p><p>Layer2 developed based on Bool Stack, namely Bitcoin’s execution layer, can rapidly utilize standard components like DHC, DA, Forced Exit, and Escape Hatch, seamlessly integrating them into their systems.</p><p>This framework empowers project teams to swiftly deploy Bitcoin Layer2 solutions, ensuring the inheritance of security features and facilitating the attraction of end-users.</p><p>Bool Network aspires to set the industry standard for Bitcoin Layer2 development, catering to diverse blockchains and project teams alike.</p><p>By furnishing this comprehensive developer framework, Bool Network is dedicated to fostering Layer2 development and establishing cohesive security standards across the blockchain industry.</p>]]></content:encoded>
            <author>boolnetwork@newsletter.paragraph.com (Bool Network)</author>
            <enclosure url="https://storage.googleapis.com/papyrus_images/087e0b0daa13c1ff9c779f6751530ccb3f1c6a283dd4d76eddee2c0cd24bc4c4.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[How to Get tBOL Faucet? - Guide for Bool Network Alpha Testnet]]></title>
            <link>https://paragraph.com/@boolnetwork/how-to-get-tbol-faucet-guide-for-bool-network-alpha-testnet</link>
            <guid>rzQCLELBnxCr4C9tvOsx</guid>
            <pubDate>Fri, 29 Mar 2024 08:18:12 GMT</pubDate>
            <description><![CDATA[For enhanced asset security on the Bool Network, we are implementing adjustments to node deployment after thorough consideration. With the imminent launch of the Alpha Testnet, it&apos;s crucial to highlight key features for optimal performance.To ensure node stability, exchanging tBOL with USDT at a 10:1 ratio is mandatory.The USDT used for this exchange is refundable upon Testnet completion, with tBOL returned to the team.Please note that the official wallet address for tBOL conversion with...]]></description>
            <content:encoded><![CDATA[<p><strong>For enhanced asset security on the Bool Network, we are implementing adjustments to node deployment after thorough consideration.</strong></p><p>With the imminent launch of the Alpha Testnet, it&apos;s crucial to highlight key features for optimal performance.</p><ul><li><p>To ensure node stability, exchanging tBOL with USDT at a 10:1 ratio is mandatory.</p></li><li><p>The USDT used for this exchange is refundable upon Testnet completion, with tBOL returned to the team.</p></li><li><p>Please note that the official wallet address for tBOL conversion within the Alpha Testnet is <strong>0x2000b83c88dc238b66a9e72e1b62c446d39ceef7</strong></p></li><li><p>In the event of a node remaining offline over 10 minutes, a penalty of 10 tBOL will be incurred per count.</p></li><li><p>If you retain the option to exit your node, refund is available when testnet is complete.</p></li></ul><p>The aim of this guide is to help you configure the network and get tBOL test tokens to participate in the node deployment process on Alpha Testnet. The aforementioned process currently supports mobile and website setup, here we are going to assume website setup for the rest of the guide. To start Alpha Testnet on Bool Network, you will firstly need to configure Alpha Testnet Network on your Metamask wallet and exchange for some tBOL tokens. Let’s get started!</p><p><strong>Configuration of the Network</strong></p><p><strong>Automatically Add Alpha Testnet Network</strong></p><ol><li><p>Visit faucet page</p></li><li><p>Simply click “Add Bool Alpha Testnet”</p></li></ol><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/af5d9c19b87945ddf2ce7cec818e616d17c5f46596ef0d463f1bb03d05825b85.png" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><p><strong>Manually add Alpha Testnet to your wallet</strong></p><ol><li><p>Click top left of your wallet and you will see “Add network</p></li></ol><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/3476f9dcfde438853d0db57b8099b9775546b6643ef27da9b1b49bb1154940fa.png" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>2 . Add a network manually</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/ce636e770f1165b501795cc154e07ddfe8a21754418a368b5818e2fce83b50f5.png" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>3. Input the network information as follows. If you see <strong>ticker symbol verification is currently unavailable</strong>, it is not going to affect your network configuration. Click <strong>save</strong> to add network.</p><p><strong>Bool Network Alpha Testnet:</strong></p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/9879abfbc037a77d3d85f2edf05f784f2d7d50b842900cfc5f75c2f0154482a5.png" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/4c44567cf169371879dcaf47360de4b35805b12dfacadd50fb7f43b8d64acdd0.png" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>4. Check if the network is successfully added to your wallet.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/ae71e1346332a7968d64d4bb3b032c164a9dbebcd30c357402975ee01665963d.png" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><h2 id="h-how-to-get-faucet" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">How to get faucet?</h2><p>Firstly please make sure that your wallet has enough USDT and gas fee. We currently support USDT transfer on BSC, Polygon and Optimism chains.</p><p>Visit <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://faucet.bool.network/prepaid?chainId=56">Faucet</a></p><p>1. Click on “Connect Wallet to Metamask”</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/08ef7162205ec3131338743383d072f05b2a135bbb41bf9fa22fc156d40ba77a.png" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>2. Choose the wallet you want to use. Click on “Next” and connect your MetaMask to Bool’s faucet site.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/df510c202babbe58e2ee58733366bc2629b548ba2f60ec95a78ffaf3e1a7115e.png" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>3. Type the amount of USDT you want to transfer and click on the “Transfer” button then click “Confirm”, it should look like this:</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/af5cb8093b78dd1bb391f206d6b9e6c639ff7eb28d4f0c4c45d1cea2f8914432.png" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>4. Look at Metamask Extension to see if it was successfully transferred</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/48fe58fc242fb640d598dc29a34d16107a452fd6a04e8b2f869e93f01ed50f0b.png" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>5. Click on the BSC Icon, add Bool Alpha testnet to your wallet</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/52ce42a87e734a71fd8a74167f80a6ac2c66cdf43626361b6af962361c3fd580.png" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>6. Click on Approve and Switch Network</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/08b81f034f27405bc17b0c4092a890bd1379eb78b7015ab66cc623db71dd0909.png" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>Congratulations! You have successfully swapped. Your transferred token might need up to 5 minutes to arrive. Please be patient or try to disconnect and connect again.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/283653d2ec95de82a378fe89e5a1179ced1767259fdd321dfcd8e648cb2304cd.png" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure>]]></content:encoded>
            <author>boolnetwork@newsletter.paragraph.com (Bool Network)</author>
            <enclosure url="https://storage.googleapis.com/papyrus_images/19581ae6c29024d242f6f7d81612c589bfed074b4aa7ed81de7f71edfe467b49.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[Bool Network: An Innovative solution to BTC Verification Layer]]></title>
            <link>https://paragraph.com/@boolnetwork/bool-network-an-innovative-solution-to-btc-verification-layer</link>
            <guid>F24mbmi1z1SR8NLhNxVQ</guid>
            <pubDate>Wed, 17 Jan 2024 03:11:41 GMT</pubDate>
            <description><![CDATA[Since the inception of Bitcoin, its robust security and decentralized nature have propelled its popularity. However, the sluggish transaction speed has posed a challenge to its transaction throughput. Addressing the scalability issue while upholding security and decentralization remains a focal point for industry experts. While layer2 technology can enhance scalability, existing layer2 solutions often grapple with the undesirable trait of centralization. In response, Bool Network has introduc...]]></description>
            <content:encoded><![CDATA[<p>Since the inception of Bitcoin, its robust security and decentralized nature have propelled its popularity. However, the sluggish transaction speed has posed a challenge to its transaction throughput. Addressing the scalability issue while upholding security and decentralization remains a focal point for industry experts. While layer2 technology can enhance scalability, existing layer2 solutions often grapple with the undesirable trait of centralization. In response, Bool Network has introduced an innovative technical solution to tackle the blockchain interoperability trilemma, addressing concerns about security, decentralization, and scalability while expanding the BTC ecosystem.</p><p>Bool Network, a decentralized and secure Bitcoin verification network, harnesses advanced cryptographic technology to elevate Bitcoin’s scalability, security, and cross-chain capabilities. Introducing a programmable second layer for Bitcoin on Bool Network aims to facilitate secure asset issuance and cross-chain experiences. The decentralized approach of Bool Network ensures scalability without altering Bitcoin’s consensus rules, employing community-driven governance to foster the rapid and secure development of Bitcoin’s second layer while enhancing interoperability.</p><p>The Bool Network framework comprises various components and layers, including the Bitcoin layer, payment channels, Dynamic Hidden Committee (DHC) layer, verification nodes, and the extension layer. These components collaborate to achieve efficient transactions. The framework introduces a decentralized signature scheme to enable arbitrary message transmission and digital asset transfers across diverse networks. The Bitcoin layer serves as the foundational layer, allowing participants to create payment channels on Bitcoin and settle transactions as needed.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/4bd628d6a7fdbe7e01a196c13cd8d6ce8800098a1761a5d1574db30f0cfc7342.png" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>Security in Bool Network is underpinned by Multi-Party Computation (MPC), Zero-Knowledge Proof (ZKP), and Trusted Execution Environment (TEE). The MPC-based distributed key management over Dynamic Hidden Committees (DHC) secures cross-chain messages. Each cross-chain message is approved by a corresponding DHC, controlled by a dynamic group of MPC nodes. The DHC uses a decentralized pattern to generate an off-chain cryptographic proof, ensuring the legitimacy of the message.</p><p>To safeguard the identities of DHC members, a ZKP-based algorithm, Ring Verifiable Random Function (Ring VRF) protocol, obscures the real public identification among a ring, increasing the costs of external attacks and eliminating the possibility of internal collusion. Key management procedures are executed in the TEE hardware, such as Intel SGX, ensuring the privacy and integrity of private key management.</p><p>Bool Network’s layered framework and collaborative components aim to boost Bitcoin’s transaction speed and scalability while upholding decentralization and security. This positions Bool Network as an innovative solution for the Bitcoin verification layer, injecting new vitality into the entire blockchain ecosystem.</p><p><strong>Follow us on social media:</strong></p><ul><li><p><em>Website: </em><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://bool.network/"><em>https://bool.network/</em></a></p></li><li><p><em>Twitter: </em><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://twitter.com/bool_official"><em>https://twitter.com/bool_official</em></a></p></li><li><p><em>GitHub: </em><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://github.com/boolnetwork"><em>https://github.com/boolnetwork</em></a></p></li><li><p><em>Discord: </em><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://discord.com/invite/DVd4q9qq7a"><em>https://discord.com/invite/DVd4q9qq7a</em></a></p></li><li><p><em>Telegram: </em><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://t.me/BoolCommunity"><em>https://t.me/BoolCommunity</em></a></p></li></ul>]]></content:encoded>
            <author>boolnetwork@newsletter.paragraph.com (Bool Network)</author>
            <enclosure url="https://storage.googleapis.com/papyrus_images/eea6d0f360b893939dd54b146a21b8035bc17a778b046128fec423cb65fa2e8f.jpg" length="0" type="image/jpg"/>
        </item>
    </channel>
</rss>