Published in


KOMODO: Advancing nSPV

Biweekly update 13th December — 27th December

In August 2019, Komodo introduced nSPV technology, the next generation of Simple Payment Verification (SPV). This new nSPV technology is more efficient than traditional Electrum SPV server methods.

As development continues on nSPV, several additional features are emerging: enabling Antara Modules to run on mobile devices, enabling static HTML wallets, compiling nSPV to Web Assembly (WASM) to support cryptocurrency transfers from within a web browser, improving opportunities for blockchain gaming, and using nSPV to integrate with the Internet of Things (IoT).

More to follow!


GitHub metrics
Developer activity (from

A Brief Introduction To SPV Architectures

Below is a list of pros and cons for each of the two SPV architectures: P2P and Electrum.

Peer-to-Peer SPV Client Architecture

Some of the more popular peer-to-peer SPV clients are lite wallets, such as the Android Bitcoin Wallet and the Bread Wallet. Both of these wallets only support Bitcoin (BTC), since P2P SPV is impractical for blockchains with larger block header sizes and faster block times.


  • There is no SPV server in this architecture. The SPV client directly connects to the existing peer-to-peer network and all of the Full Nodes of the blockchain.
  • This architecture provides almost the same level of decentralization as the peer-to-peer network to which it connects, as it directly interacts with the Full Nodes to fetch block headers and transaction-related data.
  • This architecture is more secure than the Electrum SPV model, as there are fewer attack vectors.


  • Clients must sync with the network before making any transactions. This means downloading all block headers from the Genesis block to the current one, plus information of transactions related to the client’s addresses. Even the smallest-sized block headers can add up to several gigabytes of data that must be downloaded before the SPV client’s user can create a transaction.
  • This model is not very private, as the SPV client may reveal its blockchain address and IP address to all the nodes in the network when it requests transaction data.

Server/Client based SPV Architecture

Electrum SPV is the most popular implementation in this category and is used by most of the world’s SPV users today.


  • This model does not require downloading all the block headers, so there is no need to wait for network synchronization before making the first transaction.
  • This method requires very low system resources and internet data.
  • The connections to the Electrum servers can be protected by SSL so MITM (Man In The Middle) attacks can be prevented.
  • Privacy is also somewhat protected since only the Electrum server will know the IP address and blockchain address of the SPV client, rather than every Full Node in the blockchain’s network.


  • Less decentralized compared to a true peer-to-peer network, as Electrum SPV clients can only talk to Electrum SPV servers and not directly to the blockchain’s network. While the architecture requires a single SPV wallet to query many different SPV servers, in many instances, smaller blockchain communities don’t have the resources to maintain a large number of SPV servers.
  • Electrum SPV servers can be DoS attacked if they aren’t hardened for security. If enough of these servers are brought down, the SPV clients in this architecture will have no way of accessing the blockchain network.

Further Exposition On The Limitations Of Electrum SPV Architecture

An Electrum Simple Payment Verification (SPV) server is a computer that runs two different pieces of software: a specific blockchain’s daemon (known as running a “Full Node”) and the Electrum SPV software.

This allows applications running on other devices, such as mobile phones or tablets, to access blockchain data by issuing RPC calls to the Electrum SPV server. These external devices, known as light clients, don’t need to download and run an entire blockchain in order to send and receive coins from that blockchain.

Instead, they only need to download and install a light wallet application, which contains all the code necessary to connect and interact with the Electrum SPV server. Ultimately, this makes it possible for mobile devices to validate past transactions based on block header data and create and sign new transactions. The signed transactions are then sent to the SPV server, which in turn broadcasts them over the blockchain’s peer-to-peer network via the full node.

Here, the range of actions that can be performed by the light wallet application is limited by the Electrum server software, which is standard to most Bitcoin-protocol coins. While the use-case of simple blockchain payments is served well by the Electrum server implementation, a more complex use case, like using Antara Modules in a light wallet, requires improvements to both the wallet app and the SPV server implementation itself.

Furthermore, a single SPV server can serve only a limited number of clients. To allow more light wallet users to connect to the network, an increasing number of Electrum servers must be launched in diverse geographic locations. The costs of providing reliable Electrum server access to a large number of users around the world can quickly become prohibitive for startups and small blockchain projects.

Common Attack Vectors On A Typical Light Wallet

In addition to the limitations described above, there are several security vulnerabilities associated with traditional Electrum SPV server infrastructure. There are three primary attack surfaces:

  • The environment in which the Electrum software is run (e.g. key-logging software).
  • Injection of malicious code through the build pipeline (Learn more about this attack vector and some countermeasures in this academic paper.)
  • Malicious update of a dependency in the software itself (Learn more about this attack vector in this detailed lecture.)

While a developer has no control over the security of the environment in which a light wallet application is run — that is, the device on which the app is installed — there are still a few reasonable steps that developers can take to secure the build pipeline. These steps include auditing all the dependencies used to build a Javascript-based GUI wallet, a herculean task.

This is because the Javascript programming language evolved to the current day following a hostile implementation battle between all the major web browser providers called the “Browser Wars.” During this time, it was very difficult for any new feature of Javascript to be accepted by all browsers and implemented across the board.

As a result, many of the basic features a developer might expect from a programming language are missing from Javascript. While tools like npm make it easy to share and use features (called “packages”) from other developers, it also makes keeping control of your whole codebase almost impossible. Every package used in application creates an external dependency, and therefore an attack vector through which a hacker can insert malicious code.

nSPV: Komodo’s Solution To The Problems of Legacy SPV

As Komodo uses delayed Proof of Work (dPoW) to secure the KMD chain, as well as Smart Chains in the Komodo ecosystem and a few external blockchains, there is no longer a need for a light wallet to validate the block headers from the Genesis block to the current one.

While nSPV replaces and adds to the features provided by Electrum SPV wallets today, its architecture is based on the peer-to-peer SPV client model. In fact, the core nSPV implementation is an improvement of the peer-to-peer SPV client implementation for Bitcoin named libbtc.

It gives us the decentralization and reliability that P2P SPV clients offer, without the overhead of downloading gigabytes of data and dealing with a long wait time for the SPV client to sync with the network to create the first transaction. It’s a best-of-both-worlds development.

By leveraging the cross-chain notarizations already performed for dPoW security, light-client nodes can verify far more efficiently than what would be possible with traditional Electrum SPV server methods. This new innovation is called Notarized SPV, or nSPV for short.

To validate the existence of a transaction on the blockchain, an nSPV superlight client only needs to confirm the block headers from the last notarized block prior to the transaction in question to the notarized block immediately following the block in which the transaction in question was created.

Consequently, there is no need for dedicated SPV servers that index a blockchain and respond to RPC calls, as an nSPV client can simply query any full nodes on the blockchain’s peer-to-peer network for the transaction and block header data, then validate that data locally and independently from the node(s) that provided the data.

An nSPV superlight client is more responsive than the Electrum SPV client wallet since it directly interfaces with a blockchain’s decentralized network. nSPV technology is also more reliable, as any full-node on the network can act as a source of information. nSPV clients are not dependent upon a limited number of servers in the same way that Electrum SPV clients are.

To sum it up, Komodo Lead Developer jl777 created a superlight client (a tiny executable written in C) that interfaces with a blockchain’s peer-to-peer network directly and validates transactions independently with very, very little data.

nSPV & Static HTML Wallets

A significant breakthrough for nSPV technology is that it offers support for static HTML wallets. As all necessary wallet functionality is present inside an nSPV client, a wallet application only needs to issue RPC calls to the nSPV client running locally and display the response in a readable format to the user. This enables static HTML wallets, which have no dependencies and are thus far more secure than ordinary cryptocurrency wallet applications.

The nSPV client can generate web pages using pure HTML and CSS based on user input. This way, the risk of a malicious dependency update — one of the three most common attack vectors for a Javascript-based application described earlier in the article — is avoided entirely, significantly reducing the potential attack surface.

To further reduce the attack surface, the Komodo team recommends running the nSPV static HTML wallet in a standard web browser with Javascript disabled and with no extension or add-ons enabled, as they might have permissions to read all data on all websites accessed in that browser. This would obviously present a serious security risk.

Integrating nSPV To The Antara Framework

Another explosive opportunity for nSPV technology is integrating the superlight client feature to the Antara Framework, Komodo’s toolkit for custom blockchain development. Doing so has the potential to make Antara Modules accessible on mobile devices and in web browsers.

As things currently stand, a user must run a full-node in order to activate and run Antara Modules, such as the trustless oracles module or the Dilithium quantum-secured blockchain module. With nSPV technology, the Komodo team is developing a way to make Antara Modules available via superlight clients, including even the smallest of electronic devices.

Compiling nSPV Clients To Web Assembly (WASM)

The Komodo Development Team is exploring a way to compile nSPV technology into Web Assembly (WASM) and make it available as an extension in web browsers. Significantly, the WASM edition of the nSPV client will make all Antara Modules available on every web page you visit and allow interactions that turn KMD and any Smart Chains’ coins into truly web-native currencies.

For example, a highly-anticipated use case for cryptocurrency is innovating a method for making a single micropayment for every article or piece of content you consume online. In theory, this would combat invasive ads, eliminate the need for excessive tracking of users, and provide a source of revenue to content creators. This blockchain use case could be trivially implemented using the Channels Antara Module once nSPV technology is fully compiled into WASM.

Building on that same use case, the Tokens Antara Module would make it possible to use synthetic digital assets representing any currency or security as web-money (rather than just KMD and Smart Chain currencies).

Once the Pegs Antara Module is ready to be deployed, fiat-denominated stablecoins would also be eligible for use within a browser. The stablecoins could be easily converted into fiat currency through a fintech service. This scenario would eliminate two of the primary barriers preventing online merchants and e-commerce sites from accepting cryptocurrency payments — the price volatility of digital assets and the difficulty of converting digital assets to fiat currency.

nSPV & Blockchain Gaming

A major benefit of nSPV technology advances the possibilities for blockchain gaming. A game server using Antara Modules, such as the Rogue Antara Module, in conjunction with nSPV technology, can easily bring the blockchain’s built-in cheating prevention and consensus validation mechanisms to multiplayer gaming. This is true for games with state changes that can be deterministically calculated based on a randomly-generated seed and player actions/input.

For instance, the Komodo Team has already implemented a multiplayer version of Tetris, where all players start with the same seed phrase and then have their inputs recorded on the blockchain for decentralized validation via the network to determine the last man standing. The blockchain can also enable a mechanism that collects an entry fee from each player, then automatically distributes the rewards to the winner(s) in a predetermined ratio.

nSPV & the Internet of Things (IoT)

The final feature that nSPV enables is integrating blockchain with the coming Internet of Things (IoT). As the nSPV client itself is written using the C programming language, it can be compiled to run on almost any hardware available today. And, as the functions it needs to execute are very small, it takes up very little resources in terms of disk space (hard drive) and memory (RAM).

The above two properties make it a perfect client to bring Komodo and Smart Chains to the IoT world. Any sensor or signal interaction on an Arduino or Raspberry Pi like the device will be able to trigger an on-chain transaction or activation of an Antara Module.

Looking Forward

As the Komodo team prepares for 2020, advancing nSPV technology is a major area of focus. While all of the features discussed in this article are still in development, it reinforces the fact that Komodo is one of the most active and innovative blockchain projects in the world today. Always developing at the cutting edge of the blockchain industry, Komodo is pushing the boundaries of what is possible with blockchain technology.

Equihash is one of the most prominent hashing algorithms in the blockchain industry today. Learn more about Equihash in this comprehensive guide.


Source: DexStats

AtomicDEX is the world’s first mobile application to use atomic swap technology and the industry’s only truly decentralized exchange (DEX).

Social encounters

You can check out the coolest features of the Komodo Ecosystem.

This article explains how peer-to-peer networks work, why they’re so important, and some of the benefits that this emerging P2P network model can offer to existing systems and processes.

Upcoming events

Steve Lee with @KomodoPlatform will be joining the other 60+ amazing speakers sharing their predictions and plans at CRYPTO 2020 Summit.


No updates

Partnerships and team members

No updates


No updates

Social media metrics

Social media activity
Social media dynamics
Social media dynamics

The charts above illustrate a decline in the number of both Telegram followers and Reddit subscribers. In general, Komodo experiences an average level of social activity.

The graph above shows the dynamics of changes in the number of Komodo Reddit subscribers, Twitter followers, and Facebook likes. The information is taken from

This is not financial advice.

Subscribe to detailed companies’ updates by Paradigm!

Medium. Twitter. Telegram. Reddit.



Paradigm is an ecosystem that incorporates a venture fund, a research agency and an accelerator focused on crypto, DLT, neuroscience, space technologies, robotics, and biometrics — technologies that combined together will alter how we perceive reality.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store