Posts

Showing posts from October, 2022

Multisig vs Shamir's Secret Sharing Scheme

Image
In the previous article we've discussed about multisig deployment and how it can greatly improve the project's security throughout the development cycle. Today we'll discussed even further improvements into key sharing schemes and start with Shamir’s Secret Sharing Scheme (SSSS) Shamir's Secret Sharing Scheme is related to the broader concept of multi-party computation (MPC), which refers to methods for allowing multiple parties to compute a function on their private inputs in such a way that the output is the same as if the parties had computed the function on their inputs together. MPC can be used for a wide range of applications, including secure communication, privacy-preserving machine learning, and secure multiparty computation. Shamir's Secret Sharing Scheme is simply another name for Shamir's Secret Sharing (SSS). It is called a "scheme" because it is a structured method for splitting a secret into multiple parts, such that a th...

Why Solana Developers Migrate to Ethereum

Image
For developers building on Solana, the frequent network outages and performance issues over the past year have likely been a source of major frustration. The promise of high speed and low cost that initially attracted many to Solana has not panned out, with the network failing to meet expectations for stability and reliability. In contrast, Ethereum has made huge strides recently in scalability, security, and developer experience that make it an increasingly appealing alternative. It's worth taking a close look at the current state of Ethereum and considering whether migrating your Solana project might be the right move. Enhanced Scalability with Layer 2 Rollups One of the biggest knocks against Ethereum historically was limited throughput and high gas fees on the layer 1 chain. However, the emergence of layer 2 rollup solutions like Optimism, Arbitrum, and zkSync has changed the calculus. These L2s bundle many transactions together and post cryptographic proofs of their validit...