Bankless - 49 - Moon Math: The Bull Case for Cryptography | Justin Drake
Episode Date: January 25, 2021🚀 SUBSCRIBE TO NEWSLETTER: http://bankless.substack.com/ ✊ STARTING GUIDE BANKLESS: https://bit.ly/37Q17uI ❤️ JOIN PRIVATE DISCORD: https://bit.ly/2UVI10O 🎙️ SUBSCRIBE TO PODCAST: http:/.../podcast.banklesshq.com/ 👕 BUY BANKLESS TEE: https://merch.banklesshq.com/ ------ AFTER THE SHOW DEBRIEF: https://shows.banklesshq.com/exclusive-justin-drake-debrief ----- GO BANKLESS WITH THESE SPONSOR TOOLS: ⭐️ AAVE - BORROW OR LEND YOUR ASSETS https://bankless.cc/aave 🚀 GEMINI - MOST TRUSTED EXCHANGE AND ONRAMP https://bankless.cc/go-gemini 💳 MONOLITH - GET THE HOLY GRAIL OF BANKLESS VISA CARDS https://bankless.cc/monolith 📱 DHARMA | MOBILE ONRAMP DIRECTLY INTO DEFI https://bankless.cc/dharma ------ 49 - Moon Math: The Bull Case for Cryptography Guest: Justin Drake Justin Drake is a researcher at the Ethereum Foundation and is leading the charge of the application of cryptography to Ethereum. Justin speaks about how far with come in the cryptocurrency industry, with only two extremely primitive tools: cryptographic hashes and signatures; the fire and wheel of applied cryptography. Justin leads us through a cryptographic-enabled world, where more recent breakthroughs in applied cryptography supplement hashes and signatures. Multi-party computation, fully-homomorphic encryption, SNARKs, verifiable-delay functions, these are all cryptographic tools that are yet-to-be harnessed by the Ethereum blockchain. Importantly, all of these new modern cryptographic tools are developed well beyond theoretical concepts; all that is left is for talented developers to put rubber to pavement. Justin walks the listeners through the user story of a user making a transaction on Uniswap, and discusses how cryptographic tricks can make the entire user process more secure and more trustless. We finish with a discussion about the long term fate of the Bitcoin blockchain, and its collision course with quanton computing, which threatens to break some of the crucial features that makes Bitcoin, Bitcoin. Justin provides a roadmap for the decoupling of BTC the asset from Bitcoin the blockchain, using a cryptographic two-way bridge between Bitcoin and an alternative new host blockchain, presumably Ethereum, and how BTC can upload itself to a new blockchain, and be rid of the baggage and liability of the Bitcoin blockchain 🤯 This is truly one of the most unique pieces of content we’ve produced on the Bankless program, and Justin deserves so much credit for leading this operation! Resources: Justin’s Uniswap Cryptographic Mechanism Solution spreadsheet and their theoretical application to any Ethereum app. https://docs.google.com/spreadsheets/d/1dyhNWMB6rVdmV3Xz-LlZlTt0f4tXfIW0YaoZVvenORs/edit?usp=sharing Below are the two papers Justin mentioned on long-term Bitcoin (in)security: "On the Instability of Bitcoin Without the Block Reward" by Princeton researchers. https://www.cs.princeton.edu/~arvindn/publications/mining_CCS.pdf There are two informal explainers: https://freedom-to-tinker.com/2016/10/21/bitcoin-is-unstable-without-the-block-reward/ https://medium.com/@bergealex4/bitcoin-is-unstable-without-the-block-size-size-limit-70db07070a54 "On the insecurity of quantum Bitcoin mining" https://arxiv.org/pdf/1804.08118.pdf ------ Don't stop at the video! Subscribe to the Bankless newsletter program http://bankless.substack.com/ Visit the official Bankless website http://banklesshq.com/ Follow Bankless on Twitter https://twitter.com/BanklessHQ Follow Ryan on Twitter https://twitter.com/ryansadams Follow David on Twitter https://twitter.com/TrustlessState ----- Not financial or tax advice. This channel is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. This video is not tax advice. Talk to your accountant. Do your own research. Disclosure. From time-to-time we may add links in this channel to products we use. We may receive commission if you make a purchase through one of these links. We'll always disclose when this is the case
Transcript
Discussion (0)
Welcome to Bankless, where we explore the frontier of internet money and internet finance.
This is how to get started, how to get better, and how to front run the opportunity.
I'm Ryan Sean Adams. I'm here with David Hoffman, and we're here to help you become more bankless.
David, this is the type of episode we've not done on bankless before.
What makes this one so special?
You know, I don't think anyone has done an episode like this.
Justin Drake, who is a cryptographic researcher at the EF, he loves cryptography, and that is one of the
harder subjects to do a podcast about, especially when, you know, you and I, you're generally
non-technical, and Justin is extremely technical, yet he did a fantastic job breaking down
cryptography so we could help understand how it's going to fill some of the chinks in the armor
that we have in this cryptocurrency industry, right? So we use Uniswap as like the premier example of the
the application that everyone knows and has probably engaged with, yet there are a few trust bottlenecks
for engaging with Uniswap. Metamask is a trust bottleneck. The front end of the website is a trust
bottleneck. And there's a number of other things that you are implicitly trusting when you use an application
like Uniswap that aren't anything to do with the Uniswap, the protocol itself, but are still holes in
the armor when it comes to trust. And so what this episode was about was how we are just at the
beginning of the crypto economic revolution. We start off this episode defining crypto economics.
And Justin says, uh, talks about how, you know, originally the cypherpunk vision was all about a
cryptography enabled world. Yet that was super ambitious and perhaps never going to happen.
And therefore, the integration of economic assurances or assumptions with cryptographic
assurances or assumptions is really powerful. And basically what this industry stands on.
And we have so much left untapped potential in the realm of crypto economics that we have not yet
applied to our daily interactions with the Ethereum blockchain, with the Bitcoin blockchain.
So this is all about moon math.
What we can do with all of these crypto economic tools that we've developed, yet we have not
yet applied.
Justin is really bullish on the future of cryptographic, crypto economic tools for helping
improve the trustlessness of these systems that we use on a day-to-day basis.
Really a fantastic episode.
I think one of my favorites.
Part of the reason this is important, guys, is because Bankless is all about giving you
mental models for how to think about crypto.
And ultimately, how to guide what you do in crypto, how you use it, your investments,
what you do in your kind of daily life using Defi systems.
And I think there are kind of two schools of thought about crypto that guide investing
paradigms. One is sort of crypto is an economic movement, an emphasis on the money. Bitcoiners tend to be
more that side. And the other is crypto is a software. It can evolve and change over time. Our episode
recently, David, with Chris Dixon, more expressed that mentality. And you know what the truth is,
is it's both of those things. It's not just money and it's not just software. It's software money.
And you have to understand both sides of that coin in order to guide your investment decisions
and have the correct mental models for this industry.
And this was a beautiful blend of, I think, those two things.
It really showed the softwareness and the upgradeability and the enhancement potential
of the software compute layer of crypto without sacrificing the economics piece of it,
which is so important, crypto economics.
It's both of these things together.
In this episode, we talked about Justin's heuristics, his rules of thumb for engaging with
crypto economics. He says that if cryptography doesn't do it, doesn't solve the problem,
you can therefore rely on crypto economics or add in economic assurances on top of your
cryptography. But then he also says, if you can do it with just cryptography, you should do it
with just cryptography. And that resonates with the protocol sync thesis. If we can
relegate things to math, we totally should. That was one of my big takeaways. We end the conversation,
this marathon of a conversation over two hours long, our longest episode yet. We end this conversation
with a thought experiment about how cryptography is changing and things in this industry need to
change with it. And Justin believes in apparently the industry or the academic study of
cryptography points in this direction that quantum computing will come to eventually break
Bitcoin the blockchain and Ethereum the blockchain unless we can pivot and put in new
tools, new security mechanisms that prevent quantum from computing from breaking these systems.
We talk about Bitcoin's calcification and how it might not be able to pivot to a post quantum
world. And in that world, we could actually create a scenario where BTC, the asset,
separates from Bitcoin the blockchain and uploads itself to the blockchain that does have these new
holes, these security holes as a result of quantum computing patched, which we think, of course,
is going to be Ethereum 2.0. That is a fascinating conversation. Imagine a decoupling of BTC,
the asset from Bitcoin, the blockchain, and then it exists entirely on a new blockchain. That was an
absolutely fascinating part of the conversation. As usual, guys, we have a full debriefing.
where David and I go over our thoughts immediately after the episode. So if you're a premium
subscriber to bankless, make sure you check that out. We will include a link as usual. Without further
adieu, David, we should talk about our sponsors. Gemini is the world's most trusted
cryptocurrency exchange. I've been a customer of Gemini since I first got back into crypto back in
2017 and it has been my main exchange of choice to make my crypto buys and sells. Gemini
is available in all 50 states and over 50 countries worldwide. And on Gemini, there are markets
for over 30 various crypto assets, including many of the hot defy tokens like Wi-Fi, Ave, Uni, and
also they are one of the few exchanges that has liquid dye markets. Having both the option of
logging into the Gemini.com website or instead opening the Gemini mobile app has allowed me to be
able to access any and all exchange and on or off-ramp services that I've needed to on a moment's notice.
With instant deposits and fast withdrawals, I'm able to make my money do the things I want it to when I want it to.
You can buy crypto safely and securely on Gemini with the peace of mind of knowing that your investments are insured and protected with industry leading cybersecurity.
You can open up a free account in under three minutes at Gemini.com slash go bankless.
And if you trade more than $100 within the first 30 days after sign up, you'll be gifted a free $15 bonus.
them out, gemini.com slash go bankless. If you are looking for a product that connects your
fiat bank account with defy tokens and products, you need to download the Dharma mobile app.
Dharma is a non-custodial smart contract wallet and comes with a bridge that connects you
right into your bank account. Darma is the fastest and most efficient wallet between your
fiat and your bank account and any token on uniswap or even any vault in year. With Dharma, you can
get over $25,000 per week into the DeFi universe and you can do it non-custodially.
If you or anyone you know is hot on Defy and you're trying to get your money into a
defy investment, Dharma is the place to go. Signing up and going through KYC is an absolute breeze.
It took me just under three minutes and after signing into my bank account via Plaid, I am now
just one transaction away from any token that Uniswap has to offer. Go to www.dh.dh.
I-O, that's D-H-A-R-M-A-D-O, download the DARBA app and get yourself unbanked today.
Bankless Nation, we are super excited to have on Justin Drake, who is a cryptographer.
He's a researcher at the Ethereum Foundation.
And to say he played a key role in the development of ETH II is probably an understatement.
He's been a key force behind us.
He's here to tell us all about how early we are in this crypto revolution, the advances that are coming in cryptography, that are about to change everything we think we know about cryptography, crypto, and this entire industry.
Justin, how are you doing today, sir?
I am doing great guys.
Thank you so much for having me.
You know what?
I've got to ask this before we get into the moon math and the really fun stuff.
Heath launched in 2020.
Wow.
How does that feel, ETH2 launch?
amazing. I mean, I've spent three years of my life dedicated to this, and it was a great reward. And
seeing that we have, you know, $3 billion, you know, staking and that we basically haven't had
issues so far is pretty astounding. Justin, this is actually kind of a unique episode, I think,
that's about to come out of the bankless podcast, because this is the first episode where you actually
pitched the episode to us. And this is something that I would not have thought.
about to be able to, or the skills or the knowledge to produce this sort of conversation.
So I mean, I know that you are absolutely fired up to talk about what we are going to talk about.
Maybe you could kind of give us the TLDR, the elevator pitch for what we are about to talk about
and why you are so stoked about this conversation.
Yeah, for sure.
I mean, I was inspired by you because you had this bullish Ethereum, you know, series,
and I'm just so bullish Ethereum.
And I just wanted to, you know, reflect on why am I so bullish?
And, you know, one of the big reasons is that the fundamentals are so strong, right?
The whole space is built on crypto-economics, which is, you know, part cryptography and part game theory and incentives.
And, you know, the cryptography part in particular, we're at the very beginning.
There's so much room to grow.
and it's a story that I think will unfold over many years,
possibly even decades.
And there's just so many reasons to believe that the reality we live in today
is very, very primitive.
And it may sound like we're moving to a world.
When they describe, try and describe the future,
it might sound like sci-fi,
but I really do believe that we're moving towards that end goal.
So where does this conversation start? One of the lines that you put into the agenda was that, you know, with regards to cryptography and crypto-economics, we are just in the most primitive age, the stone age, where we have like, you know, the fire and the wheel. But so much of the world's inventions are ahead of us. Where does this conversation start?
I think, you know, one interesting, you know, starting point, I think, is the cyphapunk movement, right? So they had this,
amazing dream in the 80s, which is, can we try and rebuild all of society on really strong
foundations and specifically cryptographic foundations? And people back then were really fired up,
you know, for ideological reasons in a similar way that some people today in the crypto space are
really fired up. But to a large extent, I think that dream kind of didn't pan out the way that
people hoped. And, you know, we had a few decades of silence there.
And then, you know, we had we had a few clues, you know, things like, like BitTorrent, which basically allowed us to to have really strong foundations in the sense that BitTorrent to a large extent is just cryptography plus, you know, peer-to-peer networking and plus even a little bit of incentivization the early days.
And then we had, you know, Satoshi's big breakthrough, Bitcoin, which to me is kind of the birth of crypto economics in a really big way.
And now we're, I guess we're reaching a point where kind of this, you know, this point in the exponential curve where it's the inflection point.
Everything happened quite slowly, but now we're going to see this explosion.
you know, largely driven with Ethereum.
Where does that inflection point come from?
Like, what about the, what's different about Bitcoin and crypto-economics that we didn't have before?
Why is, why is there this Cambrian explosion going on now?
Yeah.
I mean, one of the big things, I guess, and it was the key innovation of Ethereum is, is programmability.
So now we're in a position where Ethereum can, um,
absorb all the innovation that we need to absorb to solve all these problems that we have.
So in the crypto space, we're starting from the foundation.
So we have to reinvent the whole stack.
We're reinventing the wheel to a large extent.
And so even though we have lots of superpowers, such as decentralization and trustlessness
and things like that, we also have a lot of tradeoffs.
And, you know, the superpowers are so awesome that we're.
happy to live with the trade-offs. But oftentimes, in fact, you know, almost all the time,
I believe that these trade-offs that we have relative, for example, to existing services like
centralized exchanges in the context of decentralized trading, I think we can basically fill in all
the gaps that we have today and be at least as good as centralized services in every
single respect. And in some key respects, there's totally outshine them.
you know, by by a fact of 10 or 100 X.
Can we talk about this idea of crypto economics for a second in the context of Bitcoin?
Because I just want to make sure that that's clear to all of our listeners, right?
So the cypherpunks were very much into cryptography and the revolution that it could bring,
self-sovereign money, privacy, all of these things.
But they were missing something.
They were missing the economics part that made Bitcoin so special.
and that made Satoshi's white paper so special.
I'm not necessarily sure that that's completely intuitive to people.
The sorts of things you can do when you blend not just cryptography,
but it's cryptography plus economics.
It's both of those two things together that was the major innovation and discovery of Bitcoin.
Can you talk about that for a minute?
Yeah.
One metaphor that I have is that cryptography is this very powerful,
tool is a very powerful building block like the brick, right? You want to build a wall and you have
the bricks. But if you have bricks alone, that's not going to work. You need something to
glue the bricks together. You need the mortar. And the economic part kind of fills in the gap
and glues everything together so that you have a coherent system that breathes life. If you take
cryptography alone, it's kind of somewhat dry and somewhat abstract. And
once you bring in the economic part, which could be a relatively thin layer, but, you know, a critical layer,
then then suddenly you have pieces of the puzzle that stick together to form a coherent system.
Before Bitcoin, the cypherpunks were really trying to solve this problem for almost decades, right?
And they innovated in many different ways. One of them was eagled.
There was just a number of different like Bitcoin precursors that I think all relied,
on pure cryptography, right? And it was that integration of economics that really was what allowed
Bitcoin and therefore this whole entire industry to flourish. Maybe you can talk about just the
relationship between cryptography and economics and maybe tell our listeners like maybe when is it
the better time to use cryptography and when is it the better time to use economics and how you
think about balancing these two forces. So I think a lot of the previous solutions kind of kind of had
partial decentralization. They used cryptography to the maximum extent possible, but they still
had this somewhere in the system, some sort of central party. And that led to attacks, for example,
by governments. Like one of the, I guess one of the big realizations is that cryptography alone,
so let's look at the goals of cryptography. What is the goal of cryptography? It's basically
to take a trusted third party that does some sort of functionality and replace it by pure code or
pure mathematics. And it turns out that there's some impossibility results. There's some things that
you just fundamentally cannot do. And so what do you want to do is you want to relax the constraints
a little bit. So you have this spectrum of trust, right? So on the one hand, you have very low trust
technology like mathematics and then you can walk your way up you have cryptography physics and then
maybe economics and then you know you have things that are very you know human um rooted in in
human culture things like the legal system or the monetary system or even religious systems
that are deep in in the narrative and you know you want to go as far as possible into the spectrum
but you want to be realistic right there's some things you just can't do with cryptography okay so
So if we kind of turn it down a notch and include economics, then suddenly this is the inflection point where you can breathe life into the cryptography.
And to be very specific, one problem that cryptography alone cannot solve is the double spend problem.
So it's this idea that you need to have some sort of entity that can remember that you've spent something so that it can prevent you from spending it again.
And that's this notion of state.
and consensus. So cryptography, the way I think of it, it kind of solves stateless problems.
So you can start with a state and then it will give you a valid state transition. It can prove to you
that something's happened according to the rules or with possibly, you know, certain security
guarantees like privacy or whatever. But one thing that it cannot do is take this graph of
of all the possible states and state transitions
and collapse it down to one canonical one,
which we call the truth.
So basically what consensus does is that it anchors kind of,
it's a little bit like a quantum analogy, right?
So you have, in the world, in the quantum world,
you have many different states that live in a superposition.
And you know, you kind of want to choose one,
you want to collapse it to just one.
And this is what consensus does.
And in order to solve consensus,
you need to move a little bit out of cryptography
and dip your toe into things that are very economic.
And more specifically, we have assumptions like the 51% assumption in Bitcoin
or in Ethereum we could have the two-thirds assumption.
And we can talk about these assumptions in many different flavors.
We have things like honesty assumptions
where we just model the actors as always behaving,
according to the rules, but we could also have, you know, maybe rationality assumptions.
We can assume, and this is closer to the reality of things, where we can assume that, for
example, two-thirds of the players are rational, you know, they're motivated by money.
Monique is kind of interesting. It's like this one of the things that really transcends cultures
and boundaries.
and you can use money kind of as one of the really strong layers as the basis, as the foundation
for building society.
Bitcoin is famously known as a string of signatures.
In the white paper, like Satoshi called Bitcoins as like a very long string of signatures.
And that's all cryptography.
But what you're saying is that Bitcoin as a system is a,
and determining what the correct string of signatures is, is determined by,
social consensus and that that's and bitcoiners are famously saying like no there is no social consensus
to bitcoin there's only math but off a lot of coming things coming out of the Ethereum camp is like well
at the end of the day crypto economics is always one part secured by the social layer so what you're
saying is that the reason why everyone can come to consensus about what the correct string of blocks
is is incentivized by economics particularly by the Bitcoin hard cap the Bs
The C.C. Hardcap provides the economic incentive to and enables economic assurances.
But in your description, Justin, you were saying that, you know, originally the Cypherpunks
wanted everything to be run by cryptography. That was really hard. That was really ambitious,
perhaps even impossible. And so therefore, we can compromise and instead of just relying on
only cryptographic assurances, we also integrate economic assurances or assumptions as well.
But to me, in my mind, that indicates a priority or a tier, right?
Where, you know, if we can do something with cryptography and without economics,
we should perhaps do it with cryptography if we don't have to make that compromise.
Is that a fair assumption?
Yeah, exactly.
So we do have this spectrum of trust that I call it.
But, you know, I think you call it the protocol synchesis, right?
Like the heavy, dense stuff.
it wants to go at the bottom it sinks to the bottom and that's the foundation
for your stack yeah so that's exactly right
when you relax things suddenly a whole world of opportunities appears
and I have this kind of heuristic which is that if cryptography doesn't work
try crypto economics and usually it will work and this is actually in the you know
in research for FM2.0 this is kind of what helps us push forward
like usually like the very first solution that we come up with is cryptoeconomic and we know yay you know it's possible to solve this and you know at least we have one solution
and then kind of the next step is okay can we improve upon this and then that brings me to my second heuristic which is that if you can do without crypto economics
if you can do it purely with cryptography then that is going to be at least in the long run a superior solution
And so that's what you want to be aiming for long term.
That is one of the best mental models for understanding the protocol sync thesis that I've ever heard.
And so I think this is already a super valuable conversation.
Ryan and I have described the protocol synch thesis as like trust minimized, decentralized,
you know, credibly neutral.
But at the end of the day, what's going on is we're just boiling back down to that's what cryptography is.
And so the protocol sync thesis, I think could be restated.
in systems that use cryptography more than they use economic or trust-based assumption.
Right. And actually, you can look at this heuristic kind of in the fullest spectrum of things.
So if you look at Uniswap, for example, you know, just to get started, just to get to the real world,
it's made some compromises. You know, it relies on infura. It relies on the graph. It relies on all sorts of
centralized providers. But
you know over time you can kind of peel off these these layers that are higher trust and kind of
shift everything to to the high trust realm and you know with lots of engineering lots of creativity
and research we will get there and you know there's some good reasons to believe that you know the
the end goal is the moon right we will solve all our problems we have extremely powerful
arsenal of tools that have been developed in theoretical cryptography, and those will make
their way progressively through applied cryptography, and then, you know, the final boss, which is
real world cryptography.
So I don't think, we want to dive into this, Justin, because I don't think people fully understand
the field of cryptography.
So what we've basically done in kind of the past couple of decades is, you know, the past couple of
decades is we discovered this amazing thing called cryptography as as humanity. And then with Bitcoin,
we blended cryptography with economics. And that gave us the ability to get a digital consensus on
things. It was a huge unlock for humanity in that it helped us solve the double spend problem
so we can have this marvelous thing we call digital scarcity, which was not previously a layer
on the internet. So that's cryptography plus economics, digital.
scarcity, right? And that is Bitcoin. And Ethereum, of course, made that sort of a general digital
scarcity compute engine. But here's the thing. Cryptography is a changing field and an advancing
field, right? So the cryptography that Bitcoin is based on was that built out in the like
1960s, 1970s, that sort of era of cryptography. Maybe we could tell us on that. But the exciting thing
about this that I want our listeners to know is that cryptography is advancing too.
In kind of a similar way where we had the compute revolution with Moore's Law, we had the ability
to put more transistors on a chip, right? With these cryptography advances, we can almost
put more trust on a chain, more consensus. It helps us, these cryptography advances help
us scale consensus to all new levels. And it's a changing field. Can you talk about how crypto economics
is just getting started because of these new cryptography functions? Right. One of the things that I'll say
is that as I mentioned, there's these different flavors of cryptography, right? There's the theoretical
cryptography, which basically asks, can you do something yes or no? And, you know, usually the way
you answer is if the answer is yes, then they'll try and give you a specific construction. If the
answers, no, they'll give you an impossibility result telling you it's impossible to do.
But oftentimes, if the answer is yes, the construction that they will give you as cryptographers
is like, you know, pine the sky, it feels very distant from the real world.
And for decades, you know, we've had theoretical cryptographers who are, you know, passionately
in love with what they do, you know, it's very intellectually stimulating, but they're disconnected
from reality. And it turns out that in theoretical
cryptography, we've made huge leaps and bounds.
And actually this kind of, in a way, culminated this year
2020 with the discovery of what's called
code obfuscation. So it's a very powerful cryptographic tool.
And now we know how to do it on very standard cryptographic assumptions.
And sorry, is this anything to do with the cryptocurrency
industry, or is code obfuscation something that is purely out of the cryptographic domain?
So code obfuscation is kind of this beacon of hope for, and it's kind of giving us a roadmap for
the next few years and decades. And in short, what it tells us is that everything that we could
wish to do in cryptography, we can do it. And so it's basically,
the zero to one moment where whatever you want to do, you can do it, unless there's some sort
of impossibility result. But if you can do it, you can do it with code obfuscation. So at the very
least, because we know how to do code obfuscation, we know how to do kind of the rest of cryptography.
The term that we have is that we say that obfuscation is crypto-complete. This one building block
gives us all the other building blocks, which is a really amazing thing.
My mind goes to Turing completeness.
Is that an okay like metaphor?
Yeah, so it's the same word complete.
Turing completeness is basically, once you have a few basic instructions,
you can run any program that could be run on a computer.
And it's the same thing here where with code affluscation,
you actually need two primitives.
You need, once you have hash functions and an obfuscation,
these two building blocks alone give you the rest of cryptography.
And so this is fulfilling, or so what this is,
this answers is perhaps maybe the original cypherpun vision of,
can the world be completely run on cryptography?
And so if you're telling me that theoretical cryptography is quote unquote
solved by code obfuscation, does that mean that the original
cypherpong dream of a cryptography run universe is still in the cards?
No, I don't think it's in the cards.
And you know, you kind of have these things that you just can't do with
cryptography.
And like, for me,
the separating line is stateless versus stateful.
So cryptography can do all the stateless stuff.
And then once you combine it with one further ingredient,
which is blockchains or consensus,
which will give you this state,
then you can do everything.
And by everything, I mean that you can basically simulate
any trusted third party with just blockchains
and math.
I mean,
when you, when you,
just to give you a little bit of insight
as to what code obfuscation is.
So code obfuscation,
the idea is that you can have
programs
which hold secrets
and these programs are public.
So it's kind of this paradox
where you have an open source program,
but it holds the secrets
in the program.
So the secret is kind of garbled
and obfuscated.
And when you think of a trusted third party, what is a trusted third party?
Well, if you think of it as a human, for example, that's just like a brain with neurons.
And you can model that as a computer running some sort of an OS, you know, taking in as inputs, you know, these digital signals, you know, for your eyes and whatnot.
And then you can basically encode any, any rules that you'd want from this trusted third party into your
program and instead of running it in kind of in on the brain you're going to run it in in pure in pure math.
And you know, you can kind of another kind of analogy is is trusted hardware. Right. So you have these
distrusted kind of secure enclaves that are meant to run programs, but at the same time
hold these secrets. It's like a hardware wallet. Right. So you have this the secret embedded in
the hardware and the idea is that you're not meant to be able to extract.
the secret. And yeah, you can encode whatever rules you want this trusted
fed party to do or this trusted hardware to do in code and then you can
compile it to just pure math with this code obfuscation technique in theory.
So this is all theoretically possible, Justin. So what does it take for the theory
to start to catch up to the practical? Like what is the cryptography
that lives today in in Bitcoin, right? And how is that caught up to the practical implementation of
Bitcoin? Like I guess I'm wondering why we haven't seen the theoretical possibilities in practice yet.
Right. The way I think of, you know, the progress of cryptography is like there's three big
quantum leaps that need to happen for. So basically, you need to go from zero to one. Just say, yes,
in theory, this is possible to build. And that's the realm of theoretical.
cryptography. Then the next big step is basically what's called applied cryptography. And the idea
here is that basically you want to look at the whole design space and look at all the different
trade-offs and try and find constructions with all sorts of different properties that may
potentially be applicable at some point into the future. And then you have this final quantum step,
which is real world cryptography.
And the idea here is that you have someone
with a very specific use case
and they're going to pick one single design
in this design space.
And they want to make sure that it's good enough
in every single property.
And so oftentimes there's a lot of legwork to do
to basically just make sure that it's good enough
across the board for use in the real world.
And what Ethereum is, basically, it's a machine for turning applied cryptography into real world cryptography.
And for a very long time, we haven't really had this massive, you know, force pulling cryptography out of the abstract and into the real world.
And this is why cryptographers absolutely love blockchains.
And kind of blockchain is eating crypto.
You know, you go to a blockchain conference and it's like, sorry, you go to a cryptography conference and it's blockchain, blockchain everywhere.
And, you know, every time I email a cryptographer saying, hey, I read your paper, here's a few questions and, hey, maybe we'll, we're considering integrating this into Ethereum.
You know, they come back super enthusiastic. You know, they love it because, you know, we're giving meaning to their work and we're kind of basically giving them this, this possibility.
of taking it from the applied cryptography into the real world cryptography.
And I guess going back to one of your recent podcasts with Chris Dixon, he was talking about
how there's this virtuous cycle between the technology and the use case.
As the use case grows, there's more demand for technology, there's more money, more attention,
and that feeds back in to building more powerful technology,
which then unlocks more and more use cases.
And we've seen this, for example, with computing, as you said,
we've seen Moore's law, you know, 20 years ago,
you know, you didn't have, you know, GPS in your pocket
or you didn't have a camera.
And, you know, all these little gadgets led to all sorts of new applications
that we couldn't predict, like things like Uber.
And over time, we're going to grow,
our tool set of cryptographic gadgets.
And we're going to get, not only are we going to solve all the known problems that we have
with decentralized applications, where we had to make a trade-off.
For example, we had to trade off privacy, or we had to trade off scalability, or we had
to trade off front-running, things like that.
But my guess is that we're going to see totally new applications, which were basically
impossible to predict.
That's the thing I feel like Chris was saying in the podcast and that you're also echoing now is that, of course, these systems are digital scarcity engines and they produce monies.
But they are also computers, right?
That can be fundamentally improved from one generation to the next.
They can be upgraded.
They can be enhanced.
You can go from a Pentium processor to something.
much more powerful.
And these enhancements can bring about massive new eras of possibilities that weren't previously
possible in the last generation of compute.
I think what you're saying, Justin, is like Bitcoin, as it stands right now, and Ethereum
V2, this era of compute, is just scratching the surface on what these computers and this
new era is capable of.
That is exactly right.
And we're actually seeing, it's actually the beginning in three different places.
So when you think of the blockchain space, we basically have layer one, where we're cramming
a lot of innovation into EF2 and we have a whole roadmap for deploying this.
And I'm more than happy to talk about it.
And then we have innovations at layer two and like the genius of layer two is that once you
have this so-called Turing completeness, once you have the virtual, if you're in virtual machine,
and that's enough to do everything. You reach escape velocity. And so, you know, you're able to
capture whatever comes to you. Like the EVM is a sponge for innovation. And then you have,
you know, something where it's extremely early days today is all the auxiliary infrastructure,
which I guess you could call layer three. You know, things like, you know, things like,
block explorers or you know search or you know basic things like sinking like like infura
and metamask like all of this is just so so primitive we're kind of still doing it the traditional
web two way now then if you want to to you know if you want to build on ephemium you kind of as in
on the layer one a decentralized application you have this forcing function to make your decentralized
the core, the smart contract, you know, decentralized.
But then what often happens is that you,
today you won't make the investment in all the extra layer three stuff
because there's just there's too many auxiliary services.
And it's not your your core focus.
But over time, these technologies will get commoditized.
And we'll reach a point where the,
whole ecosystem will be able to reap the benefits that they bring.
Hey guys, there is so much left in this interview.
Justin takes us through the user story of making a transaction on Uniswap.
Uniswap as the model defy app.
Justin discusses all of the trust points and weaknesses that are involved in this user process.
And he gives the cryptographic solution for solving each chink in the armor along the way.
We go through six different cryptographic mechanisms.
And Justin explains to us how it can help create a defy-enabled world.
And then we finish up with one of the most interesting conversations I've heard in a long time,
which is of the long-term fate of the Bitcoin blockchain and its destined collision course trajectory with the coming world of quantum computing,
which threatens to break a number of the things that make Bitcoin Bitcoin.
He illustrates a cryptographic-enabled two-way bridge for BTC the asset to escape Bitcoin the blockchain and upload itself to a,
new host chain in which it also solves BTC's long-term economic security requirements,
which it doesn't really have the budget for anyways, by simply hopping on to a new host
blockchain which we could only presume would be Ethereum. There's so much crazy awesome stuff
left in this episode. Don't go anywhere. We have to talk about some of these fantastic sponsors
that make this show possible. If you want to live a bankless life, you need to get a monolith
defy visa card. Monolith is a one-two punch of both an Ethereum smart.
contract wallet and an accompanying Visa card that lets you spend the money that you have in
your Ethereum wallet everywhere where Visa is accepted. When you swipe your monolith visa card at the
grocery store or at a restaurant, it actually makes a transaction on the Ethereum blockchain
that spends some of the money you hold in your Monolith wallet. It's insanely cool and it's one of
the best tools out there for living a bankless but still normal life. Monolith also offers
on-ramp services for getting your Fiat money into the world of Defi.
So it's trivial to top up your monolith card if you ever need to, and your deposited money goes straight into your non-custodial wallet so your money is never held by a centralized intermediary.
Because Monolith is native Ethereum infrastructure, the money you hold in your monolith wallet still has the power of Defi behind it.
Swapping assets on uniswap or earning yield in defy is at your fingertips.
Go to monolith.xyz and sign up to get your Monolith Visa card today.
AVE is a borrowing and lending protocol on Ethereum and just recently released AVE version 2,
which has a ton of cool new features that makes using AVE even more powerful.
With AVE, you can leverage the full power of defy money Legos, yield, and composability
all in one application.
On Avey, there are a ton of assets that you can deposit in order to gain yield, and all of those
same assets can also be borrowed from the protocol if you have deposited collateral.
Here you can see me getting a 200 USDC loan against my portfolio of a number of different
defy tokens and ETH.
I'll choose a variable interest rate because it's a lower rate than the stable interest rate option,
but I could choose the stable interest rate option if I wanted to lock that interest rate in permanently.
One of AVE's V2 features is the ability to swap collateral without having to withdraw your assets,
trade them on Uniswap and then deposit them back into AVEA.
Avey does all of this for you all in one seamless transaction, so you don't have to
repay loans in order to change the collateral you have backing them.
Check out the power of AVE at AVE.com.
That's A-A-A-V-E.com.
You know, I've frequently spoken of this industry as one of the few bright shining spots
that I can find in the world right now.
There's not, it's pretty easy to find reasons to be pessimistic about the state of the world.
Yet with Ethereum and Bitcoin and this whole entire revolution, it really is a shining spot
on the hill to be really optimistic about the future.
And for some reason, I've always said that I think the future will be better because of things like Ethereum.
And when people use the metaphor behind like Ready Player One where like there's infinite possibilities and in such a rich futuristic environment,
that seems where we're going.
But I've never actually been able to articulate how we get there.
And I think that's what we're doing here in this conversation.
The bridge between some crazy, awesome Ready Player One universe and the what we have today with Ethereum 1.0 and then also Ethereum 2.4.4.2.2.2.2.2.
know the beacon chain, that gap seems to be able to be filled by some of what we are talking about
here. Before we get into that, you were talking about that cryptography as an academic study
was kind of like locked in the classroom up until blockchain, right? Up until we had crypto-economics.
And now it seems to be that with the advent of crypto and blockchain and Ethereum, we've actually
been able to actually have a real world place for that academic study to manifest itself in the
real world. Would you say that that manifestation is inside the EVM? And how does Ethereum just relate
to the study of cryptography or cryptographers in general? Can you just expand on that relationship?
Yeah. So I think we're going to see crypto everywhere, not just in the EVM. We're going to see it,
you know, deep in the guts of the, you know, the consensus engine. So for example, in EF2,
We have five pieces of cryptography, right?
We have BLS signatures, which basically allows you to have so-called aggregatable signatures.
The idea of aggregatable signatures is you have 1,000 people signing a message.
The naive way of verifying these messages, you verify them one by one, like a thousand times.
And so if each message, let's say, takes one millisecond to verify, verifying 1,000 messages is going to cost you a whole second.
And that's, you know, very expensive.
The idea of aggregatable signatures is you can combine these 1,000 signatures into a single one and just verify this one.
And that's the same as if you had verified all 1,000 individually.
And just to give you like a scale of the power of cryptography with just this one primitive.
So if you look at all the other proof of stake systems, you know, they have 1,000 validators or less.
we you know on on eF2 we have right now 60,000 validators and we could even we could support hundreds of
thousands potentially even millions of validators and this has a real practical consequences like right now
you know in order to stake you need 32 ether and you know we we tried really hard to bring this
number down 32 ether but it's still you know today an insane amount of money is like for you know
$40,000 or whatever.
But before we had, you know, this,
this roadmap to use BLS signatures,
we were going to go with 1,500 EF to stake,
which is like $2 million or whatever.
And that would be like a huge barrier to entry for decentralization.
So, yeah, that's one of the primitives,
very powerful primitive, aggregatable signatures.
So that's a small example of how cryptography can scale.
basically you just scaled decentralization with aggregated signatures just like that went from a two million dollar stake which would have been probably hundreds maybe thousands of lucky validators to now tens of thousands of validators just with that simple cryptographic primitive i want to get back to something you were saying because this is all relates justin is that um you were saying ethereum is is poised to capture this exponential of all of this cryptography progress this new era of computer
And you're talking about like the three layers, like there's a layer one, there's a layer two, layer three.
All of those areas can kind of capture some of this innovation.
But you know what I think is interesting is the question of why is Ethereum poised to capture this
versus another crypto network, say a Bitcoin, is because of the layer zero.
The layer zero is almost the social layer.
It's kind of a layer that David and I operate on bankless.
But you operate on in a sense, too, Justin.
in that the Ethereum social contract is very much open.
It's very pragmatic.
So it is very much open to these types of innovation.
Some will criticize Ethereum for that.
So we just had Lynn Alden on the podcast and she was talking about like,
I like Bitcoin because it's a fully matured 100%.
It's done.
The project is done, right?
It's solidified.
Whereas Ethereum, it's completely changing.
But if this theory of compute, cryptography compute is right,
you actually want some change because you want to incorporate these 10x, 100x gains,
and it seems like Ethereum has that on the social layer.
Is that part of the reason you say Ethereum is perfectly poised to capture some of this cryptography advancement?
Absolutely.
And I think you said it extremely well.
Like this layer zero is absolutely critical.
And you're right.
Like if we are living in an exponential world and, you know, we are, duh, you know, it's really obvious when you
zoom out a little bit, then you know, you need to have some way of adapting to this world.
And, you know, you can have like really clever tricks, you know, like the, like the, the,
the theorem virtual machine where, you know, you just have this as soon as you reach the touring
completeness, then then you're done. And, you know, you can get the best of both worlds. You can get
both the kind of the solid layer one, which doesn't change very often. And, and kind of all the
innovation that can be captured with programmability.
But going back to this layer zero, which is kind of the cultural thing,
absolutely it resonates very strongly with me.
You know, we in the firm culture, we have a culture of building, a culture of innovation,
a culture of being at the bleeding edge and not only kind of passively observing the
bleeding edge, but actively pushing it forward.
And, you know, we have a culture of being
you know, I guess trying to predict the future, like trying to be, you know, placing ourselves 10, 20 years into the future and thinking about, you know, long-term fundamentals, not just, you know, the present day.
And for me, you know, being, you know, in this space for several years, you know, when I think back to the fundamentals of human motivation, what motivates humans?
Well, I think Ephraim has everything.
So it has kind of the intellectual curiosity aspect.
It has the ideological aspect where you want, you know, maybe it's to drive some change in society.
It has the financial aspects.
It has the explorer aspect where, you know, you're discovering uncharted territory.
It has the entrepreneurial aspect.
And, you know, it's just a huge amount of dopamine going on.
just being in the space because you have much i feel it i feel it in this episode i feel the dopamine rush
as you're talking justin exactly yeah um i think and i'm i'm not seeing you know i am seeing so much
you know dopamine in the in the in the whole space and you know the bright red spot for me is
it is ethereum jason we're going to get into the topic of uniswap and how more cryptographic tools can
and help, you know, kind of smooth out the rough edges around an application like Uniswap and all
other applications on Ethereum that have chinks in the armor. Because while everyone loves Uniswap,
because it's trustless and on-chain, there's plenty of supporting infrastructure that needs to go
in in order to use Uniswap, like Inferra and Metamass. These are all central points that needs to be
tackled by cryptography. Before we get to that conversation, however, I want to back up and talk
about some of these extra new tools in the tool belt, these new cryptographic mechanisms
that previously weren't incorporated with, you know, just Bitcoin or Ethereum 1.0. You've stated
that, you know, Bitcoin and Ethereum 1.0 and then also BitTorrent are just cryptographic
hashes and signatures. And those are two tools, you know, the fire and the wheel, as you said,
but there are many, many more tools in the tool belts. What new tools do we have that we
didn't have when we first got Bitcoin or Ethereum 1.0 off the ground?
Right. I mean, one tool that you guys might be familiar with, which is, you know, absolutely mind-blowing.
And it's actually one of the reasons why I'm in Ethereum.
Like I was very attracted to these so-called snarks.
And, you know, today it's almost as if snarks are commoditized.
You know, they've become boring, which is amazing, right?
We've gone from mind-blowing technology, you know, five years ago to something which is, you know, boring and deployed in the real world.
So Snarks, as you probably know, is basically allows you to take arbitrary computation and squeeze it down, the, squeeze down the validity of this computation down to tiny proof, which is constant size.
So, you know, you can have, you know, a program and you can have some input.
And then, you know, the program could take many, many, you know, minutes or seconds or whatever, days and years.
to run and then it finally will produce an output and basically you can prove that the output is valid
so it corresponds to the input and the program and you can verify that in in constant time so and that's
scale right so if if it takes you know years to compute something we could put it at the base
layer of ethereum but that would be a terrible idea because then ethereum would take years to
to compute that, especially on a distributed network.
And so if we can compress down what is needed to put into the base layer, that scales things, right?
And is that basically the underlying pattern for all of these new tools?
No, so there's like there's very different vectors, like different tools do totally different things.
And you're right on the topic of scalability.
Basically, you should think of the blockchain as being this very weak verifier.
So it can verify cryptographic tools, but it has.
very limited computational resources. On the other hand, the real world, kind of the external world
outside of blockchain, is a very, very powerful prover. We have huge and huge amounts of computational
power. And basically, we can leverage this extra computational power to squeeze things down,
to compress it, a little bit like, you know, compressing a file, I guess, to its minimal form.
And it turns out that for computation, the minimal form is basically zero or very close.
to zero and then you feed that small amount of information on the blockchain and that's yeah
that's how you get scalability in terms of other directions just to give you a little bit of of
of a flavor so one that i'm that i'm quite excited and it it's it's actually very reminiscent of
proof of work is is cryptography which is related to time so
and I call it
crypto physics.
So it's kind of
cryptography meets physics.
So in the world of Bitcoin,
we have a proof of work.
And what is proof of work?
It's basically a proof of energy expenditure.
So it's like this really cool thing
where cryptography,
which is like,
you know,
very abstract mathematics suddenly meets reality
through energy consumption.
And it turns out that we can do
a similar thing,
with time. So we can have cryptography meet time. And the way that it works is through computation.
So if you think of proof of work as being massively parallel computation to connect with energy,
it turns out that it's the dual for time. So by dual, I mean inherently sequential. So if you have
a piece of computation that needs to operate one step at a time and it can't jump ahead some
steps, kind of you need the result from the previous step in order to move to the next step.
Well, if every step is going to take some amount of time, you know, a few nanoseconds or whatever
it is, then you can string these steps and you can use inherently sequential computation to mimic
time. And that will give you some really cool, you know, cryptographic primitives. Like, for example,
one is what's called time lock encryption. So you can have a message and you can encrypt
it for some amount of time, let's say one minute, and after one minute, kind of automagically,
it decrypts itself. So that's kind of a really mind-blowing cryptographic primitive,
and it turns out that it could be used, for example, in the context of Uniswap to remove front
running, right? So Uniswap, we have this problem right now, which is that if you,
because you're trading in, you know, in public daylight and everyone can see your trades and anyone
can place trades ahead of you and behind you just by playing with the gas price, you can get
front run. And so one way to saw front running, which is really cool is you, when you make a
trade, you will encrypt it for a very small amount of time.
you broadcast it, it gets included on-chain, and then once it's on-chain, it kind of automatically
gets decrypted. And that makes it impossible to front-run because the front-runners don't know
what they're front-running. That is insanely cool. I want to get into the details about the time element,
because to my understanding, if you're doing a computation that takes time, can you throw more
computation at it and speed up the time that it takes? Or is it actually locked into some sort of time
unit that we were familiar with. Like, this will take, you know, five seconds and it will always
take five seconds or five minutes and it will always take, you know, five minutes. How does that time
element work? So basically you want to, you want your, your time lock encryption where the delay is
based on inherently sequential. And what does inherently sequential mean? It means that even if you own,
like, all the computing power in the universe, that's not going to help you. Like, you're going to need
to do step by step and it's going to take time to do the whole computation. And one way to think of
it is, for example, a hash chain, right? So you start with some sort of number and then you just hash that
and then you hash that. So you're repeatedly hashing in a sequential manner, not in a parallel
manner, but in a sequential manner. And, you know, the idea of hash is that the output of a hash is
meant to be some random looking number, right? So you can't predict random looking numbers. So your only way
forward is just to keep on hashing and you can't parallelize it, you can't get speedups.
One of the things you can do on the other hand is that you can try and design very specialized
hardware that will do the inherently sequential computation, you know, faster than using,
let's say, a CPU which is not optimized for this particular operation.
And so one of the kind of the crazy projects that we have at the Deaffirman Foundation is to try and build the best possible hardware that humanity can build for this inherently sequential computation up to like a small margin of error and then distribute this hardware to the whole world.
And that will give you basically a very decent way of mapping computation and time.
Is that the VDF project that you just described, Justin?
Okay, so some folks might be familiar with that.
So you just described Snarks, which gives us a way to compress trust, essentially,
increase transactions per second, trusted transactions per second.
And then you just describe sort of a time lock sort of tool that gives us almost an alternative to proof of work in some ways.
Because just like it's very difficult to get energy in the real world, no one knows how to time travels.
We can't go back in time.
So that could be a very strong base primitive for lots of other things once we have certainty of a given timestamp.
What else is there out here?
I mean, just to give a small note on the time thing.
So it turns out that when you have this notion of time in cryptography,
you can do perfect randomness, unbiasedable randomness.
So, you know, when you think of, you know, Ethereum as a computer,
it can do everything.
Well, I can do many things.
But one of the things they couldn't do, which is super basic, is randomness.
Right.
And that's one of, I think, one of the reasons why we don't have, you know,
things like lotteries.
Like we could have a billion dollar lottery on Ethereum.
the only missing ingredient is that we don't know how to do good randomness.
And it turns out that there's a very deep connection between time and randomness.
Okay, moving on.
So in terms of other primitives, one that is, you know, quite cool.
And it follows actually, it's quite related to the snark is zero knowledge.
Right.
So zero knowledge is this idea where you're doing computation and this computation involves secrets.
And you don't, you want to prove that the computation was done properly, but you don't want to reveal the secrets.
And it turns out that once you have the snarks, where the S, by the way, stands for succinct, you're almost, you're more than half the way there in terms of zero knowledge.
And the reason is that if you have your computation and it compresses everything to a tiny amount of data.
So your amount of leakage, kind of information theoretically, is very, very small.
You know, to start with because your proof is tiny.
So, you know, if you started with lots and lots of secrets, the most you could leak is like a small portion of your secrets.
But it turns out that you can easily get zero knowledge from Snarks.
So this is one of these these very powerful things.
And if you think of it in the context of defy and Uniswap,
it basically solves privacy.
And this is a big deal for defy, right?
Like can we really have large, you know, players, large institutional players,
or even the retail, you know, participate in a big way on defy
where every single transaction is for the public to, you know, to analyze.
and see it just won't work, right?
So we, you know, privacy is a necessary step.
It's coming.
And we have the tools to address that.
And I guess in the context of Uniswap, you know,
we have, we have this on-chain privacy aspect where not only can we,
can we match what the centralized exchanges do, right?
So in the context of a centralized exchange,
you don't tell anyone, you know,
all you see is kind of the order book and the trades,
but you don't know who's making the trades
or who's adding orders to the order book.
So, but the one tradeoff is that you have to share who you are with the exchange.
So not only can we match this in the sense that the,
all the public information is only the trades and the order book,
but we can go beyond that,
we can be in a position where not even the exchange is aware of who's doing the trades.
So, Justin, are there any other tools that we should talk about before we actually go into
the uniswap deep dive? We're kind of blending these conversations as it is anyways.
You know, there's actually so many tools out there. So let me try and pick, you know, two.
So one, which is really awesome, is this idea of fully homomorphic encryption.
The idea here is, it's kind of off-chain privacy. So if zero knowledge,
solve the the on-chain privacy what about off-chain privacy so on off-chain
privacy you have a different problem right so you you're as a user you're you're
you're very constrained right you're using Defi on your phone or on your browser
you know you're not running a data center with and so what you do is you're
relying on a service provider and you're basically making API queries
you you're you're sending them information and they're giving you
And every time you make a query, you're basically leaking the query.
So for example, if you do a Google search and you, you know, you type in some rather, you
know, personal information, then Google will know that.
And it turns out that this, there's this magical primitive called fully homomorphic encryption,
FHE, which allows, and this is mind blowing, which allows a service provider to respond to
the query, any query, without knowing what the query is. So imagine Google being able to, you know,
give you like the top 10, you know, hits on, on whatever query you make without being able to
know what the query is. Yeah, that is absolutely insane. And I think the need for that in these days
is pretty obvious with all the topics of surveillance and surveillance capitalism going on.
I think that applies to so much of what, you know, modern society talks about as some of the problems that we are trying to solve in, in today's society.
Right. And, you know, if I were to, you know, make this a little bit more concrete in the context of Uniswarp, so we have, you know, a service called the graph, which is basically back-end infrastructure to Uniswarp.
And what it does is that it gives you kind of all the the trading metrics and whatnot. So you can say, okay, give me.
information about the if die pair between this date and this date and it will you know
will pull in all the information and and display to you on the screen so you can make kind of an informed
trading decision but you know you're also using other services like in furor for example
or that also have like similar similar kind of API query points and you know when you're leaking
this information you know you could potentially you know these
service providers could potentially link kind of addresses to like epharm addresses to IP addresses
and they could, you know, even further anonymize you beyond what you're already leaking
on chain. So we've gone through a number of different cool new tools and applied them to Uniswap.
And so I kind of want to actually formalize that conversation. Justin, when you see people
interacting with Uniswap, what are like the low hanging fruits that maybe people don't think
that they are actually trusting, you know, centralized choke points, centralized, you know,
points of trust, and which are these tools applied to help remove trust from that whole process?
What should come first in this conversation?
Right. So one actually, which I haven't mentioned, which is low-hanging fruit in several ways,
is this idea of custody, right? So just to just to zoom out a little bit,
custody, I think, is a big reason why we're having this ball run right now.
You know, it's kind of like a technical detail hidden in the background.
But what has happened is that over the last few years, custodians such as exchanges,
but also other custodians, have built really high-grade custody of crypto assets.
So what does it mean to custody crypto assets?
It simply means being able to secure a private key.
And so what they've done is that they've designed systems
where the private key is split into multiple shares.
And then these keys can be kind of can work together,
kind of somewhat recombined, but not really,
to compute the output of a function,
and this function is the signing function.
So basically it's,
you know, custody has been sold for large financial players.
And I think we're going to see custody being solved again for retail.
And for retail specifically, it's kind of surprising to me that this hasn't happened yet.
But basically, if you have funds on Metamask, you know, on your desktop, on your laptop, on your laptop, they're pretty vulnerable.
And the reason why they're pretty vulnerable is that there's any number of ways in which an attacker can get your funds.
And one of the reasons why it's scary is because not only are you as an individual vulnerable,
but the whole space is vulnerable.
So it's kind of a systemic risk where from one day to another, you know, everyone using MetaMas could lose their funds,
which would be, you know, devastating.
It could be like a $1 billion hack.
So if you think, for example, of if there's...
like a remote code execution vulnerability in the browser, which happens very frequently,
or your operating system has a remote code execution vulnerability. Or maybe there's some
sort of malicious employee within Metamask or malicious employee within the Google Play Store
or the Apple Play Store that will, you know, push forward a malicious update or malicious code.
You know, you're extremely vulnerable. And so what you want to be doing in the context of custody for
retail is very simple. It's just 2FA. We have that for exchanges, but we don't have that for
decentralized exchanges. So what is 2FA is very simple is you take your private key, you split it
into two parts, one part on your laptop, let's say, the other part on your phone. And then
you need an attacker would need to hack both your phone and the desktop in order to get the
two. And like the best way to do 2FA in a decentralized fashion is using a notion called MPC,
multi-party computation. And the idea here is that you have multiple parties, each with secrets,
that want to compute the output of a function. And in this case, the two parties are your two devices.
So while there's one human, the two parties in question are like your computer and your phone,
or maybe, you know, maybe you want to be even more secure in like your computer, your iPad and
your phone and, you know, maybe something else. And so when I ever like log into Apple, Apple says,
hey, is this actually you type in this code?
Perhaps there's some sort of mechanism where, you know, my phone and my computer are both doing
a little bit of computation to produce that private key.
And then there's some sort of relay of communication between these two devices.
So even if there's a malicious person inside of Metamask or who got a bug on my computer,
it's isolated.
Is all of this correct?
Yeah, that's absolutely right.
And the great news is that this can be, you know, largely transparent to the user.
For example, you know, your phone, so you can, you can, you can, you can.
going to trade on your laptop, right, because you have a big screen and your phone just going to be
sitting there in the background. And you can give it some rules, which you say, like, if I'm only
trading, let's say, you know, $100 or less, you know, within a day, then just automatically sign it.
And only if certain rules trigger, then, you know, just send me a notification and I just need to
tap yes, and then it's done. Where are those rules housed? Those aren't rules built into Ethereum.
That is off-chain rules. Where are those rules?
stored. Yeah, so this is basically an opportunity. I think a low-hanging fruit opportunity for someone
in the ecosystem to go build this. And it's basically, they would build apps, an app, which runs on
your phone, where you can, you know, just tell it what kind of rules. And I think things like
wallet like Argent try to do this to an extent, projects like Zango do this to an extent as well.
Yeah, I mean, as Vitalik says, you know, I think there's, there's a lot of
opportunity and not only security, but also the U-X of security, just pushing this forward.
I want to underscore how important custody is, in particular self-custody. That is the thing that
keeps this entire money system economy decentralized, right? I mean, we chose the name bankless
for this movement because we want to do more without banks. And the way banks centralized,
historically has been primarily through
custody. Even with gold, gold is inherently a decentralized
store of value money technology, but it's very hard to defend and protect
your gold, isn't it? That's why it accrues, or to move it, these sorts of things.
That's why it accrues in banks. And then once it's centralized in banks,
you lose that decentralization, you lose that self-sovereignty.
So what we're talking about here is applied cryptography, basically.
If we can make private key management easy, if we can incorporate, you know, social, the ability to store things socially or across multiple devices and have a great user experience, then we don't need crypto banks to the extent that we need them now, which is a great thing for the decentralization of this movement and our ability to go bankless.
That's how cryptography plus economics leads to an incredibly powerful tool for good for the world.
Absolutely. Yeah. And there's like no fundamental reasons for not having both security and UX. It's just a matter of time.
Justin, when is this coming? Like, why haven't we seen it yet? And when is this coming?
I think this is this, this one in particular is a low-hanging fruit. And I, you know, I really want to see it in 2021.
And I'm more than happy to talk to people who, you know, are in this space. And, you know,
want some ideas about how to actually deliver on that.
It's low-hanging fruit.
And part of it is because all the heavy-lifting cryptographic work
has already been done for these institutional players
that are now custodying billions of dollars
and have allowed for these more regulated institutions to come in.
Okay, so Justin, let's continue with the union.
Unoswop case study. And again, we're just using Uniswap because everyone is familiar with it.
We're not picking on it in any particular way. Let's say we solve the multi-party computation issue
for private key management. We've got that solved. Our metamask is now secure. What is the next
low-hanging fruit that is a vulnerability that you see people engaging with when they currently
engage with Uniswap in its current state? Okay. Another one, which I think is coming soon,
and it's actually, you know, Uniswap have really done their best to push this forward.
is this idea of authenticating the front end.
So when you're downloading a website,
how do you know you're downloading the right thing?
And it's actually shocking how brittle the Web 2 infrastructure is.
Like you have this notion of a registrar,
which will custody your DNS domain name.
They get hacked, they can do whatever they want with your DNS.
Or even if there's some sort of rogue employee within,
and that's happened many times.
There's a whole infrastructure around SSL certificate and these so-called certificate authorities.
And basically we can remove all this trust with IPFS and ENS.
And this is just plain old, you know, hashes and signatures,
but it's kind of on the off-chain side of things.
And, you know, we're already starting to see browsers, you know,
do the integration with ENS and IPFS like Opera.
and brave.
And, you know, this is just a relatively kind of incremental and slow rollout,
but it's happening much faster than I expected.
So what does that do for the end user?
Does that just mean that there is a www.w.
You know, Uniswap IPFS URL that I can go to that is always persistently available
so long as I have the internet connection?
Yeah, so what that gives you is anti-fishing.
right so someone you know like the uniswap front end is extremely valuable to an attacker they they get hold of it for some period of time
they can fish maybe tens of thousands of people into basically signing the wrong transaction on their metamask and just
losing their money um so you know they could they could you know for example offerize right you know with
ERC20 is you have this authorization step that you have to do and then you can trade.
You know, they could authorize, you know, all their funds to the wrong contract.
Instead of authorizing it to the Uniswap to some sort of road contract and that will, you know,
potentially allow them to steal all their money.
So this is, this really is a security thing, not a liveliness thing.
And so if I remember correctly, Uniswap does have a IPFS website.
Do you know if that's true?
Yeah, yeah.
So they push, you know, their website to IPFS.
Should we be using that one instead?
Or does that one not have all of the solutions that what we are talking about right here?
Yeah.
The problem is that there's still intermediaries.
And more specifically, there's cloud flare.
So Uniswap has actually done a great job in what I call kind of assumption consolidation, right?
You want to try and minimize the number of parties that you're trusting.
And what they're doing is that they're using Cloudflare as both.
both the registrar who controls the URL and as the IPFS gateway.
So the gateway is kind of this bridge between the old Web 2 world and the Web 3 world.
And it's a very thin layer of infrastructure, which is not necessary for some browsers like Brave and opera.
But it's still required for the more mainstream browsers like Google Chrome.
What you're talking about here too is not only anti-fishing, but there's a criticism that
the user interface of Uniswap is a centralization vector, and a third party could just shut down
the interface, and then it shuts down not smart contracts ability to use Uniswap, but
user's ability to use Uniswap.
And if it's persisted...
Specifically the non-technical users, right?
And if it's persisted to IPFS, and you have an EMS, and you have an EMS,
domain name behind that and CloudFair starts using that.
By the way, we saw a press release this week that CloudFair was looking at how to incorporate
more IPFS and ENS inside of its content delivery network.
I'm not sure if that's totally related.
But it feels like what this means is you could have unstoppable user interfaces, basically,
that are always available.
Yes.
And like this has real practical implications for millions of people.
people. Like, if you think, for example, of, and this is, this is a topic which really grinds me the wrong way is, you know, is sanctions. Like, for some reason, right, the U.S. government thinks it's all powerful and they can impose sanctions on other countries. And then you have millions of people suffering in these countries. And like, it turns out, and this is unfortunate that, that, you know, and there was some sort of mini controversy on Twitter that the Unisop.
front end just doesn't work in some countries like Iran or Cuba or whatever. And, you know,
it's very unfortunate and I think it's linked to the fact that, you know, at the end of the day,
there is a legal entity behind Uniswap that is based in the US and they have to comply with
sanctions. If we were to have this, you know, really good native integrations, then suddenly
we're opening up this technology to some of the people in the world who need to,
the most that are under these these sanctions.
Okay, so we've solved the custody issue with multi-party computation and using multiple
devices.
We've solved the persistent front-end accessibility using things like IPFS.
What's next on the low-hanging fruit?
Where should we go next?
Okay.
I think another really cool one is this idea of sync.
So basically, you're on your phone or on your browser.
you haven't been connected to the Ethereum blockchain in some amount of time.
So you're out of sync, right?
And what you want to do is basically sync up.
And the piece of infrastructure that is very common here is called Infura.
And basically you can go to Infura and tell me, okay, what is the head and sync up?
And this is bad for several reasons.
The first reason is liveness.
Infura goes down and half of defy the front ends go down not ideal
But there's maybe an even even worse problem than that
Which is around
Infura being malicious and feeding you wrong data
So it tells you that you know this is the real state of aphira
But actually it's something completely different
And this kind of goes back to the whole you know fishing thing
Where it's like you know you have slightly different attacks going
going on.
But basically they can trick users,
especially the less sophisticated users,
into doing really bad things,
including losing their funds.
So one possible attack on Uniswap
if Enfura is compromised
is that Infura could tell you
that you've made a trade
when actually you didn't do the trade.
Like, you know, your slippage protection kicked in
and, you know, you actually didn't do the trade.
So you think you had,
or you think you're in a position when actually you're not.
Or, you know, vice versa.
It could tell you, oh, your trade didn't go through because of slippage protection.
So you try again.
You know, you redo the trade.
And it turns out you're now overexposed because you've made the trade twice.
And, you know, for Uniswap, I guess that's not too bad.
But, you know, for some applications, it's devastating if Infura happens to be compromised.
And so the technology that basically solved this, which is very cool, is one like clients.
But so that's infrastructure that we can provide at the layer one, making the layer one friendly to like clients.
And then another one which is very cryptographic heavy, but we've made big, big strides in the recent months even, is this idea of increments.
verifiable computation.
And the idea here is it's a snark where you can kind of always keep on building on it.
So you have, imagine the tip or what's called the head of Ethereum.
Every time there's a new block, the state progresses.
And so you can imagine that for every single block, there's an associated proof that
proof that proves that not only is this state transition valid, but all the previous state
transitions all the way back to Genesis are valid. And you can do that for like clients in such a way
that the sinking process is kind of instantaneous. You only have to download this one snark
and it will tell you that, you know, this is the valid chain. And you don't have to trust, you know,
an entity like in Fuhrer for both lifeness and for safety.
So is this using that same sort of principle of compressing computation using
cryptography down to the bare minimum?
And that makes it really easy to say, say, I don't know what block number we're at in
Ethereum right now, like some 10, 20 million, I don't know.
But, you know, 10, 20 million blocks takes a long time to download.
It takes days to download.
But what you're saying with this like-client mechanism is you can just download the
latest block and then you're trusting whoever you're downloading it from, but in that latest
block there is a header that can verify every single block in all of history. So in that
instantaneous moment, you get a complete verification that you are actually indeed
communicating with the Ethereum blockchain. Was that correct? Yes. Not only are you communicating
with the correct blockchain, but also from there onwards, every query that you make to
the Ethereum, for example, if you want to read some state in the blockchain, all of that is
authenticated and improbably secure.
So Infura is a very common criticism from people outside of Ethereum because people say,
quote unquote, Ethereum is centralized around Infira.
Is this the direct counter argument for saying like, well, even if that's true,
this light client innovation is the thing that's going to solve that.
Is that what this is?
Yeah.
So admittedly, the EF1 design is horrible for like clients.
It's not like client friendly.
It is possible to do it in theory, but it just in practice is very, very messy.
In EF2, we have made a huge effort to make EF2 the beacon chain like client-friendly.
And it's extremely, it beats Bitcoin by an order of magnitude in terms of like client-friendliness.
And Bitcoin is extremely like-client-friendly.
And then you can, on top of that, you can have this kind of optional layer of infrastructure,
which is the incremental, incremental verifiable computation that I was talking about,
that compresses kind of these relatively lightweight proofs,
but that still grow with the amount of time.
So if you've been disconnected for two weeks,
it's going to be 14 times greater than if you were disconnected for just one day.
But you can compress these two weeks down to a single proof
or any amount of time down to a single proof using this incremental or verifiable computation.
Okay, so we've solved custodianship with multi-party computation.
We've solved sinking and being able to trust what is the correct blockchain with
light clients.
What was the first one?
We also solved front running.
Yes.
And so where do we go next?
What's the next lowest hanging fruit?
These are some of the biggest problems that people, I think, appropriately critique Ethereum
in its current state for.
Yet what you are saying is that we have the cryptographic tool to solve all of these
problems.
Where should we go next?
What's the next lowest low-hanging fruit?
Yeah, I mean, you mentioned people criticizing.
And, you know, very often when, you know, Hayden, you know, makes a tweet, you have, like, the, you know, maxi-trolls that come down.
And then they try to list all the downside.
So what I've done is I've gone on Twitter and I've tried to find every single criticism of Uniswap.
And every single one so far can be sold with cryptography, which is amazing.
So we talked about also on-chain privacy, off-chain privacy.
One which is cool is this idea of composability, right?
Like one of the big power of defies that you have these money Legos and you can compose them together.
Well, it turns out that before Money Legos, we had cryptographic Legos.
And specifically, we have a framework in cryptography called Universal Composability, the same composability.
word. And the universal, what that means is that you can, if you have a primitive which fits within
this framework, then you can compose it with any other cryptographic primitive and you're
guaranteed that it's not going to break, which is very much unlike DFI nowadays where you take
two money Legos, you put them together and then there's an explosion some of the time. And so I'm,
this is a little bit more, you know, nebulous and a bit more of a
kind of open research, but I think there's an opportunity out there for someone to come up with a
similar universal composability framework, which is generalized to crypto economics, not just
cryptography, so that we can have very strong assurances that if you're going to build your money
Lego, it's never going to blow up and it's going to play nice with the other money Legos.
So the word compartmentalization comes to mind, where we,
We have all these defy money Legos, and while they can be composed together, in their current
form, when we compose them together, they start to meld into the same thing.
Yet what I think you're saying is that we can still have those same benefits, but we can
actually compartmentalize each Money Lego to be kind of in its own ecosystem.
So that, and as a result of that, the composability accidental interactions that create
explosions can be controlled.
I'm still a little bit unsure as to how that control comes from.
Maybe you could expand on that.
How do we get stronger assurances that when we combine two money Legos that were
accidentally not creating TNT?
Right.
So one of the features of composability is that you kind of naively have this
exponential explosion of complexity.
You start with one body.
There's this famous problem in physics.
which is like the three body problem.
You start with one body and two body and three body,
and then the complexity just blows up.
I mean, it's kind of similar with these money Legos.
Like you have one money Lego that's all fine and good.
Now you have two, complexity has increased.
Now you have three and it's kind of Melchavs law, right?
Which is like it's quadratic.
Like for every node can talk to every other node
and then you have this quadratic thing going on.
And really the genius of universe,
or composability is that if you prove local properties,
if you're one money Lego,
you prove that it has certain properties kind of locally,
then that gives you global guarantees about the whole system,
the whole universe if you were to compose them.
So basically it's a way to limit complexity
and facilitate the security analysis.
You just need to analyze one money Lego at a time,
as opposed to analyzing the whole system
which could have all sorts of weird, complicated, emergent behavior
that is impossible and chaotic.
What's a theoretical problem that this solves?
Maybe you could give us an example that our listeners and myself could relate to.
Yeah, I mean, you could think, for example,
you know, we've seen one money Lego, which is flash loans, right?
you compose it with let's say uniswap which is going which is going to be you know some
some use as a price oracle and then there's like a third defy money lego which is like you know
synthetics right the way you build a synthetic is you use the oracle so individually each of
these defy apps is secure but when you put the three together the oracle the synthetic
and the flash loan, you get an explosion.
And then how does this solution prevent that from happening?
Or prevent something from blowing up?
Right.
So basically, and this is kind of an open problem,
but the reason why I'm optimistic is that we have a solution for pure cryptography.
Like the open problem is basically to come up with a set of properties for money Legos,
which will tell you that if you adhere,
to an interface to an API for these Legos, which have certain properties,
then you'll have like a universal, universal composable Oracle, for example.
And that will be kind of secure regardless of if you have some sort of, you know,
flash loan infrastructure.
Yes, this is maybe the most nebulous kind of idea,
but I think it's a good challenge for someone listening.
So what you guys can't see here, or you can if you're watching this on YouTube, is, oh, actually, no, you can't.
But we will share this.
This is a spreadsheet that Justin put together of objections that are in place.
I think, like, you know, definitely you've heard some of these.
If you've been on Twitter, if you've been in the crypto circles of Ethereum is centralized around in Fuera, no one's going to be their own bank and use private keys.
You know, it's impossible to download and sync a number.
note all of these things. Justin is going through this line by line, row by row and talking about
how cryptography solves this. We will actually share this spreadsheet, Justin, assuming it's
okay with you that we share the spreadsheet. Okay, we will. We'll share the spreadsheet in the show
notes so you can see what we were working from. What haven't we covered still, Justin? What's next?
Okay. There's at least two. So one of them is latency, right? So,
When you're making a trade on Uniswarp, you know, it could take several seconds for your trade to go on chain.
And, you know, we've made huge leap and bounds, right?
So we have, for example, Bitcoin where the average block time is 10 minutes.
And if one, you know, the average block time is only 15 seconds.
But there is this one caveat where because it's proof of work, sometimes it's like one minute, sometimes it's one second.
and this variance really hurts user experience.
So we have, you know, in EF2,
we're making kind of another big breakthrough forward
is that we have these fixed duration slots.
So there's like this 12 second slots.
And so you have much more control over the duration.
But 12 seconds is still in eternity, right?
You want hundreds of milliseconds
because that's the speed at which the internet operates.
And the good news is,
is that in EF2 and in with sharding,
we're gonna be able to get this kind of latency.
And the trick that we have here is what's called staggering.
So we have these 64 shards, right?
This is where transactions go on chain in the shards.
And what we can do is instead of having all 64 shards
be aligned in time,
we can stagger them a little bit by, let's say, 200 milliseconds each.
So shard zero kind of will have a block every 12 seconds,
and then shard one will have a block every 12 seconds
plus 200 milliseconds relative to block zero.
And then basically if you stagger all your shards,
then basically every 200 milliseconds,
you have an opportunity to include your data on the,
the EF2 system.
So you will be able to get a kind of uniswap
latencies like down by a huge amount,
down to basically internet level latencies.
So that's just a really clever mechanism for keeping the throughput the same
because we can't increase throughput that turns into centralization.
But since we have 64 shards,
we have some optionality with the timing of these shards.
So that actually gives Ethereum the L1 some,
maybe it's an illusion, maybe it's not.
Maybe it's actually more of a special trick up the sleeve.
But having a base layer blockchain with 200 millisecond block times,
perceived block times is pretty powerful.
That's a U.X that has been hounding this entire industry since Genesis.
Yeah, it's a really cute trick.
And it's one of the advantages of sharding in the sense that you have different
people working on different shots at any given point in time.
And so basically you can just assign tasks at, you can schedule everything so that, as you said,
the perceived latency is very, very small.
You know, one of the, the problems with this, with this idea is that it's, it's potentially
not crypto economically incentive aligned.
And the reason is that when,
When you're building a block, you have various incentives to either publish your block early or to publish late.
So, you know, one incentive to publish early, for example, is that it gives your block more time to propagate through the network.
One incentive to publish your block late maybe is so that you have more time for transactions to come in and then you have more transaction fees.
And so one of the tools that we're considering using is these these.
VDFs. So the VDS, remember, they link cryptography and time. And they basically allow us to
limit the extent by which a block proposer can play around, can manipulate when the block comes out.
So you're kind of forcing it into a very specific schedule for broadcasting and creating these
blocks. That's absolutely insane. Justin, you said you had two more. Do you have another one for us before
we move on to what I think will be the most mind-expanding part of this entire episode? Yeah. So I think
I think this is a great segue over the last one. So one of the criticisms of the Bitcoin Maxis is that
Uniswap is great and all, but the only thing you can trade there is ERC 20 shitcoins. And
they're correct to an extent. Like, you know,
they will say, oh, you can't even trade Bitcoin really because the only thing that you have is
like shitcoin and fight Bitcoin, which is rap Bitcoin.
And it turns out that with very fancy technology, you can build, you can have Bitcoin, the real deal,
the native Bitcoin, totally trustless, can live on Ethereum using pure cryptography.
And Justin, when you say the native Bitcoin, you're talking about a,
Bitcoin that is tokenized on Ethereum that has the same trust assurances as native Bitcoin on the
Bitcoin network. And I know our listeners will be familiar with the differences there. That's what
you're talking about, though, right? That's exactly right. Yeah. So. And maybe you could also talk
about the comparison between a system like that and TBTC and how a native token is actually an
improvement upon something like TBTC. Yeah, it seems like TBDC uses the, the crypto, the economic part,
to supplement for the cryptography that it's not doing.
Exactly, yes.
So this fits in, you know, the heuristic that I said before.
Like, if cryptography doesn't work or it's too difficult, try cryptoconomics.
And that's exactly what TBTC has done.
The problem with TBTC is that it's too collateral intensive.
So basically, the idea of TBTC is that you're going to create a Bitcoin synthetic.
And the way that you do synthetics is with over.
collateralization. And so if, you know, if you want to have, you know,
$10 billion of Bitcoin on, on Ethereum, you're going to need, you know,
$15 billion of ether, and it just doesn't scale.
It's, or at least it's, it's extremely expensive. And then you have, you have another,
you know, very interesting project called RenBTC, where there they actually use, you know,
multi-party computation.
But they also have a very important economic aspect where they have this rent token.
And it turns out that if an attacker buys out a majority of the rent tokens and participates
in these MPCs, then they can basically break the system.
And so it's a very similar consideration where for RenBTC, you know, for RenBTC,
the market cap of Wren needs to be at least as large as the as the tokens that are being
you know bridged over from from from Bitcoin over to refer him so that also doesn't doesn't
scale very well and then you know just to go through all the the interesting I guess
versions of BTC we also have the wrapped BTC and rap BTC is basically like a centralized
custodian specifically BitGo which is which is which is which is which is which is which is
stress it and that's that's obviously not ideal so it turns out that if you if you use code
obfuscation which is this very powerful technique that I was talking about earlier then you can do a
really cool trick so just to give a little bit of context the the the Bitcoin blockchain is
kind of stuck in the Stone Age if we kind of kind of extend this metaphor in the sense that the
only thing that the Bitcoin scripts can do, the only thing they understand is hashes and signatures.
And this is kind of unfortunate because you, in order to build a two-way bridge between Bitcoin
and Ethereum, which is trustless, you want the Bitcoin blockchain to be aware of the Ethereum
blockchain. So the process, basically, of having these bridges is like a four-way process. So
you have your Bitcoin, your BTC on Bitcoin, you're going to lock them on Bitcoin.
The Ethereum blockchain sees that they're locked and then it's going to mint an equivalent
token on Ethereum.
And then once you've had enough playing with your BTC on Ethereum, you're going to burn
the tokenized version of Bitcoin.
And then, and this is the hardest step, you want the Bitcoin blockchain to see the
Ethereum blockchain and see that they have been burnt so that you can unlock them on the Bitcoin
side and kind of redeem them one for one in a trustless manner. But the problem is, how can you
make the Bitcoin blockchain aware of Ethereum using just signatures and hashes? And it turns out that
with code obfuscation, you can do a generic snark to signature reducer. So what does that mean?
it means that you can take any snark and instead of verifying the snark the usual way,
which involves advanced cryptography that the Bitcoin blockchain just doesn't have the capability,
you can distill it to just a signature.
Basically, what the program does is that it's going to verify the snark internally.
So the obfuscated code will verify the snark.
And there's a secret key inside the program, which is obfuscary.
Remember, that's the superpower of code
of confiscation, is that it has a secret inside it.
And then it's going to use this secret to sign off on the fact
that the statement that is being proved by the snark is correct.
And then now that you have this snark to signature reducer,
you can take the signature and put it on the Bitcoin blockchain,
which it will understand because it's just a plain old signature.
And that is sufficient for Bitcoin to be aware of the Ethereum blockchain.
Basically, you can build a snark which tells you this is the state of Ethereum right now.
This is a proof that this is the valid state, you know, going back to the previous discussion around incremental, incremental verify computation.
This is the state of the Ethereum blockchain.
And now you can verify it.
And now you can close the loop and build a totally trustless Bitcoin on Ethereum.
A two-way bridge between Bitcoin and Ethereum is the gold standard that I didn't know was possible.
And so what you're saying is that it is theoretically proven to be possible.
It's just that we need to actually apply the cryptography.
How big of a challenge do you think that is to actually get something like this up and running?
Like where are we now and where do we need to be to get this to actually work?
Yeah.
So going back to the three big stages of cryptography, you have theoretical applied and then real world.
we're just basically leaving the theoretical.
We've answered positively the answer, can we do this?
But, you know, it's kind of comical how far away we are from practicality.
Like right now, if you were to try and use these techniques of code obfuscation,
you'd have a program which would run, you know, for longer than the age of the universe.
It's like it's so impractical that it's laughable.
But it's actually, you know,
not so laughable in the sense that this is the journey that cryptographic primitives take.
So if you look at snarks, for example, snarks, you know, were kind of sold theoretically 30 years ago.
And back then they were, they were comically impractical.
And, you know, over time with lots of dedication and research and development,
we now have snarks which are extremely, extremely fast and practical.
And so my kind of
with my optimistic hat on,
you know, in this exponential
world, I'm very hopeful
that, you know, in
20 years, you know, maybe 30 years,
we will have this primitive and it will be
practical. And one of the
interesting things is that it actually allows us to
run the EVM on Bitcoin,
which is kind of an interesting consequence.
But yeah, we will still be, I guess,
by the one megabyte block limit.
Yes, we will.
For eternity, I think.
So the mental model I've had with this is, is we've experienced Moore's Law's growth
in computation, and that has scaled computation.
And it seems to be that the optimistic case for a cryptography-run universe is that we get
comparable levels of growth in that scale and computation, but we get it scaled in efficiency
in cryptography.
And so if we do see that like more,
law level growth in cryptography's ability to scale computation and compress it, then that's actually
how we do get that two-way Bitcoin to Ethereum Bridge. Is that the right perception to take, Justin?
Yeah, yeah, I think so. I mean, in, you know, in the real world with transistors, we have
Moore's law, which is maybe like a doubling of the transistor density every, every year or so.
In cryptography, it's, it's much, much faster. You have a primitive, like, Snarks or I.O.
and it's more like, you know, you have a hundred X improvement or a thousand X improvement every year.
You know, you started so far away, you know, like you're astronomically far away.
But, but, you know, over a decade, if every year you're improved by a factor of thousand, then eventually you'll get there.
This is because it's software changes primarily.
We're not talking about, like, you know, physics constraints as we were with Moore's law.
Exactly. It's pure software. And even more abstractly, it's like these cryptographic protocols and mathematical tricks and whatnot.
So Justin, say we have this two-way bridge. We've solved that problem. Let's talk about the incentive to actually get BTC onto Ethereum. And I think people kind of forget that there's two different versions of Bitcoin. There's BTC, the assets. And then there's Bitcoin.
the blockchain in the same way that there's ether the asset and Ethereum the blockchain,
yet there's just this obfuscation with Bitcoin because it's the same name.
But there's actually two different things going on here.
So after we established this two-way bridge, Justin, maybe you could illustrate why people
would migrate their BTC, the asset from the Bitcoin blockchain to the Ethereum blockchain.
Right. So, you know, as you said, there's two Bitcoins.
There's Bitcoin with a capital B, which is the blockchain, and Bitcoin with a lowercase B,
which is the asset.
And just for the sake of clarity,
when I'm going to,
when I refer to the asset,
I'll actually say BTC.
So we have Bitcoin the blockchain and BTC the asset.
And I guess there's,
you know, in the short term,
there's various kind of reasons to,
to migrate BTC onto Ethereum.
You know, for example,
to make use of yield,
you know, in the context of DFI yield farming.
But I actually believe,
that long term, if you look at a few, you know, megatrans that, you know, we can dig in.
I actually don't see a future, you know, in 20 to 30 years for Bitcoin, the blockchain.
I think that there's going to be what I call like a decoupling of the asset and the blockchain.
The asset is going to outgrow its shell. The shell is kind of going to create.
track and break.
And there's going to be an uploading of the BTC, the asset onto Ethereum.
And when the Bitcoin blockchain does break for reasons that we should go into,
then at that point we can declare, you know, any BTC on the broken Bitcoin to be,
you know, burnt, lost forever, which is great for.
scarcity. And then, you know, we can then declare Ethereum as the new, more secure, more friendly
home for BTCD. What you're talking about is back to your comment about state. You're just
migrating state here to a better computer. Yes. I mean, the important thing here is that we need
to do it in a trustless and scalable way. Unfortunately, none of the existing solutions, you know,
for tokenizing BTC allow for that. But in the future, we, we'll be able to. But in the future, we'll
we will have this, you know, migration process, which is aligned with the values and culture of Bitcoin.
And I think, I'm hoping, I think that in 20 to 30 years, it will be, it will be obvious.
And it's actually a win-win for everyone, both both the Bitcoiners and, I guess, the Ethereum.
Yeah, not for the miners, though.
The miners tend to lose for some reason in both camps.
Justin, why do you say that the Bitcoin blockchain is destined to die?
What is these megatrends that's going on in cryptography that would indicate that the Bitcoin
blockchain has a countdown timer on its lifespan?
Right.
So I guess there's this kind of three big reason.
The first one is kind of a bit nebulous, which is that the Bitcoin blockchain is ossifying,
or I should say is already ossified.
And I guess culturally speaking, it has this maximum viable ossification.
It will be as ossified as it can be.
And we've talked about this.
It's somewhat at odds with the greater macro picture of an exponential world.
And if you go back to the root of ossification, it means becoming a bone.
And I think, you know, the way I picture it is that Bitcoin is becoming strong.
and stronger, you know, there's layers and layers of bones, but the environment, the context
is adding more and more pressure. At some point in time, it's just the bones just going to go crack.
Now, what are these kind of external pressures? There's kind of two flavors. Like, the first one
is around quantum computing. So we have this kind of quantum megatrend, which just changes
the rule yet again of computation, right? If, if blockchain is an innovation,
computing quantum is as well. And there is some non-trivial intersection between which in blockchain and
quantum, which we need to take into account seriously. And then the other kind of big megatrend, I guess,
is the flip side of the 21 million Bitcoin limit, whereby, and this kind of moves us away from
cryptography into the economic aspect of crypto-economics, whereby it's been shown that basically
the incentive alignment disappears once you only rely on fees as opposed to subsidy. So with the 21 million
limit, the block subsidy goes to zero. You're left with only fees. And this is problematic because
Basically, the main issue is that fees can be stolen in the sense that if I'm a Bitcoin miner, I build a block with transactions.
Today, you're kind of expecting all the other miners once I find a block to build on top of my block.
And they have an incentive to do this because there's this baseline inflation in terms of the reward.
But if you have no inflation, actually the thing that a rational miner would do,
is that it would not build on your block.
Instead, it would steal all the transactions that pays fees and then try and build and fork off,
basically.
And then and so you have a team from Stanford, which basically analyzed this and built, you know,
models and they wrote a paper, basically explaining why it's an unstable kind of
crypto economic equilibrium to only rely on transaction fees.
We made this argument a number of times on bank lists, the second argument that you're making.
And I think one of the interesting things about it is Bitcoin is memed as digital gold.
And there's an element of truth to that meme in that it helps somebody wrap their mind around the concept of digital scarcity.
So that makes sense, right?
But one major difference that always seems to be overlooked is that the fact that gold in the physical form does
not have to pay for its security with transaction fees. It paid for its security costs in like the
supernova of a star. It's a chemical element, right? And it doesn't have to, its security is not dependent
on some sort of transaction fee for me to give a bar of gold to David, right? Whereas Bitcoin
totally is. And in fact, that's the model. It's getting away from its, you know, issuance meme as
creating the security, which is its core strength and moving to this, this, this,
transaction fee, that makes it not very much like gold. And I do also agree this will become more
apparent to people. The breakdown of that digital gold meme will become more apparent to people as
time goes on and block subsidy every four years gets diminished and cut further. But what does that
mean? Bitcoin is left with. It kind of means it's left with what its core strength arguably is right
now, it's a, it's a, it's a, it's kind of a property ledger, right? And I don't mean, like when I say
meme, I actually don't mean that in a condescending way. Like I have, uh, David and I, I think have
high reverence for memes, right? Like money is a meme at some, some level. It's a social
coordination tool. But, um, it's a, exactly. It's a, it's a very different Bitcoin than the
future that I think many Bitcoiners imagine today. That, that that's kind of the future. That's kind of the
future that you're painting. Well, I actually don't think it's that different in a way because
I think a significant portion of Bitcoiners love BTCD asset, but they hate the blockchain.
Like the blockchain is like a... They don't even use it. It's a necessary evil. Like,
the real purpose of Bitcoin is all about the assets. So I think we're fairly aligned here, right?
we're giving Bitcoiners the opportunity to take their precious BTC and like house it in a very
secure and friendly environment and kind of a little bit like a butterfly, I guess, you know,
it comes out of the cocoon and then it finds emancipation as a butterfly starting from a caterpillar.
So this is an economic argument. This is talking about crypto economics. However, what's new to me in this
conversation is that there is also a purely cryptographic argument that the continuation of the
Bitcoin blockchain might not be able to continue as trends in cryptography improve.
Can you, let's just rehash that part of the conversation, because that's the novel part of
the conversation to me. And then we can actually go into perhaps the migration process
from BTC on Bitcoin to BTC on Ethereum. Yeah. So there's actually three different ways in which quantum
potentially affects, you know, a Bitcoin.
So the first one is the most well-known.
So in quantum, you have this algorithm called Schor's algorithm.
And it allows you to do things like factoring large numbers.
But it also breaks the cryptography on Bitcoin, which is basically based on elliptic curve,
the discrete log problem.
Anyway, long story short, is that quantum breaks the cryptography.
in Bitcoin. And what that means, there's actually like an economic consequence, which is that all the
lost coins, at least the lost coins for which the publicly has been made public. And Peter Wooller,
who is one of the core Bitcoin developers, did some statistics. And he found in 2019, I believe,
that 37% of the Bitcoin supply was kind of, kind of,
liable to these kinds of quantum attacks. So basically the public key is public as opposed to just
the address, which is the hash of the public key. And with that information, a quantum computer,
large enough quantum computer could basically find the private key and then spend the funds.
And this is bad for the same reason that the Tao was bad and it led to a fork. Right. The Tao basically
was, oh God, we have an attacker who is now in control of 10 or 15 percent, I
forget exactly of the supply, that's just not going to work.
And so, you know, imagine having an attacker with, you know, even 10% of the Bitcoin supply.
You know, if Bitcoin is a multi-trillion dollar asset, that that's just untenable.
And so it ruins the credible neutrality of the asset because some attacker got their hands
on Bitcoins that wasn't theirs in an illegitimate way.
Yes, exactly.
You have basically, you have a flood of Bitcoin.
which pollutes all the rest.
And so we have assurances that this is a possible thing and likely to happen in maybe the next 30 years.
Is that about right?
Yeah, 30 years is the very conservative estimate that is usually given.
Like everything moves exponentially, including quantum.
And we have an equivalent of Moore's law for quantum computers.
And so far it's very much on track.
And basically, you know, every year we're going to get better and better quantum computers.
and in 20 to 30 years, assuming this law remains, then, you know, we'll be able to break the
crypto. And it's kind of interesting because the time scales, like 20 to 30 years, align with
the economic argument that I put before, right? Like in 20 to 30 years, like one of the reasons
why the first economic argument didn't kick in is because even though the
the inflation reduces by by two every four years.
The price more than increases by two every four years.
But if you look over very long time scales,
you can't have an asset which just grows exponentially forever.
Like exponentials do end.
And in 30 years, over 99.9% like just about over that will be mine.
And like one of the other things is that
basically the ratio of the security budget and the asset should be just totally out of whack.
You know, you're going to have, you know, like a fact of one to a thousand.
And so it's, it just doesn't, that doesn't make sense there.
Justin, is this quantum problem, not a problem for Ethereum?
It is. It is. Absolutely.
And I think Ethereum will go through the, the same migration process that I'm, that I'm,
that I guess I'm happy to describe,
but maybe before describing this migration process,
I should kind of flesh out the other two quantum attacks
that are relevant to Bitcoin.
Okay, so the other basically two attacks
are based on what's called Grover's algorithm.
And this actually affects proof of work.
So in, you know, very,
famously Satoshi wrote one CPE, one vote, right? And what he meant by that is that your computational
power is going to be linear with the number of transistors that you have and the amount of
energy that you're spending. So you can kind of think of it as one transistor, one vote or one
jewel, one vote. It turns out that in quantum computing, you have these really non-obvious
effects where you have a superposition of things and you have quantum entanglement.
And these very cool kind of quantum effects mean that you actually don't have this linear rule,
one transistor, one vote.
Instead, you have more like you have this quadratic effect where if you run a computation,
for n steps, your computational power is kind of actually more like n squared as opposed to n.
And so what that means has two consequences.
The first one is that at some point in time, it's possible that, you know, the very first person
who's able to make proof of work on a quantum computer be more efficient, economically efficient
than using traditional computers will have such a large advantage that for some period of time,
they will totally dominate the proof of work.
So, you know, it could be the NSA, for example, that, you know, for a period of one year,
because they have the only quantum computer in the world that can do that,
will be able to totally control the Bitcoin blockchain.
So that's kind of like a short-term attack.
But what happens with proof of work is that, you know,
there's a difficulty adjustment, right?
And so the difficulty will adjust,
and then other people will start getting quantum computers,
and then you enter this new steady state and all is good, right?
It's only a temporary attack.
But actually, that's not the case.
So it turns out that there's a paper from this year,
which was titled something like,
on the insecurity of quantum Bitcoin mining,
which basically made a very similar point,
to the to the to the to the to the to the to the first one around the the the instability of the the
the Bitcoin mining when you have when you rely only on fees so it turns out that this
this quadratic effect makes the the chain even more unstable because of these these
because it just changes the the the nature of mining so yeah Satoshi you know quite
understandably couldn't predict and forecast
and kind of think through all the consequences of proof of work,
you know, 40 years into the future.
But yeah, it's a possible future whereby in 30 years,
mining will be truly, truly messed up.
So this episode is centered around the combination of cryptography and economics,
which creates crypto-economics.
And when you can't use cryptography, you use crypto-economics to fill those gaps.
But what you're saying, Justin,
that Bitcoin over the long term has both flaws in cryptography and in economics that no one could
have predicted at Genesis, but now that we are 12 years into this revolution, we actually do
see things on the horizon that we don't actually have the problems for and without a migration
plan, without being able to pivot. And your concern is that, you know, the Bitcoin blockchain is
trying to become as ossified as possible when there are still obstacles that we can see.
down the road. And so that has always been my, like, why my interest is always on Ethereum is that
there's no way that we understood the power of crypto economics, the first blockchain, the first
crypto economic system that this industry ever invented, which was Bitcoin. And so I'm much more
interested in the system that comes after we understand that there is so much untapped potential
in crypto economics. So earlier you said that Ethereum 1 and also is also Ethereum 2 perhaps,
has the same problem that Bitcoin does, yet it hasn't ossified yet.
It has a migration plan.
Maybe we can talk about what that migration plan looks like for both Bitcoin and
Ethereum 1.0 into a future that does not fall to these cryptographic attacks or economic failures.
Right.
So I guess the migration plan is in two steps.
The first one is you want to upgrade your cryptography to be so-called post-quantum secure.
And, you know, that's something where a lot of progress is being made, a lot of enthusiasm.
And, you know, we have, this is something that's essentially been solved, at least at the theoretical level.
Because we know how to do quantum secure snarks, you know, for example, the stocks from stockware, that quantum secure.
And then when you have that, you can do a very, very large part of the cryptography needed.
for for for for for for for blockchains so that's step one and that's that's just you know
an engineering update the other thing that we need to do is more of an economic or social
updates which is that we need to find a way to bail out to to discard um the the the lost coins
because they're liability um so we need to have a mechanism to say okay these coins are lost and
we're just going to forget about them.
And my suggestion is as followed.
And I think it's kind of optimal in the sense that it gives people the most time to migrate.
Right.
It's kind of awkward if you're going to say, okay, in one year, we're just going to call any coin that hasn't migrated lost, because that would be extremely controversial.
But what is much less controversial is anything that is, anything that is.
is forced to us by technology.
So basically there's going to be a breaking point
and anything that hasn't migrated after the breaking point,
well, obviously, is lost.
And so what I suggest building is basically
this two-way bridge between Bitcoin and Ethereum
that I was talking about, 100% trustless.
And then there's a little kind of feature,
which I call kind of a quantum canary and a quantum bond.
Okay, so what is the canary?
The canary in the coal mine, the canary in the coal mine is able to sniff out kind of as an early detector, something bad.
And this quantum canary would be able to sniff out that quantum computers are here today.
Maybe not quantum computers large enough to break, you know, the cryptography, but it's kind of an early sign.
and then this quantum canary would basically trigger a bomb which would destroy the bridge
and once the bomb has detonated and the bridge has collapsed
anything that remains in the old world is considered lost
and anything that has migrated has now found is now in the canonical home
and one thing that you can do is you can incentivize you can attach a bounty
to this canary. So whoever is the first one to present proof to the blockchain that quantum computers
are real and are a threat, they can receive a very generous bounty for doing so. And so this is
the formalization of the separation between BTC, the asset and Bitcoin the blockchain, where
the Bitcoin blockchain is actually forgotten, yet BTC, the asset is able to remain. And Justin, I want to
get your question on this.
A lot of bitcoins might listen to this and throw up a flag saying, you know, we don't want that.
Like, we don't like Ethereum.
We don't want our Bitcoins on Ethereum.
But yet, is this an option regardless of consensus?
Like, do we need consensus behind, you know, a majority of BTC holding individuals for this to work?
Or is this something that we can build and establish anyways without needing to have some sort of consensus among stakeholders?
Yeah, I think it's a little bit.
between the two. So we can have Bitcoin the asset in a very native way come on Ethereum and many other
blockchain. So in the way, Bitcoin will not just live on Ethereum, but they will probably live on many
different blockchains. And so, you know, there is a social aspect where, you know, I think that
whichever blockchain has the most Bitcoin,
you know, these native Bitcoins,
will hold a claim for being the new home.
But, you know, in a way,
they won't be, you know, yeah.
So basically we need to be able to define some sort of canonical home.
And the reason is that when you have Bitcoin on multiple blockchains,
if the consensus of that blockchain blows up,
then you want to basically preserve the integrity of the assets.
So you want to have some sort of root notion of trust.
And that will have to be determined socially.
But I think if you have a good shot,
if it holds most of the tokenized Bitcoin,
it has very high-grade security consensus.
It has a shot as being deemed a new home for BTC.
It very much strikes me that we've been talking a lot about,
like difference between Bitcoin and Ethereum is kind of ossification, right? But there's also the layer
at which you ossify, right? And one of the challenges maybe is that Bitcoin has kind of
ossified its layer one, when really the thing it needs to ossify more is its layer zero.
Because the social contract around Bitcoin as a fixed cap asset, store of value reserve,
the Bitcoin movement can remain ossified in sort of in spirit, in soul, in social contract,
but it can move its body.
And its body being kind of the layer one, the network, is sort of a rickety old computer.
It's aging really fast.
It's aging really fast.
And so what you're talking about is some, you know, a connection that maybe some
bitcoinsers haven't made yet is like ossify your layer zero.
ossify your social contract and your meme layer.
But you don't have to ossify layer one or layer two or layer three because this is compute
technology.
And we've just entered this new era.
And there are going to be waves of innovation that provide 10x, 100x improvements.
So why in the world would you ossify your layer one?
And that seems to be the more the pragmatic approach that Ethereum is taking.
And I do actually see an Ethereum some more ossification around these.
these core values in layer zero, which is exciting to see. But now with Ethereum, we have kind of
layer one that we can continue iterating on and improving, so much so that we're creating a
whole other network, this ETH two thing that lives in parallel, and we're taking the layer zero
and we're migrating it over. It seems to be a very winning strategy. And I guess this
is why, Justin, this episode fits very much into our ETH bull thesis.
series of episodes here.
Yeah, I agree.
It makes sense for Bitcoiners to solidify their layer zero
and get ready, at least psychologically speaking,
to consider options on layer one.
But I think they've also already solidified their layer zero,
or at least they're in the process of doing it.
Like, we hear people on Twitter or whatever
saying that anything that doesn't have the Twitter,
million limit is not Bitcoin.
And they will use very, very strong language.
And I think it's being ingrained in the DNA of what it means to be Bitcoin.
And I think that's perfectly fine.
But there are tradeoffs to that mentality.
There's like an other, there's a flip side to the coin.
And in a way Bitcoin can get the best of both worlds.
Bitcoin can get the best of both worlds.
It can not only have this amazing scarcity, which is with the 21 million limit, but it can also,
and even for free, kind of latch onto the security guarantees that Ethereum will provide
with a very different model, which is the minimum viable issuance, enough to provide security,
but minimal to keep basically the economic waste to a small amount.
It does seem to be the best of both worlds.
It really is up to the social layer of Bitcoin to say if they actually want that or not.
And I guess at any point bias could be included in this conversation,
but it would seem to be that it would be in Bitcoin's best interest to not go down with the ship.
and admit that Ethereum might be a great new host to upload BTC the asset too.
Because as we all know, Bitcoiners love BTC, the asset, and the Bitcoin blockchain is more of an afterthought.
Justin, this episode has been absolutely fantastic.
In addition to talking about the obstacles and optionality between Bitcoin and Ethereum,
we talked a ton about the power of cryptography.
And at least with the bankless thesis, banklessness is about power to the individual.
and cryptography has always been about putting power back into the hands of the individual.
And my own Twitter handle, Trustless States, talks about the state of being trustless,
which cryptography is inherently involved with.
We would have never been able to produce this episode without your help and without your
amazing agenda that you helped put together for us.
Thank you so much for coming on the Bankless podcast and showing us in showcasing the future of
cryptography and what can it can do for the average individual and what this crypto economic
revolution can do for the world for returning sovereignty back to the individual. Justin, thank you
for coming on the Bankless podcast. Guys, thank you so much. It's been an honor. Bankless is one of
my favorites. That is awesome to hear. Okay, guys, action items. We are going to include a spreadsheet
to the research that we referenced as Justin was going through those cryptography solutions and
kind of the problems that we solved. We'll include that as a link in the action items in the show
notes. Check that out if you want the detail. Justin also mentioned some research papers, so we're
going to ping him after this show and see if we can get links to a few of those. Finally,
Bull Market. David, what do we need in the Bull Market? We need five-star reviews. If you thought that this
episode was interesting and informative, and you think other people should listen to it. I think other people should listen to it. We need five-star.
reviews to get bankless to the top of the iTunes podcast charts.
We're trying to scrape our ways to the top of business and investing categories.
We are not yet in the top 50.
I don't even believe Ryan we're in the top 75.
So it's up to the bankless nation to give us those five-star reviews so we can get to the top of the iTunes
podcast charts.
Your likes on YouTube help as well if you're watching it that way.
Guys, risks and disclaimers, ETH is risky.
So is Bitcoin.
All of crypto is risky.
You could lose what you put in.
We are headed west though. This is the frontier. It's the frontier of cryptography as well.
It's not for everyone, but we're glad you're with us on the bankless journey. Thanks a lot.
