Market players agree at least in one thing: in crypto now occurring hidden processes of power accumulation. Projects from the Coinstelegram Club confirm this diagnosis.
Super Stable Ledger? Perl will provide it
After several months of silence, the Perlin team consider to reassure the community, declaring what it is going along. It turned out to be very serious, boring, but important things. Talk about a new, stabilized version of Avalanche Consensus being applied in constructing an open, permissionless ledger. The team stated:
– We have devised a new open, permissionless ledger which addresses the research and development work we have done at Perlin to producing an improved variant of Avalanche: Wavelet. These enhancements tackle a large number of practicality/safety concerns which come from translating Avalanche from a purely academic work to a real-world solution that is usable by developers.
The original purpose of Avalanche was to create a consensus protocol for a new cryptocurrency that was sufficiently scalable to be a store-of-value. The team adds: “We at Perlin understand however that further development is required with Avalanche in terms of both security and implementation. With the introduction of Wavelet, we aim to solve these critical issues. The team is working day-by-day with a ton of exciting results which we just can’t wait to share with the community!”
By the way, this information does not negate the previous Coinstelegram Alerts information about, perhaps, Perlin’s merge with Google. Giant loves getting everything ready.
COVA: Deep Dive into Security
As we know privacy is the key in COVA development. And by October the team announced how deep it dives in the theme. To say truth – deep indeed. They say:
– At Covalent, we have already implemented remotely attestable TEE. In addition, we are using MPC based threshold encryption for doing only the most security critical parts — the data encryption-key storage and retrieval.
What are all these abbreviations about? Shortly – sorts of solutions for protecting privacy: homomorphic encryption (FHE) or multi party computation (MPC). And the team claims – they go further, while aggregating the TEEs in a network and then putting innovation in the form of software and usage policy to enable trusted computing. (SGX TEE is a technology created and distributed by Intel. Software Guard Extensions designed to be useful for implementing secure remote computation, secure web browsing, and digital rights management).
What to add? Bravo!