On the surface, @0xMiden uses a mature ZK toolchain,
but its true barrier is not in cryptography itself.
What is difficult to replicate is the path it has taken from the very beginning, centered around "provable execution" reverse designing virtual machines, instruction sets, and account models.
This means it is not simply "plugging in ZK" onto an existing execution model, but rather making ZK a prerequisite for the execution model.
Once this choice is made, it is difficult to adjust midway, which also explains why this route seems to progress slowly but has a complete structure.
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
On the surface, @0xMiden uses a mature ZK toolchain,
but its true barrier is not in cryptography itself.
What is difficult to replicate is the path it has taken from the very beginning, centered around "provable execution"
reverse designing virtual machines, instruction sets, and account models.
This means it is not simply "plugging in ZK" onto an existing execution model,
but rather making ZK a prerequisite for the execution model.
Once this choice is made, it is difficult to adjust midway,
which also explains why this route seems to progress slowly but has a complete structure.