Oasis Network headlines ETHDam!
Meet ETHDam's Battleship Partner, Oasis Network! Dive into their consensus mechanism, tokenomics and their privacy solution using TEE (Trusted Execution Environment).
Privacy-First ✊
During ETHDam we will shine light on the importance of privacy as a crucial element in upholding individual rights and fostering trust in society, while promoting a healthy and vibrant community. Privacy at its core is fundamental to the functioning of democratic societies, the protection of human dignity, and paramount in the fight against the rise of authoritarianism.
ETHDam will bring together various privacy builders that have different takes on privacy, from their ideology to their tech stack. We will do our best to share, learn and understand with you the details of how we can implement privacy in crypto.
Meet Oasis, our Battleship Partner! 🚢
We are delighted to announce and welcome Oasis Network , as our Battleship partner for our 2nd edition of ETHDam! You will be able to enjoy their talks and workshops during the conference, discover the tech and hack using Oasis Sapphire, the first and only confidential EVM in production, all the while engaging with their team at their booth.
“We’re working side by side with L1 and L2 EVM chains and Dapps to equip Web3 with the best privacy-preserving technology, from native applications running on Oasis Sapphire to plug&play solutions adopting the Oasis Privacy Layer (OPL).“ Jernej Kos, director at the Oasis Protocol Foundation
Deep Dive into Oasis
Oasis is a Layer 1 privacy-first proof-of-stake network, providing EVM chains with smart privacy capabilities —> Whitepaper
The Consensus Layer is a scalable, high-throughput, secure, proof-of-stake consensus run by a decentralized set of validator nodes.
The ParaTime Layer hosts many parallel runtimes, each representing a replicated compute environment with shared state. The Separation of consensus and execution layers allows multiple ParaTimes to process transactions in parallel.
Tokenomics- ROSE 🌹
Supply: The ROSE native token has a capped supply fixed at 10 billion tokens.
Token utility: The ROSE token is used for transaction fees, staking, and delegation at the Consensus Layer.
What is their privacy solution?
It starts with a TEE (Trusted Execution Environment)
In a confidential ParaTime, nodes are required to use a type of secure computing technology called a TEE (Trusted Execution Environment).
TEEs act as a hypothetical black box for smart contract execution in a confidential ParaTime. This process ensures that data remains confidential, and is never leaked to the node operator or application developer.
When the EVM is run inside a TEE - in the case of Oasis Sapphire this is Intel SGX hardware isolation - the node operators cannot see transaction inputs, return values or smart contract state because all memory used by the enclave is encrypted.
The EVM runs at nearly full speed in comparison to other privacy solutions such as ZK or FHE which are very computationally expensive.
The Oasis Sapphire ParaTime
Oasis Sapphire is the first and only confidential EVM in production today, providing a smart contract development environment on the Oasis Network. Enabling developers to build EVM-based on-chain dApps with smart contracts that are 100% confidential, 100% public, or anywhere in between.. —> Github
The Oasis Privacy Layer (OPL)
OPL is a cross-chain EVM-compatible privacy solution, bridging from host networks (like Ethereum, BNB Chain, and Polygon) and the Oasis Sapphire network via messaging bridges and relaying infrastructure, opening new frontiers for confidential smart contracts in Web3 applications. —> Docs
Contracts deployed on the Sapphire runtime through OPL sign their own transactions. For any Web3 developers, this ability serves as an efficient, easily integrable alternative to Ethereum’s Gas Station Network (GSN), ERC 2771 and ERC 4337.
In short, OPL allows the privacy features of Sapphire to be accessed on any host chain while paying gas with the host chain token without migrating the dApp and its users to Oasis.
OPL allows developers to generate and sign Ethereum-compatible addresses and signatures. Using OPL brings end-to-end encryption for all contracts, transaction and signatures.
Developers can customize the level of privacy used in their contracts, instead of architecting complex solutions for varying levels of data loads with zero knowledge-based privacy tools, OPL makes privacy simple for all types of contract data.
A simple plug-and-play cross-chain privacy solution
Native privacy features vary greatly across public blockchains, OPL is designed to be the privacy layer that solves these discrepancies for all of Web3 with portable privacy accessible wherever dApps are deployed.
Using OPL gives developers access to Sapphire contracts with private storage for their own secrets.
Using the Encryption, Decryption and Key Derivation precompiles, builders can be assured that information passing through third-parties remains secure and tamper-free.
Use Cases and Hackathon Ideas 👀
1. Secret Ballots
All voting has a traditional element of confidentiality and privacy, but the fully transparent nature of most public blockchains with this same secrecy is often not possible.
Using OPL to access the confidentiality of Sapphire enables fair voting and eliminates bias from DAO governance through secret ballots. Any voting scheme built on another EVM host network can be quickly ported to Sapphire within minutes for exponentially greater and more flexible secrecy features.
2. Confidential Auctions
Popular NFT mints and actions can attract thousands of excited participants attempting to secure a collectible all at the same time. The ensuing “gas wars” lead to exorbitant fees without the guarantee of successfully minting or winning the desired collectible at all. Adding confidentiality to the auction mechanisms can radically decrease congestion, reduce gas fees and streamline the fairness of the entire collectible disbursement process.
Using OPL to access privacy features on Sapphire, NFT creators can create sophisticated auction mechanisms that closely resemble traditional auctions, including sealed bid second price, VCG, candle auctions and more.
3. Private Game Logic
Privacy and confidentiality are often essential to any compelling game. Card games, strategy games, puzzles, quests and many other experiences require secrecy and hidden information. Most Web3 games are required to integrate off-chain solutions for their privacy requirements, even though a fully crypto-native experience is the goal.
Gaming projects can use OPL to support confidential gaming logic and keep everything on-chain. An example of this is Wordleish, a simple blockchain-based demo game inspired by the highly popular Wordle and deployed on Sapphire. Any game deployed on an EVM host network can deploy contracts that execute parts of the game requiring privacy on Sapphire through OPL without migrating the entire game away from its host chain.
Roses and Privacy: A Historical Duo for Centuries
Throughout the history of roses and privacy, one of the most prominent ideological ties comes from Hellenistic and Roman mythology.
According to the legends, Harpocrates, the god of silence, secrets, and confidentiality, received a rose from Cupid. This gesture was intended to keep hidden the indiscretions of Venus, Cupid’s mother. Another myth tells a similar story of Aphrodite giving a rose to her son Eros who in turn also gave it to Harpocrates to ensure that misbehavior of the gods was kept secret.
This is where the Latin phrase sub rosa originates from, keeping Venus’ and the gods’ affairs a secret. “Sint vera vel ficta, taceantur sub rosa dicta,” which translates to: “Whether true or made up, let words spoken under the rose remain secret.”
Excited to join ETHDam, but you don’t have a ticket yet? Get your early Shrimp ticket now, before we jump to Dolphin. The first 10 users, to use the code “subrosa” will enjoy a 20% discount. 🌹🎫
The Road to ETHDam
Pre ETHDam event - ONLINE - 15th of March - RSVP
Get to know other hackers, start teambuilding and get to know our hackathon partners. 🤗
ETHDam Oasis Workshop - ONLINE - 5th of April - RSVP
Learn how to use their protocol, products and tools to make the most out of the hackathon.
Hackathon Speed Dating - IRL - 12th of April
Last moment to form a team, get a project going before we officially launch the hackathon at noon.
Everything else you might need!
Are you a hacker? Then you don’t need a ticket, but you will need to apply to hack via Taikai.
Not hacking and you still want all the alpha? Purchase your Early Shrimp ticket now, only available until the end of January. Use the discount code "alphareader” for a 10% discount. 🦐
Start connecting with fellow hackers, mentors and discover more from our hackathon partners on Discord.
You are a wise teacher, eager to share your knowledge with our hacking teams? then apply to become a Mentor.
Want to host a side event? Check the rest of the agenda, and list your own Side Event.
You work in Privacy and Security and want to share your knowledge, join a panel? Then head to our Speaking application form.
You know we host the best event in town? You want to be seen, grow and get involved? Then apply to Partner - cut off date 1st of March.
You live in the Netherlands, you love crypto and you want some backstage experience, and join the fun? Then apply to be a volunteer, and help us shape this event!