Many of the riskiest dApps on Ethereum today share the same fatal flaw: they rely on a broken and unprotected transaction system. Whether it's NFT drops, token launches, Web3 games, or betting platforms, unprotected dApps are getting hijacked by bots, insiders, and high-rollers.
We are excited to announce the release of "The Road Towards a Distributed Encrypted Mempool on Ethereum," a white paper that outlines an essential advancement in Ethereum's transaction infrastructure.
This research is now available on the Ethresearch forum and presents a structured roadmap for implementing threshold
The Lunar New Year is a time for celebration, family, and the exchange of good wishes—often in the form of hongbao, traditional red envelopes containing money.
Shutter Hongbao is a playful experiment that blends this tradition with modern cryptographic technology. While still in its early stages and not yet
The Shutter commit-reveal mechanism was initially designed to prevent malicious MEV and censorship issues, which remains the primary focus. However, beyond these applications, it also has wide-ranging applications in fields that require secure and fair information handling and combating information asymmetries. Its unique properties and decentralized structure make it suitable
Today, we're excited to announce Shutter Governance, a tool for governance platforms to introduce shielded voting for their users. It uses threshold encryption and is designed to fix issues with misbehavior, voter apathy, and voting incentive systems.
Combating front running and malicious Maximal Extractable Value (MEV) remains our
In the previous blog post, I explained some basics about maximal extractable value (MEV), Ethereum transactions, and the mempool. In that post, you learned how miners could manipulate transactions. In this blog post, I'll walk you through three different types of front running attacks.
It is not the
Blog post series about MEV for beginners.
This MEV explainer series for beginners serves you and the crypto community to dive into the "dark forest" of the maximal (formerly known as miner) extractable value (MEV) world and hopefully lighten up or refresh your knowledge about the entire problem
5 min read
Subscribe to Shutter Blog newsletter and stay updated.
Don't miss anything. Get all the latest posts delivered straight to your inbox. It's free!