Luis

847 posts

Luis banner
Luis

Luis

@Trenchweb3i

Founder @tryminted | Ex @BNPParibas | Ex M&A @JNJInnovation | Builder (1 acquired) | Ex Top 25 trader on @hyperliquidx | Advisor @okx | Angel Investor

Miami Katılım Mayıs 2013
561 Takip Edilen79 Takipçiler
Luis retweetledi
Luis
Luis@TrenchWeb3·
Im making another @CantonNetwork project showcase video for Wednesday. Projects/community comment with who I should cover. Most buzz wins. TRIBAL. $CC @CantonFdn 👇
English
29
6
70
2K
Luis retweetledi
Scout
Scout@0xScoutr·
🚨 IMPORTANT: @cantontools has been compromised. Do NOT click any links posted by the account right now. They are phishing and will compromise your wallet or credentials. I'm working to recover the account with @x @premium. Will update here as soon as it's resolved. If you've already clicked, revoke wallet permissions immediately and change any reused passwords. Please RT to warn the Canton tribe.
English
47
56
98
3.5K
Luis retweetledi
Luis
Luis@TrenchWeb3·
This video is a whole vibe. Top 10 projects on @CantonNetwork part 2. Repost, like, comment, follow. Time to get TRIBAL. @CantonFdn $cc
English
32
27
162
11.1K
Luis retweetledi
Temple
Temple@temple_ny·
Lightspeed Is Now Live The speed of a traditional exchange The composability of a decentralized exchange The privacy for real world exchange
Temple tweet media
English
327
2.2K
2.3K
103.2K
Luis retweetledi
Luis
Luis@TrenchWeb3·
We need to build a cultural movement. This is how @CantonNetwork hits escape velocity. 👇 @CantonFdn $cc
English
19
20
119
27.9K
Luis retweetledi
Luis
Luis@TrenchWeb3·
Everyone in crypto needs to start asking themselves a hard question. Do you want to be safe? Or do you want to be right? Even if Aave did thorough diligence when listing, there’s nothing stopping a protocol from changing contracts/bridge/admin parameters down the line. It’s not @LayerZero_Core’s fault either. Their bridge worked as intended. It even says in the documents explicitly NOT to use a 1 of 1 DVN. Chainlink wouldn't have helped either. Oracles report price. They can't tell you whether a token was legitimately minted. Aave used Chainlink. Doesn't stop contagion. It’s totally outrageous and unfeasible to suggest that we can monitor every aspect of every asset 24/7/365 on any market. Thats not decentralization, thats a police state. People are tired, they’re over it, and so am I. Universal open source was never meant for mainstream adoption, and It’s ludicrous to suggest we can go on like this. This is yet another testament to why privacy on @CantonNetwork is inevitable. Remember, it’s extremely hard to hack what you can’t see. TRIBAL. $cc
English
29
18
101
13.5K
Luis retweetledi
Luis
Luis@TrenchWeb3·
My top 10 projects on @CantonNetwork. The video ran long (12 min) but I wanted to give these projects the respect and time they deserved. Also, if you're watching you should follow. Enjoy. @CantonFdn $cc
English
26
29
142
6.5K
Luis retweetledi
Luis
Luis@TrenchWeb3·
My top 10 projects on @CantonNetwork video coming tomorrow. Wonder who made the list? 👀
English
14
4
78
2.8K
Luis retweetledi
Luis
Luis@TrenchWeb3·
How to successfully obtain a validator and launch on @CantonNetwork in 6 minutes. This is important video because I share our actual experience. Enjoy. @CantonFdn $CC
English
11
16
97
8.9K
Luis retweetledi
Luis
Luis@TrenchWeb3·
So @DrNickA seems to think I should be embarrassed (or ashamed) for adding cash tags to my @CantonNetwork content. So I chose to have some fun with this one. Enjoy, lmao. $CC @CantonFdn
English
10
9
57
2.3K
Luis retweetledi
Luis
Luis@TrenchWeb3·
In this 6 min video I'm going to explain to all of you (like children) why @CantonNetwork is the most secure chain in the world. So much so, that even socially engineered hacks (like we saw on @DriftProtocol) are extremely difficult to execute. Enjoy. @CantonFdn $CC
jfab.eth@josefabregab

"The Drift Protocol attack can’t happen on Canton." This claim by the CBO of @ZenithFdn is false. The core mechanism of the Drift exploit (social engineering that tricked 2/5 multisig signers into approving malicious txs), could have occurred in @CantonNetwork. Why use a devastating event to inaccurately praise Canton?

English
13
23
114
9.5K
Luis retweetledi
Luis
Luis@TrenchWeb3·
I don't see anyone except core team producing @CantonNetwork content, so I'll be making my own. Because I have a company to run, it's hard to commit to being a full time arbiter of relational thinking. However, considering the amount of midcurve takes I'm seeing, I think it's fair to say education is needed. Why Ethereum is not suitable for Institutions in 4 minutes. Enjoy. $cc @CantonFdn
English
58
42
197
26K
Luis retweetledi
Luis
Luis@TrenchWeb3·
Wow Gabe, you're such a cyberpunk. I've never engaged in anything you've ever posted, but I guess its time. His own BORG "legal framework" wraps Marshall Islands DAO LLCs around Cayman SegCo's with: NO legal accountability NO fiduciary duties, and NO distributions. Best part? You relinquish ALL of your IP to a structure that's governed by a token market he doesn't control, arbitrated in Cayman Islands courts he'll never set foot in, all while he disclaims any legal responsibility for what he built. At least he produces all of the documentation and structure (but remember, not your lawyer.) You stick to building founder traps, and @CantonNetwork will stick to revolutionizing finance. $CC
Luis tweet media
English
9
3
50
5.5K
Luis retweetledi
Luis
Luis@TrenchWeb3·
Spicy? Come on bro. Does anyone read in this space? @randhindi is way off the mark. Back on my soapbox I go: 👇 "Intranets are dead." They are not. Not at all. The enterprise intranet market is $16-18B and growing. The VPN market is $48B and growing. 50% of critical enterprise apps will remain outside public cloud through 2027. 90% will run on hybrid cloud by 2027. 86% of CIOs are actively repatriating workloads FROM public cloud back to private. "Once FHE brings encryption to the public ledger, permissioned chains become obsolete." Ok bro, lets both hold our breath and see who dies first. FHE is currently 1,000-100,000x slower than plaintext computation depending on the operation. Zama's mainnet launched December 2025, processing its first confidential transfer at ~20 TPS. LMAO! @CantonNetwork processes 700,000+ daily transactions and settles $350B/day RIGHT NOW. The ASIC hardware needed to close that gap is still in early development. "At this point, it is unclear if true decentralization is possible" - Robert M. Townsend (do research). "The only reason institutions use private networks is a lack of privacy on public ones." Wrong. Institutions use permissioned infrastructure for governance, legal enforceability, dispute resolution, regulatory compliance, selective disclosure, and accountability. Privacy is one of six reasons, not the only one. FHE addresses confidentiality. It doesn't address "who is liable when something goes wrong" or "who arbitrates a disputed settlement." "You can publicly verify the result because it's just a blockchain running code." No. "Verification" in an FHE blockchain means confirming that encrypted operations were applied correctly to ciphertexts. It does NOT mean anyone can inspect the underlying data and confirm the result makes semantic sense. On Ethereum, anyone can re-execute a transaction and confirm "account A had 100 tokens and sent 50 to B." On an FHE chain, the public sees "encrypted blob X became encrypted blob Y via operation Z." I dunno if that constitutes verification? "You can't stake shielded assets in DeFi. You can't swap them for other shielded assets." Actually Rand, Penumbra (live, Cosmos ecosystem) offers native shielded staking via delegation tokens and a fully private DEX (ZSwap) with shielded-to-shielded swaps. Namada (live mainnet) completed the first shielded cross-chain swaps. His Zcash example is technically correct (Zcash is still PoW, no staking), but using Zcash to represent all of ZK privacy is like using Bitcoin to represent all of crypto. Most core financial market infrastructure is still controlled and permissioned. SWIFT's core messaging runs on SWIFTNet, a managed private network. DTCC clears through private infrastructure with dedicated connectivity such as SMART, BT Radianz, and SFTI. Over 40% of U.S. equity volume trades off-exchange through private venues. FHE does 20 TPS. The input validation isn't even quantum-safe, which is ironic given the whole pitch. Decryption requires trusting a key committee, but somehow "trust" is only a problem when Canton does it. $350B/day settles on Canton right now and FHE processed its first transfer three months ago. This isn't even a debate anymore. $CC
The Rollup@therollupco

"In the 90s, every company had an Intranet because the Internet wasn't secure." "Today, Intranets are dead. Permissioned blockchains are facing the exact same extinction event." "The only reason institutions use private networks is a lack of privacy on public ones." "Once technologies like FHE bring encryption to the public ledger, the 'Private Blockchain' becomes an obsolete relic." Rand Hindi on why FHE is the HTTPS moment for blockchain.

English
0
5
18
2.4K
Luis retweetledi
Luis
Luis@TrenchWeb3·
Canton vs Ethereum - Round 2 with @gluk64. Lets break this down: 👇 "Canton relies on a single mechanism: trusted operators." Wrong. Canton uses sub-transaction privacy via DAML's model. Participants only see data relevant to their contracts. The trust model isn't purely operator-dependent, it's participant-scoped by design. "Manipulated state propagates silently inside opaque chains of UTXOs with nothing watching." Wrong again. Participants validate their own contract state locally. A single compromised operator cannot unilaterally rewrite shared state for honest counterparties without detection. He totally conflated operator trust with validator trust. "The aviation/nuclear" analogy. Good framing but moot. Aviation and nuclear systems achieved redundancy through decades of regulatory iteration, incident investigation, and mandatory certification. ZK proof systems have none of that institutional history in finance yet. The analogy supports the maturity concern he's trying to dismiss. "DAML is proprietary" Factually wrong. Daml is open source under Apache 2.0. The source code is on GitHub. Has been since 2019. This is a sloppy verifiable error which undermines credibility on the technical claims. "DAML has a fraction of the developer and security community compared to Ethereum" Huh? Daml is a purpose-built functional language modeled on Haskell's type system, designed for verifiable correctness of contract logic. The 'fewer eyes' argument ignores that the Daml ecosystem draws from decades of formal methods research, not just bounty hunters chasing exploits. "There is no cryptographic verification layer/cryptographic verification provides both. Trust in operators provides neither." Wildly false. Canton uses signatures, key-bound identities, encryption, topology verification, and BFT. Prividium's first line of defense is (by his own description) institutional partners operating nodes within their own security environments. That's operator trust. He's relying on the same mechanism he's dismissing. I think he meant "They no have ZK!" "ZK proofs verify operational security.” They do not. Prividium’s own permissioning, Proxy RPC, and private explorer are closed-source enterprise modules. If that auth/policy layer is wrong or compromised, the proof attests to the resulting state transition, not to whether the underlying business policy decision was correct This is where I was legit shocked. Prividium also still has explicit trust/policy escape hatches. Their docs say forced L1->L2 transactions can bypass the Proxy and may deploy arbitrary contracts or execute unauthorized writes; the mitigation is allowlist filtering, which explicitly gives the operator censorship capability Prividium’s Architecture page says all interactions must pass through the Proxy, but the Proxy page says forced L1->L2 transactions can bypass it entirely. So uhhh which one is it? I'd tighten that up. Closing: He celebrates open standards and adversarial testing. However, Prividium's access control layer, the Permissioning System, Proxy RPC, and Private Explorer are closed-source, commercially licensed, and distributed through a private Docker registry. The public cannot independently audit the code that decides who can transact, and what users can see, without a commercial agreement with Matter Labs. That sounds like gated access Alex? Open standards for me but not for thee? The entire thread is about implementation bugs and redundancy. There are false claims, and obvious inconsistencies. Moreover, not once does he address when a ZK proof says a trade settled and a counterparty disputes it, what legal framework governs the resolution? That's the institutional question, and it remains unanswered. ZK looks promising, but the lack of long-running production history and institutional track record leaves too many unanswered questions to justify this as anything close to a competitor. $350 billion a day settles on @CantonNetwork. They have live institutional infrastructure, clearer governance/legal integration, and a rapidly growing network. Prividium has a whitepaper and contradictions in its own docs. We're launching on Canton. $CC
ALEX | ZK@gluk64

Canton founders claim ZK proofs are too risky for institutional finance. They have been making this argument to buyers and regulators, publicly and behind closed doors. It deserves a public answer. Let's see if the argument holds — and if Canton's infrastructure passes its own test. The argument Their case, stated fairly: ZKPs are complex. Bugs are inevitable in any sufficiently complex system. If a flaw exists in a proof system, it could go undetected because the underlying data is private. If it goes undetected, it spreads throughout the system. This creates systemic risk. Therefore, ZKPs cannot be used for critical financial infrastructure. This is a real concern. Let's take it seriously and follow the logic. The flaw in the logic Strip away the ZKP-specific language, here's the story: Technology X can have implementation flaws. Technology X serves a mission-critical function. If it fails, the consequences are catastrophic. Therefore, Technology X can never be used. Read it again. There is a hidden assumption doing all the work: that Technology X is your only line of defense. If this logic held, we would not have aviation. Fly-by-wire, engine controllers, autopilot — every one of these systems has bugs, is mission-critical, and can fail catastrophically. Nuclear reactor control systems, robotic surgery, radiation therapy dosing, implantable cardiac devices, and many other systems all run on software that can fail catastrophically. But they are somehow still in use. How? Redundancy and containment The foundation for these mission-critical systems is the explicit assumption in their architectures that every component will eventually fail. They all rely on two things: redundancy and containment. Redundancy = multiple independent systems, each capable of catching a failure in the others. Containment = when failure occurs, limit the blast radius so it cannot become systemic. This is the only question that matters for any mission-critical system: does your architecture have more than one line of defense? Canton's architecture Let's apply this test to Canton. Canton's privacy and integrity model relies on a single mechanism: trusted operators segregating data between participants. There is no cryptographic verification layer and no independent check. If a few keys of the operators in a validation domain are compromised, manipulated state propagates silently inside opaque chains of UTXOs with nothing watching. This is a real systemic risk, accelerated by the rise of AI-assisted cyberattacks. By Canton's own logic — a single point of failure with catastrophic consequences — this is the architecture that should concern regulators. Prividium's architecture Now look at how Prividium is built. Redundancy. Prividium has three independent lines of defense. First, institutional partners operate Prividium nodes within their own security environments, the same infrastructure banks already trust and regulate. Second, zero-knowledge proofs provide cryptographic integrity verification as an independent layer on top, verifying operational security rather than replacing it. Third, as ZK proof systems standardize, multiple independent provers can verify the same computation. A flaw in one implementation gets caught by another. Containment. Each Prividium instance is an individual chain operated by an individual institution. When institutions interact across chains, Prividium's interop layer implements inter-chain accounting mechanisms that are independently enforced by the participating institutions, asset issuers, or on-chain. Even an attacker who compromises a single institution's internal IT infrastructure and simultaneously finds a ZKP bug could only affect that one Prividium instance. The damage cannot propagate to the broader network. The net balance: Canton has a single mechanism, no fallback, silent failure propagation across the network. Prividium has layered defenses, independent verification, blast radius contained by design. Importance of open standards Multiple lines of defense only matter if each line is itself strong. What makes a technology strong? The depth of adversarial testing it has survived. Shaul points to a compiler bug example in his post, and it actually illustrates this well. ZKsync embraced full EVM equivalence over a year ago. This was shaped precisely by the understanding that the more you deviate from an open standard, the larger your attack surface becomes. And Ethereum is not battle-tested in some polite, academic sense. For over a decade, its smart contract infrastructure has been completely open to scrutiny by the most sophisticated adversarial actors in the world, with hundreds of billions of dollars at stake. Vulnerabilities and exploits fed directly back into the ecosystem: new audit standards, formal verification tools, compiler safeguards, and hardened design patterns. The EVM that exists today is the product of a decade of continuous adversarial stress testing at a scale no other smart contract platform has experienced. Canton went the opposite direction. DAML is a proprietary smart contract language with a closed ecosystem and a fraction of the developer and security community. Every growing pain that Ethereum went through over the last ten years still lies ahead for DAML, except DAML will face them with orders of magnitude fewer eyes watching. Every maturity concern Canton raises about ZKPs applies to their own technology stack with far less mitigation available. The safest technology is the one that has survived the longest under the harshest conditions. For smart contract infrastructure, that is Ethereum. It's not close. So to answer the question directly: everyone agrees bugs exist. The question is whether your architecture has redundancy to catch them and containment to limit the damage when they slip through. Cryptographic verification provides both. Trust in operators provides neither.

English
8
12
55
8.8K
Luis retweetledi
Luis
Luis@TrenchWeb3·
On Ethereum VS Canton: Dude brags about Ethereum surviving adversarial stress testing. Yeah, because it's a public network with anonymous actors and no legal recourse. That's exactly the environment banks are trying to AVOID. The "battle testing" Ethereum underwent = billions of dollars in hacks, exploits, and rug pulls. Institutions look at ecosystem risk as a whole. Try to sell that to a compliance officer. When it comes to decentralization, I encourage all of you to visit kyc_rip or Dune and see the 1.7 BILLION in frozen stables on ETH. If it's decentralized, why can assets be frozen? On the BUIDL comparison. Try transferring $BUIDL tokens to a random wallet without @Securitize approval. You can't. That's a permissioned app on a public chain. BUIDL holds T-bills and cash. There's no competitive intelligence in knowing someone holds T-bills. It's a single-issuer, single-asset-class fund. There are no counterparties on the other side of a trade who need privacy from each other. For that type of asset a public ledger is fine, HOWEVER. A bank pricing a structured note doesn't want competitors seeing the terms. A pension fund building a position doesn't want the market front-running it. Two dealers on opposite sides of a swap do not want each other seeing their full book. And private credit facility where knowing the borrower's terms gives you leverage in negotiation, certainly does NOT want that. I like ZK proofs long-term, but it's still nascent with virtually no institutional legal precedent for disputes involving ZK-proven state. What happens when a ZK proof says a trade settled and a counterparty disagrees? Who arbitrates? That question doesn't have a legal answer yet. @CantonNetwork was built knowing that. $CC
ALEX | ZK@gluk64

Canton founders claim ZK proofs are too risky for institutional finance. They have been making this argument to buyers and regulators, publicly and behind closed doors. It deserves a public answer. Let's see if the argument holds — and if Canton's infrastructure passes its own test. The argument Their case, stated fairly: ZKPs are complex. Bugs are inevitable in any sufficiently complex system. If a flaw exists in a proof system, it could go undetected because the underlying data is private. If it goes undetected, it spreads throughout the system. This creates systemic risk. Therefore, ZKPs cannot be used for critical financial infrastructure. This is a real concern. Let's take it seriously and follow the logic. The flaw in the logic Strip away the ZKP-specific language, here's the story: Technology X can have implementation flaws. Technology X serves a mission-critical function. If it fails, the consequences are catastrophic. Therefore, Technology X can never be used. Read it again. There is a hidden assumption doing all the work: that Technology X is your only line of defense. If this logic held, we would not have aviation. Fly-by-wire, engine controllers, autopilot — every one of these systems has bugs, is mission-critical, and can fail catastrophically. Nuclear reactor control systems, robotic surgery, radiation therapy dosing, implantable cardiac devices, and many other systems all run on software that can fail catastrophically. But they are somehow still in use. How? Redundancy and containment The foundation for these mission-critical systems is the explicit assumption in their architectures that every component will eventually fail. They all rely on two things: redundancy and containment. Redundancy = multiple independent systems, each capable of catching a failure in the others. Containment = when failure occurs, limit the blast radius so it cannot become systemic. This is the only question that matters for any mission-critical system: does your architecture have more than one line of defense? Canton's architecture Let's apply this test to Canton. Canton's privacy and integrity model relies on a single mechanism: trusted operators segregating data between participants. There is no cryptographic verification layer and no independent check. If a few keys of the operators in a validation domain are compromised, manipulated state propagates silently inside opaque chains of UTXOs with nothing watching. This is a real systemic risk, accelerated by the rise of AI-assisted cyberattacks. By Canton's own logic — a single point of failure with catastrophic consequences — this is the architecture that should concern regulators. Prividium's architecture Now look at how Prividium is built. Redundancy. Prividium has three independent lines of defense. First, institutional partners operate Prividium nodes within their own security environments, the same infrastructure banks already trust and regulate. Second, zero-knowledge proofs provide cryptographic integrity verification as an independent layer on top, verifying operational security rather than replacing it. Third, as ZK proof systems standardize, multiple independent provers can verify the same computation. A flaw in one implementation gets caught by another. Containment. Each Prividium instance is an individual chain operated by an individual institution. When institutions interact across chains, Prividium's interop layer implements inter-chain accounting mechanisms that are independently enforced by the participating institutions, asset issuers, or on-chain. Even an attacker who compromises a single institution's internal IT infrastructure and simultaneously finds a ZKP bug could only affect that one Prividium instance. The damage cannot propagate to the broader network. The net balance: Canton has a single mechanism, no fallback, silent failure propagation across the network. Prividium has layered defenses, independent verification, blast radius contained by design. Importance of open standards Multiple lines of defense only matter if each line is itself strong. What makes a technology strong? The depth of adversarial testing it has survived. Shaul points to a compiler bug example in his post, and it actually illustrates this well. ZKsync embraced full EVM equivalence over a year ago. This was shaped precisely by the understanding that the more you deviate from an open standard, the larger your attack surface becomes. And Ethereum is not battle-tested in some polite, academic sense. For over a decade, its smart contract infrastructure has been completely open to scrutiny by the most sophisticated adversarial actors in the world, with hundreds of billions of dollars at stake. Vulnerabilities and exploits fed directly back into the ecosystem: new audit standards, formal verification tools, compiler safeguards, and hardened design patterns. The EVM that exists today is the product of a decade of continuous adversarial stress testing at a scale no other smart contract platform has experienced. Canton went the opposite direction. DAML is a proprietary smart contract language with a closed ecosystem and a fraction of the developer and security community. Every growing pain that Ethereum went through over the last ten years still lies ahead for DAML, except DAML will face them with orders of magnitude fewer eyes watching. Every maturity concern Canton raises about ZKPs applies to their own technology stack with far less mitigation available. The safest technology is the one that has survived the longest under the harshest conditions. For smart contract infrastructure, that is Ethereum. It's not close. So to answer the question directly: everyone agrees bugs exist. The question is whether your architecture has redundancy to catch them and containment to limit the damage when they slip through. Cryptographic verification provides both. Trust in operators provides neither.

English
21
15
99
19K
Luis retweetledi
Luis
Luis@TrenchWeb3·
Solana: @CantonNetwork is bad! Meanwhile on Solana.
P2P.me@P2Pdotme

A note on the Polymarket positions you've seen on-chain - the account named "P2P Team" is ours. We wanted to come out honestly. The capital came from our foundation account and all proceeds return to it. Here's the full picture. 10 days before our raise went live, we placed bets that we'd hit our $6M+ target. At that point we had one oral commitment from Multicoin ($3M) - no signed term sheets, no guaranteed allocations, nothing binding. We were betting on ourselves. We'd told the market we were raising over $6M. We believed we could. That bet was our way of backing our word with our own money at a moment when the outcome was genuinely uncertain. Over the following 10 days we made our case, secured commitments, and the raise closed at $5.2M - entirely from outside investors we don't control. We understand why this raises questions. Trading on an outcome you can influence erodes trust. We don't believe we were trading on a done deal, but we recognize reasonable people can see it differently. We named the account "P2P Team" deliberately - to give a marketing signal of our presence to the community and reflect our intent to be transparent. But intent isn't the same as action. Not disclosing at the time was a mistake we own. We took time to study the legal implications before speaking, which is why we stayed silent until now with a "No Comments" stance! - that too is a fair criticism. All proceeds go back into our futarchy-governed MetaDAO treasury. We will be liquidating all positions in the next few hours and are putting together a formal company policy on prediction market trading going forward. One thing we want to be unambiguous about: MetaDAO (@MetaDAOProject ) had zero knowledge of or involvement in these bets. We're genuinely excited to join this community and wanted to start on the right note - which means being straight with you about this.

English
0
2
19
2K