Binance Square

Jeeya_Awan

MPhil Student | 📚 🌍 Exploring crypto 💡 Excited to grow in digital finance | Let’s connect, learn & grow in blockchain 🚀
Otwarta transakcja
Posiadacz NEIRO
Posiadacz NEIRO
Trader systematyczny
Lata: 2.6
543 Obserwowani
17.9K+ Obserwujący
5.2K+ Polubione
126 Udostępnione
Cała zawartość
Portfolio
PINNED
--
Zobacz oryginał
Zobacz oryginał
Podstawy matematyczne DUSKZałożenie trudności problemu Diffie-Hellmana: W każdej grupie logarytm dyskretny loдb a to liczba x ∈ Z taka, że bx = a. Większość elementów kryptograficznych związanych z tą pracą jest powiązana z założeniem Diffie-Hellmana, które opiera się na trudności obliczania logarytmów dyskretnych w grupach cyklicznych. Rozważmy grupę cykliczną multiplikatywną G rzędu p i generator д, można sformułować następujące założenie: podane дa i дb dla losowo i niezależnie wybranych a, b ∈ Zp, to дab zachowuje się jak losowy element w G rzędu p.

Podstawy matematyczne DUSK

Założenie trudności problemu Diffie-Hellmana:

W każdej grupie logarytm dyskretny loдb a to liczba x ∈ Z taka, że bx = a.

Większość elementów kryptograficznych związanych z tą pracą jest powiązana z założeniem Diffie-Hellmana, które opiera się na trudności obliczania logarytmów dyskretnych w grupach cyklicznych.

Rozważmy grupę cykliczną multiplikatywną G rzędu p i generator д,
można sformułować następujące założenie: podane дa i дb dla losowo i niezależnie wybranych a, b ∈ Zp, to дab zachowuje się jak losowy element w G rzędu p.
Zobacz oryginał
Sieć Dusk@Dusk_Foundation network wykorzystuje rozproszoną i skupioną na prywatności walutę cyfrową, która rozwija protokół CryptoNote poprzez przełomowe odkrycia w dziedzinie zgody Byzantyjskiej oraz funkcji pseudolosowych znanych kryptografów takich jak Silvio Micali, Michael Rabin, Alexander Yampolskiy i Evgeniy Dodis. Dusk drastycznie odróżnia się od innych blockchainów, stosując adaptacyjny mechanizm zgody, zwany oddzielonym porozumieniem Byzantyjskim (SBA), który nie wymaga intensywności obliczeniowej typowej dla dowodu pracy i stanowi bardziej sprawiedliwą alternatywę dla dowodu udziału.

Sieć Dusk

@Dusk network wykorzystuje rozproszoną i skupioną na prywatności walutę cyfrową, która rozwija protokół CryptoNote poprzez przełomowe odkrycia w dziedzinie zgody Byzantyjskiej oraz funkcji pseudolosowych znanych kryptografów takich jak Silvio Micali, Michael Rabin, Alexander Yampolskiy i Evgeniy Dodis.

Dusk drastycznie odróżnia się od innych blockchainów, stosując adaptacyjny mechanizm zgody, zwany oddzielonym porozumieniem Byzantyjskim (SBA), który nie wymaga intensywności obliczeniowej typowej dla dowodu pracy i stanowi bardziej sprawiedliwą alternatywę dla dowodu udziału.
Tłumacz
The Three Pillars of DuskBy now you’ve probably noticed that @Dusk_Foundation has rebranded! They're thrilled to have a new look that is sleeker, simpler, and more direct than before. The rebranding process is very detailed and in-depth, and throughout the process and subsequent rewriting of copy, three phrases are constantly present: Real-World Assets (RWAs), Compliance, and Privacy. In many ways, these three sum up Dusk. They want to bring RWAs on-chain and to do that they must be compliant and private. Dusk is often called a privacy coin or at least put into the ZK rollup category. While dusk do care about privacy and do use zero-knowledge proof cryptography (they're not a rollup or Layer 2 though), it isn’t our end goal, and instead, they do this so that they can bring RWAs on-chain. So, today let’s have a look at these three pillars, and how they benefit both businesses and users. 1) Compliance: Compliance is hugely important for us and guides our decisions and infrastructure, as in order to interact with regulated assets we must meet their regulatory requirements. Financial institutions have to follow a huge amount of rules and regulations, and how they do this has thus far been built around centralized systems. This has led to us developing tools like Citadel, a decentralized licensing protocol that can be used for everything from KYC/AML procedures to subscription plans. The twist is that it’s private, and operates using ZKPs, meaning users do not have to give away their personal data, while still being able to prove what is necessary to comply with the rules. #Dusk has also make it easy for institutions and businesses to program and automate their compliance and follow policy. While this is a requirement for institutional adoption, it also is a strong business case in and of itself and can save companies huge amounts of money by automating and streamlining their processes. While Dusk is business-friendly, their approach also benefits average users by returning custody, of their assets, data, and identity, to them while allowing them to engage with both classical assets and new ones. Without compliance, we can have all the technology in the world but will never be able to use it in a meaningful way. A lot of blockchains are not capable of complying with GDPR, for example, and this will hinder business adoption. Their founders were thinking about regulation and compliance long before it was cool, seeing that business adoption would require blockchain technology that’s capable of being compliant and legislation that is reasonable and allows blockchain to grow. At least in the EU, they have that. 2) Privacy: Privacy is what they're best known for. Dusk use zero-knowledge proof cryptography, specifically PLONK, to ensure that transactions are verifiable and correct while being private. Privacy is another necessity, both in general for all people and to facilitate mass adoption. Institutions will never tokenize their assets if every move they make is public, and regular people would also be hesitant to use blockchain in a meaningful way if it meant every transaction they’ve ever made was public. This is what they're best known for, and while we care deeply about privacy as a right, we also recognize that it’s a necessity for blockchain to be used at scale and for things that matter. Their approach ensures privacy while providing the auditability that institutions require, and in many cases provides higher standards of privacy than institutions and users are used to (by removing the need for third parties we provide higher levels of privacy). Their novel approach to privacy and focus on the real world means that users are not constantly leaking data and can practice selective disclosure. Their goal with privacy is to match and then improve upon what is currently available. 3) Real-world assets: These two points bring dusk to real-world assets. The ultimate goal of Dusk is to bring institutional-level assets to anyone’s wallet. This means users can move seamlessly between crypto and traditional assets and engage with traditional assets in the same way as they interact with crypto; trustlessless, permissionless, and with self-custody. Bringing RWAs on-chain is good for businesses too, giving them faster settlement times, access to consolidated liquidity, and allowing them to use smart contracts for a lot of time (and money!) consuming processes. Their goal is to deliver financial freedom and inclusion to all by improving the current systems and eliminating the inefficiencies they're all used to. These three pillars make the digital world secure. $DUSK {spot}(DUSKUSDT)

The Three Pillars of Dusk

By now you’ve probably noticed that @Dusk has rebranded! They're thrilled to have a new look that is sleeker, simpler, and more direct than before. The rebranding process is very detailed and in-depth, and throughout the process and subsequent rewriting of copy, three phrases are constantly present: Real-World Assets (RWAs), Compliance, and Privacy.
In many ways, these three sum up Dusk. They want to bring RWAs on-chain and to do that they must be compliant and private. Dusk is often called a privacy coin or at least put into the ZK rollup category. While dusk do care about privacy and do use zero-knowledge proof cryptography (they're not a rollup or Layer 2 though), it isn’t our end goal, and instead, they do this so that they can bring RWAs on-chain.
So, today let’s have a look at these three pillars, and how they benefit both businesses and users.

1) Compliance:
Compliance is hugely important for us and guides our decisions and infrastructure, as in order to interact with regulated assets we must meet their regulatory requirements. Financial institutions have to follow a huge amount of rules and regulations, and how they do this has thus far been built around centralized systems.
This has led to us developing tools like Citadel, a decentralized licensing protocol that can be used for everything from KYC/AML procedures to subscription plans. The twist is that it’s private, and operates using ZKPs, meaning users do not have to give away their personal data, while still being able to prove what is necessary to comply with the rules.
#Dusk has also make it easy for institutions and businesses to program and automate their compliance and follow policy. While this is a requirement for institutional adoption, it also is a strong business case in and of itself and can save companies huge amounts of money by automating and streamlining their processes.
While Dusk is business-friendly, their approach also benefits average users by returning custody, of their assets, data, and identity, to them while allowing them to engage with both classical assets and new ones.
Without compliance, we can have all the technology in the world but will never be able to use it in a meaningful way. A lot of blockchains are not capable of complying with GDPR, for example, and this will hinder business adoption.
Their founders were thinking about regulation and compliance long before it was cool, seeing that business adoption would require blockchain technology that’s capable of being compliant and legislation that is reasonable and allows blockchain to grow. At least in the EU, they have that.
2) Privacy:
Privacy is what they're best known for. Dusk use zero-knowledge proof cryptography, specifically PLONK, to ensure that transactions are verifiable and correct while being private.
Privacy is another necessity, both in general for all people and to facilitate mass adoption. Institutions will never tokenize their assets if every move they make is public, and regular people would also be hesitant to use blockchain in a meaningful way if it meant every transaction they’ve ever made was public.
This is what they're best known for, and while we care deeply about privacy as a right, we also recognize that it’s a necessity for blockchain to be used at scale and for things that matter.
Their approach ensures privacy while providing the auditability that institutions require, and in many cases provides higher standards of privacy than institutions and users are used to (by removing the need for third parties we provide higher levels of privacy).
Their novel approach to privacy and focus on the real world means that users are not constantly leaking data and can practice selective disclosure. Their goal with privacy is to match and then improve upon what is currently available.
3) Real-world assets:
These two points bring dusk to real-world assets. The ultimate goal of Dusk is to bring institutional-level assets to anyone’s wallet. This means users can move seamlessly between crypto and traditional assets and engage with traditional assets in the same way as they interact with crypto; trustlessless, permissionless, and with self-custody.
Bringing RWAs on-chain is good for businesses too, giving them faster settlement times, access to consolidated liquidity, and allowing them to use smart contracts for a lot of time (and money!) consuming processes.
Their goal is to deliver financial freedom and inclusion to all by improving the current systems and eliminating the inefficiencies they're all used to.

These three pillars make the digital world secure.
$DUSK
Zobacz oryginał
@Dusk_Foundation prezentuje atrakcyjną propozycję wartości dla firm szukających opłacalnego dostępu do możliwości finansowania. Służy jako protokół, w którym użytkownicy z innych sieci bez uprawnień mogą inwestować w aktywa rzeczywiste (RWA) jako bezpieczne schronienie w okresach wahań rynku kryptowalut lub tendencji spadkowych. #Dusk umożliwia zabezpieczenie przez firmy generujące rzeczywiste przychody, tworząc handlowalne aktywa w ramach sieci. $DUSK {spot}(DUSKUSDT)
@Dusk prezentuje atrakcyjną propozycję wartości dla firm szukających opłacalnego dostępu do możliwości finansowania. Służy jako protokół, w którym użytkownicy z innych sieci bez uprawnień mogą inwestować w aktywa rzeczywiste (RWA) jako bezpieczne schronienie w okresach wahań rynku kryptowalut lub tendencji spadkowych. #Dusk umożliwia zabezpieczenie przez firmy generujące rzeczywiste przychody, tworząc handlowalne aktywa w ramach sieci.
$DUSK
Zobacz oryginał
Audytowalne transakcje i zgodność: @Dusk_Foundation protokół umożliwia audyt transakcji, zapewniając, że imiona nadawców i odbiorców mogą być pobierane w przypadku wymogu nowych przepisów. Audytorzy, takie jak Holenderska Izba Rynku Finansowego (Autoriteit Financiële Markten - AFM) oraz organizacje licencyjne nadzorujące wymiany, odgrywają kluczową rolę w zapewnieniu zgodności. #Dusk zaprojektował swoją infrastrukturę w sposób spełniający te wymagania regulacyjne i jest dobrze przygotowany na nową sytuację. $DUSK {spot}(DUSKUSDT)
Audytowalne transakcje i zgodność:
@Dusk protokół umożliwia audyt transakcji, zapewniając, że imiona nadawców i odbiorców mogą być pobierane w przypadku wymogu nowych przepisów. Audytorzy, takie jak Holenderska Izba Rynku Finansowego (Autoriteit Financiële Markten - AFM) oraz organizacje licencyjne nadzorujące wymiany, odgrywają kluczową rolę w zapewnieniu zgodności. #Dusk zaprojektował swoją infrastrukturę w sposób spełniający te wymagania regulacyjne i jest dobrze przygotowany na nową sytuację.
$DUSK
Zobacz oryginał
Udowodniona szyfrowanie, wyciek danych i @Dusk_Foundation ; Głównym obawą jest potencjalny wyciek udowodnionego szyfrowania przez organy władzy. Jednak ważne jest, aby zauważyć, że może ulec wycieku informacje o uczestnikach transakcji, a nie samo szyfrowanie. Prawdopodobieństwo takiego wycieku jest minimalne w #Dusk , ponieważ nie byłoby praktycznego powodu dla władz, aby to zrobić. $DUSK {spot}(DUSKUSDT)
Udowodniona szyfrowanie, wyciek danych i @Dusk ;
Głównym obawą jest potencjalny wyciek udowodnionego szyfrowania przez organy władzy. Jednak ważne jest, aby zauważyć, że może ulec wycieku informacje o uczestnikach transakcji, a nie samo szyfrowanie. Prawdopodobieństwo takiego wycieku jest minimalne w #Dusk , ponieważ nie byłoby praktycznego powodu dla władz, aby to zrobić.
$DUSK
Zobacz oryginał
@Dusk_Foundation zapewnił tożsamość cyfrową i zgodność. Dusk rozumie znaczenie tożsamości cyfrowej i zgodności w ramach ram regulacyjnych UE. Aktywnie pracują nad swoimi ambicjami dotyczącymi Europejskiej Tożsamości Cyfrowej (EUDI), wykorzystując technologię Citadel jako podstawę. Ta strategia umieszcza Dusk sprzyjająco w środowisku regulacyjnym, oferując ścieżkę korzystniejszą niż inne firmy kryptowalutowe. #Dusk używa prywatności, rozwiązania tożsamości cyfrowej, licencji pośredniczącej oraz 2 niestandardowych modeli transakcji w celu zapewnienia zgodności. $DUSK {spot}(DUSKUSDT)
@Dusk zapewnił tożsamość cyfrową i zgodność. Dusk rozumie znaczenie tożsamości cyfrowej i zgodności w ramach ram regulacyjnych UE. Aktywnie pracują nad swoimi ambicjami dotyczącymi Europejskiej Tożsamości Cyfrowej (EUDI), wykorzystując technologię Citadel jako podstawę. Ta strategia umieszcza Dusk sprzyjająco w środowisku regulacyjnym, oferując ścieżkę korzystniejszą niż inne firmy kryptowalutowe. #Dusk używa prywatności, rozwiązania tożsamości cyfrowej, licencji pośredniczącej oraz 2 niestandardowych modeli transakcji w celu zapewnienia zgodności.
$DUSK
Zobacz oryginał
Wewnętrzne zasady działania protokołu @Dusk_Foundation ; Użytkownicy wybierają klucz użytkownika, który jest używany do szyfrowania ładunku transakcji. Klucz użytkownika jest następnie szyfrowany za pomocą klucza audytora, co zapewnia, że tylko auditor może go odszyfrować. Przy użyciu dowodów zerowej wiedzy użytkownicy mogą wykazać, że klucz audytora został użyty do szyfrowania klucza użytkownika oraz że ładunek transakcji spełnia wszystkie zasady. Ten innowacyjny podejście łączy prywatność, tożsamość cyfrową i szyfrowanie w celu zapewnienia zgodności. #Dusk $DUSK {spot}(DUSKUSDT)
Wewnętrzne zasady działania protokołu @Dusk ;
Użytkownicy wybierają klucz użytkownika, który jest używany do szyfrowania ładunku transakcji. Klucz użytkownika jest następnie szyfrowany za pomocą klucza audytora, co zapewnia, że tylko auditor może go odszyfrować. Przy użyciu dowodów zerowej wiedzy użytkownicy mogą wykazać, że klucz audytora został użyty do szyfrowania klucza użytkownika oraz że ładunek transakcji spełnia wszystkie zasady. Ten innowacyjny podejście łączy prywatność, tożsamość cyfrową i szyfrowanie w celu zapewnienia zgodności.
#Dusk $DUSK
Tłumacz
Walrus Overview@WalrusProtocol is a decentralized storage protocol based on erasure-coding. Anyone can interact with Walrus to store arbitrary data and prove that the data is stored. Like IPFS, Walrus itself is not a blockchain. However, Walrus leverages the Sui network for help with storage node lifecycle management, blob lifecycle management, and the introduction of incentive systems. Sui has achieved exceptionally high scalability compared to other blockchains with its own consensus and smart contracts. However, if Sui were to handle blobs in addition to transaction data, it would be inefficient as all nodes would replicate large volumes of blobs, greatly increasing the replication factor. Therefore, Walrus uses erasure-coding to divide blobs into smaller units called slivers and allocate them to nodes, allowing large volumes of data to be stored in a decentralized protocol with a replication factor of just 4-5. In particular, unlike existing decentralized storage protocols, #Walrus has the advantage of significantly reducing data recovery costs by using an encoding method called Red Stuff. So, what is Red Stuff 1) Encoding: Red Stuff encodes the blob in two dimensions. This is for efficient sliver recovery. In the primary dimension, encoding is similar to RS-encoding, dividing B into f+1 primary slivers. Red Stuff goes a step further, dividing each of the f+1 primary slivers into 2f+1 secondary slivers in the secondary dimension. As a result, B becomes a matrix of (f+1) * (2f+1). Note that the example in the above figure assumes f=1. Based on this two-dimensional matrix, additional repair symbols are generated for both dimensions. Note that a symbol is a smaller unit of data than a sliver. First, the symbols of 2f+1 columns are expanded from f+1 to 3f+1, and then the symbols of f+1 rows are expanded from 2f+1 to 3f+1. The commitment to B can be easily calculated. W calculates commitments for each rows and columns including the additional repair symbols, then combines all these sliver commitments to create the blob commitment. 2) Write: The process of storing data in the Walrus protocol is similar to protocols using existing RS encoding. W encodes the original data with Red Stuff to generate sliver pairs to send to each node. A sliver pair here refers to a pair of primary and secondary slivers, with a total of 3f+1 sliver pairs generated. W then propagates 3f+1 sliver pairs and sliver commitments to 3f+1 nodes each. Upon receiving these, nodes verify the slivers through the commitments and send signatures back to W. When W receives 2f+1 signatures, it generates an availability certificate and publishes it on-chain (Sui network). This is because even if f Byzantine nodes sign, there are signatures from f+1 honest nodes, making it possible to recover the original data. 3) Read: The process of reading data from Walrus is also identical to protocols using existing RS encoding, and only primary slivers need to be used. When R receives f+1 or more valid primary slivers from storage nodes, it can recover B and read the data. 4) Recovery; The biggest advantage of Red Stuff compared to RS encoding is evident in the data recovery process. Assuming the network is in an asynchronous environment and nodes can freely enter and leave, there may be nodes that don't receive slivers from W. Therefore, these nodes need to communicate with other nodes to recover slivers. Let's examine how a node that didn't receive slivers recovers data through the above figure (f=1). a: Assume a situation where Node 1 fully possesses the first sliver pair, Node 3 has the third sliver pair, and Node 4 needs to recover the fourth sliver pair. b: Nodes 1 and 3 send symbols that overlap with the fourth sliver pair (S14, S34, S41, S43) to Node 4. c: Since Node 4 now has f+1 or more symbols for the fourth secondary sliver, it can recover the fourth secondary sliver. Extending this logic means that all 2f+1 honest nodes can recover their secondary slivers. d: The fact that 2f+1 nodes all have secondary slivers means there are 2f+1 symbols in each row, which allows for the recovery of all primary slivers using these 2f+1 symbols. In conclusion, if f+1 or more nodes in the network have slivers, the remaining nodes can communicate with them to recover all slivers. The size of a symbol is O(B/n^2), and each node needs to download O(n) symbols, so the recovery cost per node is O(B/n). Extending this to the entire network, the cost for all nodes to recover slivers corresponds to O(B). Considering that the cost of recovering data is O(n^2B) in the full replication method and O(nB) in the encode and share method, the Red Stuff method can process this very efficiently at a cost of O(B). In other words, the data recovery cost is constant regardless of the number of nodes (n) participating in the network. • Walrus Storage Flow: Red Stuff is one method of encoding data. Now, let's look at the big picture of how data storage occurs in Walrus, including interactions with Red Stuff and the Sui network. A user wanting to store data in Walrus acquires storage resources. Storage resources can be purchased directly from the Walrus system object smart contract on the Sui network or from a secondary market. Storage resources can be understood as permissions to store data in Walrus, specifying the start epoch, end epoch, and how much capacity can be stored. The user applies Red Stuff encoding to the blob they want to store and computes the blob ID. Subsequent steps can be performed directly or by publishers existing in the network. To register the blob ID with the storage resource, the user updates the storage resource on the Sui network to trigger an event. The user propagates the blob metadata to all storage nodes and distributes each sliver to the respective nodes. Storage nodes receive the slivers and verify whether the metadata matches the blob ID and the slivers match the metadata, and if the user transmitting the sliver has appropriate storage resources. If deemed valid, storage nodes send signatures for the respective slivers to the user. When the user receives 2f+1 or more signatures, they generate an availability certificate and transmit it to the Sui network. From this point, the PoA (point of availability) status is updated on the Sui network, indicating that the blob is available to everyone. If there are storage nodes that haven't received slivers for that blob even after confirming the PoA, they can sync with other storage nodes to recover the slivers. Note that the Walrus protocol has an epoch concept for a certain period, and the set of participating storage nodes changes with each epoch. The amount of data allocated to storage nodes varies according to the delegated WAL tokens each epoch. Also, because participating nodes can change each epoch, there's an inevitable process of transferring slivers every time the epoch changes. Note that in the default case, slivers are transferred from the previous node to the new node directly instead of going through the recovery process. However, if there's too much data and the sliver transfer time becomes longer than the epoch, the epoch may not end. To prevent this, Walrus separates the data storage (write) and retrieval (read) processes into different epochs just before the end of an epoch. In other words, when the epoch changes and the node reconfiguration process begins, the data storage process proceeds in the next epoch from this point, while the data reading process still continues in the current epoch. When 2f+1 or more nodes in the new committee of the next epoch indicate that sliver recovery is fully prepared, the read operations also smoothly transition to the next epoch. $WAL {spot}(WALUSDT)

Walrus Overview

@Walrus 🦭/acc is a decentralized storage protocol based on erasure-coding. Anyone can interact with Walrus to store arbitrary data and prove that the data is stored. Like IPFS, Walrus itself is not a blockchain. However, Walrus leverages the Sui network for help with storage node lifecycle management, blob lifecycle management, and the introduction of incentive systems. Sui has achieved exceptionally high scalability compared to other blockchains with its own consensus and smart contracts. However, if Sui were to handle blobs in addition to transaction data, it would be inefficient as all nodes would replicate large volumes of blobs, greatly increasing the replication factor. Therefore, Walrus uses erasure-coding to divide blobs into smaller units called slivers and allocate them to nodes, allowing large volumes of data to be stored in a decentralized protocol with a replication factor of just 4-5. In particular, unlike existing decentralized storage protocols, #Walrus has the advantage of significantly reducing data recovery costs by using an encoding method called Red Stuff. So, what is Red Stuff
1) Encoding:

Red Stuff encodes the blob in two dimensions. This is for efficient sliver recovery. In the primary dimension, encoding is similar to RS-encoding, dividing B into f+1 primary slivers. Red Stuff goes a step further, dividing each of the f+1 primary slivers into 2f+1 secondary slivers in the secondary dimension. As a result, B becomes a matrix of (f+1) * (2f+1). Note that the example in the above figure assumes f=1. Based on this two-dimensional matrix, additional repair symbols are generated for both dimensions. Note that a symbol is a smaller unit of data than a sliver. First, the symbols of 2f+1 columns are expanded from f+1 to 3f+1, and then the symbols of f+1 rows are expanded from 2f+1 to 3f+1. The commitment to B can be easily calculated. W calculates commitments for each rows and columns including the additional repair symbols, then combines all these sliver commitments to create the blob commitment.
2) Write:
The process of storing data in the Walrus protocol is similar to protocols using existing RS encoding. W encodes the original data with Red Stuff to generate sliver pairs to send to each node. A sliver pair here refers to a pair of primary and secondary slivers, with a total of 3f+1 sliver pairs generated.
W then propagates 3f+1 sliver pairs and sliver commitments to 3f+1 nodes each. Upon receiving these, nodes verify the slivers through the commitments and send signatures back to W. When W receives 2f+1 signatures, it generates an availability certificate and publishes it on-chain (Sui network). This is because even if f Byzantine nodes sign, there are signatures from f+1 honest nodes, making it possible to recover the original data.
3) Read:
The process of reading data from Walrus is also identical to protocols using existing RS encoding, and only primary slivers need to be used. When R receives f+1 or more valid primary slivers from storage nodes, it can recover B and read the data.
4) Recovery;
The biggest advantage of Red Stuff compared to RS encoding is evident in the data recovery process. Assuming the network is in an asynchronous environment and nodes can freely enter and leave, there may be nodes that don't receive slivers from W. Therefore, these nodes need to communicate with other nodes to recover slivers.
Let's examine how a node that didn't receive slivers recovers data through the above figure (f=1).
a: Assume a situation where Node 1 fully possesses the first sliver pair, Node 3 has the third sliver pair, and Node 4 needs to recover the fourth sliver pair.
b: Nodes 1 and 3 send symbols that overlap with the fourth sliver pair (S14, S34, S41, S43) to Node 4.
c: Since Node 4 now has f+1 or more symbols for the fourth secondary sliver, it can recover the fourth secondary sliver. Extending this logic means that all 2f+1 honest nodes can recover their secondary slivers.
d: The fact that 2f+1 nodes all have secondary slivers means there are 2f+1 symbols in each row, which allows for the recovery of all primary slivers using these 2f+1 symbols. In conclusion, if f+1 or more nodes in the network have slivers, the remaining nodes can communicate with them to recover all slivers.
The size of a symbol is O(B/n^2), and each node needs to download O(n) symbols, so the recovery cost per node is O(B/n). Extending this to the entire network, the cost for all nodes to recover slivers corresponds to O(B). Considering that the cost of recovering data is O(n^2B) in the full replication method and O(nB) in the encode and share method, the Red Stuff method can process this very efficiently at a cost of O(B). In other words, the data recovery cost is constant regardless of the number of nodes (n) participating in the network.
• Walrus Storage Flow:
Red Stuff is one method of encoding data. Now, let's look at the big picture of how data storage occurs in Walrus, including interactions with Red Stuff and the Sui network.

A user wanting to store data in Walrus acquires storage resources. Storage resources can be purchased directly from the Walrus system object smart contract on the Sui network or from a secondary market. Storage resources can be understood as permissions to store data in Walrus, specifying the start epoch, end epoch, and how much capacity can be stored. The user applies Red Stuff encoding to the blob they want to store and computes the blob ID. Subsequent steps can be performed directly or by publishers existing in the network. To register the blob ID with the storage resource, the user updates the storage resource on the Sui network to trigger an event. The user propagates the blob metadata to all storage nodes and distributes each sliver to the respective nodes. Storage nodes receive the slivers and verify whether the metadata matches the blob ID and the slivers match the metadata, and if the user transmitting the sliver has appropriate storage resources. If deemed valid, storage nodes send signatures for the respective slivers to the user. When the user receives 2f+1 or more signatures, they generate an availability certificate and transmit it to the Sui network. From this point, the PoA (point of availability) status is updated on the Sui network, indicating that the blob is available to everyone. If there are storage nodes that haven't received slivers for that blob even after confirming the PoA, they can sync with other storage nodes to recover the slivers. Note that the Walrus protocol has an epoch concept for a certain period, and the set of participating storage nodes changes with each epoch. The amount of data allocated to storage nodes varies according to the delegated WAL tokens each epoch. Also, because participating nodes can change each epoch, there's an inevitable process of transferring slivers every time the epoch changes. Note that in the default case, slivers are transferred from the previous node to the new node directly instead of going through the recovery process. However, if there's too much data and the sliver transfer time becomes longer than the epoch, the epoch may not end. To prevent this, Walrus separates the data storage (write) and retrieval (read) processes into different epochs just before the end of an epoch. In other words, when the epoch changes and the node reconfiguration process begins, the data storage process proceeds in the next epoch from this point, while the data reading process still continues in the current epoch. When 2f+1 or more nodes in the new committee of the next epoch indicate that sliver recovery is fully prepared, the read operations also smoothly transition to the next epoch.
$WAL
Tłumacz
World Wide Walrus: The Next Gen Data Storage Protocol• Decentralized Ledger: A blockchain is a distributed ledger maintained by multiple servers. These servers share and manage the same transaction history through consensus algorithms. The fact that everyone possesses the same ledger gives rise to blockchain's various advantages, making the distributed ledger the core of blockchain technology. However, managing a distributed ledger is far more challenging compared to a centralized server. Although the size of distributed ledgers may increase rapidly, it doesn't pose a significant problem in the early stages of a network. However, if this situation persists, when the distributed ledger size becomes extremely large in the future, the entry barrier for new nodes joining the network will become very high, potentially leading to increased transaction fees for future users. Thus, the incentive systems of most existing blockchains focus solely on computation rather than storage. • Sui’s Unique Onchain Data Storage: Sui has strived to solve storage issues through incentives from its inception. Sui aims to achieve sustainable data storage through an economic mechanism called the Storage Fund, which operates as follows: The fees users submit to Sui validators are divided into 1) gas fees related to computation and 2) storage costs for data retention. Sui collects storage costs upfront from users for permanent data storage and pools this into the Storage Fund. The Storage Fund continuously redistributes the accumulated amount to validators while the data remains stored on-chain. Moreover, users can receive a refund of the corresponding storage costs if they delete their data. Sui's unique on-chain data storage system produces two effects: ✓ Since users can receive a storage cost rebate when deleting on-chain data, it can incentivize reducing the distributed ledger's capacity through economic incentives. ✓ The unique incentive structure of collecting storage fees upfront and allocating them as incentives for future validators can address sustainability issues related to storage. • What About... Blob? While Sui's Storage Fund is a powerful tool, it's not an efficient method for all types of data. This is because on-chain data includes both small-volume essential data for state calculations, such as transaction data, and enormous data like blobs that include media files. Walrus is a new storage protocol to deal with blob. • Full replication; IPFS, Arweave: The most intuitive and simple method to store blobs in a distributed environment is for nodes to replicate and store the entire B uploaded by W. For example, if you upload an image file, instead of nodes splitting and dividing the image file, they replicate and store the image file as is. For examples, IPFS and Arweave. Of course, this doesn't mean that storage nodes participating in IPFS and Arweave download all files stored across the entire network; rather, they store some of the files in their complete form. W propagates B and the corresponding commitment (binding commitment, e.g., hash) to the nodes and waits until receiving f+1 signatures. (Assumption: n = 3f+1; At least f+1 signatures are required to ensure that at least one honest node, excluding f Byzantine nodes, has stored B.) Once f+1 signatures arrive, W can generate an availability certificate, guaranteeing that anyone can fully access the file on that network. However, full replication has many drawbacks, primarily inefficiency: ✓ Write: When W propagates files to nodes to store data on the network, it has a complexity of O(nB). ✓ Read: In an asynchronous environment, reading data incurs a cost of O(nB) because requests must be sent to f+1 nodes. ✓ Recovery: To recover data in an asynchronous environment, a storage node must send requests to f+1 other nodes, costing O(nB) for each storage node. When applied to the entire network, this results in a cost of O(n^2 B). Note that this is the worst cast cost. • Encode and Share: Storj, Sia As I mentioned above, the full replication method had advantages of being simple, intuitive, and easy to access complete files, but its drawback was the high storage cost for the entire network. To address this, decentralized storage networks using Reed Solomon (RS) encoding emerged. Notable examples are Storj and Sia. RS encoding is a prominent method for implementing erasure coding, widely used in real life for CDs, DVDs, QR codes, etc. Erasure coding divides original data into multiple pieces and generates additional recovery data from these pieces. Even if some data is lost, the original data can be restored to a certain extent using the recovery data. Let's look at an example of the Encode and Share method. W divides B into f+1 data chunks and additionally encodes 2f extra repair chunks. Thanks to RS encoding's characteristics, the original B can be recovered with just f+1 chunks out of a total of 3f+1 chunks. Here, each chunk's size is O(B/n). W uses binding commitments like Merkle trees to commit to all chunks and sends each node a chunk along with a proof of inclusion showing that the chunk is included in the Merkle tree. Storage nodes receiving chunks verify their validity using the commitment and send a signature back to W. W generates an availability certificate when it receives at least 2f+1 signatures from nodes (as B can be recovered via f+1 even if f out of 2f+1 are Byzantine nodes). The Encode and Share method is more efficient in data writing and reading processes compared to Full replication, but still has the drawback of inefficient data recovery. Write: It costs a total of O(B) as W propagates chunks of size O(B/n) to the network for data storage. Read: R has a complexity of O(B/n) * O(n) = O(B) as it must request chunks from nodes and receive f+1 valid responses. Recovery: In an asynchronous environment, to recover data, each storage node incurs a cost of O(B) as it needs to receive chunks from 2f+1 nodes. Applied to the entire network, this results in a total cost of O(nB), which is still inefficient. Increasing the efficiency of the data recovery process is crucial because, being a decentralized protocol, nodes can freely join and leave the network. In cases where the node set changes with each epoch, new nodes need to receive and recover chunks from previous nodes. Recognizing this issue, Walrus utilizes a new encoding method. • Red Stuff: Walrus Walrus can achieve a recovery cost of O(B/n) for each node and a total recovery cost of O(B) for the entire network through Red Stuff encoding. Hence, Walrus is the next gen storage protocol. @WalrusProtocol #Walrus $WAL {spot}(WALUSDT)

World Wide Walrus: The Next Gen Data Storage Protocol

• Decentralized Ledger:
A blockchain is a distributed ledger maintained by multiple servers. These servers share and manage the same transaction history through consensus algorithms. The fact that everyone possesses the same ledger gives rise to blockchain's various advantages, making the distributed ledger the core of blockchain technology. However, managing a distributed ledger is far more challenging compared to a centralized server. Although the size of distributed ledgers may increase rapidly, it doesn't pose a significant problem in the early stages of a network. However, if this situation persists, when the distributed ledger size becomes extremely large in the future, the entry barrier for new nodes joining the network will become very high, potentially leading to increased transaction fees for future users. Thus, the incentive systems of most existing blockchains focus solely on computation rather than storage.
• Sui’s Unique Onchain Data Storage:

Sui has strived to solve storage issues through incentives from its inception. Sui aims to achieve sustainable data storage through an economic mechanism called the Storage Fund, which operates as follows: The fees users submit to Sui validators are divided into
1) gas fees related to computation and
2) storage costs for data retention.
Sui collects storage costs upfront from users for permanent data storage and pools this into the Storage Fund. The Storage Fund continuously redistributes the accumulated amount to validators while the data remains stored on-chain. Moreover, users can receive a refund of the corresponding storage costs if they delete their data.
Sui's unique on-chain data storage system produces two effects:
✓ Since users can receive a storage cost rebate when deleting on-chain data, it can incentivize reducing the distributed ledger's capacity through economic incentives.
✓ The unique incentive structure of collecting storage fees upfront and allocating them as incentives for future validators can address sustainability issues related to storage.
• What About... Blob?
While Sui's Storage Fund is a powerful tool, it's not an efficient method for all types of data. This is because on-chain data includes both small-volume essential data for state calculations, such as transaction data, and enormous data like blobs that include media files. Walrus is a new storage protocol to deal with blob.
• Full replication; IPFS, Arweave:

The most intuitive and simple method to store blobs in a distributed environment is for nodes to replicate and store the entire B uploaded by W. For example, if you upload an image file, instead of nodes splitting and dividing the image file, they replicate and store the image file as is. For examples, IPFS and Arweave. Of course, this doesn't mean that storage nodes participating in IPFS and Arweave download all files stored across the entire network; rather, they store some of the files in their complete form.
W propagates B and the corresponding commitment (binding commitment, e.g., hash) to the nodes and waits until receiving f+1 signatures.
(Assumption: n = 3f+1; At least f+1 signatures are required to ensure that at least one honest node, excluding f Byzantine nodes, has stored B.)
Once f+1 signatures arrive, W can generate an availability certificate, guaranteeing that anyone can fully access the file on that network. However, full replication has many drawbacks, primarily inefficiency:
✓ Write: When W propagates files to nodes to store data on the network, it has a complexity of O(nB).
✓ Read: In an asynchronous environment, reading data incurs a cost of O(nB) because requests must be sent to f+1 nodes.
✓ Recovery: To recover data in an asynchronous environment, a storage node must send requests to f+1 other nodes, costing O(nB) for each storage node. When applied to the entire network, this results in a cost of O(n^2 B). Note that this is the worst cast cost.
• Encode and Share: Storj, Sia

As I mentioned above, the full replication method had advantages of being simple, intuitive, and easy to access complete files, but its drawback was the high storage cost for the entire network. To address this, decentralized storage networks using Reed Solomon (RS) encoding emerged. Notable examples are Storj and Sia. RS encoding is a prominent method for implementing erasure coding, widely used in real life for CDs, DVDs, QR codes, etc. Erasure coding divides original data into multiple pieces and generates additional recovery data from these pieces. Even if some data is lost, the original data can be restored to a certain extent using the recovery data. Let's look at an example of the Encode and Share method. W divides B into f+1 data chunks and additionally encodes 2f extra repair chunks. Thanks to RS encoding's characteristics, the original B can be recovered with just f+1 chunks out of a total of 3f+1 chunks. Here, each chunk's size is O(B/n). W uses binding commitments like Merkle trees to commit to all chunks and sends each node a chunk along with a proof of inclusion showing that the chunk is included in the Merkle tree. Storage nodes receiving chunks verify their validity using the commitment and send a signature back to W. W generates an availability certificate when it receives at least 2f+1 signatures from nodes (as B can be recovered via f+1 even if f out of 2f+1 are Byzantine nodes). The Encode and Share method is more efficient in data writing and reading processes compared to Full replication, but still has the drawback of inefficient data recovery.
Write: It costs a total of O(B) as W propagates chunks of size O(B/n) to the network for data storage.
Read: R has a complexity of O(B/n) * O(n) = O(B) as it must request chunks from nodes and receive f+1 valid responses.
Recovery: In an asynchronous environment, to recover data, each storage node incurs a cost of O(B) as it needs to receive chunks from 2f+1 nodes. Applied to the entire network, this results in a total cost of O(nB), which is still inefficient.
Increasing the efficiency of the data recovery process is crucial because, being a decentralized protocol, nodes can freely join and leave the network. In cases where the node set changes with each epoch, new nodes need to receive and recover chunks from previous nodes. Recognizing this issue, Walrus utilizes a new encoding method.
• Red Stuff: Walrus
Walrus can achieve a recovery cost of O(B/n) for each node and a total recovery cost of O(B) for the entire network through Red Stuff encoding.
Hence, Walrus is the next gen storage protocol.
@Walrus 🦭/acc #Walrus $WAL
Tłumacz
@WalrusProtocol provides; • Secure Storage for Media Assets: Walrus can store large binary files, including images, videos, or audio recordings across distributed systems, ensuring reduced downtime and mitigating data breaches. • AI Model Hosting: Developers can host AI models on Walrus, benefitting from robust fault tolerance and efficient retrieval. This decentralized environment also helps safeguard sensitive intellectual property within machine learning. • Backup Solutions: Individuals and enterprises can use Walrus for backup and archiving. When system failures occur, the erasure-coded distribution ensures data recovery without reliance on any single server. • Encrypted Document Sharing: Professionals handling legal, financial, or medical records can utilize #Walrus to share sensitive documents. WAL’s decentralized storage nodes reduce tampering risks and maintain confidentiality. $WAL {spot}(WALUSDT)
@Walrus 🦭/acc provides;
• Secure Storage for Media Assets:
Walrus can store large binary files, including images, videos, or audio recordings across distributed systems, ensuring reduced downtime and mitigating data breaches.
• AI Model Hosting:
Developers can host AI models on Walrus, benefitting from robust fault tolerance and efficient retrieval. This decentralized environment also helps safeguard sensitive intellectual property within machine learning.
• Backup Solutions:
Individuals and enterprises can use Walrus for backup and archiving. When system failures occur, the erasure-coded distribution ensures data recovery without reliance on any single server.
• Encrypted Document Sharing:
Professionals handling legal, financial, or medical records can utilize #Walrus to share sensitive documents. WAL’s decentralized storage nodes reduce tampering risks and maintain confidentiality.
$WAL
Tłumacz
Key Use Cases for @WalrusProtocol ; Walrus architecture and functionality cater to a wide variety of use cases, and adoption has been growing since it launched mainnet. Some prominent areas include: • Rich Media Storage: Most effectively handling large files like high-resolution images, videos, and audio files required by NFT projects and dApps. • Decentralized Websites: Allowing hosting of entire web applications directly from decentralized storage. • AI and Big Data: Offering a scalable and potentially cost-effective platform for the vast amounts of data used in artificial intelligence, machine learning, and large scientific computing. • Data Availability Layer: Serving as a fundamental primitive for Layer 2 scaling solutions by providing transaction data availability and verifiability outside of the main execution chain. • Blockchain Archival: Storing historical transactional data from various blockchains in a secure and accessible manner for the long term. • Novel Content Models: Enabling new possibilities like encrypted content distribution with subscription models, where creators control access using on-chain mechanisms. #Walrus $WAL {spot}(WALUSDT)
Key Use Cases for @Walrus 🦭/acc ;
Walrus architecture and functionality cater to a wide variety of use cases, and adoption has been growing since it launched mainnet. Some prominent areas include:
• Rich Media Storage: Most effectively handling large files like high-resolution images, videos, and audio files required by NFT projects and dApps.
• Decentralized Websites: Allowing hosting of entire web applications directly from decentralized storage.
• AI and Big Data: Offering a scalable and potentially cost-effective platform for the vast amounts of data used in artificial intelligence, machine learning, and large scientific computing.
• Data Availability Layer: Serving as a fundamental primitive for Layer 2 scaling solutions by providing transaction data availability and verifiability outside of the main execution chain.
• Blockchain Archival: Storing historical transactional data from various blockchains in a secure and accessible manner for the long term.
• Novel Content Models: Enabling new possibilities like encrypted content distribution with subscription models, where creators control access using on-chain mechanisms.
#Walrus $WAL
Tłumacz
What truly sets @WalrusProtocol apart is its storage programmability. Unlike traditional storage where data is passively stored, #Walrus turns stored data into active on-chain objects, allowing developers to use smart contracts to build logic around the data itself directly, making it possible to build much more dynamic and complex decentralized applications than previously possible. This new capability is made possible by a fault-tolerant and high-level architecture. $WAL {spot}(WALUSDT)
What truly sets @Walrus 🦭/acc apart is its storage programmability. Unlike traditional storage where data is passively stored, #Walrus turns stored data into active on-chain objects, allowing developers to use smart contracts to build logic around the data itself directly, making it possible to build much more dynamic and complex decentralized applications than previously possible.
This new capability is made possible by a fault-tolerant and high-level architecture.
$WAL
Tłumacz
@WalrusProtocol has promised to provide programmable data. Walrus allows interaction with the stored data via smart contracts for more dynamic dApp development. • Walrus is efficient and resilient. It utilizes advanced encoding techniques that reduce storage cost and robust data availability. • Walrus is developed by the Sui team, bringing technical credibility and high Sui ecosystem compatibility. • Walrus is available for real-world deployment. • Walrus provides versatile Web3 Storage. It is designed for diverse data types (NFTs, AI, websites) with a long-term goal of cross-chain compatibility. #Walrus $WAL {spot}(WALUSDT)
@Walrus 🦭/acc has promised to provide programmable data. Walrus allows interaction with the stored data via smart contracts for more dynamic dApp development.
• Walrus is efficient and resilient. It utilizes advanced encoding techniques that reduce storage cost and robust data availability.
• Walrus is developed by the Sui team, bringing technical credibility and high Sui ecosystem compatibility.
• Walrus is available for real-world deployment.
• Walrus provides versatile Web3 Storage. It is designed for diverse data types (NFTs, AI, websites) with a long-term goal of cross-chain compatibility.
#Walrus $WAL
Tłumacz
Seal Brings Data Access Control To WalrusSeal + Walrus, are now offering encryption and access control for anyone building on the protocol. As the data layer for Web3, @WalrusProtocol already provides decentralized infrastructure for data storage, availability, and programmability. With the launch of Seal, Walrus now delivers a solution for integrating programmable data access into any app at any scale. This vital technology invites developers to harness public data while simultaneously safeguarding sensitive information. Walrus isn't just a tool, but a transformative force for decentralized applications, heralding an exciting chapter in data-driven enterprises. Web3’s transparency means data is public by default. For many, that is a benefit, while others require privacy or access controls. Walrus with Seal enables builders to create products that not only require verifiable data, but also data privacy, fine-grained access, and secured sharing. A whole world of Web3 apps becomes possible when these technologies work together. • Making privacy part of public infrastructure: Transparency is the core principle and basic ethics of Web3, but the idea that your data is visible to everyone can present challenges for builders and users alike. For those who need to manage potentially sensitive data, it’s a nonstarter. Anyone who wants to keep data confidential either has to use a centralized service or build a custom setup; not only time-consuming and expensive, but also a barrier to entry for newcomers exploring onchain data management solutions. With Seal, #Walrus is the first decentralized data platform to natively offer onchain access control. Developers can now protect sensitive data, define who can access it, and enforce those rules entirely onchain. • Unlocking transformative use cases: With the addition of programmable data access control, Walrus now enables entirely new categories of applications that were previously impossible in decentralized environments. For example: ✓ AI Dataset Marketplaces: Organizations can now share proprietary training data or fine-tuned models while enforcing strict access policies. Data providers can monetize their assets without losing control, creating new revenue streams in the AI economy. ✓ Token-Gated Subscription Services: Premium content such as exclusive podcast episodes, videos, or educational materials can be encrypted and made accessible only to verified subscribers, enabling sustainable creator economies on Web3. ✓ Dynamic Gaming Content: Game developers can reveal encrypted in-game content, story elements, or assets only when players achieve specific milestones, creating more engaging and interactive gaming experiences. • Partners are driving real-world adoption: Dozens of Walrus-powered projects are already using Seal, demonstrating the immediate practical value of onchain encryption and access control. Examples include: ✓ Tokenizing AI Infrastructure: Inflectiv is building a data platform for AI that uses Walrus with Seal to gate and tokenize datasets. This allows contributors to protect and monetize their data while providing developers and enterprises with secure, trusted assets for AI and agent-driven applications ✓ Trustless Gaming Mechanics: Vendetta is a fully onchain multiplayer strategy game that leverages Walrus with Seal to secure in-game data and mechanics. Players gain true ownership of their progress and assets while competing in skill-based, tamper-proof battles within a transparent and secure game economy. ✓ Securing AI Agent Infrastructure: TensorBlock is building a decentralized AI platform that uses Walrus with Seal to secure models, memory, and datasets. This lets contributors protect and monetize their data, making AI accessible and democratic for all. • A full stack for decentralized data: Sui and Walrus, now with Seal, aim to accelerate the transition from Web2 to Web3, creating a comprehensive infrastructure stack for the decentralized internet. Sui provides the high-performance blockchain foundation. Walrus with Seal delivers scalable data management, availability, and access control essential for enterprise adoption. This integrated approach addresses the full spectrum of requirements for building sophisticated Web3 applications that can compete with Web2 counterparts. The momentum for building full stack apps continues to grow. ✓ OneFootball plans to use Walrus with Seal to deliver content with built-in rights management, ensuring it reaches the right audiences while protecting intellectual property. ✓ Watrfall, the Ron Perlman-led fan-funded studio, is using Walrus with Seal to unlock new models for distribution, ownership, and fan engagement. ✓ Alkimi is already processing over 25 million ad impressions per day using Walrus, with Seal keeping confidential client data secure while maintaining the transparency benefits of blockchain technology. The future of Web3 apps relies upon data that's intelligently controlled, privately managed, and enterprise-ready. That’s why it will be built with Walrus and Sui. $WAL {spot}(WALUSDT)

Seal Brings Data Access Control To Walrus

Seal + Walrus, are now offering encryption and access control for anyone building on the protocol.
As the data layer for Web3, @Walrus 🦭/acc already provides decentralized infrastructure for data storage, availability, and programmability. With the launch of Seal, Walrus now delivers a solution for integrating programmable data access into any app at any scale.
This vital technology invites developers to harness public data while simultaneously safeguarding sensitive information. Walrus isn't just a tool, but a transformative force for decentralized applications, heralding an exciting chapter in data-driven enterprises.
Web3’s transparency means data is public by default. For many, that is a benefit, while others require privacy or access controls. Walrus with Seal enables builders to create products that not only require verifiable data, but also data privacy, fine-grained access, and secured sharing. A whole world of Web3 apps becomes possible when these technologies work together.
• Making privacy part of public infrastructure:
Transparency is the core principle and basic ethics of Web3, but the idea that your data is visible to everyone can present challenges for builders and users alike. For those who need to manage potentially sensitive data, it’s a nonstarter. Anyone who wants to keep data confidential either has to use a centralized service or build a custom setup; not only time-consuming and expensive, but also a barrier to entry for newcomers exploring onchain data management solutions.
With Seal, #Walrus is the first decentralized data platform to natively offer onchain access control. Developers can now protect sensitive data, define who can access it, and enforce those rules entirely onchain.

• Unlocking transformative use cases:
With the addition of programmable data access control, Walrus now enables entirely new categories of applications that were previously impossible in decentralized environments. For example:
✓ AI Dataset Marketplaces: Organizations can now share proprietary training data or fine-tuned models while enforcing strict access policies. Data providers can monetize their assets without losing control, creating new revenue streams in the AI economy.
✓ Token-Gated Subscription Services: Premium content such as exclusive podcast episodes, videos, or educational materials can be encrypted and made accessible only to verified subscribers, enabling sustainable creator economies on Web3.
✓ Dynamic Gaming Content: Game developers can reveal encrypted in-game content, story elements, or assets only when players achieve specific milestones, creating more engaging and interactive gaming experiences.
• Partners are driving real-world adoption:
Dozens of Walrus-powered projects are already using Seal, demonstrating the immediate practical value of onchain encryption and access control. Examples include:
✓ Tokenizing AI Infrastructure:
Inflectiv is building a data platform for AI that uses Walrus with Seal to gate and tokenize datasets. This allows contributors to protect and monetize their data while providing developers and enterprises with secure, trusted assets for AI and agent-driven applications
✓ Trustless Gaming Mechanics:
Vendetta is a fully onchain multiplayer strategy game that leverages Walrus with Seal to secure in-game data and mechanics. Players gain true ownership of their progress and assets while competing in skill-based, tamper-proof battles within a transparent and secure game economy.
✓ Securing AI Agent Infrastructure:
TensorBlock is building a decentralized AI platform that uses Walrus with Seal to secure models, memory, and datasets. This lets contributors protect and monetize their data, making AI accessible and democratic for all.
• A full stack for decentralized data:
Sui and Walrus, now with Seal, aim to accelerate the transition from Web2 to Web3, creating a comprehensive infrastructure stack for the decentralized internet. Sui provides the high-performance blockchain foundation. Walrus with Seal delivers scalable data management, availability, and access control essential for enterprise adoption. This integrated approach addresses the full spectrum of requirements for building sophisticated Web3 applications that can compete with Web2 counterparts. The momentum for building full stack apps continues to grow.
✓ OneFootball plans to use Walrus with Seal to deliver content with built-in rights management, ensuring it reaches the right audiences while protecting intellectual property.
✓ Watrfall, the Ron Perlman-led fan-funded studio, is using Walrus with Seal to unlock new models for distribution, ownership, and fan engagement.
✓ Alkimi is already processing over 25 million ad impressions per day using Walrus, with Seal keeping confidential client data secure while maintaining the transparency benefits of blockchain technology.
The future of Web3 apps relies upon data that's intelligently controlled, privately managed, and enterprise-ready. That’s why it will be built with Walrus and Sui.

$WAL
Tłumacz
Never compromise on your privacy. Centralized networks aren't trustworthy. Most Web3 apps market themselves as they're decentralized but they quietly rely on centralized networks. That's a compromise. Walrus Protocol is fixing this by making the data availability as their top priority, not an afterthought. Large files stay verifiable and accessible even when nodes go offline. That's exactly how Web3 systems deliver the true resilience. @WalrusProtocol #Walrus $WAL {spot}(WALUSDT)
Never compromise on your privacy. Centralized networks aren't trustworthy. Most Web3 apps market themselves as they're decentralized but they quietly rely on centralized networks. That's a compromise.
Walrus Protocol is fixing this by making the data availability as their top priority, not an afterthought.
Large files stay verifiable and accessible even when nodes go offline.
That's exactly how Web3 systems deliver the true resilience.
@Walrus 🦭/acc #Walrus $WAL
Zobacz oryginał
Hedger: Poufne transakcje na DuskEVMW miarę rozwoju Dusk w kierunku architektury modułowej wprowadzany jest Hedger – nowy silnik prywatności stworzony specjalnie dla warstwy wykonywania EVM. Hedger przynosi poufne transakcje do DuskEVM, wykorzystując nowatorską kombinację szyfrowania homomorficznego i dowodów zerowej wiedzy, umożliwiając gotowość do spełniania wymogów regulacyjnych w zakresie prywatności dla rzeczywistych aplikacji finansowych. W przeciwieństwie do Zedgera, który został stworzony dla warstw opartych na modelu UTXO, Hedger został zaprojektowany z pełną zgodnością z EVM. Integruje się bezpośrednio z typowymi narzędziami Ethereum, co czyni go skalowalnym, audytowalnym i łatwym w wdrożeniu od pierwszego dnia.

Hedger: Poufne transakcje na DuskEVM

W miarę rozwoju Dusk w kierunku architektury modułowej wprowadzany jest Hedger – nowy silnik prywatności stworzony specjalnie dla warstwy wykonywania EVM.
Hedger przynosi poufne transakcje do DuskEVM, wykorzystując nowatorską kombinację szyfrowania homomorficznego i dowodów zerowej wiedzy, umożliwiając gotowość do spełniania wymogów regulacyjnych w zakresie prywatności dla rzeczywistych aplikacji finansowych. W przeciwieństwie do Zedgera, który został stworzony dla warstw opartych na modelu UTXO, Hedger został zaprojektowany z pełną zgodnością z EVM. Integruje się bezpośrednio z typowymi narzędziami Ethereum, co czyni go skalowalnym, audytowalnym i łatwym w wdrożeniu od pierwszego dnia.
Tłumacz
Mica Comes to Dusk: On-chain financeMiCA not only regulates, it legitimizes blockchain, bringing us into the fold, setting requirements and providing opportunities. The enforcement of MiCA makes an honest woman of blockchain. • What is MiCA? MiCA (Markets in Crypto-Assets Regulation) is the European Union’s framework for crypto-assets. It’s designed to standardize how non-securities DLT-based projects operate, including how they issue assets, provide services, manage custody, and interact with users. Doing so paves the way for the mainstream, institutional adoption of blockchain. Blockchain can be treated like any other technology; institutions understand how to use it, and the regulatory framework means we can operate above board, in the light. MiCA introduces clear EU-wide rules for crypto-asset issuers and service providers. It defines how services should be structured, what information must be disclosed, and when a crypto activity requires a license. It complements, but does not replace, existing financial or AML regulations. It doesn’t cover everything, for example, NFTs, algorithmic stablecoins, DEXs, DAOs, security tokens, mining, staking, CBDCs, and DeFi protocols without intermediaries are still in a grey area, but MiCA draws a clear line around activities that have regulatory consequences. • MiCA Misconceptions: You don’t “get a MiCA license.” You get authorized under MiCA through your local financial regulator, often as a CASP (Crypto-Asset Service Provider: for example centralize exchanges, brokers, and custodians). That authorization lets you operate across the EU. MiCA also doesn’t just apply to stablecoins or centralized exchanges. If your product involves token issuance (minus the above that do not apply, ie, algorithmic stablecoins), custody, advice, or execution, especially in a way that touches users in the EU, you’re subject to the rules. And while some see MiCA as limiting, for many it does the opposite. It provides a framework that institutions can work within, and that’s what opens the door to meaningful adoption. • What changes now? The introduction of MiCA gives legal weight to activities that were previously operating in a vacuum and in the dark. This means more structure and rules, but also more opportunity as institutional money and activities can start to be on-boarded in a meaningful way. Regulated entities can start exploring on-chain asset issuance, provided they are a stablecoin or utility token, without needing workarounds or wrappers. Institutional custody of digital assets has a framework to work with. Service providers have clarity on how to operate legally across the EU. Builders and innovators also have clarity on what the requirements are. While regulation can feel stifling, in this case it actually means innovators can operate in the EU, free from the fear of being found to be uncompliant and backwards punished for infractions before rules existed. • What Happens If You Are Non-Compliant? MiCA doesn’t ban blockchains or protocols, but it does regulate the activities built on top of them. If a project issues tokens (stablecoin or utility token), provides custody, offers trading infrastructure, or promotes investment opportunities to EU users, it falls within MiCA’s scope, regardless of whether the code is open source or the protocol claims to be decentralized. Being based in the EU, or even having core contributors in the EU, increases your exposure. Regulators can interpret “established in the Union” based on substance, not just incorporation, meaning location, operations, and active user engagement all matter. For protocols or teams that aren’t compliant, the consequences can include: ✓ Fines and enforcement actions ✓ Cease-and-desist orders ✓ Blacklisting from regulated counterparties ✓ Loss of access to banking and on/off-ramp services ✓ A negative effect on institutional partnerships Even projects that previously operated in legal grey zones will now find that the bar has been raised. MiCA gives regulators the tools to pursue unlicensed activity across all 27 EU member states, under one framework. For serious builders, especially in the real-world asset space, MiCA isn’t a burden, it’s a blessing. Without it, you’re limiting your access to institutional markets, excluding EU users, and risking enforcement down the line. • Why Dusk is positioned for this moment? The development on Dusk began long before MiCA, but with the prediction that regulation would come, and we have worked hard to ensure compliance with all EU regulations. Our prediction was that regulations and institutional interest would come, and to be ready for them when they did. Dusk is designed to handle compliance natively: ✓ Privacy is built in, but can be disclosed selectively where needed ✓ Their partnership with NPEX gives access to a licensed Multilateral Trading Facility (MTF) and broker license, opening up regulated primary and secondary markets ✓ And our tech stack supports real-world assets from issuance through to trading, without relying on off-chain enforcement ✓ Their partnership with Quantoz, and their digital euro, EURQ, an Electronic Money Token (EMT) suitable for use as legal tender This is infrastructure for regulated digital finance, not just another execution layer. @Dusk_Foundation #Dusk $DUSK {spot}(DUSKUSDT)

Mica Comes to Dusk: On-chain finance

MiCA not only regulates, it legitimizes blockchain, bringing us into the fold, setting requirements and providing opportunities. The enforcement of MiCA makes an honest woman of blockchain.
• What is MiCA?
MiCA (Markets in Crypto-Assets Regulation) is the European Union’s framework for crypto-assets. It’s designed to standardize how non-securities DLT-based projects operate, including how they issue assets, provide services, manage custody, and interact with users. Doing so paves the way for the mainstream, institutional adoption of blockchain. Blockchain can be treated like any other technology; institutions understand how to use it, and the regulatory framework means we can operate above board, in the light. MiCA introduces clear EU-wide rules for crypto-asset issuers and service providers. It defines how services should be structured, what information must be disclosed, and when a crypto activity requires a license. It complements, but does not replace, existing financial or AML regulations. It doesn’t cover everything, for example, NFTs, algorithmic stablecoins, DEXs, DAOs, security tokens, mining, staking, CBDCs, and DeFi protocols without intermediaries are still in a grey area, but MiCA draws a clear line around activities that have regulatory consequences.
• MiCA Misconceptions:
You don’t “get a MiCA license.” You get authorized under MiCA through your local financial regulator, often as a CASP (Crypto-Asset Service Provider: for example centralize exchanges, brokers, and custodians). That authorization lets you operate across the EU. MiCA also doesn’t just apply to stablecoins or centralized exchanges. If your product involves token issuance (minus the above that do not apply, ie, algorithmic stablecoins), custody, advice, or execution, especially in a way that touches users in the EU, you’re subject to the rules.
And while some see MiCA as limiting, for many it does the opposite. It provides a framework that institutions can work within, and that’s what opens the door to meaningful adoption.
• What changes now?
The introduction of MiCA gives legal weight to activities that were previously operating in a vacuum and in the dark. This means more structure and rules, but also more opportunity as institutional money and activities can start to be on-boarded in a meaningful way. Regulated entities can start exploring on-chain asset issuance, provided they are a stablecoin or utility token, without needing workarounds or wrappers. Institutional custody of digital assets has a framework to work with. Service providers have clarity on how to operate legally across the EU. Builders and innovators also have clarity on what the requirements are. While regulation can feel stifling, in this case it actually means innovators can operate in the EU, free from the fear of being found to be uncompliant and backwards punished for infractions before rules existed.

• What Happens If You Are Non-Compliant?
MiCA doesn’t ban blockchains or protocols, but it does regulate the activities built on top of them. If a project issues tokens (stablecoin or utility token), provides custody, offers trading infrastructure, or promotes investment opportunities to EU users, it falls within MiCA’s scope, regardless of whether the code is open source or the protocol claims to be decentralized. Being based in the EU, or even having core contributors in the EU, increases your exposure. Regulators can interpret “established in the Union” based on substance, not just incorporation, meaning location, operations, and active user engagement all matter.
For protocols or teams that aren’t compliant, the consequences can include:
✓ Fines and enforcement actions
✓ Cease-and-desist orders
✓ Blacklisting from regulated counterparties
✓ Loss of access to banking and on/off-ramp services
✓ A negative effect on institutional partnerships
Even projects that previously operated in legal grey zones will now find that the bar has been raised. MiCA gives regulators the tools to pursue unlicensed activity across all 27 EU member states, under one framework.
For serious builders, especially in the real-world asset space, MiCA isn’t a burden, it’s a blessing. Without it, you’re limiting your access to institutional markets, excluding EU users, and risking enforcement down the line.
• Why Dusk is positioned for this moment?
The development on Dusk began long before MiCA, but with the prediction that regulation would come, and we have worked hard to ensure compliance with all EU regulations. Our prediction was that regulations and institutional interest would come, and to be ready for them when they did.
Dusk is designed to handle compliance natively:
✓ Privacy is built in, but can be disclosed selectively where needed
✓ Their partnership with NPEX gives access to a licensed Multilateral Trading Facility (MTF) and broker license, opening up regulated primary and secondary markets
✓ And our tech stack supports real-world assets from issuance through to trading, without relying on off-chain enforcement
✓ Their partnership with Quantoz, and their digital euro, EURQ, an Electronic Money Token (EMT) suitable for use as legal tender
This is infrastructure for regulated digital finance, not just another execution layer.
@Dusk #Dusk $DUSK
Zobacz oryginał
Dusk wzmacnia fundament gospodarki• Co oznacza tokenizacja dla małych i średnich przedsiębiorstw oraz firm prywatnych i jak kolejna fala finansów cyfrowych wzmacnia fundament gospodarki. • Finanse się zmieniają. Ale nie tylko dla dużych graczy: W latach blockchain był traktowany jako dziedzina dużych instytucji i detalicznych inwestorów. Ale jedna ważna grupa często pomijana w tych dyskusjach: małe i średnie przedsiębiorstwa (SME). Małe i średnie przedsiębiorstwa stanowią ponad 99% wszystkich firm w UE, zatrudniają ponad 83 miliony osób i generują więcej niż połowę PKB Europy. Innymi słowy, są one fundamentem gospodarki.

Dusk wzmacnia fundament gospodarki

• Co oznacza tokenizacja dla małych i średnich przedsiębiorstw oraz firm prywatnych i jak kolejna fala finansów cyfrowych wzmacnia fundament gospodarki.
• Finanse się zmieniają. Ale nie tylko dla dużych graczy:
W latach blockchain był traktowany jako dziedzina dużych instytucji i detalicznych inwestorów. Ale jedna ważna grupa często pomijana w tych dyskusjach: małe i średnie przedsiębiorstwa (SME).
Małe i średnie przedsiębiorstwa stanowią ponad 99% wszystkich firm w UE, zatrudniają ponad 83 miliony osób i generują więcej niż połowę PKB Europy. Innymi słowy, są one fundamentem gospodarki.
Zaloguj się, aby odkryć więcej treści
Poznaj najnowsze wiadomości dotyczące krypto
⚡️ Weź udział w najnowszych dyskusjach na temat krypto
💬 Współpracuj ze swoimi ulubionymi twórcami
👍 Korzystaj z treści, które Cię interesują
E-mail / Numer telefonu

Najnowsze wiadomości

--
Zobacz więcej
Mapa strony
Preferencje dotyczące plików cookie
Regulamin platformy