Abstracting blockchains away from the majority of user experiences will accelerate mainstream adoption of Web3. As the economics of Web2 shift with the arrival of generative AI, there is a new urgency to onboard as many users as possible to open, decentralized systems that help them protect their assets and data. NEAR Co-Founder Illia Polosukhin shares the vision for a chain-abstracted Web3 tech stack to advance self-sovereignty for an AI-centric future.
I want to guide participants through the process of building a canister that can listen for ERC721 Transaction/Mint events, to generate the metadata and assets for a newly minted NFT, fully on-chain, using the unpredictable randomness provided by the ICP. Storing the data within a canister allows for an easy implementation of fully on-chain dynamic NFTs, where the rules for the manipulation of the tokens are defined by the canister code.
In the current form, the majority of the rollups deployed on Ethereum have some form of instant upgradeability, which introduces strong trust assumptions for users interacting with said rollups. The goal of the talk is to outline the viable path to a rollup construction that does not require an instant upgradeability.
Join the team building Gnosis' new smart account based wallet for a technical deep dive. Learn how they're innovating with secure key management using passkeys, streamlined on-chain interactions, and a focus on user experience. This workshop is perfect for developers and anyone curious about building the next generation of wallets.
Decentralized machine learning has emerged as a promising solution to address the challenges of data privacy, security, and centralized control in traditional AI development. FLock, a cutting-edge decentralized AI platform, aims to democratize AI by empowering communities to collaboratively build, train, and deploy AI models in a privacy-preserving, secure, and incentivized manner. By leveraging advanced technologies such as federated learning, zkFL, homomorphic encryption, and secure multi-party computation, FLock enables collaborative AI development while ensuring data protection. This talk will explore the key concepts, benefits, and real-world applications of decentralized machine learning, focusing on FLock's innovative approach. Attendees will gain valuable insights into the transformative potential of decentralized AI and how FLock is paving the way for a more inclusive, secure, and collaborative AI ecosystem.
We will explore how the liquid staking landscape will evolve on Gnosis following the imminent release of StakeWise V3.
This talk revolves around understanding how the Tellor protocol is adapting to the dynamic challenges presented by the evolving multichain landscape. The talk addresses the emergence of application-specific chains, the absence of a dominant native system, and the advancements in trustless bridging. The audience will gain insights into the strategic positioning of Tellor for the future, emphasizing non-negotiable principles like decentralization and interoperability, along with additional goals such as managing large data volumes and enhancing security. The talk will also highlight how Tellor aims to overcome challenges like MEV limitations, utilize data on other chains, and implement custom security measures.
This talk concerns CSM implementation: the challenges of adding permissionless modules to an existing protocol and designing modules with continuous protection from sophisticated actors. I’ll tell you how we utilize EIP-4788 (Beacon block root) and how Performance Oracle works.
Storage protocols such as Filecoin and Arweave are developing native VMs enabling decentralized applications to access and compute massive amounts of data, unlocking new capabilities for Web3. Since FVM and now AO launching soon, fully unstoppable applications (with differing levels of decentralization / guarantees, which we will dive into) unlock new and exciting use cases such as autonomous execution of LLMs, leading to more sophisticated autonomous agents going out and doing things. I'll try to focus the talk on what will be most immediately relevant for developers as these protocols evolve throughout this year.
Providing an overview of DVT based validation systems vs traditional or even pooled validation systems. Explaining why the performance ratios can be better compared with solo staking.
Connor Howe co-founder of Enso will give an evolution of intents, what the current ecosystem looks like, and the future of full abstraction enabled by the Enso intent engine.
The Ethereum community is on a mission to horizontally scale Ethereum's throughout with the creation of thousands of Rollups. However, this approach introduced issues around liquidity fragmentation from a lack of L2 to L2 interoperability. In this talk we will go through approaches of solving L2 interoperability and how Ethereum can achieve infinite horizontal scalability.
Why solo stakers are valuable to network, what does Ethereum look like with out them, talk about ways that we can support changes that benefit solo stakers, how solo stakers can better advocate for themselves
What can we learn from “traditional” neobanks as we make crypto deliver on its original promise of digital cash? Wallets must innovate beyond trading and become useful for daily life.
GmbH-Tokens offers numerous advantages that make your corporate financing more flexible. They enable easier transferability, improved liquidity, and high transparency through the integration of Smart Contracts, as well as automated payments and business processes. With the GmbH-Token, you can more effectively engage your community and provide them with a stake in your business success. Your company sells its tokens directly and scalably to investors through Ethereum. Save yourself the effort with providers of paid pooling vehicles and the manual offline processes of investments with conventional shares.
Similar to how "user" submitted transactions have the potential of creating MEV, oracle transactions create OEV (Oracle Extractable Value). There have been significant developments in the MEV field for users to mitigate the negativ externalities of MEV by simply switching their RPC (e.g. MEVBlocker). Solutions like this haven't been available to dApps utilizing oracles causing hundreds of millions in losses. If that value could be returned, how would that revolutionize the DeFi landscape?
We’ll review economic design principles for DePIN protocols focusing on roles, rewards, cost structures, and incomes. We’ll share data and analysis we did for those pillars to dive into particular examples, learnings, and insights.
Dappnode has been the easiest way to run web3 since 2018, but it always required users to have their own hardware. We're presenting now Dappnode Cloud, which will help users deploy Dappnode on the cloud as easy as with their own hardware!
Proof-of-Stake has become the primary way of securing decentralized networks and one of the largest sectors of the crypto economy. This talk will discuss the efficiency of Proof-of-Stake versus Proof-of-Work. The composition of staking revenues. And other key topics around Proof-of-Stake including MEV, restaking and the role of PoS in governance.
Everything on Ethereum is transparent, but does that limit what we can do with smart contracts? In this session we'll look at what is Confidential EVM and how it enables the next generation of innovative smart contracts & dApps to be built using Solidity and all your favorite tools & frameworks.
The current state of blockchain analytics is limited. Traditional methods focus on basic data like events and calls, missing the depth of data processed by the EVM. Storage, an essential yet often overlooked component in EVM-compliant blockchains, is key to maintaining consistency, supporting smart contracts, conserving resources, and enhancing security. Accessing and interpreting 'storage diffs' (changes in storage) at scale poses significant technical and computational challenges. Decoding these storage diffs is even more complex. A standard RPC method like getStorageAt method falls short in shedding light on storage changes. Moreover, the need to decode hashes of slots and keys adds another layer of difficulty, especially when dealing with hash maps without precise hash knowledge. There’s a however a method to simplify the use of storage by indexing and decoding every storage and state change. This innovation allows analysts to effortlessly query and interpret data previously inaccessible to them. We will showcase how storage diffs can be used to track token supplies without needing in-depth knowledge of their implementation and therefore streamline DeFi accounting processes. We'll demonstrate how fully decoded datasets provide powerful insights, even to analysts with limited expertise in blockchain or smart contracts.
Discover how smart accounts can create custom roles with secure, flexible permissions, allowing any account to act on their behalf. Through a simple module, nearly any role-based access control pattern can now be implemented on top of nearly any existing onchain system, increasing operational efficiency, enhancing security, and introducing transactional flexibility for smart accounts.
The proliferation of dApps across rollups, rollaps, appchains, and sidechains has made the already high barrier to Web3 adoption even more difficult. Moving among these apps is frustrating, requiring multiple wallets, swaps, DEXs, gas tokens, and long waits. Crypto needs cross-chain abstraction–empowering anyone to use apps easily, no matter their underlying infrastructure. The tools now exist to turn complex, multi-step, cross-chain user flows into fast, one-click experiences, without sacrificing on the security of users' assets. Fig will share insights into how he's been building these chain abstraction systems to eliminate the many friction points standing in the way of Web3 composability and interoperability.
In this talk, I will delve into the critical need for decentralizing the Consumer Price Index (CPI) to address inherent flaws and enhance transparency in economic metrics. Antitrust laws have long guarded against monopolies to prevent exploitation, yet governments and institutions can manipulate inflation data, as witnessed in places like Argentina. I will draw parallels between historical biases in the US Bureau of Labor Statistics and current limitations in the CPI methodology, emphasizing the necessity for a decentralized research system, D-FACTO. The talk will highlight the benefits of data and methodology transparency, utilizing decentralized networks to mitigate conflicts of interest.
The Gnosis, Nethermind and Shutter teams recently released a major milestone of the shutterized, threshold encrypted mempool for the Gnosis Chain Chiado testnet. Join us for a practical workshop focused on the Shutterized Gnosis Chain, an innovative solution enhancing front-running protection and censorship resistance. The workshop is divided into two main parts, with 2 separate alternative track/challenges to tackle for participants, depending on their interests and skill level: 1) Participants will engage in a hands-on session to try out transactions on the shutterized Gnosis Chain, experiencing the process and benefits of encrypted transaction pools first-hand. 2) a) (Validator track): This track will cover how to set up and run a shutterized validator using the Nethermind client, providing a deeper understanding of the network's architecture and operational mechanics. 2) b) (dapp development track): This track will guide attendees through developing a simple decentralized application (DApp), starting from a template to send encrypted transactions, aiming to make the concept of encrypted mempools more accessible. Links/resources: - https://www.gnosis.io/blog/alpha-keyper-testnet-for-shutterized-gnosis-chain-is-live-on-chiado - https://github.com/gnosischain/specs/tree/ed75f700185a962a61fda7ea60446952bc3fe593/shutter
There is a great need to introduce private transactions on public blockchains such as Ethereum. There are various cryptographic methods that can help us achieve the desired goal. Blockchains like Zcash and Monero have some of the cryptographic methods at their core that enable privacy of transactions. The privacy of transactions can be achieved by using stealth addresses (like Monero), and at the same time, the average transaction price will be negligible if layer-2 rollup is used.
When one mentions Ads to crypto/web3 folks what you get is a severe allergic reaction. Perhaps because most Twitter/X ads are cringe, 99% of crypto ads are in fact scams, or knowing how the trad AdTech market is deeply counter-positioned to web3 values. But advertising has been pivotal in the growth and success of the internet and mobile, unfortunately during the rise of mobile big tech cornered and exploited Adtech. Luckily, web3 has all the tools to fix this. Through core value propositions of ownership and transparency, Web3 will make advertising more relevant, interactive, and aligned with interests of advertisers, publishers, and users.
The Augur prediction market was a pioneer in using what the Eigenlayer people are now calling "inter-subjectivity". I will talk about the design, its limitations, parts of the design in other protocols and how we can take the design forward.
The dm3 protocol aims to connect wallets, applications, protocols, services, and ecosystems in a connected Web3 messaging ecosystem. While ENS is utilized as a general (central) registry for communication profiles, the dm3 protocol can be used natively on any other chain, layer-2, or even centralized service. Using CCIP (cross-chain interoperability protocol) links all sources to one central but decentralized registry - to build the connected messaging ecosystem of the future. Gnosis' Genome name service is now also connected to this ecosystem based on dm3's CCIP resolvers. Genome users can natively publish their communication profiles on their "gno" name and are connected with all other users, no matter where they have published their profiles. In this presentation, the technology based on CCIP will be presented and the resulting possibilities for cross-chain applications will be discussed.
The ad-based internet is broken. The web 2.0 status quo was built at a time when the internet lacked a transactional layer. It was very difficult to monetize, so people and their data became the product. Disparate, centralized services meant that users had to remember hundreds of passwords to hundreds of platforms that were regularly being hacked and leaking data.MetaMask Snaps use Secure Ecma Script allow the wallet to be securely extended at run-time to support a variety of new use-cases.
Technical overview of the current state of web3 RPC infra, a walk-through of the challenges and risks of traditional centralised solutions, and an introduction to new-gen platforms balancing efficiency and decentralization.
Account abstraction is a confusing world from an ERC perspective: we have tens of ERCs - how do they relate with each other? Do they compete technologically? Do they compete for attention? Are ERC-4337 and ERC-3074 competing with each other? We'll split them into a few categories and look at them separately: native AA ERCs, non-native AA ERCs, signature ERCs, EOA conversion ERCs.
For now, users need to spend time ensuring that a dApp is safe and doesn't have vulnerabilities. We can eliminate this problem by providing a trusted space for end-users and a security framework for projects. Protocols can upload their dApp; we will scan it for security information and publish it on our marketplace. End-users can check all security and other information about a project and start interacting with it directly on our platform.
The world of dapps is evolving to break assumptions for wallet experience to become smarter and more intuitive. This is enabled by new tech developed through Smart Accounts that unlocks more user-friendly experiences. In this talk we dive into the specific developements around how users will connect their wallets and establish session authentication. We cover some of the recent progress with WalletConnect protocol and how it will evolve in the future regarding new patterns like Session Keys
The Last Utility Chain acts as a decentralized services layer separate from the EVM L2 execution layer to provide key infrastructure services such as bridging and accounting. This talk will introduce the core concepts around the Utility Chain as a component of the twin-chain network and the benefits it can provide to builders by providing native sustainable incentive revenue.
11 years ago, Cloudera co-founder Jeff Hammerbacher said "The best minds of my generation are thinking about how to make people click ads. That sucks." Fast forward to 2024, this talk aims to take an honest look at what the smartest people in web3 are spending their time on and how it can shape where we go from here.
Embrace Tokenization: Stablecoin issuers can explore partnerships or collaborations with platforms that facilitate the tokenization of real-world assets. By integrating their stablecoins into these platforms, they can enable seamless conversions between traditional assets and digital tokens, providing liquidity and interoperability. Expand Asset Backing: Stablecoins traditionally maintain their value by being pegged to a reserve of fiat currency or other assets. Issuers can consider diversifying their reserve to include a wider range of tokenized assets. For example, they can back stablecoins with tokenized commodities, real estate, or even shares in companies. This broader asset base can enhance stability and increase the appeal of stablecoins. Regulatory Compliance: As the tokenization space evolves, regulatory frameworks will likely emerge to govern the issuance and trading of tokenized assets. Stablecoin issuers should proactively engage with regulators to ensure compliance and build trust in their operations. Adhering to regulations can help them maintain relevance in a regulated financial ecosystem.
As L2BEAT we're evaluating tens of systems which constantly evolve. With the number of L2s expected to grow to hundreds of systems our tooling has to adapt. I will walk you through the technologies we use to analyze and monitor large smart contract systems that we have developed and show you how we use them to come up with risk assesments for our website.
Decentralized, permissionless token-based systems pose significant complexity. Such systems have multiple principals and agents, we can’t predict their utilities or preferences. To tackle these uncertainties, token engineers run simulations, observe live blockchain data, explore edge case scenarios, and develop easy-to-comprehend metrics to inform about the best incentive design and optimal parameter setting. In decentralized systems, managing complexity comes with a second, major challenge: Decentralized, autonomous organizations aim to reach a consensus about key protocol settings in democratic, open voting processes, where all stakeholders a.k.a. token holders have a say. In my talk, I’ll ask: “How can we ensure informed, data-driven decision-making in a decentralized setup?” And I’ll share TE Academy’s experiments with LLMs to navigate complexity. We’ve developed a cadCAD GPT and open-source framework for AI agents to support token system simulations. This talk will walk you through our learnings and why the fusion of AI and human intelligence will become a key element in crypto governa
I will present about the role of block explorers and why decentralized infrastructure is so important, and unveiled the brand new explorer instance for Ethereum Classic.