Image for post
Image for post

Very Dogethereum pipedream teleporting many dogecoin onto Ethereum raising innovation beyond awake. Ethereum much confirm Dogecoin event!

In reality Truebit was born from an acute need not only to amplify the virtues of teleportation but specifically to check Dogecoin’s Scrypt proof-of-work inside Ethereum, a task well outside practical memory limits of a smart contract. Now, when such bridge, why not Dogecoin fork, what is “state-of-the-wow,” and how many shiba inu fit inside the #ArtProject? For answers to some of these questions, I invite you to read “Retrofitting a two-way peg between blockchains,” my joint work with Michael Straka and Dan…


Image for post
Image for post

Over the past three years, the TrueBit protocol has bootstrapped from a consensus computer to a verification game to a full-fledged computation oracle. A couple weeks ago, Sina Habibian gave a live demo of “TrueBit Lite” over Ethereum’s Rinkeby testnet. With deployable technology now in hand, we approach a long-awaited moment of truth. Will rationality, as posited in the TrueBit whitepaper, suffice to secure a real network?

Miners, also known as “Solvers” and “Verifiers,” will soon not only play a critical role in maintaining TrueBit’s integrity but also permit TrueBit to scale its computational bandwidth. In exchange for dedicating valuable…


Image for post
Image for post

Traditional cloud storage platforms like Dropbox, Sia, Storj, and Maidsafe, either enable users to share data or plan to support such functionality. These applications place users in control of the data they supply to the network. In contrast, a recent flood of cryptocurrency incentives has ushered in a need for an inverted, security requirement: systems must deter unscrupulous, anonymous users from merely pretending to publish data. In 2009 a heretical solution called Bitcoin introduced an immutable, public ledger structure known as a “blockchain” which successfully prevents “publishing” of financial transactions without a permanent commitment. …


Image for post
Image for post

The fast-changing blockchain landscape has warranted an update to the TrueBit whitepaper. Our new addendum includes security patches, a discussion of the new TrueBit Virtual Machine, and some new use cases. We are grateful to the WebAssembly community for providing us with a production-ready architecture, individuals and organizations who have imagined and built new applications related to TrueBit, and especially Sina Habibian, Zack Lawrence, Clément Lesaege, Harley Swick and Yaron Velner who suggested security improvements to the TrueBit protocol itself.

It is now possible to transform C and C++ code into verification games and run them over Kovan testnet. Download…


Image for post
Image for post

Ethereum has ushered in a remarkable new era of token crowdsales. In a recent blog post, Vitalik Buterin distilled two desirable properties of such distributions.

  1. Everyone who wishes can successfully purchase tokens.
  2. A fixed amount of currency buys at least some minimum fraction of the total tokens.

Unfortunately, as Vitalik argues, these two properties are mutually exclusive. Uncapped sales satisfy property 1 and capped sales satisfy property 2, however each of these traditional distribution methods fails to satisfy the corresponding complementary property.

Despite the “dilemma” noted above, we can construct a crowdsale protocol such that if each participant specifies a…

Jason Teutsch

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store