Veritas Security Company#
- 2022 was declared as the year with the largest hacker activity in history, with attackers targeting different ecosystems.
- Finrisen Security Company provides state-of-the-art blockchain security services.
- To prevent attacks, it is necessary to discover and fix vulnerabilities in Cairo contracts.
- Finli Security provides the V specification language to determine the state of blockchain transactions.
- Magi is a formal verifier used to prove the correctness of Cairo code.
- Orca is a fuzz testing framework used to detect vulnerabilities in Solidity and Cairo contracts.
- The services provided by Finrisen Security Company can help Cairo programmers securely test their smart contracts.
Carbon Emissions Market#
• Watch Guillaume's video to explore how blockchain addresses the challenges faced by the carbon offset market.
• With legal support, the market is booming, and buying carbon credits is equivalent to eliminating one ton of carbon dioxide. The current market is expected to reach $50 billion.
• There are still some issues in achieving true carbon neutrality, such as lack of accessibility, greenwashing, and lack of tools for investment and investment management.
• Carbonable is creating a carbon offset ultimate tool that can be used by anyone, allowing individuals and businesses to participate in the great mission against climate change.
• Guillaume suggests investing now because future carbon credit prices will fluctuate dramatically, and investing now can save more costs.
• Carbonable aims to build a more accessible application and address the issues caused by greenwashing and investment management.
• They strive to be leaders in carbon reduction actions and become the perfect platform for people to participate in environmental activities.
Starknet Index Graph#
• Jonathan Lei is the co-founder and CEO of zklend, who developed a Rust SDK based on StarkNet.
• There are several challenges, including handling chain folding, limited programmability, and managing new infrastructure.
• The Graph solves these problems by using a unified API that complies with the GraphQL standard and a generic, high-performance runtime environment.
• Users can send transactions to smart contracts through applications. Smart contracts generate events that are received by Graph Nodes, which query the corresponding indexing logic and execute it.
• Applications retrieve data from Graph Nodes through the GraphQL API.
• Indexing logic can be written in any language compiled to WASM.
• The Graph reduces the risk of single point of failure and achieves programmability and high-performance data querying.
Shutter Network, L2 MEV#
- Shutter Network provides an unprecedented solution to address threats on the market, including forward-looking and censorship systems on public blockchains.
- Shutter is attempting to inject virtual encryption into the underlying layer to counter front-running and censorship.
- They use encryption technology to encrypt transactions at the user level and have block producers sign and confirm the inclusion and order of transactions. These transactions remain encrypted, and block producers cannot inspect or front-run them.
- Their goal is to prevent malicious movement, which is often associated with front-running behavior.
- They aim to improve neutrality in the underlying layer with the help of virtual encryption to prevent front-running and censorship.
- Shadow is a modular part of L2 that can be used as a plugin by L2 or sidechains to enhance resistance against front-running and censorship.
- They also believe that some MEV is normal in clearing processes, but they are more concerned with preventing malicious MEV.
ECNTT Algorithm Ingonyama#
- Ingonyama specializes in hardware infrastructure for improving zero-knowledge computing performance.
- The old MSM and NTT algorithms have many implementations, and now they are trying a new variant called ECNTT.
- The basic operation of ECNTT is elliptic curve addition instead of modular multiplication. It has higher computational complexity but is precomputable.
- Elio's blockchain application is an example of ECNTT, allowing privacy users to operate on private data.
- Implementing ECNTT on hardware poses challenges as it increases the complexity of basic computation units and memory access.
- There may be future hardware implementations of ECNTT.
Stark Integration with Traditional Institutional Finance#
• Dave Engel, the Director of Business Development at StarkWare, will discuss the future of StarkWare and institutional finance.
• Does institutional finance need blockchain? Quoting Jamie Dimon, the CEO of JP Morgan, cryptocurrencies have no intrinsic value, but blockchain is real.
• What are some examples of blockchain usage in institutional finance seen in the current market?
• Starkex is one of StarkWare's most popular platforms, which can serve as a future role for institutional finance.
• We are adopting StarkWare technology as a cornerstone of institutional finance infrastructure to achieve scalability, visibility, and resilience.
Visa has built a payment POC on Starknet, so everyone is encouraged to watch Kai's speech from yesterday, which may be the most in-depth technical presentation. Visa has created a POC for recurring payments using account blocking on Starknet.
• StarkWare's ultimate goal is to connect and respect complex enterprise clients, machines, and the financial sector to create a powerful and scalable financial chain.