<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/">
    <channel>
        <title>cryon</title>
        <link>https://paragraph.com/@cryon-2</link>
        <description>fudder ⛩️ wandering between crypto and people</description>
        <lastBuildDate>Tue, 07 Apr 2026 10:41:28 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>https://github.com/jpmonette/feed</generator>
        <language>en</language>
        <image>
            <title>cryon</title>
            <url>https://storage.googleapis.com/papyrus_images/3cd58d78e89e6a2e535ff37f66467499c747e542f0a39b33f0d0e894de9e9298.jpg</url>
            <link>https://paragraph.com/@cryon-2</link>
        </image>
        <copyright>All rights reserved</copyright>
        <item>
            <title><![CDATA[A Quick Guide to Internet Protocols, APIs, and Web Development]]></title>
            <link>https://paragraph.com/@cryon-2/a-quick-guide-to-internet-protocols-apis-and-web-development</link>
            <guid>YtFX8h9csDVlGJv61cVm</guid>
            <pubDate>Wed, 29 Nov 2023 13:10:50 GMT</pubDate>
            <description><![CDATA[Decoding Internet ProtocolsInternet protocols are the backbone of online communication, ensuring data is accurately sent and received across the web. - IP v4 vs IP v6: These are versions of Internet Protocol (IP) addressing. IP v4 is the older, more familiar format (e.g., 182.0.2.345), while IP v6 addresses the need for more internet addresses with a longer format (e.g., 4527:0a00:1567:0200:ff00:0042:8329). - TCP and UDP: Transmission Control Protocol (TCP) ensures data is sent and received c...]]></description>
            <content:encoded><![CDATA[<h2 id="h-decoding-internet-protocols" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Decoding Internet Protocols</strong></h2><p>Internet protocols are the backbone of online communication, ensuring data is accurately sent and received across the web.</p><p>- <strong>IP v4 vs IP v6</strong>: These are versions of Internet Protocol (IP) addressing. IP v4 is the older, more familiar format (e.g., 182.0.2.345), while IP v6 addresses the need for more internet addresses with a longer format (e.g., 4527:0a00:1567:0200:ff00:0042:8329).</p><p>- <strong>TCP and UDP</strong>: Transmission Control Protocol (TCP) ensures data is sent and received correctly and in order, while User Datagram Protocol (UDP) is used for tasks like live streaming, where some data loss is acceptable.</p><p>- <strong>HTTP/S</strong>: The HyperText Transfer Protocol, with its secure version HTTPS, is what moves data around the internet. It involves requests and headers that dictate the nature of the data exchange.</p><h3 id="h-http-methods" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><strong>HTTP Methods</strong></h3><p>They define the action to be performed on a given resource. Let&apos;s briefly look at four primary methods:</p><p>- <strong>GET</strong>: This method is used to retrieve information from a specified resource. When you visit a webpage, your browser is essentially making a GET request to fetch the page&apos;s content.</p><p>- <strong>POST</strong>: It&apos;s all about sending data to a server, commonly used when you submit a form on a website. The data sent via POST will be processed by the server, possibly leading to updates in the database.</p><p>- <strong>PUT</strong>: This method steps in for updating existing resources. If you&apos;re editing an existing post on a forum, for instance, the application might use a PUT request to apply your changes.</p><p>- <strong>DELETE</strong>: As straightforward as it sounds, DELETE is used to remove existing resources. If you&apos;re deleting an email or removing a post, your application is likely making a DELETE request to the server.</p><p>Absolutely! Here&apos;s a paragraph on HTTP status codes that you can integrate into your article:</p><h3 id="h-status-code" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><strong>STATUS CODE</strong></h3><p><br>Essential indicators in web communication, providing insight into the result of a request. They fall into five distinct categories:</p><p>- <strong>Informational (100-199)</strong>: These codes indicate that the request initiated by the browser is being processed. For example, <code>100 Continue</code> suggests that the initial part of a request has been received and the client should continue the request.</p><p>- <strong>Successful (200-299)</strong>: This range signifies success. The most familiar among these is <code>200 OK</code>, which confirms that a request has been successfully processed.</p><p>- <strong>Redirection (300-399)</strong>: Codes in this category inform the client that additional actions are needed to complete the request. A common code is <code>301 Moved Permanently</code>, indicating that the resource requested has been permanently moved to a new URL.</p><p>- <strong>Client Error (400-499)</strong>: These codes denote errors made by the client. <code>404 Not Found</code> is a well-known status code, indicating that the requested resource could not be found on the server.</p><p>- <strong>Server Error (500-599)</strong>: This group represents errors on the server side. For instance, <code>500 Internal Server Error</code> is a general code used when an unexpected condition was encountered and no specific message is suitable.</p><hr><h3 id="h-unraveling-apis-and-services" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><strong>Unraveling APIs and Services</strong></h3><p>Application Programming Interfaces (APIs) are critical for enabling different software components to communicate effectively.</p><p>- <strong>Browser API</strong>: It extends the functionality of web browsers, allowing them to interact with elements like local storage and geolocation.</p><p>- <strong>REST API</strong>: This is a staple in web services, enabling efficient communication over HTTP, adhering to the principles of Representational State Transfer.</p><p>- <strong>Sensor-Based API</strong>: This tech taps into device sensors, like accelerometers, facilitating real-time responses to physical data inputs.</p><hr><h3 id="h-web-development-triad-html-css-and-javascript" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><strong>Web Development Triad: HTML, CSS, and JavaScript</strong></h3><p>The trinity of web development: HTML, CSS, and JavaScript, each plays a unique role.</p><p>- <strong>HTML</strong>: The framework of web pages, it references files and structures content.</p><p>- <strong>CSS</strong>: The stylist of the web, CSS dictates the layout, colors, and fonts, adding aesthetics to HTML structures.</p><p>- <strong>JavaScript</strong>: The interactivity enabler. JS brings dynamic updates and interactive features to web pages.</p><hr><h3 id="h-web-hosting-solutions" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><strong>Web Hosting Solutions</strong></h3><p>Web hosting is pivotal in making websites accessible.</p><p>- <strong>Shared Hosting</strong>: Ideal for small websites; here, a server is shared among multiple users.</p><p>- <strong>Virtual Private Server</strong>: Offers a balance of cost and performance, with fewer sites per server.</p><p>- <strong>Dedicated Physical Server</strong>: As the name implies, it&apos;s dedicated solely to one user, offering maximum control and resources.</p><p>- <strong>Cloud Hosting</strong>: A scalable, high-end option that leverages both physical and virtual servers.</p><hr><h3 id="h-webpages-websites-and-web-apps" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><strong>Webpages, Websites, and Web Apps</strong></h3><p>Finally, let&apos;s differentiate between webpages, websites, and web apps.</p><p>- <strong>Webpage</strong>: A single document, typically a combination of HTML, CSS, and JavaScript.</p><p>- <strong>Website</strong>: A collection of webpages under one domain name.</p><p>- <strong>Web App</strong>: More dynamic and interactive than traditional websites, often resembling desktop applications in functionality.</p>]]></content:encoded>
            <author>cryon-2@newsletter.paragraph.com (cryon)</author>
            <enclosure url="https://storage.googleapis.com/papyrus_images/0266848c9084699733d26c1d82bb421e6b7c7162b4d8bb9443fc02ab25f8d17c.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[Confidentiality in Smart Contracts - FhenixIO's Revolutionary Approach]]></title>
            <link>https://paragraph.com/@cryon-2/confidentiality-in-smart-contracts-fhenixio-s-revolutionary-approach</link>
            <guid>jVPzMxeaAjxcutsz2ZRr</guid>
            <pubDate>Wed, 22 Nov 2023 16:49:08 GMT</pubDate>
            <description><![CDATA[Recently, I&apos;ve been exploring new security solutions in the blockchain industry. I came across @FhenixIO, offering a solution for confidential smart contracts on public blockchains. It uses Fully Homomorphic Encryption (FHE) to process data without decrypting it.Let&apos;s dive into it 👇🏻 Blockchain&apos;s transparency is a strength, but when it comes to smart contracts, this feature raises a dilemma: How can we keep sensitive smart contract details confidential? Smart contracts on blo...]]></description>
            <content:encoded><![CDATA[<p>Recently, I&apos;ve been exploring new security solutions in the blockchain industry. I came across <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://x.com/FhenixIO">@FhenixIO</a>, offering a solution for confidential smart contracts on public blockchains. It uses Fully Homomorphic Encryption (FHE) to process data without decrypting it.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/9b989cbed6c23315990e41809f35a9c6.jpg" alt="" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>Let&apos;s dive into it 👇🏻</p><p>Blockchain&apos;s transparency is a strength, but when it comes to smart contracts, this feature raises a dilemma:</p><p><strong>How can we keep sensitive smart contract details confidential?</strong></p><p>Smart contracts on blockchains, as you probably know, are like open books - anyone can read them. This exposure risks leaking personal data, trade secrets, and strategic moves.</p><p>A real concern for businesses!</p><p>In blockchain, enhancing privacy often means sacrificing scalability. More private solutions can slow down the network, making it a tough balancing act for developers.</p><p>That&apos;s why technologies like <strong>Zero-Knowledge Proofs</strong> and <strong>Homomorphic Encryption</strong> joined the market - promising to keep smart contracts confidential without losing blockchain&apos;s essence.</p><h2 id="h-fhenixio-solution" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Fhenix.IO Solution</h2><p>Now we won&apos;t get lost on ZKPs, in fact I want to focus on so-called <strong>Fully Homorphic Encryption (FHE).</strong> The novelty brought by @FhenixIO in the first place.</p><p>FHE employes an <strong>optimistic rollup</strong>, a type of <strong>Layer 2</strong> scaling solution for blockchains. Which means that it operates under the assumption that transactions are valid unless proven otherwise.</p><p>Avoiding significant computational penalties associated with verifiable FHE techniques. Which tends to overload the system compared to traditional plaintext computation.</p><p>Optimistic rollups are thus not just a solution but a necessity for FHE in blockchain environments​​.</p><p>What are the <strong>advantages</strong> over ZK-based rollups?</p><p>• <strong>Simplicity</strong> and <strong>Compatibility</strong></p><p>• <strong>Lower Computational Overhead</strong></p><p>• <strong>Developer Friendly</strong></p><p>• <strong>Cost Efficient</strong></p><p>Fhenix framework integrates Ethereum, enhancing his ecosystem significantly while maintaining the integrity of its base layer. How?</p><p>• <strong>Cryptoeconomic Solution</strong> → it addresses the challenge of arbitrating non-EVM native fraud proofs.</p><p>Without necessitating any modifications to Ethereum&apos;s base layer, preserving EVM&apos;s structure and functionality.</p><p>• <strong>Optimistic FHE Rollups</strong> → as I have already explained, this type of rollup is used to ensure greater efficiency and scalability for smart contracts.</p><p>• <strong>Scalability and Security</strong> → thanks to the optimistic rollup approach they can scale without congesting the Ethereum Layer 1.</p><p>They achieve this by executing transactions outside the primary chain and posting back state updates along with proofs of correct execution.</p><p>• <strong>Efficiency</strong> in <strong>Handling Confidential Data</strong> → the strongest point of Fhenix, that thanks to the L2 Rollup structure improves the efficiency of executing transactions and managing confidential data on-chain.</p><h3 id="h-what-makes-fhenixios-approach-unique" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0">What makes Fhenix.io&apos;s approach unique?</h3><p>Traditional methods require FHE to be replicated across all nodes in a blockchain network. So how does Fhenix do?👇🏻</p><p>Fhenix.io&apos;s structure avoids this, reducing the computational cost and making the solution more efficient and practical.</p><p>While the approach is specifically tailored for the <strong>EVM</strong>, it holds independent value as a system that enables verifiable FHE.</p><p>This focus ensures that the solution is not only efficient but also highly relevant and adaptable to the most widely used blockchain ecosystem.</p><p>The <strong>architecture</strong> of the FHE rollup system, including its various components and layers, is designed to enhance efficiency through his innovative approach, that also contributes to the development of a new wave of privacy-centric dapps.</p><p>This is made possible by enhancing user confidence, expanding potential use cases, and increasing the overall security and utility in the EVM ecosystem.</p><h2 id="h-the-architecture" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">The Architecture</h2><h3 id="h-" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0">💻 <strong>𝐟𝐡𝐞𝐎𝐒</strong></h3><p>It acts as the core engine of the Fhenix nodes, empowering smart contracts with robust encryption capabilities. When these contracts require encrypted computations, they seamlessly integrate with the fheOS precompiles, which are tailored for Fully Homomorphic Encryption (FHE) operations.</p><p>fheOS&apos;s design ensures full compatibility with the Ethereum Virtual Machine (EVM), bridging the gap between advanced encryption technologies and existing Ethereum-based applications.</p><p>The fheOS library, therefore, stands as a testament to Fhenix.io&apos;s commitment to enhancing blockchain privacy and security, offering a comprehensive suite of encrypted operations (like arithmetic operations i.e. addition, multiplication and number comparisons) essential for the next generation of smart contracts.</p><h3 id="h-" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0">👨‍💻 <strong>𝐠𝐨-𝐭𝐟𝐡𝐞</strong></h3><p>It serves as a bridge between the Rust-based core FHE mathematical operations library (tfhe-rs) and blockchain applications, especially those written in Go.</p><p>This integration is achieved through a Go-based API, designed specifically for executing complex FHE mathematical operations. Additionally, a specialized Rust wrapper adapts the <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="http://tfhe.rs/">TFHE.rs</a> library for seamless use in blockchain contexts.</p><p>This strategic amalgamation significantly enhances Ethereum&apos;s go-ethereum (geth) capabilities, paving the way for more advanced and secure smart contract applications.</p><h3 id="h-threshold-services-network" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0">🌐 𝐓𝐍𝐒 (Threshold Services Network)</h3><p>TSN operates as a distinct network layer, separate from the L1 blockchain or other rollup components. A vital separation for its functionality and security. It gives smart contracts running on the network the ability to utilize FHE primitives.</p><p>This means dapps using Fhenix can integrate encrypted data directly into their smart contract logic. It manages a secret-shared network key. This network key is essential for threshold decryption processes.</p><p>Central to TSN&apos;s operation is the management of a secret-shared network key. Unlike traditional systems where a single entity might hold a key, this network key is collectively entrusted to the TSN, a design choice that bolsters security.</p><p>Fhenix.io innovatively employs <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://keyless.io/blog/post/a-beginners-guide-to-shamir-s-secret-sharing">Shamir&apos;s secret-sharing</a> method in this context. This method involves dividing the key into multiple parts, or &apos;shares.&apos; To reconstruct the key, a predetermined number of these shares (n + 1) are required, ensuring that no single entity can unilaterally access the key.</p><p>Crucially, TSN oversees the threshold decryption and re-encryption processes. This ability is pivotal in safeguarding the confidentiality of data, while still allowing it to be effectively processed and utilized within smart contracts. Such a mechanism ensures that while data remains private and secure, its utility in smart contracts is not hindered</p><h3 id="h-" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0">🦹 𝐅𝐫𝐚𝐮𝐝 𝐏𝐫𝐨𝐨𝐟𝐬 𝐦𝐞𝐜𝐡𝐚𝐧𝐢𝐬𝐦</h3><p>At the heart of optimistic rollups is the fraud proofs mechanism, ensuring transaction integrity on blockchain networks.</p><p>This mechanism becomes particularly vital when dealing with encrypted data in smart contracts, such as those facilitated by <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="http://fhenix.io/">Fhenix.io</a>. <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="http://fhenix.io/">Fhenix.io</a> empowers users to independently re-run and verify transactions off-chain, ensuring their accuracy. If discrepancies are detected, what&apos;s the next step?</p><p>Users can submit a fraud-proof directly on-chain, where Ethereum serves as the ultimate arbiter, ensuring fairness and rectitude. This vigilant process is crucial for upholding the pillars of trust and security in the blockchain ecosystem.</p><p>Fraud proofs are essential for accurate state updates. The system&apos;s design ensures chain integrity, even amid malicious attempts to alter transactions.</p><p>Fhenix utilizes Arbitrum’s Nitro fraud prover, cleverly adapting FHE logic to WebAssembly. System that, surprisingly, hasn&apos;t seen any fraud proof submissions since its mainnet launch in August 2021 according to <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://cointelegraph.com/news/arbitrums-fraud-proofs-havent-been-used-since-it-launched">Cointelegraph</a> (at least until Sept 11th).</p><p>This innovative move allows <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="http://fhenix.io/">Fhenix.io</a> to seamlessly integrate its cryptographic smart contracts into the Ethereum ecosystem.</p><h3 id="h-whos-behind-fhenixio" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0">Who&apos;s behind <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="http://fhenix.io/">Fhenix.IO</a>?</h3><p><strong>Guy Zyskind</strong>, the founder and a pivotal figure in the blockchain industry. Zyskind combines deep technical expertise with a visionary approach to blockchain technology. His entrepreneurial spirit is further exemplified through his role as the founder of <strong>SCRT Labs</strong>, a company dedicated to advancing decentralized technologies. Known for <strong>Secret Network</strong>, a protocol that offers scalable permissionless smart contracts. Some of the projects built on it are: <em>Tarantino NFTs, </em><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://tunnel.scrt.network/"><em>Secret Bridge</em></a><em>, </em><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://sienna.network/"><em>Sienna Network</em></a><em> and </em><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://btn.group/"><em>Shade Protocol</em></a><em>.</em></p><p>Joining him in this venture is <strong>Guy Itzhaki</strong>, has a strong blend of technical acumen and leadership. Itzhaki&apos;s experience in software development (worked at Intel Corp. for +7 years) and management positions him as a key asset in driving Fhenix&apos;s innovative solutions.</p><h2 id="h-final-thoughts" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Final Thoughts</h2><p>The recent acquisition of <strong>$7 million in funding</strong> by Fhenix is a resounding affirmation of the burgeoning interest and investment in the realm of blockchain privacy solutions. This influx of capital not only underscores the faith investors place in Fhenix&apos;s innovative technology but also reflects a broader industry recognition of the critical need for enhanced privacy in blockchain applications.</p><p>In a world where privacy concerns are increasingly paramount, particularly in various industries and for individuals alike, Fhenix stands at the forefront of addressing these challenges. Their approach uniquely balances the <strong>imperatives of security</strong> and <strong>data protection</strong> with the fundamental principles of transparency and decentralization that are hallmarks of blockchain technology. This alignment ensures that blockchain&apos;s core values are not just preserved but also strengthened in the face of evolving digital landscapes.</p><p>Central to Fhenix&apos;s ethos is their dedication to <strong>democratizing access</strong> to their pioneering technology for developers. By demystifying and simplifying the intricacies of advanced cryptographic techniques, Fhenix empowers developers to harness the full potential of their platform.</p><p>This focus on <strong>accessibility</strong> and <strong>user-friendliness</strong>, as articulated by founder Guy Zyskind, ensures that developers can channel their efforts towards innovation and creativity, unencumbered by the daunting complexities of underlying cryptographic mechanisms.</p>]]></content:encoded>
            <author>cryon-2@newsletter.paragraph.com (cryon)</author>
            <enclosure url="https://storage.googleapis.com/papyrus_images/2a4cc1742c4a0e0d43fe222ef5314ed8a26ba779baaa051dbb3748440f21950d.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[NAMADA]]></title>
            <link>https://paragraph.com/@cryon-2/namada</link>
            <guid>LYx1CZmX8KcCFenYqDMM</guid>
            <pubDate>Thu, 19 Oct 2023 10:32:18 GMT</pubDate>
            <description><![CDATA[Nihil 🔮What’s the problem, and what about the solution?I’d love to start by looking at what Namada is trying to solve and why the problem exists, this is probably the best way to deeply understand the real value behind this project.The Problem: The Paradox of Transparency and Privacy in BlockchainLet’s start from the fundamental principle: Blockchains and DLTs, were designed to offer a decentralised, *transparent *and immutable ledger system. While ***transparency ***is highly valued for its...]]></description>
            <content:encoded><![CDATA[<figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/09d3675ad0ae627e4fa5bb9af61472edd0771f16bf8b27d5e7d501458f9dd6a0.png" alt="Nihil 🔮" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="">Nihil 🔮</figcaption></figure><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/c0e2da4b140d771e947328967248f2fbcab97f196f68ba7b8d94454110bbf5dc.gif" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><h2 id="h-whats-the-problem-and-what-about-the-solution" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">What’s the <code>problem</code>, and what about the <code>solution</code>?</h2><p>I’d love to start by looking at what Namada is trying to solve and why the problem exists, this is probably the best way to deeply understand the real value behind this project.</p><h2 id="h-the-problem-the-paradox-of-transparency-and-privacy-in-blockchain" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">The Problem: The Paradox of Transparency and Privacy in Blockchain</h2><p>Let’s start from the fundamental principle: Blockchains and DLTs, were designed to offer a decentralised, *transparent *and immutable ledger system.</p><p>While ***transparency ***is highly valued for its role in ensuring the verifiability of every transaction and preventing fraudulent activities, it also has a drawback: <strong>the erosion of financial privacy</strong>.</p><p>Transparency, which does create a ‘trust-free’ environment, can at the sametime raise concerns about the protection of personal financial information.</p><p>The World Economic Forum (WEF) scrupulously underscores, in the <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www3.weforum.org/docs/WEF_Privacy_and_Confidentiality_Options_for_CBDCs_2021.pdf">*Privacy and Confidentiality Options for Central Bank Digital Currency *paper</a>, the paramount importance of privacy in the digital currency space, elucidating the complexities and nuances of implementing cryptographic techniques, such as Zero-knowledge proofs, to safeguard transactional privacy and confidentiality.</p><p>Namada, in its quest to harmonize transparency and privacy, could potentially leverage advanced cryptographic methodologies, akin to those discussed by the WEF, to architect a blockchain protocol that not only adheres to global privacy norms and regulatory frameworks but also robustly safeguards user data and financial transactions.</p><p>We can sum up all these points as follows:</p><ul><li><p><strong>Transparency Paradox</strong>: While blockchains offer unparalleled transparency ensuring verifiable and fraud-resistant transactions, this very feature endangers financial privacy.</p></li><li><p><strong>Privacy Dilemma</strong>: The WEF emphasizes the criticality of privacy in digital currencies, highlighting the intricate balance needed between absolute transparency and complete anonymity in the blockchain space.</p></li><li><p><strong>Cryptographic Techniques</strong>: Implementing advanced cryptographic techniques, like Zero-knowledge proofs, can safeguard transactional privacy and confidentiality amidst the transparency of the blockchain.</p></li><li><p><strong>Namada’s Quest</strong>: Namada seeks to harmonize transparency and privacy, potentially utilizing advanced cryptographic methodologies to construct a blockchain protocol that adheres to global privacy norms and safeguards user data and transactions robustly.</p></li><li><p><strong>Global Privacy Perspective</strong>: The global viewpoint on privacy, navigating through the spectrum from anonymity to transparency, profoundly aligns with the challenges and solutions being carved out in the blockchain sector, presenting a complex yet vital puzzle to solve in the digital currency landscape.</p></li></ul><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/6ae4323ae83691e976ce3be39a1c812f6579309cb3f84bd5587ab4987f9b588c.webp" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>Some articles regarding privacy issues</p><h2 id="h-the-solution" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">The solution</h2><p>This is where <strong>Heliax</strong> comes in, seated in Zug, Switzerland. A company of visionaries, researchers, and innovators, that stands at the forefront of open-source protocol development.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/a3fa495be683dc61ccd57d218eb920a960f4a770723d8c34884262578e954a14.webp" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>Heliax’s Logo</p><h2 id="h-their-mission" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Their mission?</h2><p>To tackle humanity’s most pressing challenges through technology, with the aim of improving individual sovereignty and privacy.</p><p>Heliax’s philosophy rests on four foundational pillars:</p><ul><li><p><strong>Groundbreaking Research</strong>: Heliax’s team delves deep, pioneering privacy-centric systems through rigorous research.</p></li><li><p><strong>Cutting-edge Design</strong>: A holistic approach ensures systems that are not only functional but also user-centric.</p></li><li><p><strong>End-to-End Integration</strong>: Overseeing the entire lifecycle, from ideation to deployment, ensures consistent feedback and refinement.</p></li><li><p><strong>Open-Source Deployment</strong>: Transparency is key. Continuous refinement in response to community feedback ensures protocols that resonate with the masses.</p></li></ul><h2 id="h-heliaxs-vanguard-the-projects" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Heliax’s Vanguard — The projects</h2><p>To understand Heliax’s impact, let’s explore some of their flagship projects:</p><ol><li><p><strong>Anoma</strong></p></li></ol><ul><li><p>Anoma is both a blockchain and an architectural framework for blockchains. Any chain can implement the Anoma architecture, creating what’s known as a “fractal instance” of Anoma, Namada is one them. The main innovation that Anoma brings is an infrastructure</p></li><li><p><strong>Link</strong>: <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://anoma.net/">Anoma</a></p></li></ul><p><strong>2. MASP (Multi Asset Shielded Pool)</strong></p><ul><li><p>It’s a set of Rust crates designed for the Multi Asset Shielded Pool extensions of the Sapling circuits from Zcash. It allows for shielded asset types, enabling multiple assets to share the same shielded pool. The MASP retains most of the security, feature, and performance properties of the original Sapling circuits. It introduces the use of asset identifiers to distinguish different asset types and includes a Convert circuit for shielded conversions between distinct asset types.</p></li><li><p><strong>Link</strong>: <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://github.com/anoma/masp">MASP on GitHub</a></p></li></ul><p><strong>3. Vamp-IR</strong></p><ul><li><p>It’s a language for arithmetic circuits. The Vamp-IR compiler can transform an arithmetic circuit into a form compatible with any proving system backend.</p></li><li><p><strong>Link</strong>: <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://github.com/anoma/vamp-ir">Vamp-IR on GitHub</a></p></li></ul><p><strong>4. Taiga</strong></p><ul><li><p>It’s a framework for generalized shielded state transitions. It allows applications built on top of it to enjoy fully shielded multi-party state transitions.</p></li><li><p><strong>Link</strong>: <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://github.com/anoma/taiga">Taiga on GitHub</a></p></li></ul><p><strong>5. Ferveo</strong></p><ul><li><p>It’s a synchronous Distributed Key Generation protocol designed for front-running protection on public blockchains.</p></li><li><p><strong>Link</strong>: <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://github.com/anoma/ferveo">Ferveo on GitHub</a></p></li></ul><p><strong>6. PLONK</strong></p><ul><li><p>It’s a cryptographic method used to verify complex computations efficiently and securely. Think of it as a way to confirm that a digital process was done correctly without revealing the specifics of the process itself.</p></li><li><p><strong>Link</strong>: <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://github.com/heliaxdev/plonk">PLONK on GitHub</a></p></li></ul><p><strong>7. Juvix</strong></p><ul><li><p>It’s a high-level, functional smart contract language and framework that is designed to address the shortcomings of existing smart contract development platforms.</p></li><li><p><strong>Link</strong>: <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://docs.juvix.org/latest/">Juvix Documentation</a></p></li></ul><p><strong>8. Typhon</strong></p><ul><li><p>It’s an ordering and execution engine for blockchains that Heliax is building as a CometBFT replacement for Anoma. It has four sub-components: Mempool, Consensus, Execution, and P2P Layer.</p></li><li><p><strong>Link</strong>: <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://isaacsheff.com/project/typhon">Typhon</a></p></li></ul><h2 id="h-heliaxs-luminaries-the-team" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Heliax’s Luminaries — The Team</h2><p>Behind every great project is an even greater team. Let’s meet some of the visionaries at Heliax, the first three are the <strong>board members</strong> and <strong>founders of Namada</strong>:</p><p><strong>Adrian Brink</strong>:</p><ul><li><p>Former core developer and head of partnerships at <strong>Tendermint/Cosmos</strong>.</p></li><li><p>Technologist at <strong>Web3 Foundation</strong>.</p></li><li><p>Co-founded <strong>Cryptium Labs</strong> and <strong>Metastate</strong> with Awa and Christopher.</p></li></ul><p><strong>Awa Sun Yin</strong>:</p><ul><li><p>First female data scientist and software engineer at <strong>Chainalysis</strong>.</p></li><li><p>Researcher at <strong>Tendermint/Cosmos</strong>.</p></li><li><p>Co-founded ventures with Adrian and Christopher, including <strong>Cryptium Labs</strong>.</p></li></ul><p><strong>Christopher Goes</strong>:</p><ul><li><p>Began his decentralization journey by creating <strong>Zchain</strong>, a popular explorer for <strong>ZCash</strong>, and the <strong>Wyvern DEX protocol</strong> that powers NFT marketplaces like <strong>OpenSea</strong>.</p></li><li><p>Joined <strong>Tendermint/Cosmos</strong> in 2018 as a core developer and became the author and lead developer of the <strong>IBC protocol</strong>.</p></li><li><p>While contributing to Cosmos until its mainnet launch and the release of IBC, Christopher co-founded <strong>Cryptium Labs</strong> and <strong>Metastate</strong> with Adrian and Awa.</p></li></ul><p>Although the above-mentioned members are just a taste of Heliax’s wide range of talents, the team is much broader. As you can imagine, it takes way more than 3 people to build such an ecosystem. As a matter of fact, the team also includes: <strong>cryptographers, mathematicians, computer scientists, researchers, engineers,</strong> and many more.</p><p>Each member, whether named here or not, plays a pivotal role in the company’s success and innovation. I’d like to clarify that the omission of any name is in no way an offence. For a comprehensive view of the entire team and their remarkable backgrounds, please refer to the <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://heliax.dev/team">full link</a>.</p><h2 id="h-anoma-the-architectural-marvel" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">ANOMA — The Architectural Marvel</h2><p>I don’t want to get too far off track with Anoma, but since Namada is a fractal instance of it, a few words must be said.</p><p>Anoma isn’t just another chain, it’s an entire architectural structure that reshapes the way we interact with decentralised systems.</p><p>Rather than merely processing transactions, *Anoma focuses on building an *<strong><em>intent-based infrastructure</em></strong>. A much-debated narrative at the moment (see here 2 useful posts from <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://twitter.com/anoma/status/1702054640853172642">@Anoma</a> and <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://twitter.com/apriori0x/status/1702055292631236804">@Apriori</a>).</p><p>Anoma does not merely execute commands, but tries to understand the underlying intention behind the commands, thus making application development more intuitive and user-centered.</p><p>I will soon write a more in-depth article on it. In the meantime, you can read <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://dba.mirror.xyz/NTg5FSq1o_YiL_KJrKBOsOkyeiNUPobvZUrLBGceagg">this article</a> by Jon Charbonneau.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/3156961d3de611a00e07cea09016605a8b1320129642b6b2db2c562cf1c5a69a.webp" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><h2 id="h-namada-a-deep-but-smooth-dive-into-next-gen-blockchain-privacy" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">NAMADA — A Deep but Smooth Dive into Next-Gen Blockchain Privacy</h2><p>Now let us finally proceed to Namada. Since it is a relatively broad ‘protocol’, it’s good to start by breaking things down. The key innovations brought by Namada are:</p><ul><li><p><strong>Privacy as a Public Good</strong></p></li><li><p><strong>MASP &amp; CC</strong></p></li><li><p><strong>Interoperability</strong></p></li></ul><p>They can be further divided into:</p><ul><li><p><strong>Proof-of-Stake L1</strong>: As a Layer 1 blockchain, Namada operates on a Cubic Proof-of-Stake (CPoS) consensus mechanism.</p></li><li><p><strong>Interchain Privacy</strong>: Namada’s design prioritizes privacy across multiple blockchains, a feature often sought but rarely achieved.</p></li><li><p><strong>Asset-Agnostic</strong>: From Nakamigos (NFTs) to $ETH and $DAI, every transaction is shielded, ensuring top-tier privacy.</p></li><li><p><strong>Native Interoperability</strong>: With the integration of IBC (Inter-Blockchain Communication), Namada seamlessly interacts with fast-finality chains.</p></li><li><p><strong>Ethereum Bridge</strong>: A trustless two-way bridge to Ethereum amplifies Namada’s reach, facilitating smooth transactions between the platforms.</p></li><li><p><strong>MASP Circuit</strong>: At its heart, Namada employs an upgraded multi-asset shielded pool (MASP) circuit, allowing a diverse range of assets to coexist within a shared shielded environment.</p></li><li><p><strong>Shielded Set Rewards</strong>: The recent enhancement to the MASP circuit introduces shielded set rewards, promoting privacy as not just a feature, but a “<a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://namada.net/blog/pgf-on-namada-public-goods-capital-efficiency-cool-graphs-pick-three">public good</a>”.</p></li><li><p><strong>Public Goods Funding</strong>: This one’s a tricky and debated one. I’ll try to explain it better later on, but basically it means that Namada supports “public goods” with a two-pronged approach: continuous and retroactive funding.</p></li></ul><p>Don’t worry if something seems odd, we’re going to look at each one of those in a more detailed but clear way.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/6f5352951ea9a352ea1837d811796c258653b0fcb6aaae14e0cf9c7cf222d3e7.webp" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><h2 id="h-the-basics" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">The Basics</h2><p>This section will cover the basics, if you already know what a Layer 1 and a consensus mechanism is, you can just skip ahead to “<em>The Evolution and Significance of Asset-agnostic Shielded Transfers</em>”.</p><p>To sum up what *layers *are, you can just imagine a multi-tiered cake, where each layer represents a different level of the blockchain network, each with its own functionalities and purposes, working harmoniously together to deliver a seamless, efficient, and scalable system. Well, in this case Namada it’s the flour at the bottom of the cake.</p><h2 id="h-the-evolution-and-significance-of-asset-agnostic-shielded-transfers" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">The Evolution and Significance of Asset-agnostic Shielded Transfers</h2><p>From the dawn of crypto up to today, transactions were transparent and exposing metadata such as sender/receiver addresses and transaction sizes. This transparency, while ensuring verifiability, inadvertently damaged users’ financial privacy.</p><blockquote><p>🔑 <strong>Zero-Knowledge Proofs</strong> are cryptographic methods that allow one party to prove to another that a statement is true without revealing any specific information about the statement itself. Imagine proving you know a password without actually revealing the password.</p></blockquote><p>Protocols such as Zerocash, which later evolved into Zcash, introduced the concept of <strong>shielded transactions</strong> using <strong>zk-SNARKs (Zero-Knowledge Succinct Non-Interactive Argument of Knowledge)</strong>.</p><blockquote><p>🖲️ <strong>ZK-SNARKs</strong> differ from standard ZKPs because they provide more efficient, shorter and faster proofs. Whereas standard proofs often involve multiple interactions between prover and verifier, ZK-SNARKs require only one. For security, ZK-SNARKs rely on a common reference string generated by several parties. But newer iterations like ZK-STARKs remove the need for a trusted setup.</p></blockquote><p>Drawing inspiration from Zcash’s <strong>Sapling circuit</strong> — a cryptographic construction designed to facilitate private transactions — Namada introduced the <strong>Multi-Asset Shielded Pool (MASP) circuit</strong>. This upgraded circuit leverages <strong>homomorphic Pedersen commitments</strong>, a type of cryptographic commitment that allows for certain algebraic operations to be performed on the commitment values without revealing the committed data. This ensures that multiple assets can coexist in a shared shielded environment. Whether they are NFTs, an $ATOM, or a $NAM transfer, transactions are indistinguishable from one another.</p><p>Central to this is the <strong>Jubjub curve</strong>, a specific type of <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.techtarget.com/searchsecurity/definition/elliptical-curve-cryptography">elliptic curve</a> optimized for zk-SNARKs. The <strong>ctEdwards curve point</strong> is a representation on this Jubjub curve, ensuring efficient and secure cryptographic operations. The asset generator, a crucial component in Namada’s system, is a valid ctEdwards curve point on the Jubjub curve. Its uniqueness is derived from the <strong>BLAKE2s</strong> hash of the asset identifier, ensuring that each asset type has a distinct and secure representation in the system.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/14ecd935abf599b5a4065dd608b8d8c163590e1c038cf209e307bee45476cfce.webp" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>Edwards curves of equation <em>x² + y² = 1 − d ·x²·y²</em>​</p><p>But how does it work? At its core, the MASP distinguishes between two sets of assets:</p><ul><li><p>the <strong>shielded set</strong>, where transactions are completely private, and</p></li><li><p>the <strong>transparent set</strong>, where transactions are public.</p></li></ul><p>In the shielded set, privacy is achieved through <strong>Pedersen hashes</strong> — a cryptographic hash function that operates over <strong>elliptic curves</strong>. These hashes ensure transactional privacy by producing a fixed-size output, making it computationally infeasible to deduce any information about the input.</p><p>Namada’s innovation also incorporates the <strong>Pseudo Random Function (PRF)</strong>, instantiated with <strong>BLAKE2s</strong> — a cryptographic hash function faster than MD5, SHA-1, and SHA-2. This PRF ensures that each asset type has a unique representation, preventing potential collisions or overlaps.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/b456ee2707dbca1ae363d2780f408f1de4c9a1ad43a26e3b74008bd9f3deeac2.webp" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>Comparison of Hash Functions: BLAKE2s, MD5, SHA-1 and SHA-2</p><p>The <strong>RFC hash-to-curve</strong> method is another crucial component, ensuring that asset identifiers are securely and uniquely mapped to points on an elliptic curve, further bolstering the system’s security.</p><p>Namada’s vertical integration is a testament to its commitment to user-centricity. Users can interact with the mainnet seamlessly, generating zk-SNARKs swiftly on edge devices via browser applications. This integration ensures that any asset can be privately and securely transferred from any device, leveraging the power of the MASP circuit and zk-SNARKs.</p><p>In essence, Namada’s advancements in asset-agnostic shielded transfers represent a significant leap in ensuring privacy and interoperability across diverse asset types and blockchains. It’s not just about transacting secretly; it’s about doing so without boundaries.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/d4affa08c2fbbd36140f3106f27b5bea8da1e6e72cd6fab5aad07e4ec4abdaa9.webp" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>Shielded transfers with ETH, ERC20, NFTs and ATOM on Namada</p><h2 id="h-namadas-consensus-mechanism" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Namada’s Consensus Mechanism</h2><h2 id="h-namadas-adoption-of-cometbft" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Namada’s Adoption of CometBFT</h2><p>Namada, leveraging the CometBFT-rs bindings, offers a trifecta: peer-to-peer transaction gossip, unyielding BFT consensus, and state machine replication tailored for its unique state machine.</p><h2 id="h-why-cometbft-for-namada" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Why CometBFT for Namada?</h2><ol><li><p><strong>Unwavering Finality</strong>: Once a block finds its place in the blockchain, it’s there to stay. An indispensable feature for applications that bank on irreversible transactions.</p></li><li><p><strong>Inter-Blockchain Communication</strong>: With the <strong>Inter-blockchain communication system (IBC)</strong> in its arsenal, Namada promises compatibility with all CometBFT-backed blockchains, including stalwarts in the Cosmos ecosystem.</p></li><li><p><strong>Proven Reliability</strong>: The Cosmos ecosystem’s longstanding trust in CometBFT stands testament to its reliability.</p></li><li><p><strong>Customizability</strong>: Tailor-made solutions are the need of the hour. CometBFT doesn’t disappoint, offering flexibility in parameter adjustments, even accommodating custom proof-of-stake algorithms.</p></li></ol><h2 id="h-cometbft" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">CometBFT</h2><p>Its essence lies in its ability to function even when up to a third of its machines encounter arbitrary failures. Every non-faulty machine within the system is guaranteed to witness the same transaction log and compute an identical state.</p><p>This level of secure and consistent replication is pivotal in distributed systems, serving as the bedrock for applications ranging from digital currencies to infrastructure orchestration.</p><p>CometBFT’s design philosophy prioritizes user-friendliness, clarity, performance, and versatility for a broad array of distributed applications. It distinguishes itself from distributed key-value stores like <em>Zookeeper</em> (developed by Apache as a centralized service for maintaining configuration information, naming, providing distributed synchronization, and group services), <em>etcd</em> (an open-source key-value store that provides a reliable way to store data across a cluster of machines), and <em>consul</em> (developed by HashiCorp, is a distributed service discovery and configuration system) by its Byzantine Fault Tolerance.</p><p>While these systems can tolerate crash failures in less than half of their machines, even a single Byzantine fault can compromise their entire system. CometBFT, on the other hand, is equipped to handle arbitrary failures, including malicious attacks. Furthermore, it doesn’t confine developers to a specific application, allowing them to craft the logic that aligns with their objectives, be it a key-value store, cryptocurrency, or an e-voting platform.</p><p>CometBFT is composed of two primary technical components:</p><ol><li><p><strong><em>Tendermint Consensus M</em>echanism</strong></p></li><li><p><strong><em>Application Blockchain Interface (ABCI)</em></strong></p></li></ol><h2 id="h-the-tendermint-consensus-engine" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">The Tendermint Consensus Engine</h2><p>This engine, a modern iteration of protocols for event ordering in distributed networks, stands resilient against adversarial challenges. Its primary role? Guaranteeing consensus on transaction ordering among reliable machines through a democratic voting process. Validators, in structured rounds, propose and subsequently vote on blocks, ensuring a uniform transaction sequence.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/492b26c8211607de14e8ea42883ac06b95a782b26ee1ee0dc820c61c0d92f4c3.webp" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>Visual representation of the Tendermint (CometBFT) consensus mechanism</p><h2 id="h-the-bridge-application-blockchain-interface-abci" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">The Bridge: Application Blockchain Interface (ABCI)</h2><p>The ABCI, a pivotal component of the CometBFT ecosystem, serves as the communication layer between the consensus process and user-defined applications. Its decoupled design is not just about flexibility; it’s about empowering developers. With ABCI, they can craft deterministic applications across any programming language, without being confined to the consensus algorithm’s inherent limitations.</p><p><strong>Core Concepts of ABCI</strong>:</p><ul><li><p><strong>Modularity</strong>: ABCI is designed with modularity at its core. It separates the networking and consensus from the application logic, allowing developers to focus solely on the latter without the intricacies of the former.</p></li><li><p><strong>Transactions Lifecycle</strong>: Every transaction undergoes a lifecycle: from being checked for validity (<code>CheckTx</code>) to being delivered (<code>DeliverTx</code>). ABCI ensures that each step is processed, guaranteeing the transaction&apos;s eventual inclusion in the blockchain.</p></li><li><p><strong>Blocks and Results</strong>: ABCI applications return results for the transactions they process. These results, combined with other transactions, form blocks. The <code>Commit</code> method ensures that all state transitions are atomic, providing a snapshot of the application&apos;s state after processing the transactions in a block.</p></li><li><p><strong>Querying</strong>: ABCI isn’t just about processing; it’s about retrieval too. The <code>Query</code> method allows users to retrieve information about the application&apos;s state, ensuring transparency and accessibility.</p></li><li><p><strong>ABCI++</strong>: An evolution of the ABCI, ABCI++ offers enhanced features, including the ability to manipulate the block before it’s finalized. This provides applications with greater control over block formation, ensuring optimal performance and efficiency.</p></li></ul><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/c0e6c0ed6ae7548fc99b0d9a91c120b603b1e5ba5d8968d53d4815016fd09099.webp" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>Visualization of the flow of messages via ABCI</p><p>In essence, the ABCI acts as a bridge, but it’s a bridge with intelligence, flexibility, and adaptability, ensuring that applications not only communicate with the consensus but do so efficiently and effectively.</p><h2 id="h-inter-blockchain-communication-system-ibc" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Inter-blockchain Communication System (IBC)</h2><p>The <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://ibcprotocol.org/faq/">IBC protocol</a>, built by Cosmos, allows for secure, asynchronous communication between separate blockchains. Through IBC, chains like Namada can:</p><ul><li><p>Transfer assets and execute Smart Contracts across blockchains</p></li><li><p>Maintain light clients without running full nodes</p></li><li><p>Coordinate transactions and achieve atomic transfers</p></li><li><p>Establish trust and interoperability between diverse ledgers</p></li></ul><p>The IBC, influenced by TCP/IP, is the backbone of cross-chain messaging, enabling true composability and extensibility between any IBC-enabled blockchain. It starts with a handshake for mutual verification between chains. After that, data packets containing various information are exchanged and verified for authenticity. While the IBC guarantees the trustworthiness of the data, its interpretation and execution takes place at the application level. This interoperability, with flexible routing options, is crucial for an interconnected ecosystem of decentralised applications.</p><h2 id="h-namadas-cubic-proof-of-stake-cpos" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Namada’s Cubic Proof-of-Stake (CPoS)</h2><p>Namada’s PoS mechanism, known as Cubic Proof-of-Stake (CPoS), introduces several innovations that are pertinent to both validators and delegators:</p><ol><li><p><strong>Upgraded F1 Fee Distribution Mechanism</strong>:</p></li></ol><ul><li><p>CPoS employs an enhanced version of the F1 fee distribution mechanism. This system ensures that staking rewards compound automatically, eliminating the necessity for transactions to claim and re-stake these rewards.</p></li><li><p>The F1 scheme is designed to split rewards and inflation between validators each block with minimal iteration. The only approximations arise due to finite decimal precision. Notably, this mechanism requires no iteration to delegate or withdraw, making it efficient and scalable.</p></li><li><p>The F1 algorithm is agnostic to how fees are divided among validators, offering flexibility in reward distribution. For instance, it’s possible to reward only validators who signed a particular block.</p></li><li><p>This mechanism is inspired by the initial F1 Fee Distribution research paper, which emphasizes the importance of a fair reward distribution system in a proof-of-stake blockchain. The paper presents F1 as an approximation-free, slash-tolerant fee distribution algorithm that can handle varying validator commission rates, inflation rates, and fee proportions efficiently.</p></li></ul><p><strong>2. Cubic Slashing</strong>:</p><ul><li><p>Namada’s cubic slashing algorithm ensures that penalties for safety faults are calculated in a manner where the amount slashed increases exponentially if more validators or a larger single validator commit faults simultaneously.</p></li><li><p>The slashing rate for a specific infraction is proportional to the cube of the sum of the voting powers of all validators that committed infractions within a (-1,+1) epoch range of the infraction in question. This approach encourages validators operating multiple consensus nodes to deploy diverse and uncorrelated setups, enhancing the security of the network.</p></li></ul><p>This is the Cubic Slashing Formula:</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/be0129199963449c1317ca298ae8a5c7356bb6a4b6d4071d5aaac67e72b115b3.webp" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>Let’s break it down:</p><ul><li><p>The multiplier, 9×: This factor further amplifies the penalty, making sure that even small infractions don’t go unnoticed, while larger ones are heavily penalized.</p></li><li><p>This part inside the brackets sums up the voting powers of all validators who committed an infraction. Each validator’s voting power, <em>vpi</em>, is divided by the total voting power, <em>vptotal</em>, at the time of their misstep. This gives us a relative measure of how influential the erring validators were in the network.</p></li><li><p>The squared term, ² : After obtaining the combined relative influence of the erring validators, we square this value. Squaring emphasizes the impact of larger infractions, ensuring that as the combined fault value grows, the penalty grows at an even faster rate.</p></li></ul><p>This formula ensures that the penalty is not just a mere slap on the wrist. Rather, it grows exponentially based on the combined influence of the erring validators. The result is a network in which validators are motivated to act in the interest of the system.</p><p><strong>3. Improved PoS Guarantees</strong>:</p><ul><li><p>Namada’s CPoS ensures that the cost of launching an attack on the network is quantifiable in all scenarios. This is due to the automatic detection mechanism that identifies which accounts (validators, delegators, etc.) contributed to a fault.</p></li></ul><p><strong>4. Transaction Fees in Multiple Assets</strong>:</p><ul><li><p>Namada allows transaction fees to be paid in a variety of tokens. The set of accepted tokens can be updated through a governance vote, providing flexibility and adaptability to the network’s economic model.</p></li></ul><h2 id="h-ethereum-bridge" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Ethereum Bridge</h2><h2 id="h-namada-ethereum-interoperabilty" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Namada-Ethereum Interoperabilty</h2><p>Imagine you’ve built a brand-new city (Namada) next to an existing metropolis (Ethereum). Before you can build a bridge connecting the two, there’s a process to ensure it’s safe, efficient, and agreed upon by the city’s council. This is what bootstrapping the bridge is all about. Now, for those interested in the nitty-gritty:</p><ol><li><p><strong>Governance’s Role</strong>: A proposal is set in motion to decide on the magic block height, <code>h</code>, to activate the bridge. This isn&apos;t just a software update; it&apos;s a hard fork.</p></li><li><p><strong>The Pause Before the Storm</strong>: Once <code>h-1</code> block is finalized, the Namada chain takes a breather. It&apos;s halted.</p></li><li><p><strong>Ethereum’s Side of Things</strong>: Smart contracts for the bridge are deployed on the Ethereum side. The validators at <code>h</code> block height are the gatekeepers, ensuring the bridge&apos;s integrity.</p></li><li><p><strong>Transparency is Key</strong>: Details about these contracts are made public. Anyone can verify them.</p></li><li><p><strong>The Rebirth</strong>: If the validators give a thumbs up, Namada chain is reborn with a fresh genesis file, now pointing to the Ethereum proxy contract.</p></li><li><p><strong>Bridge in Action</strong>: Once the bridge is live, validators’ ledger nodes get to work, coordinating the first validator set update.</p></li></ol><p><strong>A Practical Example</strong>: Imagine epochs being 100 blocks long with a consistent validator set. A proposal emerges to activate the bridge at <code>h = 3400</code>. This proposal sails through, and by block 3399, the chain halts. Ethereum bridge contracts are then deployed, verified, and by block 3400, Namada chain is back, now with the bridge active. Within a few blocks, the first validator set update is in motion.</p><h2 id="h-security" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Security</h2><p>Main points and details related to the security of the Namada-Ethereum bridge.</p><ol><li><p><strong>Namada Validators</strong></p></li></ol><ul><li><p>Role as full nodes of Ethereum.</p></li><li><p>Stake’s significance in bridge security.</p></li></ul><p>2. <strong>Consequences of Malicious Actions</strong></p><ul><li><p>Forking attack consequences.</p></li><li><p>Slashing of stake on Namada for stealing Ethereum tokens.</p></li></ul><p>3. <strong>Ethereum-side Precautions</strong></p><ul><li><p>Asset lock limit to mitigate forking attack damages.</p></li></ul><p>4. <strong>Redemption Limitations</strong></p><ul><li><p>Introduction of speed limits for redeeming wrapped Ethereum assets on Namada.</p></li></ul><p>5. <strong>Purpose of Redemption Limitations</strong></p><ul><li><p>Not primarily for security enhancement.</p></li><li><p>Making potential attacks more cumbersome and inconvenient.</p></li></ul><p><strong>Potential Attack on the Namada-Ethereum Bridge: A Brief Scenario</strong></p><ol><li><p><em>The Setup</em>: John the Ripper and his group become validators on Namada, aiming to exploit its connection to Ethereum.</p></li><li><p><em>The Attack</em>: They initiate a forking attack on Namada, creating a false record of locked Ethereum tokens they never deposited.</p></li><li><p><em>Redemption Attempt</em>: They try to redeem these fictitious tokens for wrapped Ethereum assets on the real Ethereum network.</p></li><li><p><em>Namada’s Defense</em>:</p></li></ol><ul><li><p>The forking attack is detected; John the Ripper’s group loses their staked assets on Namada.</p></li><li><p>Ethereum’s side limits the amount of redeemable assets, capping their potential theft.</p></li><li><p>A redemption speed limit slows down their extraction, increasing risk of detection.</p></li></ul><h2 id="h-transfers-to-namada" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Transfers — to Namada</h2><p>Namada uses two main “accounts” to manage transfers. One is designed to handle the storage and tracking of Ethereum-based assets, and the other is specifically for holding Namada tokens that are set to be sent to Ethereum.</p><p>When someone sends an Ethereum-based token, like an ERC20, to Namada, the system either creates a corresponding amount in Namada or releases tokens that were previously held in a special account.</p><p>Here’s a more technical explanation:</p><p><strong>1. Asset Transfer Mechanism</strong>:</p><ul><li><p>Namada employs two pivotal internal accounts: <code>#EthBridge</code> and <code>#EthBridgeEscrow</code>. The former governs the <code>/eth_msgs/</code> storage and manages the ledgers for wrapped Ethereum assets, while the latter holds Namada tokens in escrow, which are destined for Ethereum.</p></li></ul><p><strong>2. Wrapped ERC20 Tokens</strong>:</p><ul><li><p>When an ERC20 token voyages to Namada, the <code>TransferToNamada</code> Ethereum event triggers. Validators then mint the requisite amount to the corresponding multitoken balance key for the receiver or liberate the escrowed native Namada token. The Rust struct <code>TransferToNamada</code> encapsulates the transfer details, including the amount, asset type, and receiver.</p></li></ul><p><strong>3. Namada Token Dynamics</strong>:</p><ul><li><p>Wrapped Namada tokens destined for Ethereum must have an equivalent native token held in escrow by <code>#EthBridgeEscrow</code>. Upon the inclusion of the associated <code>TransferToNamada</code> Ethereum event into Namada, validators effectuate a transfer from <code>#EthBridgeEscrow</code> to the receiver.</p></li></ul><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/db9311e1f020264ab6cd69ee4116502e7f431559585316b2699f9af3401b45be.webp" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><h2 id="h-transfers-to-ethereum" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Transfers — to Ethereum</h2><p>Moving assets from Namada to Ethereum is a bit more involved. Users initiate a transfer on Namada, which then produces a “proof” on the Namada side. This proof is essential, as users need to take it and submit it to Ethereum to finalize the transfer.</p><p>Due to Ethereum’s gas fees, it’s often cheaper to group several transfers together, creating what’s known as a “<code>batch</code>&quot;. Namada maintains a special pool where these individual transfers are collected and wait to be batched together.</p><p>This pool operates using a tree-like structure (Merkle Tree), and for added security, it requires approval from multiple validators, or trusted entities, within the system. Additionally, there are mechanisms in place to ensure the same transfer isn’t counted multiple times and to manage transfers that might take longer than expected.</p><p>Here’s a more technical explanation:</p><p><strong>1. Transfer Initiation</strong>:</p><ul><li><p>Transferring assets from Namada to Ethereum isn’t an automatic affair. Users must dispatch a specific transaction to Namada to instigate a bridge transfer. Once greenlit, a cryptographic “proof” is generated and posted on Namada.</p></li></ul><p><strong>2. Proof Retrieval and Ethereum Submission</strong>:</p><ul><li><p>Users are tasked with obtaining the proof of the transaction. This proof, once submitted to the pertinent Ethereum smart contract, facilitates the redemption of Ethereum assets or the minting of wrapped assets. All Ethereum gas expenditures fall under the user’s purview.</p></li></ul><p><strong>3. Batching and Bridge Pool</strong>:</p><ul><li><p>Given Ethereum’s gas fees, it’s economically prudent to batch multiple transaction proofs. The Bridge Pool, akin to a mempool, accumulates these transactions. Users pay an additional NAM fee, held in a Bridge Pool Escrow, to cover Ethereum gas costs. Validators then disburse these fees in NAM to users who relay these transactions to Ethereum.</p></li></ul><p><strong>4. Merkle Tree Organization</strong>:</p><ul><li><p>The Bridge Pool adopts a Merkle tree structure. Every update mandates a signature from a quorum of validators on the tree root. Users aiming to relay transactions to Ethereum must ensure that the Merkle tree root, inclusive of their transactions, is duly signed.</p></li></ul><p><strong>5. Bridge Pool Validity Predicate</strong>:</p><ul><li><p>The Bridge Pool’s storage is governed by a native validity predicate. The storage layout is meticulously structured to ensure seamless transaction processing. The <code>TransferToEthereum</code> Rust struct encapsulates the transfer details, while the <code>PendingTransfer</code> struct includes the gas fee details.</p></li></ul><p><strong>6. Replay Protection and Timeouts</strong>:</p><ul><li><p>Nonces, cryptographic numbers used once, are pivotal in thwarting transaction replays. Given the unordered nature of transactions, some might time out. Such transactions necessitate a state reversion on Namada, including the refund of associated fees.</p></li></ul><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/1274d47731df43c6834f825d2a4e8e303c4f1e2f0d968a2439d97de70ad2f7e9.webp" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><h2 id="h-namada-governance" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Namada Governance</h2><p>Namada’s governance system is intricate, ensuring a robust and transparent decision-making process. It’s divided into on-chain and off-chain governance:</p><ol><li><p><strong>On-Chain Governance</strong>: This involves decisions made directly within the blockchain. It’s a structured process where proposals are submitted, discussed, and voted upon by validators and delegators. The outcome is determined by predefined rules and protocols.</p></li><li><p><strong>Off-Chain Governance</strong>: This is more flexible and involves discussions and decisions made outside the blockchain. It’s a collaborative approach, often involving community consensus.</p></li></ol><p><strong>Proposals</strong></p><p>They are structured suggestions for changes or decisions. Each proposal has specific attributes, such as <code>content</code>, <code>author</code>, <code>type</code>, and associated <code>epochs</code> (time periods). Namada supports various proposal types, each with its unique properties and requirements. For instance, a <code>Default</code> proposal allows both validators and delegators to vote and requires a specific voting power threshold to pass.</p><p><strong>Storage</strong></p><p>Each proposal and its associated data are stored under specific keys, ensuring organized and efficient data retrieval. Governance parameters, such as the <code>minimum proposal fund</code>, <code>maximum proposal code size</code>, and <code>voting time windows</code>, are stored under the <code>GovernanceAddress</code>. Votes, an essential part of the governance process, also have dedicated storage keys. This structured storage ensures that data related to governance is easily accessible and verifiable.</p><p>In essence, Namada’s governance system is a blend of structured on-chain processes and collaborative off-chain discussions, ensuring a transparent, fair, and efficient decision-making process.</p><h2 id="h-economics" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Economics</h2><p><strong>Non-Technical Explanation:</strong></p><p>Namada’s economic model revolves around its native token, <code>$NAM</code>. Users utilize $NAM to pay for transactions, and as the platform&apos;s popularity grows, so does the demand for $NAM. This is because everyone needs it to interact with the system.</p><p>On the other hand, Namada doesn’t just have a fixed amount of $NAM. The system creates new $NAM tokens every year, but there’s a limit to how many can be made. These new tokens are used to reward those who help secure the system, incentivize certain activities, and fund projects that benefit everyone. <em>If there are extra tokens beyond what’s needed, they get destroyed to maintain balance</em>.</p><p><strong>Technical Deep Dive:</strong></p><p>Namada’s economic dynamics are primarily influenced by its <strong>transaction fees</strong> and <strong>inflation model</strong>. Users are required to pay transaction fees in $NAM, and potentially other tokens, aligning the demand for $NAM with the demand for transaction space within the network. Refer to the <em>fee system</em>, following this paragraph, for a comprehensive breakdown.</p><p>On the supply front, Namada employs a deterministic inflation model. The protocol is designed to mint $NAM tokens at a predetermined maximum rate annually. This rate is a fraction of the existing supply, as detailed in the <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://specs.namada.net/economics/inflation-system">inflation system</a>. The minted NAM is then channeled into three primary protocol subsidies:</p><ol><li><p><strong>Proof-of-Stake (PoS):</strong> The reward mechanism for validators who stake their $NAM to secure the network.</p></li><li><p><strong>Shielded Pool Incentives:</strong> These are incentives provided to promote certain activities within the network, ensuring privacy and security. More about this can be found in the <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://specs.namada.net/economics/shielded-pool-incentives">shielded pool incentives</a> section.</p></li><li><p><strong>Public-Goods Funding:</strong> A portion of the minted $NAM is allocated to fund projects and initiatives that are deemed beneficial for the entire Namada community.</p></li></ol><h2 id="h-fee-system" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Fee System</h2><p>To ensure the efficient functioning of the Namada network, every transaction must pay a fee to be accepted into the ledger. These fees serve dual purposes:</p><ol><li><p>They help in the efficient <strong><em>allocation of block space and gas</em></strong>, both of which are limited resources. Given the open nature of transaction submissions and fluctuating demand, fees help manage these resources effectively.</p></li><li><p>Fees provide an ***incentive ***for block producers to include transactions in the blocks they create.</p></li></ol><p>Namada’s fee system is <strong>flexible</strong>, allowing transaction fees to be paid in any fungible token that’s part of a whitelist controlled by <strong>Namada governance</strong>. The governance also sets the minimum fee rates, which can be updated periodically. Transactions can opt to pay more than the minimum to get prioritized by the block proposer. Additionally, when using the shielded pool, transactions can unshield tokens to cover the required fees.</p><p>The whitelist consists of pairs, where one part is a token identifier and the other is the minimum price per unit gas for transactions using that token. This list can be updated through standard governance proposals. All collected fees are directly paid to the block proposer, ensuring that there’s no more profitable alternative like side payments.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/548aa9c025323face8a18e36ccb52a330bd2905e42372c551af29922636dca79.webp" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><h2 id="h-inflation-system" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Inflation System</h2><p>The Namada protocol utilizes its native staking token, <code>$NAM</code>, to programmatically mint rewards. These rewards cater to:</p><ol><li><p>Algorithmically measurable public goods:</p></li></ol><ul><li><p>Proof-of-stake security</p></li><li><p>Shielded pool usage</p></li></ul><p>2. Out-of-band public goods.</p><p><strong>1. Proof-of-Stake Rewards</strong></p><ul><li><p><strong>Purpose</strong>: To ensure the security of the proof-of-stake voting power allocation mechanism, tokens are bonded to validators. These tokens can be slashed if validators act maliciously. The bonded tokens can only be withdrawn after an unbonding period.</p></li><li><p><strong>Reward Mechanism</strong>: To incentivize validators and delegators for bonding their tokens and participating in consensus, Namada offers inflationary rewards. The inflation rate is adjusted using a PD-controller to aim for a 2/3 bonding ratio. The maximum inflation rate for proof-of-stake rewards is 10% annually. More details can be found in the reward distribution mechanism section.</p></li></ul><p><strong>2. Shielded Pool Rewards</strong></p><ul><li><p><strong>Purpose</strong>: The privacy offered by the MASP is contingent on the number of users and assets in the shielded pool. To promote a larger privacy set, Namada provides inflationary rewards.</p></li><li><p><strong>Reward Mechanism</strong>: A variable portion of inflation, capped at 10% annually, is allocated for shielded pool incentives. These incentives are distributed based on each asset’s presence in the shielded pool, controlled by a PD-controller. Further insights are available in the shielded pool incentives section.</p></li></ul><p><strong>3. Public Goods Funding</strong></p><ul><li><p><strong>Purpose</strong>: To support non-algorithmically-measurable public goods.</p></li><li><p><strong>Reward Mechanism</strong>: Namada allocates 10% annual inflation for this purpose. More information is available in the public goods funding section.</p></li></ul><h2 id="h-detailed-inflation-calculation-model" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Detailed Inflation Calculation Model</h2><p>Inflation is determined and disbursed every epoch. The calculation involves:</p><ul><li><p><strong>Fixed Parameters</strong>: These include values like the cap of proof-of-stake reward rate, the cap of shielded pool reward rate for each asset, the public goods funding reward rate, and various other parameters related to the PD-controller.</p></li><li><p><strong>State Values</strong>: These are dynamic values that change over time, such as the current supply of $NAM, the current amount of $NAM locked in proof-of-stake, and other values related to the shielded pool and previous epochs.</p></li><li><p><strong>Public Goods Funding Calculation</strong>: This is a straightforward calculation based on the public goods funding reward rate and the current supply of $NAM.</p></li><li><p><strong>PD-Controllers</strong>: These are used for both proof-of-stake and shielded pool rewards. The controllers first compute some intermediate values, then determine the rewards for proof-of-stake and each asset in the shielded pool.</p></li></ul><p>The tokens minted as rewards are then distributed to their respective validity predicates, and the latest inflation and locked token ratio values are stored for the next epoch.</p><p>This is the first part of the series of articles on Namada. Thank you for reading so far.</p><p>To keep up to date with future articles, in which we’ll look at concepts such as “Public Good Funding” in depth, follow me on Medium or on <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="http://x.com/cryoncrypto">X</a>.</p>]]></content:encoded>
            <author>cryon-2@newsletter.paragraph.com (cryon)</author>
        </item>
    </channel>
</rss>