walkersync.eth (∎, ∆)

5.5K posts

walkersync.eth (∎, ∆) banner
walkersync.eth (∎, ∆)

walkersync.eth (∎, ∆)

@CryptoWalker46

#BITCOIN | Angel Investor | Trader | Onchain Researcher | $ZK maxi | Delegate @zksync

Not Financial Advice Entrou em Aralık 2019
641 Seguindo2.3K Seguidores
Tweet fixado
walkersync.eth (∎, ∆)
walkersync.eth (∎, ∆)@CryptoWalker46·
📒 Crypto Liquidity Playbook (Dec–Apr → Post-April) 🟢 Phase 1: Liquidity Wave (Dec–Apr) • Macro backdrop: ~$40B/month T-bill RMPs = stealth liquidity injection. • Crypto impact: • BTC: ETF inflows + macro liquidity = strong bid. Expect grind higher, reduced volatility. • ETH: Staking yields look attractive vs fading T-bill yields. ETH/BTC ratio could strengthen. • Alts: Liquidity spillover → rotation into higher beta names (L2s, DeFi, meme coins). • Stablecoins: Net inflows as fiat liquidity gets recycled into crypto rails. Playbook moves: • Position in majors (BTC, ETH) early → capture liquidity drift. • Rotate into alts once majors stabilize. • Monitor stablecoin supply growth as leading indicator. 🟡 Phase 2: Seasonal Fade (Post-April) • Macro backdrop: Liquidity injections taper → risk-off bias. • Crypto impact: • BTC: Potential consolidation or retrace; ETF flows may cushion downside. • ETH: Yield narrative holds, but less macro tailwind. • Alts: Higher volatility, sharper corrections. Riskier to hold without momentum. • Stablecoins: Supply growth slows or reverses → signal of tightening. Playbook moves: • Reduce beta exposure (alts) before fade. • Hedge majors with options or stablecoin rotation. • Watch for liquidity proxies (reverse repo balances, T-bill yields). 📊 Key Indicators to Track • Stablecoin supply growth (USDT, USDC). • BTC ETF net flows. • ETH staking participation. • Global liquidity gauges (Fed balance sheet, RRP usage). ⚡ TL;DR: • Dec–Apr: Ride the liquidity wave → BTC/ETH strength, alt rotations. • Post-April: Expect fade → tighten risk, rotate to majors/stables. 2026 will give us two possible exit windows. Window 1: February 15 – March 10, 2026 Window 2: March 20 – April 14, 2026
English
3
1
11
1.2K
walkersync.eth (∎, ∆) retweetou
ALEX | ZK
ALEX | ZK@gluk64·
Incisive piece raising the question the entire tokenized securities industry skipped: what is the token, as a matter of law? Is it the security itself? An instruction to a transfer agent? A receipt for a record that lives somewhere else? Turns out, almost every protocol shipped compliance infrastructure without answering this first. The result is tokens that exist onchain, but the actual ownership record still sits with an intermediary offchain. Every institution still reconciles against an offchain ledger. Settlement still waits on intermediary processing. Collateral can't move freely because the token doesn't carry its own legal weight. You've added a technology layer without removing the friction it was supposed to eliminate. Gabe's answer: the onchain state has to be legally authoritative. The obvious objection is privacy. No institution will put its real ledger on a public chain in plaintext. But as Gabe argues, privacy and public-chain settlement aren't in tension if you put the privacy at the right layer. As he puts it: "ZKsync's Prividium is the most developed version of this architecture, already in use by Deutsche Bank and several US regional banks"
_gabrielShapir0@lex_node

x.com/i/article/2037…

English
6
13
81
8.2K
walkersync.eth (∎, ∆) retweetou
Grok
Grok@grok·
Here's a short recap: Canton claims ZK proofs are too risky for finance due to complex, undetectable bugs creating systemic risk. Counter: Mission-critical tech (aviation, nuclear) succeeds via redundancy + containment, not perfection. Canton relies on trusted operators only (single failure point, silent propagation). Prividium adds layers: institutional nodes, independent ZK verification, multi-prover checks, per-chain containment. Ethereum's open, battle-tested EVM beats Canton's proprietary DAML for security through adversarial scrutiny. Crypto verification beats pure trust.
English
5
23
126
10.9K
walkersync.eth (∎, ∆)
walkersync.eth (∎, ∆)@CryptoWalker46·
🚨 At DAS one thing was crystal clear: Institutions want crypto rails, but they won’t move onchain without privacy. Enter @zksync Prividium: the scalable privacy layer built to unlock trillions in tokenized assets & payments. This isn’t speculation. The biggest players are calling privacy their #1 requirement. The future of finance is being written and it’s @zksync $ZK for more read below 👇
Arjun@neuralunlock

One thing was clear at DAS: The world's largest institutions want crypto rails, but in order to come onchain, they need privacy. Whoever builds the most secure, scalable privacy solution will be able to capture trillions in tokenized assets and payments volumes. This is not a hypothetical... privacy has come up in nearly every conversation with the most influential players at the table.

English
3
1
13
417
walkersync.eth (∎, ∆)
walkersync.eth (∎, ∆)@CryptoWalker46·
Canton warns ZKPs are “too risky.” Reality check: their own infra has one line of defense trust in operators. Silent failures spread. Prividium = layered defenses + containment + open standards. ZKPs don’t add risk, they add resilience. 👉 Trust math, not middlemen Canton's ceiling is ZK's floor. $ZK is the way.
ALEX | ZK@gluk64

Canton founders claim ZK proofs are too risky for institutional finance. They have been making this argument to buyers and regulators, publicly and behind closed doors. It deserves a public answer. Let's see if the argument holds — and if Canton's infrastructure passes its own test. The argument Their case, stated fairly: ZKPs are complex. Bugs are inevitable in any sufficiently complex system. If a flaw exists in a proof system, it could go undetected because the underlying data is private. If it goes undetected, it spreads throughout the system. This creates systemic risk. Therefore, ZKPs cannot be used for critical financial infrastructure. This is a real concern. Let's take it seriously and follow the logic. The flaw in the logic Strip away the ZKP-specific language, here's the story: Technology X can have implementation flaws. Technology X serves a mission-critical function. If it fails, the consequences are catastrophic. Therefore, Technology X can never be used. Read it again. There is a hidden assumption doing all the work: that Technology X is your only line of defense. If this logic held, we would not have aviation. Fly-by-wire, engine controllers, autopilot — every one of these systems has bugs, is mission-critical, and can fail catastrophically. Nuclear reactor control systems, robotic surgery, radiation therapy dosing, implantable cardiac devices, and many other systems all run on software that can fail catastrophically. But they are somehow still in use. How? Redundancy and containment The foundation for these mission-critical systems is the explicit assumption in their architectures that every component will eventually fail. They all rely on two things: redundancy and containment. Redundancy = multiple independent systems, each capable of catching a failure in the others. Containment = when failure occurs, limit the blast radius so it cannot become systemic. This is the only question that matters for any mission-critical system: does your architecture have more than one line of defense? Canton's architecture Let's apply this test to Canton. Canton's privacy and integrity model relies on a single mechanism: trusted operators segregating data between participants. There is no cryptographic verification layer and no independent check. If a few keys of the operators in a validation domain are compromised, manipulated state propagates silently inside opaque chains of UTXOs with nothing watching. This is a real systemic risk, accelerated by the rise of AI-assisted cyberattacks. By Canton's own logic — a single point of failure with catastrophic consequences — this is the architecture that should concern regulators. Prividium's architecture Now look at how Prividium is built. Redundancy. Prividium has three independent lines of defense. First, institutional partners operate Prividium nodes within their own security environments, the same infrastructure banks already trust and regulate. Second, zero-knowledge proofs provide cryptographic integrity verification as an independent layer on top, verifying operational security rather than replacing it. Third, as ZK proof systems standardize, multiple independent provers can verify the same computation. A flaw in one implementation gets caught by another. Containment. Each Prividium instance is an individual chain operated by an individual institution. When institutions interact across chains, Prividium's interop layer implements inter-chain accounting mechanisms that are independently enforced by the participating institutions, asset issuers, or on-chain. Even an attacker who compromises a single institution's internal IT infrastructure and simultaneously finds a ZKP bug could only affect that one Prividium instance. The damage cannot propagate to the broader network. The net balance: Canton has a single mechanism, no fallback, silent failure propagation across the network. Prividium has layered defenses, independent verification, blast radius contained by design. Importance of open standards Multiple lines of defense only matter if each line is itself strong. What makes a technology strong? The depth of adversarial testing it has survived. Shaul points to a compiler bug example in his post, and it actually illustrates this well. ZKsync embraced full EVM equivalence over a year ago. This was shaped precisely by the understanding that the more you deviate from an open standard, the larger your attack surface becomes. And Ethereum is not battle-tested in some polite, academic sense. For over a decade, its smart contract infrastructure has been completely open to scrutiny by the most sophisticated adversarial actors in the world, with hundreds of billions of dollars at stake. Vulnerabilities and exploits fed directly back into the ecosystem: new audit standards, formal verification tools, compiler safeguards, and hardened design patterns. The EVM that exists today is the product of a decade of continuous adversarial stress testing at a scale no other smart contract platform has experienced. Canton went the opposite direction. DAML is a proprietary smart contract language with a closed ecosystem and a fraction of the developer and security community. Every growing pain that Ethereum went through over the last ten years still lies ahead for DAML, except DAML will face them with orders of magnitude fewer eyes watching. Every maturity concern Canton raises about ZKPs applies to their own technology stack with far less mitigation available. The safest technology is the one that has survived the longest under the harshest conditions. For smart contract infrastructure, that is Ethereum. It's not close. So to answer the question directly: everyone agrees bugs exist. The question is whether your architecture has redundancy to catch them and containment to limit the damage when they slip through. Cryptographic verification provides both. Trust in operators provides neither.

English
9
6
50
3.7K
walkersync.eth (∎, ∆) retweetou
ALEX | ZK
ALEX | ZK@gluk64·
Canton is not a blockchain, and it's NOT a semantic difference. This materially limits their ability to protect transacting parties, which is the entire reason the blockchain technology exists.
ALEX | ZK@gluk64

Yuval is trying to manufacture a gotcha, so let me set the record straight: If you deploy a smart contract on Ethereum, you have FULL CONTROL over how that contract will behave. Same if you deploy your own L2 or a Prividium instance: you determine the rules of that environment completely. This is exactly why banks and institutions are comfortable building on public chains. But any real smart contract limits the ability of transacting parties to exert control over the assets inside it. That's the entire point. You set the rules upfront, enforced by code in real time — not by contractual promises that take years and millions of dollars to litigate. This is what makes blockchains a genuine upgrade over legacy financial infrastructure. Would an issuer ever want to limit their own control? Of course! Issuers do it every day. Anti-dilution protections, debt covenants, dividend waterfalls — these are all promises issuers make to investors that say "I won't do X." Today those promises are enforced by lawyers. Smart contracts can enforce them by math. So the real question every institution should ask their blockchain provider: can your platform actually enforce this logic, or does the issuer always retain root access to the asset? Canton requires issuers to retain full administrative control, which fundamentally undermines the network's ability to protect transacting parties. On Ethereum, enforcement is guaranteed by math and open-source code. Canton calls that a feature, but every investor on the other side of the trade should call it a risk.

English
25
27
274
28.4K
Andy
Andy@andyyy·
Wow this Canton vs. every public blockchain battle was not what I expected to see on the feed on a Friday afternoon
ALEX | ZK@gluk64

Canton founders claim ZK proofs are too risky for institutional finance. They have been making this argument to buyers and regulators, publicly and behind closed doors. It deserves a public answer. Let's see if the argument holds — and if Canton's infrastructure passes its own test. The argument Their case, stated fairly: ZKPs are complex. Bugs are inevitable in any sufficiently complex system. If a flaw exists in a proof system, it could go undetected because the underlying data is private. If it goes undetected, it spreads throughout the system. This creates systemic risk. Therefore, ZKPs cannot be used for critical financial infrastructure. This is a real concern. Let's take it seriously and follow the logic. The flaw in the logic Strip away the ZKP-specific language, here's the story: Technology X can have implementation flaws. Technology X serves a mission-critical function. If it fails, the consequences are catastrophic. Therefore, Technology X can never be used. Read it again. There is a hidden assumption doing all the work: that Technology X is your only line of defense. If this logic held, we would not have aviation. Fly-by-wire, engine controllers, autopilot — every one of these systems has bugs, is mission-critical, and can fail catastrophically. Nuclear reactor control systems, robotic surgery, radiation therapy dosing, implantable cardiac devices, and many other systems all run on software that can fail catastrophically. But they are somehow still in use. How? Redundancy and containment The foundation for these mission-critical systems is the explicit assumption in their architectures that every component will eventually fail. They all rely on two things: redundancy and containment. Redundancy = multiple independent systems, each capable of catching a failure in the others. Containment = when failure occurs, limit the blast radius so it cannot become systemic. This is the only question that matters for any mission-critical system: does your architecture have more than one line of defense? Canton's architecture Let's apply this test to Canton. Canton's privacy and integrity model relies on a single mechanism: trusted operators segregating data between participants. There is no cryptographic verification layer and no independent check. If a few keys of the operators in a validation domain are compromised, manipulated state propagates silently inside opaque chains of UTXOs with nothing watching. This is a real systemic risk, accelerated by the rise of AI-assisted cyberattacks. By Canton's own logic — a single point of failure with catastrophic consequences — this is the architecture that should concern regulators. Prividium's architecture Now look at how Prividium is built. Redundancy. Prividium has three independent lines of defense. First, institutional partners operate Prividium nodes within their own security environments, the same infrastructure banks already trust and regulate. Second, zero-knowledge proofs provide cryptographic integrity verification as an independent layer on top, verifying operational security rather than replacing it. Third, as ZK proof systems standardize, multiple independent provers can verify the same computation. A flaw in one implementation gets caught by another. Containment. Each Prividium instance is an individual chain operated by an individual institution. When institutions interact across chains, Prividium's interop layer implements inter-chain accounting mechanisms that are independently enforced by the participating institutions, asset issuers, or on-chain. Even an attacker who compromises a single institution's internal IT infrastructure and simultaneously finds a ZKP bug could only affect that one Prividium instance. The damage cannot propagate to the broader network. The net balance: Canton has a single mechanism, no fallback, silent failure propagation across the network. Prividium has layered defenses, independent verification, blast radius contained by design. Importance of open standards Multiple lines of defense only matter if each line is itself strong. What makes a technology strong? The depth of adversarial testing it has survived. Shaul points to a compiler bug example in his post, and it actually illustrates this well. ZKsync embraced full EVM equivalence over a year ago. This was shaped precisely by the understanding that the more you deviate from an open standard, the larger your attack surface becomes. And Ethereum is not battle-tested in some polite, academic sense. For over a decade, its smart contract infrastructure has been completely open to scrutiny by the most sophisticated adversarial actors in the world, with hundreds of billions of dollars at stake. Vulnerabilities and exploits fed directly back into the ecosystem: new audit standards, formal verification tools, compiler safeguards, and hardened design patterns. The EVM that exists today is the product of a decade of continuous adversarial stress testing at a scale no other smart contract platform has experienced. Canton went the opposite direction. DAML is a proprietary smart contract language with a closed ecosystem and a fraction of the developer and security community. Every growing pain that Ethereum went through over the last ten years still lies ahead for DAML, except DAML will face them with orders of magnitude fewer eyes watching. Every maturity concern Canton raises about ZKPs applies to their own technology stack with far less mitigation available. The safest technology is the one that has survived the longest under the harshest conditions. For smart contract infrastructure, that is Ethereum. It's not close. So to answer the question directly: everyone agrees bugs exist. The question is whether your architecture has redundancy to catch them and containment to limit the damage when they slip through. Cryptographic verification provides both. Trust in operators provides neither.

English
31
8
195
67.1K
zaksans.grvt
zaksans.grvt@ZaksansPG·
Weak. “there will always be bugs” lmao. that's not the bar. the real question is: do users have to trust you when things break or can they verify what's happening if your answer is “trust us, we'll detect it” you're just rebuilding the same black box with nicer words this is exactly why @zksync exists zk forces integrity to be proven, not assumed until you ship something better, this is just cope ZK is the endgame. 🫳🎤
Shaul Kfir@ShaulKfir

I guess it's that time of the day again to warn about the systemic risk of relying on ZKP for privacy... 🧵

English
7
3
32
978
walkersync.eth (∎, ∆) retweetou
Dino ZK (∎, 🔥)
Dino ZK (∎, 🔥)@DinoMaxZK·
Canton ceiling is @zksync floor. $ZK is the way.
ALEX | ZK@gluk64

Canton founders claim ZK proofs are too risky for institutional finance. They have been making this argument to buyers and regulators, publicly and behind closed doors. It deserves a public answer. Let's see if the argument holds — and if Canton's infrastructure passes its own test. The argument Their case, stated fairly: ZKPs are complex. Bugs are inevitable in any sufficiently complex system. If a flaw exists in a proof system, it could go undetected because the underlying data is private. If it goes undetected, it spreads throughout the system. This creates systemic risk. Therefore, ZKPs cannot be used for critical financial infrastructure. This is a real concern. Let's take it seriously and follow the logic. The flaw in the logic Strip away the ZKP-specific language, here's the story: Technology X can have implementation flaws. Technology X serves a mission-critical function. If it fails, the consequences are catastrophic. Therefore, Technology X can never be used. Read it again. There is a hidden assumption doing all the work: that Technology X is your only line of defense. If this logic held, we would not have aviation. Fly-by-wire, engine controllers, autopilot — every one of these systems has bugs, is mission-critical, and can fail catastrophically. Nuclear reactor control systems, robotic surgery, radiation therapy dosing, implantable cardiac devices, and many other systems all run on software that can fail catastrophically. But they are somehow still in use. How? Redundancy and containment The foundation for these mission-critical systems is the explicit assumption in their architectures that every component will eventually fail. They all rely on two things: redundancy and containment. Redundancy = multiple independent systems, each capable of catching a failure in the others. Containment = when failure occurs, limit the blast radius so it cannot become systemic. This is the only question that matters for any mission-critical system: does your architecture have more than one line of defense? Canton's architecture Let's apply this test to Canton. Canton's privacy and integrity model relies on a single mechanism: trusted operators segregating data between participants. There is no cryptographic verification layer and no independent check. If a few keys of the operators in a validation domain are compromised, manipulated state propagates silently inside opaque chains of UTXOs with nothing watching. This is a real systemic risk, accelerated by the rise of AI-assisted cyberattacks. By Canton's own logic — a single point of failure with catastrophic consequences — this is the architecture that should concern regulators. Prividium's architecture Now look at how Prividium is built. Redundancy. Prividium has three independent lines of defense. First, institutional partners operate Prividium nodes within their own security environments, the same infrastructure banks already trust and regulate. Second, zero-knowledge proofs provide cryptographic integrity verification as an independent layer on top, verifying operational security rather than replacing it. Third, as ZK proof systems standardize, multiple independent provers can verify the same computation. A flaw in one implementation gets caught by another. Containment. Each Prividium instance is an individual chain operated by an individual institution. When institutions interact across chains, Prividium's interop layer implements inter-chain accounting mechanisms that are independently enforced by the participating institutions, asset issuers, or on-chain. Even an attacker who compromises a single institution's internal IT infrastructure and simultaneously finds a ZKP bug could only affect that one Prividium instance. The damage cannot propagate to the broader network. The net balance: Canton has a single mechanism, no fallback, silent failure propagation across the network. Prividium has layered defenses, independent verification, blast radius contained by design. Importance of open standards Multiple lines of defense only matter if each line is itself strong. What makes a technology strong? The depth of adversarial testing it has survived. Shaul points to a compiler bug example in his post, and it actually illustrates this well. ZKsync embraced full EVM equivalence over a year ago. This was shaped precisely by the understanding that the more you deviate from an open standard, the larger your attack surface becomes. And Ethereum is not battle-tested in some polite, academic sense. For over a decade, its smart contract infrastructure has been completely open to scrutiny by the most sophisticated adversarial actors in the world, with hundreds of billions of dollars at stake. Vulnerabilities and exploits fed directly back into the ecosystem: new audit standards, formal verification tools, compiler safeguards, and hardened design patterns. The EVM that exists today is the product of a decade of continuous adversarial stress testing at a scale no other smart contract platform has experienced. Canton went the opposite direction. DAML is a proprietary smart contract language with a closed ecosystem and a fraction of the developer and security community. Every growing pain that Ethereum went through over the last ten years still lies ahead for DAML, except DAML will face them with orders of magnitude fewer eyes watching. Every maturity concern Canton raises about ZKPs applies to their own technology stack with far less mitigation available. The safest technology is the one that has survived the longest under the harshest conditions. For smart contract infrastructure, that is Ethereum. It's not close. So to answer the question directly: everyone agrees bugs exist. The question is whether your architecture has redundancy to catch them and containment to limit the damage when they slip through. Cryptographic verification provides both. Trust in operators provides neither.

English
10
9
46
1.7K
walkersync.eth (∎, ∆) retweetou
ALEX | ZK
ALEX | ZK@gluk64·
Canton founders claim ZK proofs are too risky for institutional finance. They have been making this argument to buyers and regulators, publicly and behind closed doors. It deserves a public answer. Let's see if the argument holds — and if Canton's infrastructure passes its own test. The argument Their case, stated fairly: ZKPs are complex. Bugs are inevitable in any sufficiently complex system. If a flaw exists in a proof system, it could go undetected because the underlying data is private. If it goes undetected, it spreads throughout the system. This creates systemic risk. Therefore, ZKPs cannot be used for critical financial infrastructure. This is a real concern. Let's take it seriously and follow the logic. The flaw in the logic Strip away the ZKP-specific language, here's the story: Technology X can have implementation flaws. Technology X serves a mission-critical function. If it fails, the consequences are catastrophic. Therefore, Technology X can never be used. Read it again. There is a hidden assumption doing all the work: that Technology X is your only line of defense. If this logic held, we would not have aviation. Fly-by-wire, engine controllers, autopilot — every one of these systems has bugs, is mission-critical, and can fail catastrophically. Nuclear reactor control systems, robotic surgery, radiation therapy dosing, implantable cardiac devices, and many other systems all run on software that can fail catastrophically. But they are somehow still in use. How? Redundancy and containment The foundation for these mission-critical systems is the explicit assumption in their architectures that every component will eventually fail. They all rely on two things: redundancy and containment. Redundancy = multiple independent systems, each capable of catching a failure in the others. Containment = when failure occurs, limit the blast radius so it cannot become systemic. This is the only question that matters for any mission-critical system: does your architecture have more than one line of defense? Canton's architecture Let's apply this test to Canton. Canton's privacy and integrity model relies on a single mechanism: trusted operators segregating data between participants. There is no cryptographic verification layer and no independent check. If a few keys of the operators in a validation domain are compromised, manipulated state propagates silently inside opaque chains of UTXOs with nothing watching. This is a real systemic risk, accelerated by the rise of AI-assisted cyberattacks. By Canton's own logic — a single point of failure with catastrophic consequences — this is the architecture that should concern regulators. Prividium's architecture Now look at how Prividium is built. Redundancy. Prividium has three independent lines of defense. First, institutional partners operate Prividium nodes within their own security environments, the same infrastructure banks already trust and regulate. Second, zero-knowledge proofs provide cryptographic integrity verification as an independent layer on top, verifying operational security rather than replacing it. Third, as ZK proof systems standardize, multiple independent provers can verify the same computation. A flaw in one implementation gets caught by another. Containment. Each Prividium instance is an individual chain operated by an individual institution. When institutions interact across chains, Prividium's interop layer implements inter-chain accounting mechanisms that are independently enforced by the participating institutions, asset issuers, or on-chain. Even an attacker who compromises a single institution's internal IT infrastructure and simultaneously finds a ZKP bug could only affect that one Prividium instance. The damage cannot propagate to the broader network. The net balance: Canton has a single mechanism, no fallback, silent failure propagation across the network. Prividium has layered defenses, independent verification, blast radius contained by design. Importance of open standards Multiple lines of defense only matter if each line is itself strong. What makes a technology strong? The depth of adversarial testing it has survived. Shaul points to a compiler bug example in his post, and it actually illustrates this well. ZKsync embraced full EVM equivalence over a year ago. This was shaped precisely by the understanding that the more you deviate from an open standard, the larger your attack surface becomes. And Ethereum is not battle-tested in some polite, academic sense. For over a decade, its smart contract infrastructure has been completely open to scrutiny by the most sophisticated adversarial actors in the world, with hundreds of billions of dollars at stake. Vulnerabilities and exploits fed directly back into the ecosystem: new audit standards, formal verification tools, compiler safeguards, and hardened design patterns. The EVM that exists today is the product of a decade of continuous adversarial stress testing at a scale no other smart contract platform has experienced. Canton went the opposite direction. DAML is a proprietary smart contract language with a closed ecosystem and a fraction of the developer and security community. Every growing pain that Ethereum went through over the last ten years still lies ahead for DAML, except DAML will face them with orders of magnitude fewer eyes watching. Every maturity concern Canton raises about ZKPs applies to their own technology stack with far less mitigation available. The safest technology is the one that has survived the longest under the harshest conditions. For smart contract infrastructure, that is Ethereum. It's not close. So to answer the question directly: everyone agrees bugs exist. The question is whether your architecture has redundancy to catch them and containment to limit the damage when they slip through. Cryptographic verification provides both. Trust in operators provides neither.
English
96
120
755
216.9K
MadMaxx (∎, ∆)
MadMaxx (∎, ∆)@MadMaxx_eth·
How it started vs how it's going Or When you hire average CT retard
MadMaxx (∎, ∆) tweet mediaMadMaxx (∎, ∆) tweet media
English
8
1
18
545
walkersync.eth (∎, ∆) retweetou
ZK_INDIA
ZK_INDIA@india_zksync·
“Tokenized deposits are how banks bring money onchain without leaving the regulatory system.” -Alex Gluchowski aur yehi hai game changer.... .@zksync × .@BitGo ye pura banking system upgrade kar rahe hain. 👉 Real bank money + blockchain speed 👉 Fully compliant + programmable 👉 No need for stablecoins Simple words mein: Bank ka paisa bhi ab crypto jaisa behave karega Mass adoption ka asli trigger yahi ho sakta hai get positioned or regret later $ZK
ZKsync@zksync

"Banks are on a race to modernize. Working with @BitGo, we offer a full stack tokenized deposits solution enabling every financial institution to compete on the digital assets economy." @gluk64 laying out the vision of our partnership with @BitGo on stage at @blockworksDAS.

English
2
8
21
662