<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/">
    <channel>
        <title>Gaemiogad</title>
        <link>https://paragraph.com/@gaemiogad</link>
        <description>undefined</description>
        <lastBuildDate>Sat, 11 Apr 2026 09:59:31 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>https://github.com/jpmonette/feed</generator>
        <language>en</language>
        <image>
            <title>Gaemiogad</title>
            <url>https://storage.googleapis.com/papyrus_images/8c9fc9006f9be26fa8b5c19227015e4c455e75a9f2a40d9919e8363798cf7400.jpg</url>
            <link>https://paragraph.com/@gaemiogad</link>
        </image>
        <copyright>All rights reserved</copyright>
        <item>
            <title><![CDATA[EulerFinance: Borrowing the big energy of the small and medium physique on the track]]></title>
            <link>https://paragraph.com/@gaemiogad/eulerfinance-borrowing-the-big-energy-of-the-small-and-medium-physique-on-the-track</link>
            <guid>TZ2IoDsSTclQ7BanZ3zk</guid>
            <pubDate>Mon, 03 Jan 2022 16:54:28 GMT</pubDate>
            <description><![CDATA[In the Euler Finance information update, the team revealed that its internal quantitative analysts are further improving Euler&apos;s risk framework. At the same time, Euler&apos;s fifth audit is also in progress. It can be seen that in order to prevent being affected by the frequent large-scale hacking incidents in the second half of 2021, Euler has always maintained a rigorous and responsible attitude towards its own security. Next, we continue the content of the first part and introduce yo...]]></description>
            <content:encoded><![CDATA[<p>In the Euler Finance information update, the team revealed that its internal quantitative analysts are further improving Euler&apos;s risk framework.</p><p>At the same time, Euler&apos;s fifth audit is also in progress.</p><p>It can be seen that in order to prevent being affected by the frequent large-scale hacking incidents in the second half of 2021, Euler has always maintained a rigorous and responsible attitude towards its own security.</p><p>Next, we continue the content of the first part and introduce you to other aspects of Euler&apos;s innovations.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/4a697273270c6a43f4ed60b6a41ff35547b9af981ad3e4bff7e249ada7aa0f40.png" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>Brand new clearing mechanism</p><p>Euler has also made many innovations in liquidation. In its liquidation model, Euler adds the value of the borrower&apos;s debt assets, and considers the combination of mortgage rate and borrowing rate to customize its exclusive liquidation threshold.</p><p>In addition, in terms of resistance to MEV, Euler used classic Dutch auctions and set up a &quot;discount acceleration mechanism&quot; for lps (liquidity providers) to strengthen the shield.</p><p>Euler also established a &quot;multi-collateral stable pool&quot; internally for liquidators to conduct liquidation at low cost.</p><p>1</p><p>Liquidation surcharge</p><p>In the process of liquidation, the liquidator needs to provide slightly more borrowed assets than the violator to repay the assets. This extra amount will be included as an expense in the liquidator&apos;s borrowed assets reserve.</p><p>The basic liquidation discount starts at the level of the fee and is therefore ultimately paid by the offender.</p><p>On this basis, more volatile assets that usually lead to more liquidation tend to accumulate reserves at a faster rate than less volatile assets, which helps protect loans to such assets people.</p><p>In addition, this fee can ensure that &quot;self-liquidation&quot; is always a net negative value, which increases the profit margin that some uncompliant and unethical manipulation strategies could have achieved.</p><p>2</p><p>Resistance to MEV</p><p>Basic knowledge:</p><p>Before introducing this method, let&apos;s add a bit of knowledge about miner extractable value (MEV).</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/3c288cdbbd2dc63ca546702162d8589221fffc9db35fd81f6989fbb097407962.png" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>MEV refers to a measure of the profit obtained by miners through the ability to arbitrarily include, exclude, or reorder transactions in the blocks they produce.</p><p>Based on the principle that every transaction in the Ethereum network is open and transparent, the following types of &quot;attacks&quot; that affect normal traders&apos; transactions will appear in the network:</p><p>Front-running: Refers to making a profit by placing a transaction before the target transaction (the attacked transaction) in the same block; it often occurs in clearing and arbitrage transactions.</p><p>Back-running: Refers to making a profit by placing a specific transaction after the target transaction in the same block; it often occurs in Oracle transactions or large transactions.</p><p>Sandwich Attacks: This method is a combination of the above two forms, allowing the attacked transaction to be caught in the middle of two specific transactions &quot;forged&quot; by the miners for profit.</p><p>The sandwich attack greatly expands the range of attacks that miners can attack by virtue of their familiarity with the transaction sequence through the &quot;front and back attack&quot;. Even an AMM transaction on an ordinary decentralized exchange may become the target of the attack. .</p><p>The method is: the attacker first opens the first &quot;pre&quot; transaction in order to create huge token price fluctuations, and then executes the second &quot;post&quot; transaction immediately after the execution of the attacked transaction, in exchange for the token that launched the attack to gain profit.</p><p>Solution:</p><p>So how does Euler&apos;s Dutch auction work? After the borrower reaches the liquidation line, Euler makes the liquidator&apos;s mortgage asset liquidation discount price gradually rise from the lowest point (that is, the income gradually decreases), thus creating a Dutch auction in the field of loan liquidation.</p><p>Examples are as follows:</p><p>If the liquidator Bob can make a profit with 4% of the proceeds in a liquidation, the liquidator Alice may be able to grab the auction from Bob at a lower discount price (for example: 3%) through various means.</p><p>Those who accept the lower discount price first will have priority in obtaining the right of liquidation.</p><p>In addition, Euler also provides another safeguard for liquidators:</p><p>Provide a discount booster for LPs, which allows them to conduct Dutch auctions at lower prices for arbitrage before miners rush away.</p><p>Stress test on bad debt warning</p><p>Simulation environment:</p><p>To ensure that bad debts are minimized under extreme conditions, the Euler team will stress test the liquidation scenarios by simulating the long-tail risk events of individual assets and asset portfolios to estimate the risk of bad debts.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/c9dc5293813929cf981e092d7eb4a699bd1a28b4c819ab1e3a71ff882163cb24.png" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>Examples are as follows:</p><p>Single asset</p><p>If the index list of the agreement shows that the token jumps from 250th to 30th and can maintain that position for a long enough time, the team will simulate activities to check the share of bad debts in total loans under different borrowing factors, so that the team may The borrowing factor will be increased from 0.28 to 0.35.</p><p>Portfolio</p><p>It is also possible to simulate a more complex environment, using 50 tokens from below quartiles as borrowed assets, and under high volatility, 4 mortgage assets (including 3 time-tested and 1 proposed new Mortgage) unified support.</p><p>By simulating tail risk scenarios, the team can assess the worst-case scenario of the agreement and decide whether it is appropriate to include collateral assets.</p><p>Agreement governance</p><p>In Euler&apos;s white paper, the token economic model and community governance have not yet been supplemented. According to the existing information, we can currently know the following contents:</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/cb982d7a53701096de777306f10c2b45bf2c387049525f7ede358724165c8287.png" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>About EUL token</p><p>The Euler protocol is also based on the traditional DAO governance method, and long-term management is carried out by a community composed of the holders of the original token of the Euler (EUL) protocol.</p><p>As a voting right, EUL can be used to propose an upgrade agreement or vote on other people&apos;s proposals; EUL holders can directly vote on the proposal, or delegate the vote to a third party.</p><p>EUL holders can finally vote on the following matters:</p><ol><li><p>Set the calculation factor borrowed by the isolation layer</p></li><li><p>Set calculation factors for specific asset mortgage and borrowing</p></li><li><p>What kind of assets are included in the cross layer and mortgage layer</p></li><li><p>Choice of risk parameters and changes to universal lending methods</p></li></ol><p>Euler Treasury</p><p>The Euler vault will also be managed by EUL holders.</p><p>Part of the treasury will initially be locked and used to assist the agreement when problems such as funding difficulties arise in the agreement.</p><p>The remaining funds will be allocated to agreement users (lenders and borrowers), those who provide guarantees for the agreement (pledgers), and other contributors to the Euler ecosystem (grant recipients).</p><p>The ultimate goal of Euler Treasury is to transfer control of the agreement to all stakeholders.</p><p>Euler Grants</p><p>In order to encourage developers to build on Euler and help integrate it into the wider DeFi ecosystem, a portion of Euler funds will be allocated to the Euler Grants program.</p><p>The purpose of the grant is to promote the development of Euler by establishing a community-driven DAO culture.</p>]]></content:encoded>
            <author>gaemiogad@newsletter.paragraph.com (Gaemiogad)</author>
        </item>
        <item>
            <title><![CDATA[Provide more effective and versatile identity management]]></title>
            <link>https://paragraph.com/@gaemiogad/provide-more-effective-and-versatile-identity-management</link>
            <guid>f5KlavSLmhxPwYmsCjt6</guid>
            <pubDate>Wed, 17 Nov 2021 17:56:44 GMT</pubDate>
            <description><![CDATA[What if instead of just connecting you to your digital wallet, your private key can connect you to your digital identity? This is the development direction of blockchain technology that many people see today. It provides a secure and unforgeable method for authentication. Blockchain identification can be used for anything. It simplifies online account registration. It can be used as a passport or driver&apos;s license. It can act as a card, user name, password, or any other role you need to e...]]></description>
            <content:encoded><![CDATA[<p>What if instead of just connecting you to your digital wallet, your private key can connect you to your digital identity? This is the development direction of blockchain technology that many people see today. It provides a secure and unforgeable method for authentication. Blockchain identification can be used for anything. It simplifies online account registration. It can be used as a passport or driver&apos;s license. It can act as a card, user name, password, or any other role you need to establish identity. One of the main benefits of this new trend is that it will significantly improve the security of your identity. Blockchain recognition makes it possible to share only basic information. Think about any time you have to show your driver&apos;s license as proof of identity. They just need to know that you are you, but you have given them your address, birthday, etc.</p>]]></content:encoded>
            <author>gaemiogad@newsletter.paragraph.com (Gaemiogad)</author>
        </item>
        <item>
            <title><![CDATA[Blockchain, Bitcoin, business monetization]]></title>
            <link>https://paragraph.com/@gaemiogad/blockchain-bitcoin-business-monetization</link>
            <guid>qz7rMj8NxKZqV25zkcjU</guid>
            <pubDate>Thu, 21 Oct 2021 09:19:39 GMT</pubDate>
            <description><![CDATA[1.Blockchain For me, blockchain is a new technology trend, and technology usually brings innovation in the market, which is also one of the reasons why blockchain is so popular. Of course, how many of the voices here are about technology, and how many of them are talking about digital currency in the name of blockchain I don&apos;t know. My judgment is actually consistent with the mainstream judgment in the market. Blockchain is likely to overturn the current Internet environment. To be preci...]]></description>
            <content:encoded><![CDATA[<p>1.Blockchain For me, blockchain is a new technology trend, and technology usually brings innovation in the market, which is also one of the reasons why blockchain is so popular. Of course, how many of the voices here are about technology, and how many of them are talking about digital currency in the name of blockchain I don&apos;t know.</p><p>My judgment is actually consistent with the mainstream judgment in the market. Blockchain is likely to overturn the current Internet environment. To be precise, it is an upgrade to our current Internet.</p><p>Of course, it is a kind of &quot;technical&quot; upgrade.</p><p>2.Bitcoin is synonymous with a type of digital currency. In fact, there are two kinds of Bitcoin on the market, one is the capital market and the other is the &quot;miner&quot;.</p><p>There is no way to talk about the former, it is really not high enough. If you want to understand the former, you might as well pay attention to Teacher Li Xiaolai. I think it is not an exaggeration to call Teacher Li Xiaolai the spokesperson of the capital market bitcoin. What do you think?</p><p>The latter, miner’s Bitcoin, is a kind of product gameplay. We should first realize that Bitcoin itself is not a product, but a certain “element” belonging to a product category.</p><p>From the perspective of a practitioner, when we look at Bitcoin, we can&apos;t just look at the price, but also at its business, its form of expression, and some &quot;product&quot; level things.</p><p>I made a bold guess:</p><p>Product A provides a service for specific users to &quot;bypass bank supervision to achieve transfer purposes&quot;, and users need to pay a certain &quot;handling fee&quot; to use this service. The realization principle of this business requires the assistance of ordinary users to complete, and a large number of network users need to form a special business achievement environment (blockchain) comparable to bank supervision. In order to reward and encourage ordinary users to participate, when ordinary users participate and complete the business, they will receive a certain token reward (Bitcoin). In order to make these rewards (Bitcoins) attractive to users, there are some hidden designs that allow the value of these tokens to increase (not mentioned in the article). 3. Business monetization Business monetization is a concept I put forward. Perhaps there are already similar concepts or concepts with the same name. It can only be said that any similarities are purely coincidental.</p><p>I think business monetization is a new way for companies and users to get along, a bit like the back feeding of the animal kingdom.</p><p>At the beginning of the enterprise, users are actually the food and clothing parents of the enterprise. In the later stage of the enterprise, whether it is capital intervention, scale expansion, or business increase, this relationship needs to change.</p><p>I have experienced many start-up projects, some developed and some died. But there is always one thing in common. The distance between companies and users is always getting farther and farther. When I want to give back and thank old users, I can often do nothing.</p><p>Business monetization allows users to grow with the growth of the company and share the value of the company. In many cases, it is not that companies are unwilling to share their own interests, but that there is no way to achieve them. Of course, in terms of actual results, after realizing a community of interests with users, for enterprises, it is equivalent to deeply binding users in their own industries.</p><p>This is also an extremely effective method for active users and self-propagation.</p>]]></content:encoded>
            <author>gaemiogad@newsletter.paragraph.com (Gaemiogad)</author>
        </item>
    </channel>
</rss>