Skip to main content

· 11 min read

On November 13, 2024, 0G Labs announced a $40 million funding round led by Hack VC, Delphi Digital, OKX Ventures, Samsung Next, and Animoca Brands, thrusting the team behind this decentralized AI operating system into the spotlight. Their modular approach combines decentralized storage, data availability verification, and decentralized settlement to enable AI applications on-chain. But can they realistically achieve GB/s-level throughput to fuel the next era of AI adoption on Web3? This in-depth report evaluates 0G’s architecture, incentive mechanics, ecosystem traction, and potential pitfalls, aiming to help you gauge whether 0G can deliver on its promise.

Background

The AI sector has been on a meteoric rise, catalyzed by large language models like ChatGPT and ERNIE Bot. Yet AI is more than just chatbots and generative text; it also includes everything from AlphaGo’s Go victories to image generation tools like MidJourney. The holy grail that many developers pursue is a general-purpose AI, or AGI (Artificial General Intelligence)—colloquially described as an AI “Agent” capable of learning, perception, decision-making, and complex execution similar to human intelligence.

However, both AI and AI Agent applications are extremely data-intensive. They rely on massive datasets for training and inference. Traditionally, this data is stored and processed on centralized infrastructure. With the advent of blockchain, a new approach known as DeAI (Decentralized AI) has emerged. DeAI attempts to leverage decentralized networks for data storage, sharing, and verification to overcome the pitfalls of traditional, centralized AI solutions.

0G Labs stands out in this DeAI infrastructure landscape, aiming to build a decentralized AI operating system known simply as 0G.

What Is 0G Labs?

In traditional computing, an Operating System (OS) manages hardware and software resources—think Microsoft Windows, Linux, macOS, iOS, or Android. An OS abstracts away the complexity of the underlying hardware, making it easier for both end-users and developers to interact with the computer.

By analogy, the 0G OS aspires to fulfill a similar role in Web3:

  • Manage decentralized storage, compute, and data availability.
  • Simplify on-chain AI application deployment.

Why decentralization? Conventional AI systems store and process data in centralized silos, raising concerns around data transparency, user privacy, and fair compensation for data providers. 0G’s approach uses decentralized storage, cryptographic proofs, and open incentive models to mitigate these risks.

The name “0G” stands for “Zero Gravity.” The team envisions an environment where data exchange and computation feel “weightless”—everything from AI training to inference and data availability happens seamlessly on-chain.

The 0G Foundation, formally established in October 2024, drives this initiative. Its stated mission is to make AI a public good—one that is accessible, verifiable, and open to all.

Key Components of the 0G Operating System

Fundamentally, 0G is a modular architecture designed specifically to support AI applications on-chain. Its three primary pillars are:

  1. 0G Storage – A decentralized storage network.
  2. 0G DA (Data Availability) – A specialized data availability layer ensuring data integrity.
  3. 0G Compute Network – Decentralized compute resource management and settlement for AI inference (and eventually training).

These pillars work in concert under the umbrella of a Layer1 network called 0G Chain, which is responsible for consensus and settlement.

According to the 0G Whitepaper (“0G: Towards Data Availability 2.0”), both the 0G Storage and 0G DA layers build on top of 0G Chain. Developers can launch multiple custom PoS consensus networks, each functioning as part of the 0G DA and 0G Storage framework. This modular approach means that as system load grows, 0G can dynamically add new validator sets or specialized nodes to scale out.

0G Storage

0G Storage is a decentralized storage system geared for large-scale data. It uses distributed nodes with built-in incentives for storing user data. Crucially, it splits data into smaller, redundant “chunks” using Erasure Coding (EC), distributing these chunks across different storage nodes. If a node fails, data can still be reconstructed from redundant chunks.

Supported Data Types

0G Storage accommodates both structured and unstructured data.

  1. Structured Data is stored in a Key-Value (KV) layer, suitable for dynamic and frequently updated information (think databases, collaborative documents, etc.).
  2. Unstructured Data is stored in a Log layer which appends data entries chronologically. This layer is akin to a file system optimized for large-scale, append-only workloads.

By stacking a KV layer on top of the Log layer, 0G Storage can serve diverse AI application needs—from storing large model weights (unstructured) to dynamic user-based data or real-time metrics (structured).

PoRA Consensus

PoRA (Proof of Random Access) ensures storage nodes actually hold the chunks they claim to store. Here’s how it works:

  • Storage miners are periodically challenged to produce cryptographic hashes of specific random data chunks they store.
  • They must respond by generating a valid hash (similar to PoW-like puzzle-solving) derived from their local copy of the data.

To level the playing field, the system limits mining competitions to 8 TB segments. A large miner can subdivide its hardware into multiple 8 TB partitions, while smaller miners compete within a single 8 TB boundary.

Incentive Design

Data in 0G Storage is divided into 8 GB “Pricing Segments.” Each segment has both a donation pool and a reward pool. Users who wish to store data pay a fee in 0G Token (ZG), which partially funds node rewards.

  • Base Reward: When a storage node submits valid PoRA proofs, it gets immediate block rewards for that segment.
  • Ongoing Reward: Over time, the donation pool releases a portion (currently ~4% per year) into the reward pool, incentivizing nodes to store data permanently. The fewer the nodes storing a particular segment, the larger the share each node can earn.

Users only pay once for permanent storage, but must set a donation fee above a system minimum. The higher the donation, the more likely miners are to replicate the user’s data.

Royalty Mechanism: 0G Storage also includes a “royalty” or “data sharing” mechanism. Early storage providers create “royalty records” for each data chunk. If new nodes want to store that same chunk, the original node can share it. When the new node later proves storage (via PoRA), the original data provider receives an ongoing royalty. The more widely replicated the data, the higher the aggregate reward for early providers.

Comparisons with Filecoin and Arweave

Similarities:

  • All three incentivize decentralized data storage.
  • Both 0G Storage and Arweave aim for permanent storage.
  • Data chunking and redundancy are standard approaches.

Key Differences:

  • Native Integration: 0G Storage is not an independent blockchain; it’s integrated directly with 0G Chain and primarily supports AI-centric use cases.
  • Structured Data: 0G supports KV-based structured data alongside unstructured data, which is critical for many AI workloads requiring frequent read-write access.
  • Cost: 0G claims $10–11/TB for permanent storage, reportedly cheaper than Arweave.
  • Performance Focus: Specifically designed to meet AI throughput demands, whereas Filecoin or Arweave are more general-purpose decentralized storage networks.

0G DA (Data Availability Layer)

Data availability ensures that every network participant can fully verify and retrieve transaction data. If the data is incomplete or withheld, the blockchain’s trust assumptions break.

In the 0G system, data is chunked and stored off-chain. The system records Merkle roots for these data chunks, and DA nodes must sample these chunks to ensure they match the Merkle root and erasure-coding commitments. Only then is the data deemed “available” and appended into the chain’s consensus state.

DA Node Selection and Incentives

  • DA nodes must stake ZG to participate.
  • They’re grouped into quorums randomly via Verifiable Random Functions (VRFs).
  • Each node only validates a subset of data. If 2/3 of a quorum confirm the data as available and correct, they sign a proof that’s aggregated and submitted to the 0G consensus network.
  • Reward distribution also happens through periodic sampling. Only the nodes storing randomly sampled chunks are eligible for that round’s rewards.

Comparison with Celestia and EigenLayer

0G DA draws on ideas from Celestia (data availability sampling) and EigenLayer (restaking) but aims to provide higher throughput. Celestia’s throughput currently hovers around 10 MB/s with ~12-second block times. Meanwhile, EigenDA primarily serves Layer2 solutions and can be complex to implement. 0G envisions GB/s throughput, which better suits large-scale AI workloads that can exceed 50–100 GB/s of data ingestion.

0G Compute Network

0G Compute Network serves as the decentralized computing layer. It’s evolving in phases:

  • Phase 1: Focus on settlement for AI inference.
  • The network matches “AI model buyers” (users) with compute providers (sellers) in a decentralized marketplace. Providers register their services and prices in a smart contract. Users pre-fund the contract, consume the service, and the contract mediates payment.
  • Over time, the team hopes to expand to full-blown AI training on-chain, though that’s more complex.

Batch Processing: Providers can batch user requests to reduce on-chain overhead, improving efficiency and lowering costs.

0G Chain

0G Chain is a Layer1 network serving as the foundation for 0G’s modular architecture. It underpins:

  • 0G Storage (via smart contracts)
  • 0G DA (data availability proofs)
  • 0G Compute (settlement mechanisms)

Per official docs, 0G Chain is EVM-compatible, enabling easy integration for dApps that require advanced data storage, availability, or compute.

0G Consensus Network

0G’s consensus mechanism is somewhat unique. Rather than a single monolithic consensus layer, multiple independent consensus networks can be launched under 0G to handle different workloads. These networks share the same staking base:

  • Shared Staking: Validators stake ZG on Ethereum. If a validator misbehaves, their staked ZG on Ethereum can be slashed.
  • Scalability: New consensus networks can be spun up to scale horizontally.

Reward Mechanism: When validators finalize blocks in the 0G environment, they receive tokens. However, the tokens they earn on 0G Chain are burned in the local environment, and the validator’s Ethereum-based account is minted an equivalent amount, ensuring a single point of liquidity and security.

0G Token (ZG)

ZG is an ERC-20 token representing the backbone of 0G’s economy. It’s minted, burned, and circulated via smart contracts on Ethereum. In practical terms:

  • Users pay for storage, data availability, and compute resources in ZG.
  • Miners and validators earn ZG for proving storage or validating data.
  • Shared staking ties the security model back to Ethereum.

Summary of Key Modules

0G OS merges four components—Storage, DA, Compute, and Chain—into one interconnected, modular stack. The system’s design goal is scalability, with each layer horizontally extensible. The team touts the potential for “infinite” throughput, especially crucial for large-scale AI tasks.

0G Ecosystem

Although relatively new, the 0G ecosystem already includes key integration partners:

  1. Infrastructure & Tooling:

    • ZK solutions like Union, Brevis, Gevulot
    • Cross-chain solutions like Axelar
    • Restaking protocols like EigenLayer, Babylon, PingPong
    • Decentralized GPU providers IoNet, exaBits
    • Oracle solutions Hemera, Redstone
    • Indexing tools for Ethereum blob data
  2. Projects Using 0G for Data Storage & DA:

    • Polygon, Optimism (OP), Arbitrum, Manta for L2 / L3 integration
    • Nodekit, AltLayer for Web3 infrastructure
    • Blade Games, Shrapnel for on-chain gaming

Supply Side

ZK and Cross-chain frameworks connect 0G to external networks. Restaking solutions (e.g., EigenLayer, Babylon) strengthen security and possibly attract liquidity. GPU networks accelerate erasure coding. Oracle solutions feed off-chain data or reference AI model pricing.

Demand Side

AI Agents can tap 0G for both data storage and inference. L2s and L3s can integrate 0G’s DA to improve throughput. Gaming and other dApps requiring robust data solutions can store assets, logs, or scoring systems on 0G. Some have already partnered with the project, pointing to early ecosystem traction.

Roadmap & Risk Factors

0G aims to make AI a public utility, accessible and verifiable by anyone. The team aspires to GB/s-level DA throughput—crucial for real-time AI training that can demand 50–100 GB/s of data transfer.

Co-founder & CEO Michael Heinrich has stated that the explosive growth of AI makes timely iteration critical. The pace of AI innovation is fast; 0G’s own dev progress must keep up.

Potential Trade-Offs:

  • Current reliance on shared staking might be an intermediate solution. Eventually, 0G plans to introduce a horizontally scalable consensus layer that can be incrementally augmented (akin to spinning up new AWS nodes).
  • Market Competition: Many specialized solutions exist for decentralized storage, data availability, and compute. 0G’s all-in-one approach must stay compelling.
  • Adoption & Ecosystem Growth: Without robust developer traction, the promised “unlimited throughput” remains theoretical.
  • Sustainability of Incentives: Ongoing motivation for nodes depends on real user demand and an equilibrium token economy.

Conclusion

0G attempts to unify decentralized storage, data availability, and compute into a single “operating system” supporting on-chain AI. By targeting GB/s throughput, the team seeks to break the performance barrier that currently deters large-scale AI from migrating on-chain. If successful, 0G could significantly accelerate the Web3 AI wave by providing a scalable, integrated, and developer-friendly infrastructure.

Still, many open questions remain. The viability of “infinite throughput” hinges on whether 0G’s modular consensus and incentive structures can seamlessly scale. External factors—market demand, node uptime, developer adoption—will also determine 0G’s staying power. Nonetheless, 0G’s approach to addressing AI’s data bottlenecks is novel and ambitious, hinting at a promising new paradigm for on-chain AI.

· 3 min read

In one of the most sophisticated cyber attacks of 2023, Radiant Capital, a decentralized cross-chain lending protocol built on LayerZero, lost approximately $50 million to hackers. The complexity and precision of this attack revealed the advanced capabilities of state-sponsored North Korean hackers, pushing the boundaries of what many thought possible in crypto security breaches.

The Radiant Capital Hack: How North Korean Hackers Used a Single PDF to Steal Hundreds of Millions

The Perfect Social Engineering Attack

On September 11, 2023, a Radiant Capital developer received what seemed like an innocent Telegram message. The sender posed as a former contractor, claiming they had switched careers to smart contract auditing and wanted feedback on a project report. This type of request is commonplace in the remote-work culture of crypto development, making it particularly effective as a social engineering tactic.

The attackers went the extra mile by creating a fake website that closely mimicked the supposed contractor's legitimate domain, adding another layer of authenticity to their deception.

The Trojan Horse

When the developer downloaded and unzipped the file, it appeared to be a standard PDF document. However, the file was actually a malicious executable called INLETDRIFT disguised with a PDF icon. Once opened, it silently installed a backdoor on the macOS system and established communication with the attackers' command server (atokyonews[.]com).

The situation worsened when the infected developer, seeking feedback, shared the malicious file with other team members, inadvertently spreading the malware within the organization.

The Sophisticated Man-in-the-Middle Attack

With the malware in place, the hackers executed a precisely targeted "bait-and-switch" attack. They intercepted transaction data when team members were operating their Gnosis Safe multi-signature wallet. While the transaction appeared normal on the web interface, the malware replaced the transaction content when it reached the Ledger hardware wallet for signing.

Due to the blind signing mechanism used in Safe multi-sig transactions, team members couldn't detect that they were actually signing a transferOwnership() function call, which handed control of the lending pools to the attackers. This allowed the hackers to drain user funds that had been authorized to the protocol's contracts.

The Swift Cleanup

Following the theft, the attackers demonstrated remarkable operational security. Within just three minutes, they removed all traces of the backdoor and browser extensions, effectively covering their tracks.

Key Lessons for the Industry

  1. Never Trust File Downloads: Teams should standardize on online document tools like Google Docs or Notion instead of downloading files. For example, OneKey's recruitment process only accepts Google Docs links, explicitly refusing to open any other files or links.

  2. Frontend Security is Critical: The incident highlights how easily attackers can spoof transaction information on the frontend, making users unknowingly sign malicious transactions.

  3. Blind Signing Risks: Hardware wallets often display oversimplified transaction summaries, making it difficult to verify the true nature of complex smart contract interactions.

  4. DeFi Protocol Safety: Projects handling large amounts of capital should implement timelock mechanisms and robust governance processes. This creates a buffer period for detecting and responding to suspicious activities before funds can be moved.

The Radiant Capital hack serves as a sobering reminder that even with hardware wallets, transaction simulation tools, and industry best practices, sophisticated attackers can still find ways to compromise security. It underscores the need for constant vigilance and evolution in crypto security measures.

As the industry matures, we must learn from these incidents to build more robust security frameworks that can withstand increasingly sophisticated attack vectors. The future of DeFi depends on it.

· 5 min read

The blockchain industry faces a critical inflection point in 2024. While the global market for blockchain technology is projected to reach $469.49 billion by 2030, privacy remains a fundamental challenge. Trusted Execution Environments (TEEs) have emerged as a potential solution, with the TEE market expected to grow from $1.2 billion in 2023 to $3.8 billion by 2028. But does this hardware-based approach truly solve blockchain's privacy paradox, or does it introduce new risks?

The Hardware Foundation: Understanding TEE's Promise

A Trusted Execution Environment functions like a bank's vault within your computer—but with a crucial difference. While a bank vault simply stores assets, a TEE creates an isolated computation environment where sensitive operations can run completely shielded from the rest of the system, even if that system is compromised.

The market is currently dominated by three key implementations:

  1. Intel SGX (Software Guard Extensions)

    • Market Share: 45% of server TEE implementations
    • Performance: Up to 40% overhead for encrypted operations
    • Security Features: Memory encryption, remote attestation
    • Notable Users: Microsoft Azure Confidential Computing, Fortanix
  2. ARM TrustZone

    • Market Share: 80% of mobile TEE implementations
    • Performance: <5% overhead for most operations
    • Security Features: Secure boot, biometric protection
    • Key Applications: Mobile payments, DRM, secure authentication
  3. AMD SEV (Secure Encrypted Virtualization)

    • Market Share: 25% of server TEE implementations
    • Performance: 2-7% overhead for VM encryption
    • Security Features: VM memory encryption, nested page table protection
    • Notable Users: Google Cloud Confidential Computing, AWS Nitro Enclaves

Real-World Impact: The Data Speaks

Let's examine three key applications where TEE is already transforming blockchain:

1. MEV Protection: The Flashbots Case Study

Flashbots' implementation of TEE has demonstrated remarkable results:

  • Pre-TEE (2022):

    • Average daily MEV extraction: $7.1M
    • Centralized extractors: 85% of MEV
    • User losses to sandwich attacks: $3.2M daily
  • Post-TEE (2023):

    • Average daily MEV extraction: $4.3M (-39%)
    • Democratized extraction: No single entity >15% of MEV
    • User losses to sandwich attacks: $0.8M daily (-75%)

According to Phil Daian, Flashbots' co-founder: "TEE has fundamentally changed the MEV landscape. We're seeing a more democratic, efficient market with significantly reduced user harm."

2. Scaling Solutions: Scroll's Breakthrough

Scroll's hybrid approach combining TEE with zero-knowledge proofs has achieved impressive metrics:

  • Transaction throughput: 3,000 TPS (compared to Ethereum's 15 TPS)
  • Cost per transaction: $0.05 (vs. $2-20 on Ethereum mainnet)
  • Validation time: 15 seconds (vs. minutes for pure ZK solutions)
  • Security guarantee: 99.99% with dual verification (TEE + ZK)

Dr. Sarah Wang, blockchain researcher at UC Berkeley, notes: "Scroll's implementation shows how TEE can complement cryptographic solutions rather than replace them. The performance gains are significant without compromising security."

3. Private DeFi: Emerging Applications

Several DeFi protocols are now leveraging TEE for private transactions:

  • Secret Network (Using Intel SGX):
    • 500,000+ private transactions processed
    • $150M in private token transfers
    • 95% reduction in front-running

The Technical Reality: Challenges and Solutions

Side-Channel Attack Mitigation

Recent research has revealed both vulnerabilities and solutions:

  1. Power Analysis Attacks

    • Vulnerability: 85% success rate in key extraction
    • Solution: Intel's latest SGX update reduces success rate to <0.1%
    • Cost: 2% additional performance overhead
  2. Cache Timing Attacks

    • Vulnerability: 70% success rate in data extraction
    • Solution: AMD's cache partitioning technology
    • Impact: Reduces attack surface by 99%

Centralization Risk Analysis

The hardware dependency introduces specific risks:

  • Hardware Vendor Market Share (2023):
    • Intel: 45%
    • AMD: 25%
    • ARM: 20%
    • Others: 10%

To address centralization concerns, projects like Scroll implement multi-vendor TEE verification:

  • Required agreement from 2+ different vendor TEEs
  • Cross-validation with non-TEE solutions
  • Open-source verification tools

Market Analysis and Future Projections

TEE adoption in blockchain shows strong growth:

  • Current Implementation Costs:

    • Server-grade TEE hardware: $2,000-5,000
    • Integration cost: $50,000-100,000
    • Maintenance: $5,000/month
  • Projected Cost Reduction: 2024: -15% 2025: -30% 2026: -50%

Industry experts predict three key developments by 2025:

  1. Hardware Evolution

    • New TEE-specific processors
    • Reduced performance overhead (<1%)
    • Enhanced side-channel protection
  2. Market Consolidation

    • Standards emergence
    • Cross-platform compatibility
    • Simplified developer tools
  3. Application Expansion

    • Private smart contract platforms
    • Decentralized identity solutions
    • Cross-chain privacy protocols

The Path Forward

While TEE presents compelling solutions, success requires addressing several key areas:

  1. Standards Development

    • Industry working groups forming
    • Open protocols for cross-vendor compatibility
    • Security certification frameworks
  2. Developer Ecosystem

    • New tools and SDKs
    • Training and certification programs
    • Reference implementations
  3. Hardware Innovation

    • Next-gen TEE architectures
    • Reduced costs and energy consumption
    • Enhanced security features

Competitive Landscape

TEE faces competition from other privacy solutions:

SolutionPerformanceSecurityDecentralizationCost
TEEHighMedium-HighMediumMedium
MPCMediumHighHighHigh
FHELowHighHighVery High
ZK ProofsMedium-HighHighHighHigh

The Bottom Line

TEE represents a pragmatic approach to blockchain privacy, offering immediate performance benefits while working to address centralization concerns. The technology's rapid adoption by major projects like Flashbots and Scroll, combined with measurable improvements in security and efficiency, suggests TEE will play a crucial role in blockchain's evolution.

However, success isn't guaranteed. The next 24 months will be critical as the industry grapples with hardware dependencies, standardization efforts, and the ever-present challenge of side-channel attacks. For blockchain developers and enterprises, the key is to understand TEE's strengths and limitations, implementing it as part of a comprehensive privacy strategy rather than a silver bullet solution.

· 3 min read
Dora Noda

In the rapidly evolving world of blockchain, venture capital plays a crucial role. Yet, beneath the surface of sophisticated analysis lies a straightforward goal: selling tokens. Unfortunately, many VCs, especially newcomers, fail to turn a profit due to a lack of deep industry knowledge. Their primary function often boils down to promoting and supporting their investments through various channels.

The Performance of Liquid Funds

Currently, liquid funds are underperforming compared to Bitcoin (BTC). Historically, they were profitable, but so were individual investors. Liquid fund investors typically already have BTC exposure, forcing these funds to invest in non-BTC assets, which frequently struggle to outperform BTC. If a fund can't beat BTC, it doesn't add value.

Advanced Blockchain Literacy

Influencers (KOLs)

Never take influencer content at face value. Their statements often generate noise and serve as tools to gauge project funding and their network. When someone promotes a project, it’s usually because they have financial stakes. Disregard profit and loss screenshots and retrospective analyses. Genuine wealth is often understated, and the most seemingly affluent may not be as wealthy as they appear.

Centralized Exchanges

Inherently distrust centralized exchanges. Avoid using them for contract trading. They can serve as cross-chain bridges or platforms for buying spot currencies, but always be ready to withdraw funds at the slightest hint of FUD (Fear, Uncertainty, Doubt). Using a centralized exchange can be a good career start, providing passive information intake, but success depends on your ability to leverage this information.

Evaluating Blockchain Projects

Treat statements from project teams with skepticism. Announcements of partnerships often signify minimal progress. Focus on the tangible actions of the project team and evaluate how their work accelerates the value chain. If the outcomes positively influence public perception of token value, the project is worth considering. Be wary of projects with past ethical breaches—they are likely to repeat such behavior.

Marketing in Blockchain

Most project teams lack effective marketing strategies. It's challenging to quantify marketing success, and metrics often involve inflated figures. Basic marketing budgets are best converted into influencer rounds. Other marketing expenses are less effective than direct market actions like price boosts.

Individual Investment Approach

For VC-backed tokens, avoid promoting them publicly but feel free to share sincere insights. For community-driven tokens, engage in community building and advocacy. Trust on-chain data and genuine buy orders. Encourage any form of investor rights protection unless you have conflicting interests. Publicly documenting your learning journey and successes can build trust and credibility.

Key Takeaways

Navigating the blockchain industry requires skepticism, strategic thinking, and a reliance on verifiable data. Trust actions over words, and always prioritize projects and funds that demonstrate real, measurable progress.

· 4 min read
Dora Noda

Decentralized physical infrastructure network (DePIN) is emerging as a transformative force in the Web3 landscape, offering a new paradigm for building, operating, and managing physical infrastructure networks. However, many DePIN startups face significant challenges due to a lack of funds and technical competence. IoTeX 2.0 aims to address these challenges with a suite of innovations designed to support the DePIN community in realizing the vision of "DePIN for Everyone!".

Core Innovations of IoTeX 2.0

  1. Tokenomic Design:

    • A comprehensive utility for IOTX tokens within the modular DePIN infrastructure.
    • Inflationary staking rewards, deflationary burning mechanisms, and growth incentives to maintain a balanced token supply.
  2. Modular DePIN Infrastructure:

    • Modular Security Pool (MSP): Provides a unified trusted layer for DePIN infrastructure modules through restaking.
    • W3bstream: A decentralized multi-prover network for DePIN verification, supporting various validity proof approaches.
    • ioID: A unified identity system managing and securing machine-to-machine and machine-to-person relationships.
    • ioConnect: A universal embedded SDK empowering device abstraction and facilitating smart device interaction.
    • ioDDK: A chain SDK allowing DePIN projects to provision self-sovereign application chains, inheriting IoTeX L1 security.
  3. Public Goods:

    • Tools like DePINScan and DePIN Liquidity Hub to support awareness, usability, and liquidity for DePIN projects.

The Importance of DePIN

DePIN aims to disrupt traditional industries and public utilities, which are often monopolies controlled by centralized corporations and governments. By leveraging blockchain technology, DePIN can bring transparency, trust, and innovation to physical infrastructure and public utilities. This new model allows people to contribute to and build equity in real-world infrastructure networks, overcoming financial and logistical barriers to entry.

The DePIN Landscape

DePIN is a collective effort of numerous projects across the globe, focusing on decentralizing and improving physical infrastructure. The DePIN sector includes:

  • Physical Resource Networks: Produce non-fungible resources relying on location-dependent hardware.
  • Digital Resource Networks: Produce marketplaces for fungible resources, relying on location-agnostic hardware.
  • Infrastructure and Tooling: Facilitate growth and provide off-the-shelf capabilities for DePIN applications.

The DePIN Tech Stack and Its Challenges

The DePIN tech stack requires an end-to-end architecture connecting the real world to the blockchain. This includes layers like hardware abstraction, connectivity, sequencer, data availability, long-term storage, off-chain computing, blockchain, identity, and governance. Developing this complex stack presents high barriers to entry, particularly for emerging markets.

IoTeX 2.0: A Modular Approach

IoTeX 2.0 introduces a modular infrastructure, allowing DePIN projects to construct a tech stack that suits their specific needs. This approach supports both large and small teams by providing comprehensive and purpose-built solutions. Key components include:

  • Modular Security Pool (MSP): Ensures unified and end-to-end trust across DIMs, leveraging staked assets from well-established blockchains.
  • W3bstream: Facilitates decentralized off-chain computing with multiple provers, enhancing the scalability and efficiency of DePIN applications.
  • ioID and ioConnect: Simplify identity management and hardware abstraction, respectively, enabling seamless integration of smart devices into DePIN projects.
  • ioDDK: Supports the launch of self-sovereign L2 blockchains, expanding the capabilities of DePIN projects.

Future Outlook

IoTeX 2.0 aims to create a new world where physical infrastructure networks are decentralized, transparent, and equitable. By leveraging cutting-edge technologies like zero-knowledge proofs, AI, and blockchain, IoTeX 2.0 envisions a future where smart devices, autonomous systems, and digital resource marketplaces operate seamlessly and securely. This vision empowers everyday people to contribute to and benefit from the modernization of global infrastructure, ensuring "DePIN for Everyone!".

Summary

IoTeX 2.0 is a significant milestone in the evolution of the IoTeX network, addressing the challenges faced by DePIN startups and driving the next phase of growth for decentralized physical infrastructure networks. With its innovative modular infrastructure, comprehensive tokenomics, and commitment to public goods, IoTeX 2.0 is poised to lead the DePIN movement and empower builders worldwide. Are you an IoTeX developer? BlockEden.xyz offers IoTeX RPC at https://blockeden.xyz/api-marketplace/iotex.

· 3 min read
Dora Noda

BlockEden.xyz is thrilled to announce the winners of the Sui Overflow Hackathon! After weeks of innovative coding, intense competition, and creative problem-solving, we are proud to present the projects that stood out the most. Congratulations to all the participants for their outstanding contributions. Here are the top winners:

1st Prize ($1,500 in SUI): Orbital

Project Links:

Orbital is a cutting-edge cross-chain lending platform that leverages wormhole technology and Supra Oracles to revolutionize decentralized finance (DeFi). By enabling seamless and secure lending and borrowing across multiple blockchain networks like SUI and Avalanche, Orbital maximizes liquidity and capital efficiency. The integration of Supra Oracles ensures accurate, real-time data for price feeds and interest rates.

Designed to feel like a DEX that many blockchain users are accustomed to, Orbital simplifies the user experience with a unified interface where users can manage all transactions from a single dashboard. This intuitive design makes it just one-click to borrow, transforming the traditional DeFi landscape.

2nd Prize ($1,000 in SUI): Liquidity Garden

Project Link:

Liquidity Garden is an innovative farm simulation game where players build and manage their own farm garden. Players stake liquidity from FlowX DEX to buy NFT seeds, water them daily, and watch as dynamic NFTs grow and release $OXYGEN tokens. With additional features like raising pets and integrating token swaps directly in the game, Liquidity Garden provides a unique blend of gaming and DeFi, encouraging continuous engagement and interaction.

3rd Prize ($100 in SUI): BioWallet, Cocktail OTC Market, SharkyTheSuiBot, Zomdev

BioWallet

Project Links:

BioWallet transforms devices into secure hardware wallets by leveraging biometric-based onboarding. This innovative digital wallet eliminates the need for traditional seed phrases, storing private keys securely in the Secure Enclave. With advanced features like MultiSig and WebAuthn, BioWallet offers top-notch protection and flexibility, bridging the gap between traditional browser wallets and hardware wallets.

Cocktail OTC Market

Project Links:

Cocktail OTC Market provides a seamless platform for token transactions without the need for a centralized exchange. Sellers can list their tokens with flexible pricing, and buyers can browse and purchase tokens easily. Managed by Sui contracts, Cocktail OTC Market ensures secure and transparent transactions, making it a reliable solution for token trading.

SharkyTheSuiBot

Project Links:

SharkyTheSuiBot is the fastest SUI Telegram bot designed to find and exploit arbitrage opportunities across different SUI DEXs. It performs trading activities based on script-logic strategies, offers real-time price fetching, and enables users to provide liquidity in pools directly from the bot. With advanced features like flash loans and real-time charts, SharkyTheSuiBot enhances the user trading experience.

Zomdev

Project Links:

Zomdev is a developer bounty system where companies post bounties for GitHub issues or talent acquisition, and developers can claim these bounties based on project submissions. This platform facilitates a dynamic interaction between companies seeking development assistance and developers looking for opportunities to earn and showcase their skills.

Final Words

Congratulations to all the winners and participants! Your innovative solutions and creative ideas have made this hackathon a remarkable success. We look forward to seeing how these projects evolve and continue to impact the blockchain and DeFi landscape.

Stay tuned for more updates and future hackathons from BlockEden.xyz!


· 5 min read
Dora Noda

Telegram, a popular cross-platform IM tool, created by Pavel Durov, launched TON (Telegram Open Network) in 2013. With 1.8 billion users and 70 billion daily messages, TON has raised $850 million through ICO for its development. This blog delves into TON’s unique technical features and services.

Chain Specs

TON (Telegram Open Network), as outlined in its whitepaper, classifies all public blockchains along five dimensions:

  • Single-chain vs. multi-chain
  • Smart contract support
  • Consensus mechanism
  • Sharding support
  • Chain interconnectivity

Multi-Chain Blockchain System

TON is not a single-chain blockchain but a collection of multiple blockchains, including Masterchain, Workchains, and Shardchains.

  • Masterchain: The core of TON’s blockchain system, storing essential information and parameters. It records validators, their token holdings, active Workchains, and Shardchains. The Masterchain contains the latest block hashes of all Workchains and Shardchains, ensuring overall coordination and security.
  • Workchains: Up to 2^32 Workchains can exist, each handling fund transfers and smart contract interactions. Workchains can have different rules, such as account address formats, transaction formats, smart contract types, and virtual machines. Despite their differences, they must adhere to interoperability standards to enable smooth interaction.
  • Shardchains: These are subdivisions of Workchains, designed to improve processing efficiency by distributing tasks among multiple Shardchains. Shardchains follow the rules of their respective Workchains and automatically split or merge based on load, ensuring scalability and performance optimization.

TON Virtual Machine (TVM)

TVM is a program execution environment running on the blockchain, primarily for executing smart contracts. In TVM, everything is built out of cells and there is TVM that is instantiated for each contract every time.

  • Data Storage: TVM stores data in cells, each containing up to 128 bytes and references to other cells. This structure allows flexible data handling.
  • Data Handling: TVM can manage various data types, using a stack-based structure for efficient computation.
  • Built-in Functions: TVM includes tools like hash tables, encryption (elliptic curves), hash functions (e.g., SHA256), and Merkle proof mechanisms, ensuring data security and integrity.
  • Large Smart Contract Support: TVM can handle complex and large smart contracts, accommodating dynamic sharding.
  • Programming Languages: TVM supports FunC, Fift, and Tact, each tailored for different needs.
  • Additional Features: TVM supports closures and efficiently executes complex tasks.

Infinite Dynamic Sharding

Unlike traditional top-down sharding, TON employs a bottom-up approach. It envisions extreme sharding, where each shard is an account chain. These account chains form larger Shardchains, which connect to the Masterchain, creating a scalable and flexible system.

TON’s dynamic sharding adjusts shard numbers based on load. If a shard’s load is high, it splits; if low, it merges. This dynamic adjustment ensures load balancing, performance optimization, and resource utilization.

BFT PoS Consensus Mechanism

TON uses a BFT PoS consensus mechanism, combining Byzantine Fault Tolerance (BFT) and Proof of Stake (PoS).

  • BFT: An algorithm handling Byzantine faults, ensuring system consistency despite up to one-third of nodes failing.
  • PoS: Nodes with more tokens have a higher chance of validating transactions and generating blocks, incentivizing security.

Roles in TON’s PoS Mechanism:

  • Validators: Nodes maintaining network security and validating transactions by staking 300,000 TON tokens.
  • Nominators: Entities providing stake to validators, sharing in the rewards if the validator performs well.

Tight-Coupling Chain Interactivity

TON’s tightly-coupled system ensures fast message passing and consistency across all blockchains. Features like embedding Shardchain block hashes in Masterchain blocks and using vertical blockchains for error correction help achieve this.

Vertical Blockchain Mechanism: When an invalid block is detected, a corrected block is added vertically, preserving valid parts and reducing disruption.

Hypercube Routing: Messages traverse a hypercube network, ensuring accurate and swift delivery across Shardchains.

TON Services

TON DNS: Provides name mapping for blockchain accounts, smart contracts, and services, making DApp usage as convenient as traditional internet domains.

TON Proxy: An anonymous network proxy service that hides TON node IP addresses, similar to I2P, creating a decentralized VPN service.

TON Storage: A distributed storage system akin to IPFS, using P2P networks for file storage. It supports complex DApp storage needs, such as video streaming.

TON Pay: Integrated micropayment channels for instant off-chain transactions, ensuring secure and efficient payments for all DApps on TON.

Token Economy

TON’s token, Gram, has a total supply of 5 billion, with a portion mined and a fraction allocated to reward DApp developers. A unique pricing mechanism prevents volatility, maintaining economic stability and fostering a sustainable ecosystem.

Stats

  • TVL: $705M
  • Daily Active Wallets: 320K
  • Daily Tx: 4.2M

Conclusion

TON offers a full-featured blockchain operating system, aiming to surpass platforms like Ethereum and EOS. Its innovative design and comprehensive services make it a formidable player in the blockchain arena. Join the revolution with BlockEden.xyz, where we provide cutting-edge solutions for content creators and developers alike.


· 5 min read
Dora Noda

BlockEden.xyz, known for its Remote Procedure Call (RPC) infrastructure, is expanding into AI inference services. This evolution leverages its open-source, permissionless design to create a marketplace where model researchers, hardware operators, API providers, and users interact seamlessly. The network's Relay Mining algorithm ensures a transparent and verifiable service, presenting a unique opportunity for large model AI researchers to monetize their work without infrastructure maintenance.

The Core Problem

The AI landscape faces significant challenges, including:

  • Restricted Model-Serving Environments: Resource-intensive infrastructure limits AI researchers' ability to experiment with various models.
  • Unsustainable Business Models for Open Source Innovation: Independent engineers struggle to monetize their work, relying on major infrastructure providers.
  • Unequal Market Access: Enterprise-grade models dominate, leaving mid-tier models and users underserved.

BlockEden.xyz’s Unique Value Proposition

BlockEden.xyz addresses these issues by decoupling the infrastructure layer from the product and services layer, ensuring an open and decentralized framework. This setup enables high-quality service delivery and aligns incentives among all network participants.

Key benefits include:

  • Established Network: Utilizing an existing network of BlockEden.xyz's services to streamline model access and service quality.
  • Separation of Concerns: Each stakeholder focuses on their strengths, improving overall ecosystem efficiency.
  • Incentive Alignment: Cryptographic proofs and performance measurements drive competition and transparency.
  • Permissionless Models & Supply: An open marketplace for cost-effective hardware supply.

Decentralized AI Inference Stakeholders

Model Providers: Coordinators

Coordinators manage the product and services layer, optimizing service quality and providing seamless access for applications. Coordinators discreetly ensure supplier integrity by posing as regular users, offering unbiased performance assessments.

Model Users: Applications

Applications typically use first-party coordinators but can also access the network with a third-party for enhanced privacy and cost savings. Direct access allows for diverse use case experimentation and eliminates intermediary costs.

Model Suppliers: Hardware Operators

Suppliers run inference nodes to earn tokens. Their competencies in DevOps, hardware maintenance, and logging are crucial for network growth. The permissionless approach encourages participation from various hardware providers, including those with idle or dormant resources.

Model Sources: Engineers & Researchers

Researchers and institutions that open-source models can earn revenue based on usage. This model incentivizes innovation without the need for infrastructure maintenance, providing a sustainable business model for open-source contributors.

Working with Cuckoo Network

BlockEden.xyz collaborates with Cuckoo Network to revolutionize AI inference through a decentralized and permissionless infrastructure. This partnership focuses on leveraging both platforms' strengths to create a seamless and efficient ecosystem for AI model deployment and monetization.

Key Collaboration Areas

  • Infrastructure Integration: Combining BlockEden.xyz's robust RPC infrastructure with Cuckoo Network's decentralized model-serving capabilities to offer a scalable and resilient AI inference service.
  • Model Distribution: Facilitating the distribution of open-source AI models across the network, enabling researchers to reach a broader audience and monetize their innovations without the need for extensive infrastructure.
  • Quality Assurance: Implementing mechanisms for continuous monitoring and assessment of model performance and supplier integrity, ensuring high-quality service delivery and reliability.
  • Economic Incentives: Aligning economic incentives across all stakeholders through cryptographic proofs and performance-based rewards, fostering a competitive and transparent marketplace.
  • Privacy and Security: Enhancing privacy-preserving operations and secure model inference through advanced technologies like Trusted Execution Environments (TEE) and decentralized data storage solutions.
  • Community and Support: Building a supportive community for AI researchers and developers, providing resources, guidance, and incentives to drive innovation and adoption within the decentralized AI ecosystem.

By partnering with Cuckoo Network, BlockEden.xyz aims to create a holistic and decentralized approach to AI inference, empowering researchers, developers, and users with a robust, transparent, and efficient platform for AI model deployment and utilization. You can now try decentralized text-to-image API at https://blockeden.xyz/api-marketplace/cuckoo-ai.

Input/Output of a Decentralized Inference Network

LLM Inputs to Cuckoo Network:

  • Open-source models
  • Demand from end-users or Applications
  • Aggregated supply from commodity hardware
  • Quality of service guarantees

LLM Outputs from Cuckoo Network:

  • No downtime
  • Seamless model experimentation
  • Public model evaluation
  • Privacy-preserving operations
  • Censorship-free models

Web3 Ecosystem Integrations

BlockEden.xyz's RPC protocol can integrate with other Web3 protocols to enhance Decentralized AI (DecAI):

Data & Storage Networks: Seamless integration with decentralized storage solutions like Filecoin/IPFS and Arweave for model storage and data integrity.

Compute Networks: Complementary services leveraging decentralized computing layers like Akash and Render, supporting both dedicated and idle hardware.

Inference Networks: Flexible deployment models and robust ecosystems supporting diverse inference tasks.

Applications: AI agents, consumer apps, and IoT devices benefit from DecAI inference for personalized services, data privacy, and edge decision-making.

Summary

BlockEden.xyz's established infrastructure and economic design unlock new opportunities for open-source AI. By providing a decentralized and verifiable service, it bridges the gap between open-source AI and Web3, enabling innovative, sustainable, and reliable services. This approach allows for greater model diversity, better market access for SMEs, and a new business model for open-source researchers. Future developments will continue to expand the ecosystem, ensuring BlockEden.xyz remains a robust and adaptable solution in the evolving AI and blockchain landscapes.

· 2 min read
Dora Noda

BlockEden.xyz is excited to announce our Ecosystem Project Prize for participants in the Sui Overflow hackathon during April 21 - June 15, 2024. We're offering a total prize pool of $5000 in Sui for innovative projects that utilize our RPC and Indexer services.

Join the Sui Overflow Hackathon and Win $5000 in Sui with BlockEden.xyz!

How to Participate

  1. Register for Sui Overflow: Ensure you're signed up for the Sui Overflow hackathon.
  2. Integrate BlockEden.xyz: Use our RPC and Indexer services in your project.
  3. Submit Your Project: Complete your project and submit it by the hackathon deadline.

Prize Distribution

  • 1st Place: $1500 in Sui (x 1 winner)
  • 2nd Place: $1000 in Sui (x 2 winners)
  • 3rd Place: $100 in Sui (x 15 winners)

$5000 in total for 18 winners, distributed in SUI.

Judging Criteria

  • Innovation: How creatively you use BlockEden.xyz services.
  • Impact: Potential impact on the Sui ecosystem.
  • Functionality: The project’s technical performance.

Why BlockEden.xyz?

  • Reliable RPC services
  • Comprehensive Indexer solutions
  • Seamless integration

Get Started

  1. Visit BlockEden.xyz: Sign up and access our services at https://blockeden.xyz/dash/sign-up/ and then create your API access key.
  2. Explore Our Documentation: Detailed guides to help you integrate https://blockeden.xyz/docs/sui/.
  3. Join the Hackathon: Start building and bring your ideas to life.

Make your mark in the Sui ecosystem with BlockEden.xyz!

Contact Us

Connect with our team for support and to share your innovative ideas:

😆 Happy hacking!

· 3 min read
Dora Noda

BlockEden.xyz is renowned for enhancing blockchain decentralization, interoperability and asset utility. The partnership with Cuckoo Network extends BlockEden’s influence into the decentralized AI sector, leveraging our blockchain expertise to support Cuckoo’s AI-driven ecosystem.

Cuckoo Network introduces a decentralized framework for AI development, addressing key challenges like privacy, censorship, and computational accuracy. By integrating AI with blockchain technology, Cuckoo enables a more robust and user-governed AI infrastructure.

Strategic Synergies

The collaboration between BlockEden.xyz and Cuckoo Network focuses on several strategic areas:

Technology Integration

BlockEden.xyz will utilize its blockchain infrastructure to enhance the security and efficiency of Cuckoo’s decentralized AI tasks. This involves providing high-performance node operations that support the Cuckoo ecosystem, ensuring reliable and continuous AI task processing and validation.

Validator Role and Network Security

Through this partnership, BlockEden.xyz will serve as a validator for the Cuckoo Network, enhancing network security and stability. This role is pivotal in ensuring the integrity and reliability of decentralized AI task processing on Cuckoo’s platform. As a validator, BlockEden will leverage its blockchain expertise to facilitate robust and secure AI operations, benefiting the broader blockchain and AI ecosystems.

Community and Ecosystem Development

BlockEden.xyz and Cuckoo Network will jointly work on community engagement initiatives, aiming to foster a collaborative environment for developers, AI enthusiasts, and blockchain advocates. This includes educational programs, joint workshops, and hackathons to encourage innovation and practical solutions in the intersecting fields of AI and blockchain.

Anticipated Outcomes

The partnership is set to deliver significant advancements in how blockchain and AI technologies interact. Key outcomes include:

  • Enhanced Decentralization: By operating nodes across key regions, BlockEden.xyz will help decentralize the Cuckoo AI network, promoting a more resilient and secure ecosystem.
  • Advanced AI Solutions: Leveraging BlockEden’s blockchain expertise, Cuckoo Network will enhance its AI model development, ensuring greater accuracy and privacy in AI operations.
  • Broadened Developer Tools: Together, both entities will develop and provide advanced tools for developers, such as specialized APIs for blockchain and AI interactions, enriching both ecosystems.

Conclusion

The partnership between BlockEden.xyz and Cuckoo Network represents a significant advancement toward a future driven by decentralized technologies in AI and blockchain. This alliance supports our shared vision for a decentralized, secure, and efficient digital future, while establishing a precedent for using blockchain technology to enhance the capabilities and global reach of AI solutions.

Both BlockEden.xyz and Cuckoo Network are excited to explore this collaborative journey, confident that together, we can pave the way for groundbreaking developments in both domains.