Allen

Allen

crypto seeker||starknet

starkware2023 Conference-2

Veritas Security Company#

  1. 2022 was declared as the year with the largest hacker activities in history, with attackers targeting different ecosystems.
  2. Finrisen Security Company provides state-of-the-art blockchain security services.
  3. To prevent attacks, it is necessary to identify and fix vulnerabilities in Cairo contracts.
  4. Finli Security provides the V Specification language to determine the state of blockchain transactions.
  5. Magi is a formal validator used to prove the correctness of Cairo code.
  6. Orca is a fuzz testing framework used to detect vulnerabilities in Solidity and Cairo contracts.
  7. The services provided by Finrisen Security Company can help Cairo programmers securely test their smart contracts.

Carbon Emissions Market#

• Watch Guillaume's video to explore how blockchain addresses the challenges faced by the carbon offset market.
• With legal support, the market is flourishing, where buying carbon credits is equivalent to eliminating one ton of carbon dioxide, and the current market is expected to reach $50 billion.
• There are still some challenges in achieving true carbon neutrality, such as lack of accessibility, greenwashing, and lack of tools for investment and investment management.
• Carbonable is creating an ultimate tool for carbon offset that can be used by anyone, allowing individuals and businesses to participate in the great mission against climate change.
• Guillaume suggests investing now, as future carbon credit prices are expected to fluctuate significantly, and investing now can save more costs.
• Carbonable aims to build a more accessible application and address the issues caused by greenwashing and investment management.
• They strive to become leaders in carbon reduction actions and provide a perfect platform for people to participate in environmental activities.

Starknet Index Graph#

• Jonathan Lei is the co-founder and CEO of zklend, who has developed a Rust SDK based on StarkNet.
• There are several challenges, including dealing with chain folding, limited programmability, and managing new infrastructures.
• The Graph solves these problems by using a unified API that complies with the GraphQL standard and a generic, high-performance runtime environment.
• Users can send transactions to smart contracts through applications; smart contracts generate events that are received by Graph Nodes, which query the corresponding indexing logic and execute it.
• Applications retrieve data from Graph Nodes through the GraphQL API.
• Indexing logic can be written in any language compiled to WASM.
• The Graph reduces the risk of single point of failure and achieves programmability and high-performance data querying.

Shutter Network, L2 MEV#

  1. Shutter Network provides an unprecedented solution to address threats on the market, including forward-looking and censorship systems on public blockchains.
  2. Shutter is attempting to inject virtual encryption into the underlying layer to counter front-running and censorship.
  3. They use encryption technology to encrypt transactions at the user level and have block producers sign and confirm the inclusion and order of transactions, while the transactions remain encrypted and block producers cannot inspect or front-run them.
  4. Their goal is to prevent malicious movement, which is often associated with front-running behavior.
  5. They aim to improve neutrality in the underlying layer with the help of virtual encryption to prevent front-running and censorship.
  6. Shadow is a modular part of L2, which can be used as a plugin by L2 or sidechains to enhance resistance against front-running and censorship.
  7. They also believe that some liquidation processes are normal MEV, but they are more concerned with preventing malicious MEV.

ECNTT Algorithm Ingonyama#

  1. Ingonyama specializes in hardware infrastructure for improving zero-knowledge computation performance.
  2. The old MSM and NTT algorithms have many implementations, and now they are exploring a new variant called ECNTT.
  3. The basic operation of ECNTT is elliptic curve addition instead of modular multiplication. It has higher computational complexity but can be precomputed.
  4. Elio's blockchain application is an example of ECNTT, allowing privacy users to operate on private data.
  5. Implementing ECNTT on hardware poses challenges as it increases the complexity of basic computation units and memory access.
  6. There may be future hardware implementations of ECNTT.

Stark Integration with Traditional Institutional Finance#

• Dave Engel, the Business Development Director of StarkWare, will discuss the future of StarkWare and institutional finance.
• Does institutional finance need blockchain? Quoting Jamie Dimon, CEO of JP Morgan, cryptocurrencies have no intrinsic value, but blockchain is real.
• What are some examples of blockchain usage in institutional finance seen in the current market?
• Starkex is one of the most popular platforms offered by StarkWare, which can serve the future of institutional finance.
• We are adopting StarkWare technology as the backbone of institutional finance infrastructure to achieve scalability, visibility, and resilience.

Visa has built a payment POC on Starknet, so everyone is encouraged to watch Kai's presentation from yesterday, which provides the most in-depth technical insights. Visa has created a POC for recurring payments using account blocking on Starknet.
• StarkWare's ultimate goal is to connect and empower complex enterprise clients, machines, and the financial sector to create a powerful and scalable financial chain.

Loading...
Ownership of this post data is guaranteed by blockchain and smart contracts to the creator alone.