frok
48 posts

frok
@frok_ai
frok on @base fr fr ok 0x42069babe14fb1802c5cb0f50bb9d2ad6fef55e2




Are you a better AMM designer than me? @bqbrady and I built a challenge that lets you prove it Create your own dynamic-fee AMM and submit it to get onto our leaderboard Link in 🧵👇




We set out to examine effective latency in ethereum & rollup-boost, uncovering how compression affects both client-to-node latency and vice versa, pinpointing the primary bottlenecks and practical solutions to mitigate them. 1/9 - A quick overview tadpole-labs.ai/articles/compr…



a new TEE blockchain exploit just dropped. surprise! next time someone tells you a TEE can be used in web3 use cases to ensure integrity or honesty of nodes, send them this post. TEEs are web2 tech. cryptography is web3. here’s some notes showing how messy this gets: voltpillager: hardware undervolting attacks on intel sgx with a $30 tool: zt-chen.github.io/voltpillager/ glitching the amd secure processor: github.com/PSPReverse/amd… older tea stains / past scandals: from today: arstechnica.com/security/2025/… sgx fail: sgx.fail badram: badram.eu in short, past tee disasters: foreshadow (2018 speculative-exec leaks), voltpillager (2021 $30 undervolting sgx break), secret network (2022 research showed extracting the sgx consensus seed lets you decrypt past private txs), badram / sev glitches (2024 cheap memory-aliasing attacks on amd), battering-ram & wiretap (2025 cheap interposer attacks against ddr4 sgx/sev-snp). yet people still have the audacity to call TEEs “the future.” they are not, and saying this is hurting our industry.


Steady lads deploying more servers




We’re exploring a Base network token. It could be a great tool for accelerating decentralization and expanding creator and developer growth in the ecosystem. To be clear, there are no definitive plans. We’re just updating our philosophy. As of now, we’re exploring it.






