209 похожих чатов

Also, I read that Oasis is running an EVM compatible

paratime but apparently this will not have any of the TEE privacy features? Is that accurate? If so, what's the reason for it?

5 ответов

3 просмотра

That’s correct. The EVM-compatible paratime is for the benefit of developers who want to benefit from fast execution and low gas fees within the Oasis ecosystem. Now you might ask, “why not use some other EVM chain like Avalanche, Polygon, Solana’s EVM, or something?” and the key phrase would be “within the Oasis ecosystem.” Currently, Parcel has first-class support for minting data-backed tokens on Emerald, and that’s not planned for any other network (modulo bridging). Other Oasis paratimes/layer2s may also take a similar tack to benefit from optimizations in oasis-core.

LogicalLadder- Автор вопроса
Nick
That’s correct. The EVM-compatible paratime is for...

Can you elaborate on the optimisations made for data backed tokens? In what way are they specialised VS say the data tokens used for Ocean protocol on substrate etc

LogicalLadder
Can you elaborate on the optimisations made for da...

Well, strictly speaking, there’s no reason the Parcel bridge adapter can’t go on any EVM network. The code is set up to allow it, but Emerald is inexpensive, does the right thing, and will have decent liquidity after the Wormhole bridge integration is launched. It’s just due to convenience and development velocity. Any new features will be prototyped on Emerald before any eventual rollout to other EVMs. However, just to keep ops simple and the UX clean, once Cipher lands (again, with Wormhole integration), I think that data-backed tokenization will hit endgame as far as the smart contracting platform is concerned. Compared to Ocean Protocol’s tokens, Parcel-data-backed tokens offer confidential computation and fine-grained access control.

LogicalLadder- Автор вопроса
Nick
Well, strictly speaking, there’s no reason the Par...

Can you link me to more information about Cipher, wormhole, Emerald and Parcel? I haven't read too much about them With regard to the confidential computation, do you simply mean that there is privacy with regard to interacting with data? E.g no one can see you access data Or is it that if you run computation on the data, no one can see what your computation was, or is it something else altogether

Похожие вопросы

Обсуждают сегодня

Карта сайта