sam.frax

5.4K posts

sam.frax banner
sam.frax

sam.frax

@samkazemian

¤ Founder CEO @FraxFinance 💸 $FRAX ¤ 🇺🇸 Cofounder @IQAICOM $IQ 🤖 neuroscience & philosophy @ucla

Katılım Temmuz 2015
5.4K Takip Edilen43K Takipçiler
sam.frax
sam.frax@samkazemian·
Ferry was fully built internally by us at Frax from the ground up to be uncompromisingly secure but extremely slow (by design). While some users loved the security, the 24H wait times made it uncompetitive to gain market share against CCTP & other faster solutions. It was the far end of the spectrum of fast+risky vs slow+secure. The current frxUSD mesh is the optimization of secure+very fast.
English
0
0
5
159
Dominik Hell
Dominik Hell@DominikHell6·
@samkazemian @0xLamps Yes, I’m just more interested in your case specifically because didn’t you have to maintain about the same effort with Ferry. So why move?
English
1
0
1
164
sam.frax
sam.frax@samkazemian·
At Frax, we did all of these mitigations immediately & more at the very beginning before rolling out our frxUSD LZ mint-burn mesh. I'm surprised how many other projects didn't. We use our own libraries (no external entity can upgrade them, not even LZ), we run our own Frax DVN internally with veto privs but require external DVN unanimous consensus to transfer value, we've had 3/3 DVN policy since last year (increasing to 5/5 soon), & are currently working on even more advanced+secure hook logic compared to the simple rate limiter/circuit breakers projects are just starting to deploy. If you want to collaborate or need crosschain guidance, feel free to reach out to us to work on security together.
Fishy Catfish@CatfishFishy

Heeaaaaaaaaated debate broke out in the ETHSecurity Community Telegram earlier today between LayerZero’s Bryan and security researchers. TLDR summary: - $3 billion+ of LZ OFTs were recently at risk of being compromised due to a default library contract that LZ Labs could upgrade instantly with no timelock to forge messages (like what happened with rsETH hack) -According to Banteg, major projects like Ethena and EtherFi were STILL using this default library contract as of a few weeks ago - There is still $178 million in value exposed to being compromised from projects using default library (look at quote tweet) - LZ Labs doesn’t need to be malicious for this be risk, they have history of poor opsec (in addition to being hacked by North Korea): - Onchain data shows LZ Labs multisig signers were engaging in non-multisig signing activity like trading memecoins, swapping on DEX, bridging. All major phishing risks as this mean production multisig keys were connected to websites, not just used for signing - LZ Labs handled private keys like a high schooler, trading memecoins on production multisig keys, no wonder they got targeted by North Korea, who knows what other poor opsec they have? THREAD BELOW

English
26
18
187
25.3K
sam.frax
sam.frax@samkazemian·
The modularity of it is its power but also its undoing if not set up properly. With this system you control: your own token contract, your own verification rules, your own fee/gas rates, your own libraries & node+RPC lookups. You can even decide to completely move away from LZ without migrating your token/holders by upgrading the token contract away from all LZ downstream dependencies without any technical blockers. Most other solutions lock a user in on at least 1 of the above areas to 'create a moat.' Of course if all these abilities overwhelm you so you just delegate them all to a single source & use 'standard config' then it's terrible. You should just lock yourself in with some other service that will think about those things for you, but in return not let you leave later should you want to.
English
1
0
9
474
sam.frax
sam.frax@samkazemian·
Liquidity, integrations, monetary premium, lindy, brand, & legal agreements/exclusivity/licenses (where applicable such as RWAs) are the "AI resistant" components of onchain products. Those contribute the most to token/company valuation since they better predict the long term cash flows far out into the future compared to measuring present-day revenue.
English
5
1
26
1.9K
Guy Wuollet
Guy Wuollet@guywuolletjr·
you can’t vibe code usdc you can’t openclaw hyperliquid you can’t prompt engineer morpho network effects are the moat
English
66
31
413
49.5K
sam.frax
sam.frax@samkazemian·
@ImperiumPaper @fraxfinance We were far ahead of our time with the Frax Ferry. Fun fact: the reason we gave it a nautical theme was because we didn’t want to be just another “bridge.” We were a ferry, a new class of crosschain protocol. 🛥️
English
5
4
59
1.6K
PaperImperium
PaperImperium@ImperiumPaper·
I’ve never understood why bridges have to always be fast. I get it for impatient retail or cross-chain arbitrage. But many tasks aren’t very time sensitive. Which is why I always had a soft spot for the (now-defunct?) @fraxfinance bridge. They called it Frax Ferry and gave the roles a nautical theme. The captain had admin roles, and a second set of actors called crew members had the power to temporarily pause to enforce a “stop, look, listen” process. Normally I dislike meme-y themes (like food names), but in this case I think the ferry analogy helped communicate to users how it worked. The Frax Ferry would have scheduled departure times between specific chains, and would take 24 hours to arrive. This gave ample time to catch shenanigans. And also meant there was low risk of infinite mint, since any compromise would have to be sustained undetected for the entire journey. I’m not sure if 24 hours is the right time period, but it’s hard to think that the Frax Ferry would have allowed DPRK to rekt Kelp. To the extent a need for fast bridging still exists, it does seem appropriate for someone (bridge, issuer, swap-bridge counterparty) to levy a fee to account for the increased risks. The model converged upon has been the asset issuers doing this for free - you’ll notice even on L2s, the standard bridges aren’t growing their escrows much as fast options proliferate. I think we can agree there needs to be a rethinking about how this risk is shared. That could be a fee, lower claims priority, or some TBD clever solution.
English
16
6
69
12.6K
sam.frax
sam.frax@samkazemian·
@hosseeb People forget Satoshi was definitely a fan of new use cases of "block chain" (as he called it in those days) including DNS (what would later become Namecoin). There's ample evidence he would be liberal in various use cases & even advocate different chains: #msg28696" target="_blank" rel="nofollow noopener">bitcointalk.org/index.php?topi…
English
0
0
9
883
Haseeb >|<
Haseeb >|<@hosseeb·
If Hal Finney were reanimated and someone told him how stablecoins worked, I don't think his reaction would be: "wait, you're telling me this non-KYC, instantly transferable, cryptographically custodied, P2P-accessible US dollar has... a freeze function? Oh. So we failed."
Haseeb >|<@hosseeb

Stablecoins are actually super cypherpunk. CT has broken your brain on this. The idea that anyone at any time, with just a mobile phone, can hold and send dollars instaneously to anyone in the world, no KYC, no nothing--that was literally the cypherpunk dream.

English
97
9
206
86.9K
sam.frax retweetledi
Frax
Frax@Frax·
Yield or no yield. Pass CLARITY. Our Founder and CEO @samkazemian on why this is the capstone act that connects stablecoins and crypto to the broader financial system. The sooner it passes, the sooner crypto moves forward 👇
Eleanor Terrett@EleanorTerrett

🚨SCOOP: Hearing from industry sources that stablecoin yield compromise text is imminent and could drop as soon as today. Reaching out to @SenThomTillis and @Sen_Alsobrooks offices for comment.

English
8
14
59
7.3K
sam.frax retweetledi
Frax
Frax@Frax·
.@Strategy $STRC is already a $8.5B product. The next unlock is CLARITY. CLARITY can bring financial products like this onchain, connect them to stablecoins, and unlock global liquidity. @milesjennings of a16z and @samkazemian of Frax at @TheBitcoinConf 👇
English
3
14
63
2.6K
sam.frax
sam.frax@samkazemian·
Major props to EF & @VitalikButerin for this. First time I've seen EF intervene in something that's objectively right but would have gone against their 'credible neutrality' ideology. More of this. Makes me proud to build @Frax in the Ethereum ecosystem & will continue to do so.
Ethereum Foundation@ethereumfndn

0/ Today, the Ethereum Foundation completed a bilateral swap of ~21,269 aWETH to wstETH, coordinated with @LidoFinance and @mellowprotocol as part of their ongoing deleveraging work.

English
11
16
171
21K
sam.frax retweetledi
Stable Summit 🦫
Stable Summit 🦫@stable_summit·
Sam Kazemian, Founder & CEO, @fraxfinance, returns to Stable Summit IV: NYC. One of the few remaining OGs, @samkazemian has built on the full spectrum of stablecoins, from 2020's FRAX to today's GENIUS-compliant frxUSD. Join us June 4, NYC · stablesummit.xyz
Stable Summit 🦫 tweet media
English
2
5
29
2.8K
sam.frax
sam.frax@samkazemian·
@bkiepuszewski @hasufl The issuer of an asset decides what’s their native liability, not outside observers. The issuer makes this social claim by publishing balance sheets, clearly labeling what their native asset is etc. It also shouldn’t matter what tech/code they use such as lockbox vs mint-burn.
English
1
0
4
195
bartek.eth
bartek.eth@bkiepuszewski·
So you think that, for example, USDS (DAI) holders should be suddenly exposed to LZ-related risks just because someone, few years later, decided to create USDS-OFT wrapper to bridge USDS to Solana ? (as seems to be the case as I have just learned). Should I exit all my USDS position now ? What is this USDS-OFT, btw, @hexonaut ? #writeContract" target="_blank" rel="nofollow noopener">etherscan.io/address/0x1e1d…
English
3
0
8
987
bartek.eth
bartek.eth@bkiepuszewski·
Few remarks and lessons after rsETH drama, from my personal PoV Users should know that there is a difference between rsETH on Ethereum and rsETH on L2s. Abstracting this info is nice for UI, but it leads to unacceptable risk management practices. Why should the rsETH holder on L1 be suddenly exposed to a bad DVN setup created because @KelpDAO decided to add the fifteenth chain and DVN, there is just an RPC call to your grandfather's server ? So, put it simply - issue assets on L1. By all means, bring them to L2s, but do not hide additional risks from users ! On the other hand, holding rsETH on Arbitrum suddenly feels different than holding rsETH on Ethereum. Arbitrum is a Stage1 Rollup, everybody should know what it means, in particular everybody should be aware that there is a Security Council there that may intervene Similarly, on Stage 0 Rollup without Security Council the team can intervene (for good and for bad - it is up to you whether you see it as an advantage or unacceptable risk factor). This info should be known to any user of such Rollup and it should be reflected in the risk assessment. We are open at @l2beat to work with any wallet provider, swap service etc... so that asset risks are uniformly communicated to users Finally, to those of you who think that a well-formed Security Council of a Stage 1 Rollup is just a MultiSig of people "possibly in one location" - you are idiots
English
8
7
84
7K
sam.frax
sam.frax@samkazemian·
The reason I said it’s a blurry line is because the issuer gets to say what their liability is. Not an outside observer. If an issuer makes a legal/economic claim that “this bridge is my bridge” it shouldn’t matter if the issuer outsources the verification to a service provider or literally verifies themselves in their own server. It’s still their liability & they’re on the hook for it uniformly. That’s the economic reality. For example, who knows what code CCTP runs inside Circle’s system, they could be using various service providers in a black box. But it doesn’t matter, it’s Circle’s liability no matter what.
English
5
1
7
257
donnoh.eth 💗
donnoh.eth 💗@donnoh_eth·
@samkazemian @aave yes imo that’s ok because it doesn’t introduce any third party risk. this is exactly what WBTC does through layerzero, with BitGo being the 1/1 DVN, which is equivalent to what USDC does with CCTP
English
1
0
6
323
sam.frax
sam.frax@samkazemian·
@donnoh_eth @aave Ok so if an issuer uses their own LZ DVN that runs on their servers as the final LZ message confirmation, that’s good right? That can be a simple rule Aave risk team adds to their canonical bridge definition.
English
1
0
5
288
donnoh.eth 💗
donnoh.eth 💗@donnoh_eth·
@samkazemian @aave there’s no third party in USDC bridged via CCTP because USDC is issued by Circle and CCTP is validated by Circle. this is a *first* party validated bridge. no confusion. the line is not blurry at all.
English
1
0
12
647
sam.frax
sam.frax@samkazemian·
@donnoh_eth @aave What’s the difference between “natively minted USDC with issuer managed CCTP bridge” vs “natively minted other asset also with its own issuer managed bridge?” The line is blurry & listing the former but not any of the latter isn’t really a serious option.
English
1
0
17
2.2K