Episode Transcript
Transcripts are displayed as originally observed. Some content, including advertisements may have changed.
Use Ctrl + F to search
0:08
Gunnar Austin welcome to validated that
0:10
he got to be here. Yet.
0:13
To I'm excited! Have you hear this has
0:15
been? I think a long time coming. There's
0:17
been a lot of stuff we've been going
0:19
back and forth on on Twitter for years.
0:21
You and totally have been going back and
0:23
forth on Twitter for years and I think
0:25
you are in that class of one of
0:27
the people who is a constant optimistic critic.
0:29
Of. The salon ecosystem in a way
0:32
that a noise some people and one of
0:34
the engineers lot of people like me find
0:36
is deeply appreciative because these systems are nowhere
0:38
near done and so it's a process of
0:41
getting better every day. So I'm excited to
0:43
have you here today! Are
0:45
you have extra much? And I
0:47
really appreciated Noom. With that
0:49
characterization warms my heart. Excellent or we
0:51
got a ton of stuff to get
0:53
to today. I want to kind start
0:55
off with a little bit of your
0:57
interest in block Chain how you kind
0:59
of got started in it and what
1:01
keeps you. Interested. In working
1:03
in this space and the technology. Yeah,
1:06
so I'm a big crypto, currency and
1:08
block chain. Enthused, and I have been
1:10
since. Since. The only
1:12
way to use Bitcoin was running Bitcoin
1:14
core with the Windows July, and the
1:17
only way to use Bitcoin was to.
1:19
Run. This app which is a full node
1:21
in the background and are very like crappy.
1:23
I guess like a D C sharp.net. July.
1:26
Or whatever. I don't know it, it looks bad. And.
1:29
It was ugly. And I got into
1:31
it because I was a high schooler
1:33
who was during like web development and
1:35
making like crappy little games and the
1:37
ability to work out a monetary component
1:39
of my games while being too young
1:41
to have a bank account. Actually,
1:44
Use Bitcoin before I had a debit
1:46
card. I love that and got cut
1:48
it into like how it works a
1:50
little bit because I knew about hash
1:52
functions and signatures. cause of. Like.
1:54
Try to roll my own. Authentication for mode
1:56
little like toy were baggins that I was
1:59
making his fourteen. The answer Like.
2:01
The kind of made sense I mean I
2:03
you I'd door it didn't really know how
2:06
easy the essay words but like I could
2:08
kind of vibe vibe, space, understanding of how
2:10
Bitcoin works and then forward like. Five.
2:12
Six seven years later it actually became something
2:14
you could do for career which was awesome
2:16
and so will recruit which is usually get
2:19
a full time job. Learning. About and
2:21
working on this stuff. No brainer. So.
2:24
My first full time job in the crypto
2:26
currency space was. Twenty. Nineteen
2:28
and I've been in and out.
2:31
But. I've been full time for all
2:33
three years now. Yeah, So that
2:35
original journey from planner out bitcoin
2:37
to the work you're doing today
2:39
it's last year and other places
2:42
is. A pretty. Massive change,
2:44
right? The technology stack is completely different,
2:46
the paradigm at how we use the
2:48
stuff is completely different, and the vision
2:51
of what these things are has also
2:53
changed. A lot since as early
2:55
days I have a what part of.
2:58
The. Larger, both declining crypto culture,
3:00
you feel like you've moved west than
3:02
you've said have grown worse than what?
3:04
Have you grown further away from Gusher
3:06
here? So. I still
3:08
think that bitcoin. And just
3:11
currency and payments. And like
3:13
money is. The main
3:15
use case. It's the one use case
3:17
that I'm really sure about. There.
3:19
Are. You. Know a lot of
3:21
other things that people try to use for these
3:24
days, are interested in trying to use it for
3:26
these days and have to use gaming and all
3:28
about the social. I'm a little bit skeptical. To
3:30
me, these things are a bit unproven and so
3:32
I'm excited enough about what is proven. To.
3:35
You. Know, commit to crypto currency just on.
3:37
like. To. Think that bitcoin can do?
3:40
Yeah, And so all my interest in.
3:42
March Internal organs been developing has been
3:45
in the interests of improvements to Bitcoin.
3:47
For. Example. I am interested
3:49
in the Fi and the or programmability
3:51
and the defy that has emerged from
3:53
for around building. Because.
3:56
You have ways of improving. Upon
3:58
bitcoin you can have decent the was stable coins
4:00
which is a. More. Useful
4:02
denomination for your decentralized currency than
4:05
some volatile. Btc. Which is
4:07
gonna. Probably. Not the best thing
4:09
to actually pay people with as you live in oh
4:11
right country where your currency is. A
4:13
lot more stable that. So. I
4:15
loved the idea that you can have more
4:17
useful denominations than. These. Random coins that
4:20
we met at a sinner. Ah,
4:22
and. Stealing. Tech
4:24
is. Very. Interesting to
4:26
me because because it's own. To. Skill
4:29
and this has been. We've.
4:31
Been talking about since the early earliest days of
4:33
bitcoin with our going scale this thing. And.
4:36
Then the other thing and I'm. Most.
4:39
Excited about as. Invasions of privacy,
4:42
Most. Interested in like the shield
4:44
the previous privacy. Approach is
4:46
was he cares Tornado case. I
4:48
guess like protocol is because around the salon
4:50
forecast. For number. And.
4:54
I am be a really into that really. Passionate.
4:56
About privacy and fall that space
4:58
recklessly. Were. you part of the block
5:01
or as. So.
5:03
Sophomore in college. While that was going
5:05
on, I didn't follow it too closely,
5:07
but I definitely remember. Like.
5:09
All the are doing on the forums. All.
5:11
Arguing the crypto meet ups that we're going on in
5:13
New York at that time. And eventually
5:16
the most people take away from it
5:18
was we're getting a bitcoin cash airdrop
5:20
if we hold btc and I was
5:22
like kind of like that was i
5:24
feel like those like the middle such
5:26
left curve of like. The. At
5:28
view of the block size. Worth? Yeah!
5:31
Ah is the reason I ask is is
5:33
because. You. Know bitcoin not scaling
5:35
was a choice. Oh yeah, because they
5:38
could have rhythm Arthur's. Yeah that
5:40
there's this sort of the view that some
5:42
people have. or it's like bitcoin is ordained
5:44
by God and. It. Is not controlled
5:46
by man. and of course we. We know this
5:48
is. A software package that
5:50
a certain quorum agrees to run. And
5:53
there's nothing inherent about that software package
5:56
that means changes cannot be introduced. There's
5:58
just a. Very. Strong
6:00
cultural aversion to change, which is quite
6:02
frankly is why bitcoin is still valuable
6:04
today. In large part riders lot of
6:06
good reasons this exists, but we do
6:08
have to accept that. You know. This
6:11
is a norm. This is not a law
6:13
of the universe at, so I'm kind of
6:15
curious as someone who is really like bitcoin
6:17
brought you in some ways keeps you in
6:19
the space when you think about. Scaling.
6:22
What is that actually means you in the
6:24
context of Bitcoin? Well.
6:27
As opposes everyone was to ruin the
6:29
box. Those them. It's. Worth mentioning
6:32
that with the tapper upgrade the boxes which
6:34
we don't roost although in like maybe you
6:36
could argue that because the software computer room
6:38
for you could soon be running and twenty
6:41
live in version of between the ability to
6:43
delude silver to goes. I think
6:45
that's how they do things on a computer. But.
6:48
Yeah so like or a one way to talk
6:50
about feeling. Is. Just to
6:52
say like just throughput of the chain
6:54
is is stealing. I'm pretty
6:56
into the meme where we say that
6:59
stealing and the block chain context is
7:01
throughput divided by cost Verify. Ah
7:04
I said mean because like. It's
7:06
contentious, yet like. I'm. More
7:08
interested in scaling that way. I'm more interested
7:11
in. Building. Stealing tech
7:13
that. Preserves. Elo verification cost
7:15
because I think the real the opposition
7:17
are the block size due to. Concerns.
7:20
About. Raising. The
7:22
cost to use the central the flu. Come.
7:25
From a real thing like you can see
7:27
that new movie disagree you might think that
7:30
so much B S but I think there
7:32
is like something of value would be lost
7:34
if we made it too difficult to use
7:36
the genes trust with with yeah. It's
7:40
interesting because, like I think some folks might
7:42
be wondering. Why? As
7:44
someone from Find a Foundation and someone who
7:46
works on Thursday or spending so much time
7:48
talking about the coin, but I think there
7:50
is sort of a. Maybe.
7:52
An unspoken paradigm in a lot of people's
7:55
minds and it easy it less need theory
7:57
and community because there's more of a rift
7:59
there with bitcoin made the but that on
8:01
one side of the spectrum you have, you
8:03
know, Timeless. State less
8:06
money. And that is Bitcoin. And.
8:08
Then on the other side you
8:10
have execution environments and that you
8:13
know you can still have your
8:15
state resistant nuclear war resistance a
8:17
coin, but that the execution scaling
8:19
environment for that may well be
8:21
something like. Sauna. That
8:24
it is a is a fast excuse
8:26
environment to do things with rabbits, bitcoin,
8:28
or other types of assets and build
8:31
programmability sort of as a as an
8:33
execution layer. On even if at
8:35
the ended the day. would you want to
8:37
do is keep the majority of your value
8:39
in an asset like Bitcoin or in this
8:42
case expressly Bitcoin. As
8:44
and that's always been an interesting. Way
8:47
to look at it and said have a theory and came up
8:49
and said we want to do. Both. We.
8:52
Want to do the ultrasound money?
8:54
Him: And. We want to do
8:56
the incident scaling meme and that we can
8:58
provide that in what used to be one
9:00
software package now as. Many. Many many
9:03
different software packages, but I'm I'm kind of curious
9:05
if that is similar or different from how you
9:07
tend to look at the world. Yeah,
9:10
that's interesting. Yeah, I mean like the
9:12
Btc acid itself being the thing that
9:14
no one can ever met with the
9:16
monetary policy change and then like it's
9:18
impossible to do the truth was bridge
9:20
across to disconnect auctions bootlegs so you
9:23
could. Root like to see
9:25
going to people say you can if
9:27
they're just connected. know if they make readers
9:29
you is this your security In some
9:31
way than just it's yeah technically possible
9:33
with and yeah what about a so
9:35
I fear him The So I guess
9:37
bitcoin was supposed to bring the block size
9:39
because the not so much about like.
9:42
Wanting to control the cost of running a node
9:44
or keeping a trust minimized? I think it was
9:46
mainly about just we don't want change it would
9:48
want to touch the parameters. Want to
9:51
keep it ossified because it was ordained by
9:53
God. To theory, I'm. Their
9:55
reasoning for wanted to keep it small to do.
9:57
They do change that they have yet to regularly
9:59
so. It's not about. Freedom.
10:01
The block size to what? Metallic. Sedative
10:03
within twenty four games, it's they have,
10:06
like, kind of, a different reason for,
10:08
and also, if you talk to different
10:10
theory. People. You may
10:12
hear different explanations for why they. Care
10:15
about this? Yeah, and so I'd
10:17
say. Like when I first started.
10:20
Having all these conversations with Soy on
10:22
twitter. A while I
10:24
was working full time in the slot ecosystem. I
10:27
was. Asking. These questions because I
10:29
was trying to understand like why the if
10:31
they're inside cares about the. Wrong. And.
10:35
I talk to a lot of if people about and
10:37
I heard a lot of the for answers and I
10:39
think the part of it that is true and that
10:41
I do sympathize with. Is. Just. We.
10:44
Don't want to be too difficult and expensive
10:46
to use the train chain. Trust us Li
10:48
I now disagree that you'd I don't think
10:50
you need a full node to use the
10:52
change drastically and that's why now I focus
10:55
on building like clients I said I would
10:57
be hard he two hours your thought given
10:59
your current work. yeah yeah I'm the are
11:01
slices full nodes are quite big and yet
11:04
we want them to be huge. but then
11:06
we compensate for that by making good like
11:08
clients that are. Nearly as good as full
11:10
nodes. And so this is
11:12
my ultimate conclusion From all those conversations is
11:14
like I don't care about the costs run
11:16
a full node. Some people do and I
11:18
couldn't. I can summarize why, for example, Tobruk
11:20
and the Lot other a theory and people
11:23
still want their costs to a full node
11:25
to be low even though they. Agree
11:27
with like some the like line stuff and
11:29
I have agree with. But. Like
11:31
my personal segways like let you have
11:34
to raise the cost of hardware. You.
11:36
Have to. Use. Bigger machines and
11:38
more bang with the scale that is inescapable.
11:41
But where? Where crypto people
11:43
were blocking people. Part. Of the
11:45
purpose of a crypto currency is that there's
11:47
lustrous. More senseless
11:50
things? Yeah, And so let's build
11:52
the tech that lets us skill
11:54
the chains while preserving this viable
11:56
trust minimization aspect. Yeah this
11:58
is always been. One of the places
12:01
that I. Think. I stumble sometimes
12:03
in S Which, which is the idea
12:05
that. Like the
12:07
bitcoin errors were right, that proof
12:09
of work is more. Resistant.
12:12
Than proof of stake that works to
12:14
all sorts of problems, whether it's. Outages
12:17
whether it's you know, stick going offline
12:19
like the in a pretty famously Bitcoin
12:22
can lose. Eighty percent of
12:24
it's hash power and it just gets
12:26
very very very slow burn you days.
12:28
But it doesn't actually quote unquote. Go.
12:31
Offline. Whereas the eighty percent of any
12:33
Proof of Stake network goes offline, it's
12:36
all Christians. And that is
12:38
a that is a system. That. Has
12:40
to be built that way and I I would
12:42
say the trade of proof of stake or have
12:44
very much shown themselves to be. Worthwhile
12:47
especially in execution environment. but you you
12:49
you get down a place eventually way
12:51
he say well you know like like
12:53
what you're saying hey actually the node
12:56
requirements don't. An eminent I'm at
12:58
Channel My David Hoffman right now of your
13:00
arm which would be here if you get
13:02
to a place where the node requirements are
13:04
more than most people can run. It's
13:07
just, you know, two cycles of employees
13:09
away from saying like well, it's just
13:11
runner, ten person guardian that work man
13:14
and proof of authority network And as
13:16
long as everyone can validate the like
13:18
clients, it's actually no big deal And
13:20
and you get to a place eventually.
13:23
which is we've basically build centralized system
13:25
so little bit more verification and we
13:27
reduce the amount of trust. But in
13:29
a situation where something catastrophic happens. The.
13:32
Like plants can detect the fault of the
13:35
can actually do anything. the intervene with the
13:37
false how do you think about. That.
13:39
Sort of a situation. and the reason
13:42
I'm asking you this question cause of
13:44
the bitcoin history. because you eat out
13:46
Bitcoin has been for years. You
13:48
know if there's a problem? People
13:51
can forgive and six at and that's not
13:53
necessarily the case If you have incredibly heavy
13:55
know it's. Interesting. Interesting.
13:57
So I mean there isn't a.
14:00
it off between like node
14:02
size and. Number of.
14:05
Participants. And consensus when I think
14:07
it's ally, is the ultimate example. This
14:09
I believe you have three thousand consensus
14:11
participants in your. Privacy.
14:14
Quorum but two thousand or two
14:16
as younger and a. Free.
14:18
That the heart of the harbor is big,
14:20
so I don't. I don't think that like
14:22
big hardware on block producers necessarily translate to
14:25
a smaller quorum or even less news. Although.
14:28
I mean you may be gesturing towards eat Lt
14:31
was which are ours were small quorums and. Easily.
14:34
Verifiable but like small core of
14:36
if even greater than one but.
14:39
I. Approve a Sig Maxi. This.
14:41
Is really oh yeah? big time? Yeah. I
14:43
think that proof of Work is basically a
14:45
complete relic of the past, completely obsolete. The.
14:48
One like, so you said that, Proof of
14:50
Stake. You know if
14:52
a percent say goes offline the chain has you can
14:54
build proof of stake. Without. That. You.
14:57
Can have live in a sobering proof of stake?
14:59
Guess you can have had no analogy that so
15:01
you can kind of do both, even even Ca
15:03
to get the boat. Best of both worlds. So
15:06
like you could have a live in a savoring
15:08
proof of stake. And. Then a
15:10
finality gadget for that, And this is how.
15:12
Ethereal. Gaspar works with more than
15:14
fifty percent of state goes offline. Blocks
15:17
will still be produced, And
15:19
I think it may be is a Mac on.
15:21
Not really sure about this, but I think it
15:23
might even be like almost all the notes to
15:25
go offline and then like just a few, surviving
15:27
knows could continue to produce blocks. But
15:29
for now it his last and with that means
15:31
is Rios can happen. Yeah, and. If.
15:34
Finality on during his last and the chain
15:36
progress without finality. After. A certain
15:38
amount of time is block will start to/the
15:40
male who stop voting and then after a
15:43
certain number of like reorder of about blocks
15:45
on the live in a gadget. The
15:47
save this fanatic edges restore it and then
15:50
the change to finality back after all these
15:52
people got/he had this is this is sort
15:54
of the idea they in a forking advanced
15:56
on a theory and both sides/himself down to
15:59
one side have. In. Enough
16:01
of the steak to continue finalizing bought.
16:03
Oh yeah, yeah, they're that is true.
16:05
So like if like Australia got cut
16:07
off from the rest the rule deflect
16:09
the Pacific ocean like internet cable got
16:11
caught or something. I was in pacific
16:13
rim. Those
16:15
those validators would like. They
16:18
would observe a finality outage com and
16:20
then like only the Australia validators would
16:22
continue to produce blocks and like. Then
16:24
you'd end up with just like two
16:26
different completely valid forces a theory and
16:28
that are that are just going on
16:30
their own. Yeah. Kiwi.
16:33
Btc. See. fetuses,
16:36
I yeah I guess this is always been
16:38
an interesting one cause in of the salon
16:41
our. View of the
16:43
world. Is that? Execution
16:47
in the absence of analogy is
16:49
not worth the trade off. Yeah.
16:51
Many people believe this that the same view as
16:54
pretty much the whole like Tinder Mint world as
16:56
well the i have any sort of the way
16:58
to recover if to mercy goes off on and
17:00
I would say like to his their own it
17:02
during really likes their thing and I think it's
17:04
quite nice or times we've seen it. With.
17:07
To do in and work and like
17:09
peel finale outages? Yeah. Sort. Of
17:11
I mean or will we see progress without finale outages
17:13
and then the rear of Zorn. Even that like there
17:16
weren't really any real stirring up like. Finale.
17:18
Outage. And like I think
17:20
it was because one of the consensus
17:22
clients a bug. yeah you're actually if
17:24
remember correctly lighthouse which is the declines
17:27
it's written ross it had a bug,
17:29
that and dos or the other clients
17:31
and then so like it became only
17:33
lighthouse because my house like inadvertently like
17:35
took out prism and other ones. Which.
17:38
Is very funny and and I think they
17:40
passed it or fixed it. Before.
17:42
Anyone got inactive do it? Now
17:45
sir nice and also like. If.
17:47
You're running prism and and you see that it went down.
17:49
you can display oh shit and and switch out last yeah
17:51
and then like we're going to fix in a switch back
17:53
prism. Yeah this is a multi plan
17:55
vision of why it actually matters, which is why
17:58
he and out the fun and our cars. A
18:00
second independent client and the oil is exactly
18:02
from earth. Fired for an answer is a
18:04
great. From. Church that a focus with
18:06
yeah ah, finance their I mean we're or
18:08
Hoban we get some version of it on
18:11
mean that this here so well as ahead
18:13
of schedule isn't Ah, I mean you know,
18:15
schedules and block chains are sort of an
18:17
amorphous com on the way things are measured
18:19
and century or plan their measures and centuries.
18:21
but yet restless Red Mask don't exist. Know
18:24
because I think the that the way I
18:26
mean that. But yeah that's that's sort of
18:28
the hope in this. The end goal of
18:30
that project is One hundred X Performance. All.
18:33
Over the current network and you know that is a
18:35
multi project to get there of course but. I
18:37
never got as the the highly scalable vision
18:40
so I want to talk about. Trust
18:42
minimization and the role that that played
18:44
and in your decisions both in terms
18:46
of career choices and the way that
18:48
you've chosen to spend your time on
18:51
different types of of software projects at
18:53
you know you and and and Turbo
18:55
he mentioned before from scroll or two
18:57
people that said have the drumbeat of
18:59
this. I'm on Twitter
19:01
on the time. What do
19:03
you? Didn't you see people?
19:06
Misunderstanding. These terms D C
19:08
Them intentionally misleading people on what they
19:11
mean. Why do you think there's such
19:13
a you would expect trusts to be
19:15
something that we can agree on in
19:17
networks that are built. On.
19:20
Having to truths. But. It seems
19:22
like still a very contentious pointed this
19:24
industry about what qualifies as trusted or
19:26
says trust plus vs trust minimized. Yeah.
19:29
I would say that like you know,
19:31
obviously if you run a full node
19:33
of your chain, you are not trusting
19:36
anyone. You're checking every single lock right.
19:38
And sure, I mean there's some baseline
19:40
trust assumptions for example, like maybe you
19:42
trust two thirds fruit of state for
19:44
lightness and to some things are inescapable.
19:46
trust. some things you cannot overcome with.
19:49
Modern technology or you do the classic
19:51
like what have your entails you you
19:53
and your laptop is back toward read
19:55
through, something that we cannot overcome. But.
19:58
Like I would say that. Why
20:00
citrus minimized and sort of like
20:02
my goal for building trust Minimization
20:04
tech for block and is get
20:06
every user. Equal to what?
20:08
the. Uses. The full nodes have
20:11
because that is. I
20:13
think. As good as you can get and
20:15
a noble goal. And. That
20:17
would get us to. This. Put back
20:19
to this place Word. Block. Chains are
20:21
a less trusted version than. What?
20:24
Do or tried by things. Yeah.
20:26
Now one of the places that a
20:28
lot of people go in there talking
20:31
about how we build. Systems.
20:33
Are the average user has.
20:35
No interest based assurances that a
20:37
full node is operating crackly. Are
20:40
zero knowledge proofs I did. This is kind
20:43
of one of the there are many examples
20:45
of how you can use their knowledge proofs.
20:47
one of them being the think this which
20:49
is really just a proper that gives you
20:52
scale for the other one is basically to
20:54
say I don't have to verify your computation.
20:57
Because. There's a cryptographic signature generated as
20:59
part of your computation that proves that
21:01
correct. This is. See. The. Analogy:
21:04
You're probably not forgive me for this. Is
21:06
there? Like has checking that you know a
21:08
file or something on earth are perfectly fine.
21:10
Analogy: Early go have some shards. is the
21:13
integrity of data and is your nose Proof
21:15
is the integrity of a competition. Yes,
21:17
It's very similar in comparison, so.
21:20
I want to ask of. Very. Broad
21:22
question. Why this many
21:24
years ensues? Zero Knowledge. Prove
21:26
Or is. Do. We still not
21:28
have one. Is that run anywhere near real
21:30
time? Oh, I don't think we're Well, I
21:33
mean, maybe pessimistic, but there's an. Enormous
21:35
amount of overhead in sick
21:37
every competition and. Real
21:40
time sound like science fiction at the moment.
21:43
right? And we have some really high
21:45
performance ones. What I mean like. Maybe
21:48
when high performance, but. We.
21:50
Have some literati babies. have a
21:52
block. Time isn't. Ability.
21:54
Lead the ability for as he can
21:56
prove to execute within one block on
21:59
most networks. Oh.
22:01
Yeah, I'm okay. so. Depends.
22:05
Or do it like if you want to
22:07
seek a prove consensus and a whole block
22:10
worth of state transitions in as a proof.
22:13
That's. Gonna definitely be slower than whatever
22:15
the block I'm was just because.
22:19
You know you have to do so many extra
22:22
competitions for each instruction that you run if you're
22:24
trying to prove. Yeah. Any competition.
22:26
But what is nice is that.
22:29
It won't fall behind so you can have
22:31
a chain progress as fast as you want.
22:34
And. The truth lag behind by certain amount of
22:36
time, but they always keep up. So.
22:38
It's not like that's not so bad, right? So
22:40
like. You. Know suppose we have
22:42
our four hundred mil second blocks and
22:44
then maybe three minutes later, the user
22:47
gets a confirmation that. Though.
22:49
That like. The. Height three minutes
22:51
ago was valid. Yeah, that's better than what
22:54
users have now, which is nothing blind. Trust
22:56
Frank, I'm pretty happy with that every day.
22:58
Someday get real time because of some math
23:00
breakthrough or some hardware breakthrough in the future
23:02
of even more cool but I'm personally does
23:04
happy enough that we have the ability to
23:06
give them confirmations at all he and with
23:08
a little bit of a delay that so
23:10
much better than. Blindly. Trust plan?
23:13
Interesting. Yeah. So. Sit. I
23:15
think one of the arguments that you're
23:17
here is okay. So let's assume that
23:19
zero knowledge tech gets. Good
23:21
enough that you can get. Let's call
23:24
it. you know that a three minute,
23:26
a five minute confirmation, On and on
23:28
on something. right at that point? What?
23:31
Is the role that the block chain is. Because.
23:34
I could see a world where someone's leg. Access
23:37
your knowledge. Proofs make Octane irrelevant.
23:40
You now can have arbitrary data coming
23:42
from arbitrary sources that doesn't necessarily need
23:44
to be verified. These the computation is
23:47
now verified as a good point, right?
23:49
So like imagine you're you are using
23:51
a blocks index because you don't trust
23:53
Robin Hood. Guess? But then Robin Hood
23:56
rolls out a new Zeke a brew
23:58
feature where now you know. Robin
24:00
Hood is executing their code exactly upon the
24:02
terms that you agree to when you were
24:04
using Out. Yeah. Are still. I
24:06
still think we need block chance. Even
24:08
with that because block hands are also
24:10
there are more than just. Ruined.
24:13
Trust, right? We're also trying to make these things that no
24:15
one can take away. We're trying to make these things that.
24:17
Last. Forever can be censored. And.
24:21
Like. No one, even with all the power in the
24:23
world, could. Take. Away from us. So
24:25
like. Even. Zk Robin Hood.
24:28
Like that can be shut down, right? That
24:30
can be like seized or. Have
24:32
their business license suspended or something like
24:34
that. but. The. Crypto version of
24:36
the block chain version without. Last
24:39
Forever runs itself. Resilience,
24:41
Against all kinds of attacks. And.
24:43
So like we want that stuff and then we
24:46
also want the trust my this and stuff and
24:48
I think that's where gets interesting. Yeah.
24:50
Civil is, I've always struggled with the idea
24:52
that a block chain will ever be. Technologically
24:55
resistant to state action,
24:58
I think the reason of and you we can set aside
25:00
like. In. L a Rhode Island dance
25:02
cut down on thing. anyone's worried about
25:04
it. We're we're We're talking like a
25:06
a massive actual nation state level with
25:08
us. India, you China, something like that.
25:12
In that situation, The.
25:15
The the security of the network
25:17
from the values standpoint. Seems.
25:20
To me at least to be much more governed by
25:22
the social layer than the technical. And
25:24
I guess my analogy here would be. If
25:27
you make something technically
25:29
resists and but socially
25:31
unacceptable. The.
25:33
Value of that underlying assets? Like that.
25:35
You know it. It's Us Bends Bitcoin,
25:37
Bitcoin, Ghost of Three Thousand Dollars, for
25:39
instance, right? And I know, Yeah, At
25:41
some point, you have to ask yourself,
25:44
Or. The eat the Us and the You and
25:46
China right As a trifecta, come together and
25:48
say no Bitcoin. In
25:51
a blood blood diamond still exists right
25:53
there There are there are people who
25:56
you know by. Assassinations with
25:58
bars of gold. Right?
26:00
or some other type of like
26:02
highly hard to move physical assets.
26:04
And the the The thing there
26:06
is the social layer. Of
26:09
crypto is what keeps it in the
26:11
good graces of government. At. Least
26:13
in democratic or semi democratic systems.
26:16
As. Much as the technology and so
26:18
I'm I'm kind of. I've always wondered
26:20
about sort of how. How.
26:22
Absolute as we need to be around that
26:24
layer. Considering. That at
26:27
this point in this is the argument
26:29
that circle actually control the theory Him.
26:32
And that the end of the day
26:34
if if circle said we need this
26:36
change to be made or we need
26:38
you to go in and remove this
26:40
transaction that we've traced back to North
26:42
Korea a refusal to comply. With.
26:45
Would have. Such. Catastrophic effects
26:47
for a network that it would functionally
26:49
not be able to maintain its role
26:51
and that it's players would probably can
26:54
pitch elite to that request. Or
26:56
yeah, so that circle for question thing I'd
26:58
so we just talked with it. Too easy
27:00
going on or the projects, but I have
27:02
a answer that I think you're like okay,
27:05
So. I. Really don't like
27:07
the framing that sir who controls the
27:09
for the hard for selection of the
27:11
team or circle controls a theorem Sir
27:13
who controls mana I agree cause what
27:15
happens if if circle is. Coerced.
27:18
Into. Only. Accepting redemptions
27:20
on aid. Hard for
27:22
goes if the room that. Removes
27:24
tornado cash from the state or otherwise
27:26
changes the state. In a
27:29
way that's against the recall that
27:31
actually crazy second chain. Yes, So
27:33
there are two chains. This happened before we did,
27:35
we did the dow hack, we did a other
27:37
and classic. Forging, Into a theorem.
27:40
It wasn't that the old chain
27:42
was deleted. it still exists. And
27:44
you have phones on both of you.
27:46
Headphones on Lithium Classic. You got phones
27:48
on A theorem. And. During
27:50
classic still has value. It. Has
27:53
probably some usage still. and oh really,
27:55
no vote? like. If. The
27:57
Circle for happened you'd have to chance. you'd have
27:59
to to. Organs you have. Our
28:01
Ethan Circle Eve. Yeah, and. I
28:04
would say that. He. Knows
28:06
the value of both the probably be a lot
28:08
less than the value of his prior to that
28:10
event. I think the the Pirate
28:12
East chain were all of the if I brace
28:14
is probably going to have a lot of problems.
28:17
And. A bunch of opposite break
28:19
and you I would not. Be.
28:21
As useful in some ways, but wouldn't be worth zero.
28:24
It. Wouldn't go completely to zero and
28:26
are similarly on the other side
28:28
on serve the circle a fork
28:30
that one would not be as
28:32
worth as much as the original
28:34
is either Because the entire narrative
28:36
that this is a like decentralized
28:38
protocols gone, it's now completely centrally
28:40
captured. This one company changed the
28:42
state by breaking the rules especially the validate
28:44
are set of the scene is just for
28:47
show. the whole decentralized consensus and like peter
28:49
view layer of this is all for show
28:51
the one company that now everyone has decided
28:53
on the same. They're okay with them, just
28:56
completely have a right access to the whole
28:58
state. Yeah. So I agree with
29:00
you that like. Assyrian probably actually would not
29:02
listen to circle not like of the or aim
29:05
is one percent or ah well predator vibe is
29:07
your chance Yet there would be there would be
29:09
to change that. I I might even go as
29:11
far as to say that the impacts of it.
29:14
Would be such that circle actually.
29:17
If anything, the the market forces work the other way.
29:20
Is. It you would see a massive exodus
29:22
from Us D C. V
29:24
him. There was a moment like this
29:26
and and there's no real great alternative
29:28
to us. The see today, right if
29:30
you're looking for for highly regulated, stable
29:32
coins. But we have Gm though we
29:34
have pack so he's either see a
29:36
world where the institutional money moves to
29:39
something that hasn't been sanctioned and the
29:41
deeds and money just goes back to
29:43
tether. right? I mean
29:45
that a i'd rather is not an American company
29:47
but now I still think if the U s
29:49
didn't want other do exist in probably wouldn't exist.
29:52
You. Think yeah I guess the
29:54
The, The, the. Question.
29:56
With a lot of the stuff is always when. is it worth
29:59
it right? Because like other. Policy that no one
30:01
likes that talk about is like. Drugs.
30:04
Are still. Easy
30:06
to obtain despite being illegal
30:08
in the United States. Pirated
30:10
copies of movies despite
30:12
being illegal. Are. Still easy
30:15
to obtain and it's not like for rise
30:17
then. You know monitor is
30:19
your internet traffic and you know
30:21
like. Into. The yes
30:23
people use encryption on bit torrent but like
30:25
fundamentally it are hard to look at your
30:28
computer and be like oh they downloaded forty
30:30
five gigabytes in five minutes and like that
30:32
for you know from ten thousand other beer
30:34
from a hundred other people like that's probably
30:36
a pirated movie file. We you know that
30:38
there is guilt by association that exists within
30:40
a lot of the things but the compliance
30:43
not strong enough to and forth up. And.
30:45
For me, I see that as the
30:47
social layer of the politicians who went
30:50
after piracy in the early two thousand
30:52
all that voted out of office Because
30:54
it turns out it's pretty popular. And.
30:56
That the actual resistance of block
30:59
chain to state action. Is.
31:01
Very similar in that if we actually saw
31:03
him a we've seen this that politicians right
31:05
now in the United States who are very
31:07
anti crypto. If. They're vulnerable. It is
31:09
enough to make them lose their reelection
31:11
campaign. And that that's the
31:14
actual. Ah, Consensus layer, Power
31:16
layer, whatever you want to call
31:18
it of crypto is more in
31:20
the number of people who believe
31:22
in these networks than necessarily the
31:24
technological resistance. Of. The networks. right?
31:28
So. Much of your group that are not.
31:30
well, I'm kind of you who you of. Interesting
31:32
point but let's go back a little bit
31:34
too. Like if so
31:36
is it be one thing if
31:38
the government banned crypto currency. A
31:41
be another thing if they went to war
31:43
against crypto currency. So if we went to
31:45
war against drugs. Or yeah, fuck me
31:47
for the for as you go so well right?
31:49
Yeah, so like I think that's kind of what
31:51
we want to do. So if we want to
31:53
make it so. We. Want to design
31:55
the networks? From like a technology
31:57
perspective in a way that if there were were
31:59
on. Crypto. Crypto would win in the same
32:01
way that the Drugs on the War on
32:04
Drugs like Ray and the Drugs one because
32:06
the user's one. Year.
32:08
Bright lay off at at the end of
32:10
the day that the War on Drugs failed
32:12
because they didn't cut off. The.
32:14
Demand for the product. Yeah
32:17
and euro Yeah can and must make it
32:19
easy to get right? So like. You.
32:21
Know, for example, Rpc services like a
32:24
lot of Rnc providers, are businesses and
32:26
if there's if they're going to war
32:28
against crypto currency, their business licenses are
32:30
gone. They can no longer accept money
32:33
from their clients for the can no
32:35
longer pay taxes I don't think are
32:37
busy businesses. Are so passionate that
32:39
they're going to. Become. Like speakeasies
32:41
or bootleggers either. I probably will. just
32:44
fun do a new like jobs. They're
32:46
probably just like close down there isn't
32:48
become Cdn. Yeah so like we wouldn't
32:51
in this world we would have. Rpc
32:53
providers of is sketchy are fussy providers would
32:56
be like criminal pirate guys know like the
32:58
people who are uploading all these torrance the
33:00
bittorrent yeah or like the very early days
33:02
are trying to buy a Vpn that wasn't
33:05
to your work. Yeah so.
33:07
Are. Fuzzy providers become. Not.
33:10
Trustworthy businesses. They become sketchy criminals, so
33:12
that's why I'm like let's not trust
33:14
them. What makes excellent We don't have
33:16
the trust them. In the
33:18
event that we end up in this world. Because
33:21
they might not be right now. They're trustworthy and right now
33:23
is very easy to say. Oh curious
33:25
is never going to run. Meat is murder
33:27
is a trustworthy guy. But. Like
33:29
some that my change someday be
33:31
trustworthy Rpc providers my be gone.
33:34
Shore or it some day. He'll.
33:36
He gets acquired by Oracle. Orcl.
33:38
Like Lario Theatrical and then Larry
33:40
Ellison. Gonna start like lying to
33:42
users about their balance. Yes, Yes
33:46
of the light that the an area southern
33:48
Oregon or or or you know the I
33:50
mean so a very different version of this
33:53
actually turn It happened with. Ice. And
33:55
and you know when they were acquired they
33:57
coin this the scope of what they were
33:59
able to. You under a
34:01
publicly traded, highly regulated entity
34:03
that owns a exchange. Men:
34:06
That the product sweet had to change
34:08
in response to the regulatory visions and
34:10
I thought to say that you know
34:13
anything wrong happened. There is just the
34:15
business realities changed in the products and
34:17
services that company was able to offer
34:19
post acquisition were very different and free
34:21
acquisition. Interesting and thing to. Sometimes I
34:23
even the ferry as use cases and and
34:25
it's just. A business use cases
34:28
change and suddenly you know what if
34:30
there's a oh fact block type conversation
34:32
equivalent for our Pcs. Oh
34:34
yeah I mean I I I think that is already
34:36
confirmed to be happening. For three I'm a convert. Those
34:38
already major are busy that are not letting people. Interact
34:41
with tornado. Interesting.
34:44
Yes that is. Take a hard have
34:46
it here. I want to bring this
34:48
back to Celeste year. And
34:50
see the availability that the so I
34:53
wanna. I wanna talk to a little
34:55
bit about how. Data. Availability
34:57
works. How it differs from
34:59
settlements, How it differs from
35:02
state. And then also. Where.
35:05
Data availability and verifiability intersect
35:07
something that you see as
35:09
necessary for the future of
35:11
the A products. For. Her.
35:13
Great. So let's start. With.
35:15
That with the basic with their with think. So.
35:19
If you're using something that's built on
35:21
Philistia, Where. Is the execution
35:23
happening? Where is that the states. Where.
35:25
Is the Da and where is the settlements? Instead
35:28
of an example, you want to just pick. Yeah
35:31
so this is a very common source of
35:33
confusion just there's a lot of different ways
35:35
that first is being used and they all
35:37
have like very different answers to your thirst
35:39
for something like a eclipse would say. Okay,
35:42
Eclipse is an ethereal L to. And
35:45
it uses slushy data availability if they're
35:47
him settlements and it's it's I guess
35:49
for To the Slaughter virtual machine to
35:52
execute transactions. And what does
35:54
that mean? What I mean That. Transactions.
35:58
Go to either the A. He cancer or
36:00
the Eclipse Network depending on if it's an incident.
36:03
What's age of decentralization? it up. And
36:05
they will produce a block
36:08
and. Or. A bachelor
36:10
blocks or whatever. Maybe like it's. Many
36:12
blocks that ends up being one huge
36:15
block and there will be a Merkel
36:17
root. Of either like
36:19
the state and most most roll ups
36:21
we do talk about a Merkel Root
36:23
of the Century being posted on chain
36:25
on it might be different for salon
36:27
of the and because the salon of
36:29
the Am doing like clients is much
36:31
more easy with like as to decide
36:33
where you have a. Root. Of
36:36
the transactions rather than root of the say
36:38
it was. Turns out that works just as
36:40
well for bridging and all that are. So
36:42
I'll say Eclipses posting a root of a
36:44
bunch of transactions onto. A Syrian.
36:47
The reason why you need. Data.
36:50
Availability is because. What?
36:52
Could happen is the block producer could have
36:54
posted a Merkel root for a tree that
36:56
does not exist. Right? And
36:59
what data availability guarantees is
37:01
that. Even though
37:03
the route is was posted to the like lance
37:05
a roll up for an l to is a
37:07
on chain like line so it's it's the same
37:09
as like that might have been talking about responses
37:11
so that you've used to have a bridge. I
37:14
actually never heard some and it's have a roll
37:16
up as a like land friend Alan yeah I
37:18
mean of an interesting like an ethereal out famous
37:20
your email to is a lot a trust minimize
37:23
like client for one chain of running on it
37:25
during a one. Yeah. Rather than
37:27
a like line that you're on your phone which
37:29
is on another that could and thing that's very
37:31
cool. So so yes I we read. A
37:33
Merkel wrote. Has been created that
37:35
me that actually conform to a tree. Yeah.
37:37
So like. If maybe
37:40
the blah freezer just. Created
37:42
three. And. Then put the route
37:44
on shame. but he didn't He hid the tree he can
37:46
be hidden. And then that's useless
37:48
because people cannot challenge it if
37:50
there is secure by for offers
37:52
or they wouldn't be able to
37:54
withdraw. Because
37:57
they can't get their Merkel past the rounds. So.
38:00
When. The contract is accepting the route
38:02
it must also. Or
38:05
when the like client more generically is accepting the
38:07
route from the role of block producer. It
38:09
must also verify that the data is
38:12
available that the rest of the tree
38:14
exist somewhere as retrievable by the users.
38:17
And so. Data. Availability is
38:19
not a storage thing, It's not
38:21
Rpc thing. It's actually this very
38:23
like nice, weird specific. Problem.
38:25
Where it's make sure that the data is
38:27
retrieval. make sure that was not withheld. Make
38:30
sure that it was available at one point in time
38:32
so that it may have been archived. It's sort of
38:34
excess, right? That a fair way to
38:36
think about it like it is a temporary holding
38:38
place for data that may need to be referenced
38:41
for a bunch of other things. Yeah
38:44
I'm so like it During of added added
38:46
the for it for for gloves face the
38:48
blocks and if you are and it's are
38:50
in full node and your download a new
38:52
block. If you you can download the blobs
38:54
and then immediately delete them that would be
38:57
fine. Because. That is verifying availability.
38:59
Use you just once check that they
39:01
were there. And then it doesn't
39:03
matter. Restore it like you're You're just
39:05
validating that they exist at all at
39:07
one point. Fresh and so. Did
39:09
availability is not considered to be
39:11
persistent storage. No. Yeah, no,
39:14
it's not block chain, regular block and
39:16
do not guarantee storage. So there is
39:18
actually nothing like. If. All
39:20
copies of. Bitcoin. Lock
39:22
number seven were deleted right now. What
39:25
would we do like? the declined is not
39:27
fargo and the coin does not guarantee it
39:30
all of it's it's true restored. We just
39:32
kind of trust that it will be stored.
39:34
Yeah, and the more scale the chain is.
39:36
The. More We have to trust that. All
39:38
the data will be archived. Yeah I
39:41
mean this is like a. Classic. Lead
39:43
to problems at a friend who is like
39:45
in the observatory team at at Sea and
39:47
and they were saying that they throw out
39:50
ninety nine Point Nine Nine Seven percent of
39:52
their lawn data is of they stored at
39:54
It was something like to petabyte the day.
39:56
Oh my God. While. And
39:58
the just there's. It it would
40:01
break the economies of. A
40:03
very centralized, very profitable company
40:05
like Etsy, let alone a
40:07
decentralized boxing. Yeah. Yeah.
40:10
So this is this is a cool thing that gnome
40:12
comes up. It's. It's starting to be.
40:15
An. Interesting like return twitter conversation which I'm
40:17
happy about. It is for while we're just
40:19
months and months of the most boring discourse
40:21
measurable in our backs are some pretty cool
40:23
stuff Think with yeah which is like now
40:26
people are like arguing about. Like.
40:29
Historical think and data availability which is which
40:31
is really interesting. A lot of the corners
40:33
still like to sing from China discuss possible
40:35
or it's a bitcoin changes not that big.
40:38
friendly you can in a couple days I
40:40
guess. sink the whole chain from Genesis where
40:42
he is on salon or a dozen. Absolutely
40:44
not possible and I'll think that's a bad
40:46
them because this is. this is actually an
40:49
inescapable trade offs. and if you want to
40:51
scale. You. Have to trade off the
40:53
boys who. Like. Think the entire. Block.
40:56
And from Genesis you can do some
40:58
cool things with precursors. Your knowledge proofs like
41:00
me know it's a mirror. you every
41:02
every block includes approve of the entire
41:04
chain and it doesn't matter of the old
41:06
blocks get deleted forever not archived lost
41:08
because you never have to trust by
41:10
the entire history the chain which is awesome.
41:13
So. That the proposition for. Data
41:16
availability of or were seen a number of
41:18
different solutions out there. They're all kept trying
41:20
to address some version of this again. layer
41:22
has their own the A product without now
41:24
plus he seems to be that the Da
41:27
layer that is your most favorite in the
41:29
theory him world. There's other ones out there
41:31
as well as other ones coming out for
41:33
set of other networks so on a has
41:36
set of a slightly different implementation of all
41:38
of this were like compression in a uses
41:40
Merkle tree, them Merkel proofs and as a
41:42
bunch of that sort unchained. But the retrieval
41:44
to a lot of that. Is. Often
41:46
on the Rpc layer, although it can
41:48
be all reconstructed from the data and
41:51
sane. But oh. Over the
41:53
long term. Like what is the role
41:55
that data availability players? Because I think
41:57
hearing you describe it here. In
42:00
consider think it's kind of a race to the
42:02
bottom. Market where it's like a
42:04
we just need somewhere to put the stuff. That.
42:06
For retrievable for fourteen days or something
42:08
like that, but there's obviously a much
42:10
bigger vision for what Solas the I
42:13
can be for the next year's of
42:15
block chain. Oh yeah, so.
42:17
The. Example Retard two Hours Eclipse which
42:19
isn't a theory Email to useless is
42:21
yeah yeah and all the top users
42:24
this less the are currently three more.
42:26
Juice and Out see the data availability
42:28
for through email. Choose. Aura.
42:30
A religious anywhere that settled somewhere. Besides.
42:33
Last year is. Kind of a
42:35
race of on commodity. that's pretty true
42:37
for that use case. Now there's other
42:39
ways useless to a it. Where.
42:41
The specific first you block space
42:43
is important to what you're doing.
42:46
And. Is not a community. But.
42:49
For serving it's like else using this way
42:51
where you have like an adaptation from the
42:53
D A layer as a criteria for the
42:56
and yeah my clients exception to bash is
42:58
like you want one that has a high
43:00
cost of attack or high budget of attack.
43:03
And. Besides, like that. besides like how
43:05
securities the next thing you care about is how
43:07
low the Bruce. Sir.
43:10
Like. If. You have celeste year
43:12
was just maybe charging like a one cent
43:14
and then like a fork of the last
43:16
year with like a really low market cap.
43:18
Yeah you might spring for the premium because
43:21
the more sense of one is less likely
43:23
to be attacked. So. What
43:25
is an attack like? And a d A Liar. I.
43:27
Think we know what does look like on proof of work
43:29
that works when they look like and prefer sake. What?
43:32
Is like I guess. Maybe. That we can
43:34
take a step back. What is security model that A
43:36
D A layer needs to be worried about and then
43:39
what is the attack vector Their their shit. So again
43:41
it depends on how using it. So if you build
43:43
with called a sovereign roll up on first year. That.
43:46
It's completely restless and are the only attack
43:48
against that the could possibly happen is alive.
43:50
This failure from Allen. But if
43:52
you're using first year as the a four
43:55
and a through email to what could happen
43:57
is a majority attack on fullest year like
43:59
a two thirds militias take on first year.
44:01
Collude. With a sequencer. And
44:04
then you would have are optimistic. Grow up.
44:07
They. Could see all these response because what could
44:09
happen is. The sequencer
44:11
produces a invalid say transition.
44:13
And then data is withheld. But.
44:16
The validators on plus your lion say
44:18
the data wasn't withheld and. Frog.
44:21
Who's can be prevented prevented? So
44:23
the. Sequencer. Would be able
44:25
to steal the entire phones off. The role of
44:27
bridge A right? If of course it's like a
44:29
mature officer grow up where fraud, truth, and yeah
44:32
are actually the. On strongest trust
44:34
assumption the chance, right which right now they're
44:36
quite far from. It's. Quite far from being
44:38
that the caisson. On the. Popular.
44:41
Else who's. Yeah. I. It's
44:43
a There's one last topic I want
44:45
to talk about, which I think is
44:47
one of the reasons we started the
44:50
I'm In Back and Forth original and
44:52
which was you tweeted something to the
44:54
effect of. I think program ability
44:56
and blocked in the might have than a mistake.
44:59
And just programmability as look on the interested
45:01
in box and I was one of the
45:03
people of the bitcoin and said this might
45:05
be for the bunker boys but this is
45:07
an interesting to me because at the end
45:09
of the day like nuclear war resistant money
45:11
like at I feel like I'm probably not
45:13
gonna last out the war. So what I
45:15
care about the money after the war. Is
45:19
her for me the pro. The ideas,
45:21
smart contracts is what got me into
45:23
Block Ten. Originally this is how I
45:25
started working on some projects, building a
45:27
nice and twenty seventeen and that piece.
45:30
Has been was kept the me and what's
45:32
kept me hopeful about the space and we
45:34
can build trust plus computing environments that can
45:36
execute any code and this sort of ah
45:39
idea of an unseen program especially salon as
45:41
model where anyone can hit data up to
45:43
a non chain program that on in program
45:45
does a known saying and outputs a new
45:48
and value and that is just an incredible
45:50
force for good. In. The world,
45:52
but you are such as saying that
45:54
programmability is also it's of the the
45:56
one reason people lose money, it is
45:59
the source. As well,
46:01
so I wanted to have a little bit
46:03
more of that conversation live with you and
46:05
get get your thoughts on on programmability. I'm.
46:08
Sure sir like are not answer app
46:10
improve our. Armed. But the thing
46:12
that is why also like this is. A.
46:14
Modern era. This kind of like workshop in the
46:17
idea on twitter and and soon as they'll they'll
46:19
yet but us. So. Like
46:21
very pro Our farm. I love all
46:23
the great apps that exist in have
46:26
been built a Smart Contracts put. The
46:28
scary thing is these deterministic virtual machines
46:30
that the block chains run which are
46:33
really unforgiving and so if there's a
46:35
problem in the code for Smart contract.
46:38
People's phones will be loss. And
46:41
all the active and execution clients fired.
46:43
Answer Slow. Are. On
46:46
a Theory Death Wrath. Oh nevermind.
46:49
They. Would all exits you the hack the same
46:51
way and on all the clients all the.
46:54
Fun! To be loss and huge it's just
46:56
with him has happened many times like billions
46:58
of been lost. Yeah, smart contract exploits. Ah,
47:01
but like every app that runs
47:03
as a Smart contract. You.
47:05
Could just take it out of the smart contract vm
47:07
and make it part of the I want So. And
47:10
once per the own. So. It
47:12
gets implemented in execution clients and so
47:15
like on a theory and would have
47:17
thought of have limitations from like Guess
47:19
Reznor, Mind or Besser. Yeah. And
47:21
if they ever diverse we would
47:23
catch it very quickly and were
47:26
were a lot better at. Catching.
47:28
Diverging client behavior than smart contracts bugs.
47:30
It's funds don't really get lost when
47:32
clients divers. We kind of just start
47:35
the chain and say hey guys, there's
47:37
something was under specified or there's a
47:39
bug in a client Were like sort
47:41
this out and. A
47:43
worse quite well and I really like that. And
47:46
then so of course you lose the ability to
47:48
eat. Or it's a lose the ability to just.
47:50
Run nap on May Net. Fan. Just
47:52
like trial, your app and launcher and all that. But.
47:55
Like. Or. Other really that many
47:57
apps like it seems like. Every.
48:00
It is building a new decks. everybody's building
48:02
a new lending protocol every building new perps
48:04
originally new F T's and it's really much
48:06
much of the same thing So I wonder
48:08
like maybe we should stop. Just
48:10
rebuilding the same things over over again. We
48:12
should just like have an open source Dexter
48:14
we all like work on. And.
48:16
It's part of l One and a can ever act. Of
48:19
yet of like the the the thesis
48:21
that I'm I'm toying with here. yeah
48:23
I mean you know blood. It is
48:25
a system where we start enshrining core
48:27
applications into the core code. The. Validators
48:29
get a bit heavier to run that Maybe
48:31
that's an appropriate trade off. We. Decide
48:33
to run Committee structure is to cigarette
48:35
who can build code for these systems.
48:37
Make sure it's secure. We have any
48:39
more meetings, everyone votes and those systems
48:42
there now housed in several data centers
48:44
and a just you know I am
48:46
I being facetious hear me is very
48:48
quickly. we get to Hsbc and the
48:50
Federal Reserve. right? Yeah, we
48:52
wish we did. We do, because
48:54
they're the it. The minute we
48:56
start saying that we're going to
48:58
move applications out of the permissionless
49:01
layer into the permissions layer. the
49:03
cost of Innovation skyrockets because now
49:05
suddenly have to pay. Seven.
49:07
Teams to implement you to swap. And.
49:09
The validators get heavier. Potentially.
49:11
To because they now have to be handling the
49:14
more they're not just handling execution in there. Handling
49:16
in grass have a lot of work. And
49:18
I just you know I am joking about
49:21
but like a i think what I'm worried
49:23
about is that puts us on. A
49:25
path. To making the
49:28
cost of starting something on
49:30
box seen. As high as
49:32
the cost of starting something as become and
49:34
web two or higher right leg If you
49:36
want to do something that touches money. In.
49:39
The United States you have to raise two million
49:41
dollars. You need Mtl in every state you need.
49:43
you know, x or y and Z You need
49:45
agreements, a credit card, profit companies in it and
49:48
game like the it is a. It
49:50
is a very long process. If.
49:52
You don't want to outsource and you service
49:54
prayers for every component. Actually started
49:56
a new business and this is why there's
49:59
like three clearing. In.
50:01
The United States and like, that's it. And
50:03
that's why there is functionally three companies
50:05
that process all the credit card payments
50:07
like. Like. It becomes a consolidation
50:09
boat and these industries become protected of the
50:11
same way. It's it's it's You know. the
50:13
classic thing where if you know anyone who's
50:15
ever tried to build a company that selling
50:18
a product the Us government. Sixty.
50:20
Three years to get qualified to
50:22
sell something to the government. And.
50:24
When i when i worry about his be
50:26
be building very similar systems. Where
50:29
the entry barrier become so high
50:31
that the Protocol development team this
50:33
at these clients become gatekeepers to
50:35
the execution of our men as
50:37
opposed to being. You know
50:40
that the more appropriate gatekeepers adding new features
50:42
to the L one like they are today?
50:44
Well I mean like. You
50:47
said that the Via I'm is
50:50
the permissionless layer and the A
50:52
one is permissions. I don't agree
50:54
that it slip permission, but. It.
50:57
Is more tightly controlled by. You.
51:00
Eat like the for example if you want to add a core
51:02
new feature to a theory and. You. Have
51:04
to get a lot of people to agree with
51:06
you. this isn't good to add and then you
51:09
need a lot of engineering teams to actually implement
51:11
that feature. This. Is part of why Stuff
51:13
takes a long time to build on the theory and
51:15
is because. There's. A lot of stakeholders
51:17
involved if I want to go launched
51:19
in nude beach and mean coin. On
51:22
a theory am. I don't have to talk any
51:24
one and only to talk to any committee. I just. Submit.
51:27
Code to the chain and you know the
51:29
chances of catching on are very low, but
51:31
the barrier to deployment is functionally zero. Or
51:34
it's it's some East Yeah it is certainly
51:36
very easy to launch mean coins and other
51:38
like the things that earth. Maybe
51:40
not. are you know my i'm not
51:43
an hundred and ninety them include. or
51:45
maybe the fact that I wrote like
51:47
a Totally Buggies cameo like broken Ducks
51:49
and Ship with a Minute and A
51:51
give you points but then they all
51:53
your house because I never gone. Did
51:55
an M B a complete scam or
51:57
is like maybe not so great? Maybe.
52:00
The American Dream. Oh. Yeah
52:03
I did. you move your a movie does the Americans
52:05
are? I mean I write a lot or how drax
52:07
and like I have i have shuttle i think this
52:10
way so I mean again I'm I'm kind of like
52:12
yeah matthew around but like. I
52:14
think if you're if the fisher you
52:16
on as they are one is like
52:18
really popular so like for example say
52:20
through doesn't try to decks and you're
52:22
like the and we we're a bunch
52:25
of mass economics or geniuses and we
52:27
wrote this academic paper but like the
52:29
best optimal ducks. And you implement
52:31
it. And you your thing is
52:33
popular and everybody wants that it probably would
52:35
like end up getting in there do things
52:37
are not like. He i
52:39
in practice the the dev teams who work on
52:42
all the clients are like. Entity.
52:44
That get funded officer officer grants or
52:46
maybe through some kind of business model.
52:48
But legs open source software in general
52:50
isn't. Doesn't. Have to be.
52:52
There were a lot of. Open source
52:55
software is kind of volunteer base
52:57
yes and like. Blocks.
52:59
And started out more like that at
53:01
first. Now now almost everyone who's been
53:03
working on blocking says like full time
53:06
start up with funding didn't used to
53:08
be that way and so like. I'm.
53:11
Sort of sort of like. You're
53:13
thinking of the old way a little bit.
53:16
Too. Much. Of our and
53:18
so like yeah, I'm indefinite I think like. If
53:21
you except for the new like. Regime.
53:24
Of protocols are start ups than. I
53:26
think you're probably right to the Vm, but like
53:29
I am also. Cosmos
53:31
apps and they're all. all the apps are in front
53:33
of L One. like the Terror Stable one was part
53:35
of L One and it could have had different clients
53:37
that all we're. Implementing
53:40
it unlike you never would have had to worry
53:42
about a bug in that lead into lots of
53:44
funds and services. The Magnus. right? Org
53:46
was also try and l one which I
53:48
think is awesome. I love yet if there's
53:50
a lot of good arguments here that say
53:53
for we eliminated as execution risk and now
53:55
it. This is a similar argument to formal
53:57
verification right? That formal verification doesn't prove. Your.
54:00
Design is correct, but it proves that you
54:02
built the thing correctly. Yeah, I'm
54:05
on your to. I'm also pretty pretty bullish
54:07
on from a verification of ended at nowadays
54:09
it used to be really trendy inbox routinely
54:11
to Eighty Nine and. He. Saw like
54:13
I think maker dow you to
54:16
swap. And. The A Theory and
54:18
be contained deposit raw of formerly verified
54:20
smart contracts and was really expensive. I
54:22
think it's ugly. Two years for the
54:24
maker, no verification thing. now deceased and
54:27
so people. People. Don't
54:29
on from verification. I and I've talked to
54:31
the it's great thuds the three. As for
54:33
my family I was which is awesome but
54:36
I've met the founder of Runtime Verification which
54:38
is the company that did on a surf
54:40
and like he's working on a bunch of
54:43
stuff like improve the process and also think
54:45
like Mr Lab they did the. Likes.
54:48
Of the move, Prove or you can
54:50
I guess like they're probably a mean if
54:52
you don't actually know how to do
54:54
for verification it's probably like bad. If
54:56
do they have this tool that you think
54:58
is formal verification of actually are still
55:00
running insecure contracts and you just are running
55:02
this tool sir. I U S C
55:04
A formal verification is not some magic bullet.
55:07
It doesn't prevent you from designing bad
55:09
systems. Maybe the path to like freezing
55:11
out is through else you contracts is through
55:13
for verification as you're probably five years
55:15
away. But like not not like science fiction.
55:17
The way some people talk about. Not like
55:19
built and seek a purpose. That. Is
55:22
that seems like Sakara Me? I mean there's some.
55:24
there's some really cool like hardware based the taste
55:26
of that like all the time is working on.
55:28
yeah see that. but I sort of. I mean
55:30
like we don't have anything goes real hum proving
55:33
at right now today. Who
55:35
knows though, we really cool down. I. Mean,
55:37
this is one of the things that
55:40
I I love about this had a
55:42
systems as you can never sat that
55:44
never bet against hardware getting faster and
55:46
cheaper every year and then these unexpected
55:49
waterfall moments of software innovation. Yeah
55:51
and if you get if you look
55:53
into like the high performance ck space
55:55
like for example the plenty to in
55:58
the punky three. Community.
56:01
There like thinking about software in the
56:03
same way that the foreign answer team
56:05
does. They're thinking about like every single
56:07
instruction, every single cycle, not just in
56:09
the proving systems themselves which they do
56:11
but also in like with the caveat
56:13
hims ah for example like the new
56:15
as to one K B M or
56:17
with riskier. Ah, you
56:20
actually are like looking at every single cycle
56:22
of your program they are trying to prove
56:24
and you're doing Florida answer shit the like
56:26
dog remove unnecessary instructions and all that and
56:28
it's covert similar way of thinking because it's
56:30
like. We're. Just trying to like. Get.
56:32
And much prove a performance as possible. And it's
56:34
it's. So. Slow unless
56:36
you do this and a. Fluff.
56:39
On behalf. Of a lot
56:41
I think that's as get a place to and
56:43
as anywhere yet. Some. Guy thank you
56:45
for coming on the set the are they for
56:47
having me as a present This project. Validated
56:55
is produced by Gray Bell I with
56:57
help from Raw Skill and Brand an
56:59
Actor and they're a volley Arnie and
57:01
Ainslie Medford Engineering by Tyler Moore said.
Podchaser is the ultimate destination for podcast data, search, and discovery. Learn More