We bring the capital and resources to help projects scale.
Number Theoretic Transforms (NTTs) play a critical role in the generation of ZKPs. Several notable ZK proof systems, including Plonky2 and other STARK-based proof system rely heavi...
Number Theoretic Transforms (NTTs) play a critical role in the generation of ZKPs. Several notable ZK proof systems, including Plonky2 and other STARK-based proof system rely heavi...
Can we trust each other? It’s one of the fundamental questions that, after the still unbelievable demise of FTX, our industry is struggling to answer. No, we can’t. Can we? Tru...
Can we trust each other? It’s one of the fundamental questions that, after the still unbelievable demise of FTX, our industry is struggling to answer. No, we can’t. Can we? Tru...
Zero-Knowledge proofs have many amazing properties, but today, they suffer from a fundamental issue — they’re expensive and difficult to make. In this article, we describe our appr...
Zero-Knowledge proofs have many amazing properties, but today, they suffer from a fundamental issue — they’re expensive and difficult to make. In this article, we describe our appr...
Whitehats and DeFi protocols need a shared understanding of security policy. We propose the SAFU - Simple Arrangement for Funding Upload - as a versatile and credible way to let wh...
Whitehats and DeFi protocols need a shared understanding of security policy. We propose the SAFU - Simple Arrangement for Funding Upload - as a versatile and credible way to let wh...
Token delegation contracts may want to use explicit lock-up periods, to give delegates more independence in making crypto governance decisions. We demonstrate using the Maker contr...
Token delegation contracts may want to use explicit lock-up periods, to give delegates more independence in making crypto governance decisions. We demonstrate using the Maker contr...
To provide accurate and timely data, price oracles should align incentives with data publishers, i.e. make them "stake" collateral, reputation, and trading capital.
To provide accurate and timely data, price oracles should align incentives with data publishers, i.e. make them "stake" collateral, reputation, and trading capital.
Since the massive explosion of DeFi activity and innovation in mid-2020, decentralized lending has become a core pillar of the emerging on-chain financial system.
Since the massive explosion of DeFi activity and innovation in mid-2020, decentralized lending has become a core pillar of the emerging on-chain financial system.
In this article we introduce MetaSilo — our integration of Silo with MetaMask — which we believe may help larger crypto teams scale and sleep better.
In this article we introduce MetaSilo — our integration of Silo with MetaMask — which we believe may help larger crypto teams scale and sleep better.
Jump Crypto applying its research and development prowess to increase the efficiency of one of the world’s fastest blockchains
Jump Crypto applying its research and development prowess to increase the efficiency of one of the world’s fastest blockchains
“The speed of light is too slow.”
“The speed of light is too slow.”
In experiments with noncompliance, some subjects assigned to the treatment group may be unlikely to actually receive treatment, presenting difficulties for obtaining precise estimates of treatment effects. In this study, we seek to address the issue by introducing a class of compliance-weighted Wald estimators in which those unlikely to be compliers are downweighted and observe the effects.
In experiments with noncompliance, some subjects assigned to the treatment group may be unlikely to actually receive treatment, presenting difficulties for obtaining precise estimates of treatment effects. In this study, we seek to address the issue by introducing a class of compliance-weighted Wald estimators in which those unlikely to be compliers are downweighted and observe the effects.
We outline two dishonest strategies that can be cheaply executed on the Ethereum 2.0 Beacon Chain.
We outline two dishonest strategies that can be cheaply executed on the Ethereum 2.0 Beacon Chain.
Protocols should set up "dropboxes" (distinct on-chain addresses) for whitehats to move funds into, from the protocol — and they should promise rewards and favorable treatment for ...
Protocols should set up "dropboxes" (distinct on-chain addresses) for whitehats to move funds into, from the protocol — and they should promise rewards and favorable treatment for ...
Injective, a blockchain built for finance, today announced a new $40 million funding round led by Jump Crypto.
Injective, a blockchain built for finance, today announced a new $40 million funding round led by Jump Crypto.
As crypto matures, the same maxim is becoming increasingly true about bridge protocols. In terms of security risk, bridges are a big target.
As crypto matures, the same maxim is becoming increasingly true about bridge protocols. In terms of security risk, bridges are a big target.