EVATO▫️

3.2K posts

EVATO▫️ banner
EVATO▫️

EVATO▫️

@evatocrypt

interop researcher. chief contributing officer @ a lot

onchain Tham gia Aralık 2021
3 Đang theo dõi515 Người theo dõi
EVATO▫️
EVATO▫️@evatocrypt·
@DrNickA we don't necessarily need to fight.. we just have to ignore the false permissionless protocols and centralized ones too.. they will lose momentum as time tary
English
0
0
0
13
BeanBee 🐝
BeanBee 🐝@BeanBeeAI·
@VeryAI Failure modes matter more than accuracy at small scale.
English
1
0
1
54
VeryAI
VeryAI@VeryAI·
Most biometric systems break at global scale. Face, fingerprint, iris – each fail for different reasons. Here’s what actually works (and why) ↓
English
19
8
114
6.3K
EVATO▫️
EVATO▫️@evatocrypt·
@NickyScanz So real.. 😂.. I tried keeping them hidden after the 3rd beer but it went out anyway
English
0
0
0
13
andy | mnstr mode
andy | mnstr mode@andy8052·
This is insane because they only made $15,000 Like you are risking your rep and doing weird stuff to make $15,000 when raising $6m? Makes zero sense
P2P.me (TGE arc)@P2Pdotme

A note on the Polymarket positions you've seen on-chain - the account named "P2P Team" is ours. We wanted to come out honestly. The capital came from our foundation account and all proceeds return to it. Here's the full picture. 10 days before our raise went live, we placed bets that we'd hit our $6M+ target. At that point we had one oral commitment from Multicoin ($3M) - no signed term sheets, no guaranteed allocations, nothing binding. We were betting on ourselves. We'd told the market we were raising over $6M. We believed we could. That bet was our way of backing our word with our own money at a moment when the outcome was genuinely uncertain. Over the following 10 days we made our case, secured commitments, and the raise closed at $5.2M - entirely from outside investors we don't control. We understand why this raises questions. Trading on an outcome you can influence erodes trust. We don't believe we were trading on a done deal, but we recognize reasonable people can see it differently. We named the account "P2P Team" deliberately - to give a marketing signal of our presence to the community and reflect our intent to be transparent. But intent isn't the same as action. Not disclosing at the time was a mistake we own. We took time to study the legal implications before speaking, which is why we stayed silent until now with a "No Comments" stance! - that too is a fair criticism. All proceeds go back into our futarchy-governed MetaDAO treasury. We will be liquidating all positions in the next few hours and are putting together a formal company policy on prediction market trading going forward. One thing we want to be unambiguous about: MetaDAO (@MetaDAOProject ) had zero knowledge of or involvement in these bets. We're genuinely excited to join this community and wanted to start on the right note - which means being straight with you about this.

English
7
1
47
8.9K
EVATO▫️
EVATO▫️@evatocrypt·
@JasonYanowitz This is incredible tbh.. have you considered having one in west Africa, like lagos??
English
0
0
0
22
Yano 🟪
Yano 🟪@JasonYanowitz·
What a special week. What most don't realize is that we have an events team of only 3 people. Crazy feat for a team that small to pull off an event of this scale. Thanks to everyone who joined us in New York, see you at our next DAS in London.
Digital Asset Summit 2026@blockworksDAS

DAS NYC 2026 is in the books! Thank you to everyone who joined us for an incredible week at the crypto's premier institutional event Next up: October 20-21 in London 🇬🇧

English
18
4
126
9.2K
EVATO▫️
EVATO▫️@evatocrypt·
@grebby I guess professionalism is what matters. But where you got you professionalism doesn't
English
0
0
0
4
greb
greb@grebby·
the only industry where you can be working with a 16 year old or a 55 year old and they might actually both be really good at their jobs there aint no school or classes for stuff like this just do it
Galileo@galileowilson

Crypto is probably the only industry where background genuinely does not matter You can be a random high schooler in the middle of nowhere and still print money if you know what to do This is probably the #1 reason why I love this space so much, every single person gets a fair shot to make it

English
44
3
119
6K
CBB
CBB@Cbb0fe·
After a decade of worthless shitcoins dumped on retards I don’t think the crypto market has a lot of opportunities left But the ones remaining are insanely huge Equity perps
English
86
14
827
73.8K
david phelps
david phelps@divine_economy·
i criticize ethereum a lot for a simple reason: i'm an ethereum builder. it's my home. for the past few years i've meant that abstractly as i've built across 100+ L2s. today i mean that concretely that i'm building a consumer app on the L1. excited the future is finally here.
Confetti@confetti_win

some big news: starting next week, we'll be running our own contests on a new chain ethereum. mainnet. even a year ago it would have been inconceivable to build a consumer app on the L1. today it's an obvious choice. we're going home.

English
19
9
192
9.6K
airtx (🥚,🥚) 🇦🇲
Sui's biggest issue is not it's tech, but it has no idea who it's audience is. These guys coming up with temu PTBs have gotten more organic eyes than any of Sui's posts.
Jules | n/acc@JulesXBT

On @01Exchange a single atomic call can include up to 10 coordinated place and cancel actions within a single transaction

English
8
1
54
4.6K
EVATO▫️
EVATO▫️@evatocrypt·
@0xbrighty A permissionless system protects honest users by default while still allowing society to handle abuse where it actually matters. Privacy is not about hiding crime, It is about removing unnecessary surveillance while preserving freedom and security.
English
0
0
0
14
Brighty.eth (♟️,♟️)
@evatocrypt But how should a truly permissionless system deal with bad actors, I reckon thats usually the reason for assets freezing, but it also means it's not truly self custodial
English
1
0
1
13
EVATO▫️
EVATO▫️@evatocrypt·
Self custody is a Property not a Marketing Term Crypto was created to remove gatekeepers. But today, many products claim decentralization while quietly rebuilding the same control systems crypto was meant to replace. Real self-custody means you and only you control your assets. • You hold the private keys or seed phrase. • No company can freeze, reverse, or block your transactions. • Withdrawals do not require approval. • Access to funds does not depend on a server, admin, or support team. • The protocol continues working even if the founding team disappears. If someone else can stop you from moving your funds, you don’t truly own them. There Is NOT Self-Custody (Even If Marketed That Way) Many platforms blur the line: • Wallets where keys are stored on company servers • Apps requiring KYC to withdraw assets • Smart contracts with admin pause or upgrade powers controlled by a team • “Non-custodial” apps that can blacklist addresses • Bridges or protocols that rely on multisig committees to release funds These are delegated custody systems, not self-custody. Convenient? Yes. Permissionless? No. The Problem With Posing as decentralized is the amount of trust it damages in the this space.. Every collapse of a “fake decentralization” project damages trust across the entire ecosystem, including genuinely decentralized protocols. Permissionless Is a Property, Not a Marketing Term A system is permissionless only when participation does not depend on identity, approval, or trust in operators. The future of this space depends less on new tokens or flashy brands and more on honest architecture.
EVATO▫️ tweet media
English
1
4
14
167
exos
exos@xetoexos·
At this point, it is clear to me that $ZK deserves a violent mark-up. ZKsync has developed the tech that will most likely end up at the heart of modern finance. It is up to you to decide if you want to have a stake in it.
ALEX | ZK@gluk64

Canton founders claim ZK proofs are too risky for institutional finance. They have been making this argument to buyers and regulators, publicly and behind closed doors. It deserves a public answer. Let's see if the argument holds — and if Canton's infrastructure passes its own test. The argument Their case, stated fairly: ZKPs are complex. Bugs are inevitable in any sufficiently complex system. If a flaw exists in a proof system, it could go undetected because the underlying data is private. If it goes undetected, it spreads throughout the system. This creates systemic risk. Therefore, ZKPs cannot be used for critical financial infrastructure. This is a real concern. Let's take it seriously and follow the logic. The flaw in the logic Strip away the ZKP-specific language, here's the story: Technology X can have implementation flaws. Technology X serves a mission-critical function. If it fails, the consequences are catastrophic. Therefore, Technology X can never be used. Read it again. There is a hidden assumption doing all the work: that Technology X is your only line of defense. If this logic held, we would not have aviation. Fly-by-wire, engine controllers, autopilot — every one of these systems has bugs, is mission-critical, and can fail catastrophically. Nuclear reactor control systems, robotic surgery, radiation therapy dosing, implantable cardiac devices, and many other systems all run on software that can fail catastrophically. But they are somehow still in use. How? Redundancy and containment The foundation for these mission-critical systems is the explicit assumption in their architectures that every component will eventually fail. They all rely on two things: redundancy and containment. Redundancy = multiple independent systems, each capable of catching a failure in the others. Containment = when failure occurs, limit the blast radius so it cannot become systemic. This is the only question that matters for any mission-critical system: does your architecture have more than one line of defense? Canton's architecture Let's apply this test to Canton. Canton's privacy and integrity model relies on a single mechanism: trusted operators segregating data between participants. There is no cryptographic verification layer and no independent check. If a few keys of the operators in a validation domain are compromised, manipulated state propagates silently inside opaque chains of UTXOs with nothing watching. This is a real systemic risk, accelerated by the rise of AI-assisted cyberattacks. By Canton's own logic — a single point of failure with catastrophic consequences — this is the architecture that should concern regulators. Prividium's architecture Now look at how Prividium is built. Redundancy. Prividium has three independent lines of defense. First, institutional partners operate Prividium nodes within their own security environments, the same infrastructure banks already trust and regulate. Second, zero-knowledge proofs provide cryptographic integrity verification as an independent layer on top, verifying operational security rather than replacing it. Third, as ZK proof systems standardize, multiple independent provers can verify the same computation. A flaw in one implementation gets caught by another. Containment. Each Prividium instance is an individual chain operated by an individual institution. When institutions interact across chains, Prividium's interop layer implements inter-chain accounting mechanisms that are independently enforced by the participating institutions, asset issuers, or on-chain. Even an attacker who compromises a single institution's internal IT infrastructure and simultaneously finds a ZKP bug could only affect that one Prividium instance. The damage cannot propagate to the broader network. The net balance: Canton has a single mechanism, no fallback, silent failure propagation across the network. Prividium has layered defenses, independent verification, blast radius contained by design. Importance of open standards Multiple lines of defense only matter if each line is itself strong. What makes a technology strong? The depth of adversarial testing it has survived. Shaul points to a compiler bug example in his post, and it actually illustrates this well. ZKsync embraced full EVM equivalence over a year ago. This was shaped precisely by the understanding that the more you deviate from an open standard, the larger your attack surface becomes. And Ethereum is not battle-tested in some polite, academic sense. For over a decade, its smart contract infrastructure has been completely open to scrutiny by the most sophisticated adversarial actors in the world, with hundreds of billions of dollars at stake. Vulnerabilities and exploits fed directly back into the ecosystem: new audit standards, formal verification tools, compiler safeguards, and hardened design patterns. The EVM that exists today is the product of a decade of continuous adversarial stress testing at a scale no other smart contract platform has experienced. Canton went the opposite direction. DAML is a proprietary smart contract language with a closed ecosystem and a fraction of the developer and security community. Every growing pain that Ethereum went through over the last ten years still lies ahead for DAML, except DAML will face them with orders of magnitude fewer eyes watching. Every maturity concern Canton raises about ZKPs applies to their own technology stack with far less mitigation available. The safest technology is the one that has survived the longest under the harshest conditions. For smart contract infrastructure, that is Ethereum. It's not close. So to answer the question directly: everyone agrees bugs exist. The question is whether your architecture has redundancy to catch them and containment to limit the damage when they slip through. Cryptographic verification provides both. Trust in operators provides neither.

English
8
6
50
4K
EVATO▫️
EVATO▫️@evatocrypt·
@ec265 I didn't make mention that eth and sol are the same. Read again Etc.
English
0
0
0
48
EVATO▫️
EVATO▫️@evatocrypt·
The safest technology is the one that last the longest under the hardest conditions. If ETH last, it's safe then same to sol
ALEX | ZK@gluk64

Canton founders claim ZK proofs are too risky for institutional finance. They have been making this argument to buyers and regulators, publicly and behind closed doors. It deserves a public answer. Let's see if the argument holds — and if Canton's infrastructure passes its own test. The argument Their case, stated fairly: ZKPs are complex. Bugs are inevitable in any sufficiently complex system. If a flaw exists in a proof system, it could go undetected because the underlying data is private. If it goes undetected, it spreads throughout the system. This creates systemic risk. Therefore, ZKPs cannot be used for critical financial infrastructure. This is a real concern. Let's take it seriously and follow the logic. The flaw in the logic Strip away the ZKP-specific language, here's the story: Technology X can have implementation flaws. Technology X serves a mission-critical function. If it fails, the consequences are catastrophic. Therefore, Technology X can never be used. Read it again. There is a hidden assumption doing all the work: that Technology X is your only line of defense. If this logic held, we would not have aviation. Fly-by-wire, engine controllers, autopilot — every one of these systems has bugs, is mission-critical, and can fail catastrophically. Nuclear reactor control systems, robotic surgery, radiation therapy dosing, implantable cardiac devices, and many other systems all run on software that can fail catastrophically. But they are somehow still in use. How? Redundancy and containment The foundation for these mission-critical systems is the explicit assumption in their architectures that every component will eventually fail. They all rely on two things: redundancy and containment. Redundancy = multiple independent systems, each capable of catching a failure in the others. Containment = when failure occurs, limit the blast radius so it cannot become systemic. This is the only question that matters for any mission-critical system: does your architecture have more than one line of defense? Canton's architecture Let's apply this test to Canton. Canton's privacy and integrity model relies on a single mechanism: trusted operators segregating data between participants. There is no cryptographic verification layer and no independent check. If a few keys of the operators in a validation domain are compromised, manipulated state propagates silently inside opaque chains of UTXOs with nothing watching. This is a real systemic risk, accelerated by the rise of AI-assisted cyberattacks. By Canton's own logic — a single point of failure with catastrophic consequences — this is the architecture that should concern regulators. Prividium's architecture Now look at how Prividium is built. Redundancy. Prividium has three independent lines of defense. First, institutional partners operate Prividium nodes within their own security environments, the same infrastructure banks already trust and regulate. Second, zero-knowledge proofs provide cryptographic integrity verification as an independent layer on top, verifying operational security rather than replacing it. Third, as ZK proof systems standardize, multiple independent provers can verify the same computation. A flaw in one implementation gets caught by another. Containment. Each Prividium instance is an individual chain operated by an individual institution. When institutions interact across chains, Prividium's interop layer implements inter-chain accounting mechanisms that are independently enforced by the participating institutions, asset issuers, or on-chain. Even an attacker who compromises a single institution's internal IT infrastructure and simultaneously finds a ZKP bug could only affect that one Prividium instance. The damage cannot propagate to the broader network. The net balance: Canton has a single mechanism, no fallback, silent failure propagation across the network. Prividium has layered defenses, independent verification, blast radius contained by design. Importance of open standards Multiple lines of defense only matter if each line is itself strong. What makes a technology strong? The depth of adversarial testing it has survived. Shaul points to a compiler bug example in his post, and it actually illustrates this well. ZKsync embraced full EVM equivalence over a year ago. This was shaped precisely by the understanding that the more you deviate from an open standard, the larger your attack surface becomes. And Ethereum is not battle-tested in some polite, academic sense. For over a decade, its smart contract infrastructure has been completely open to scrutiny by the most sophisticated adversarial actors in the world, with hundreds of billions of dollars at stake. Vulnerabilities and exploits fed directly back into the ecosystem: new audit standards, formal verification tools, compiler safeguards, and hardened design patterns. The EVM that exists today is the product of a decade of continuous adversarial stress testing at a scale no other smart contract platform has experienced. Canton went the opposite direction. DAML is a proprietary smart contract language with a closed ecosystem and a fraction of the developer and security community. Every growing pain that Ethereum went through over the last ten years still lies ahead for DAML, except DAML will face them with orders of magnitude fewer eyes watching. Every maturity concern Canton raises about ZKPs applies to their own technology stack with far less mitigation available. The safest technology is the one that has survived the longest under the harshest conditions. For smart contract infrastructure, that is Ethereum. It's not close. So to answer the question directly: everyone agrees bugs exist. The question is whether your architecture has redundancy to catch them and containment to limit the damage when they slip through. Cryptographic verification provides both. Trust in operators provides neither.

English
2
1
18
1.6K
Golem
Golem@BowTiedGolem·
great article by @TheZKnomist detailing the HUGE news we dropped this week of our institutional partnership with @BitGo highly recommend to go and give it a read to see how Prividium, the bank stack of Ethereum, is coming along slowly at first then everything all at once 🫡
The ZKnomist@TheZKnomist

x.com/i/article/2037…

English
4
2
36
1.5K