Skip to content

Instantly share code, notes, and snippets.

View aruokhai's full-sized avatar
🦍
Building On Bitcoin

Aruokhai Joshua aruokhai

🦍
Building On Bitcoin
View GitHub Profile
I have an idea of using Ark for Escrow related services. ( I am thinking about it )
The idea lies in the finality of sweep and unilateral exit.
@aruokhai
aruokhai / arkuximprovment.md
Last active January 20, 2025 14:59
Ark UX Improvement: Binary Forest Replaces Binary Tree

Objectives

The Ark Protocol, a very splendid UTXO based Bitcoin OffChain Protocol, in its current non-convenant iteration, is presently faced with some not so splendid UX Flaws. These Flaws are categorized into two:

Liquidity Flaw (Short Sweep Duration):

In cases where a premature sweep is conducted using the linear properties of Schnorr signatures, the recovered liquidity from such a sweep remains dependent on the transaction frequency of users and the depth of the Ark tree, given that a binary tree structure is employed. A proposed solution by JoΓ£o Bordalo involves utilizing a splitting function for VTXOs based on a predefined ratio. Building on this idea, I suggest a more dynamic splitting approach that accounts for the average transaction size. This adjustment could better optimize the protocol by reducing both the cost of unilateral exits and the overall size of the Ark tree. Regardless of the specific approach taken, a reduction in liquidity requirements is likely to result.

Reliabi

@aruokhai
aruokhai / Arkissue.md
Last active November 26, 2024 15:29
Ark Liquidity Issue Fix

Ark Liquidity Lock Fix

The unresolved issue of liquidity lock requirements must be addressed before the Ark protocol can be deemed ready for public deployment. This issue pertains specifically to the mechanics of spending outputs within the Ark protocol, which directly impact its scalability and efficiency in managing off-chain transactions.

In the Ark Protocol, a timelock is imposed on non-leaf transactions, allowing the Ark Server to reclaim the associated outputs once the timelock expires. However, this timelock mechanism significantly amplifies the Ark Server's liquidity requirements, as it necessitates maintaining locked funds over extended periods, thereby impacting the system's overall capital efficiency.

To address this issue, I propose utilizing a multi-key address scheme analogous to the structure employed in Silent Payments. This approach not only mitigates the liquidity challenges but also introduces the added advantage of enabling Ark Providers to reorganize and group transactions based on

@aruokhai
aruokhai / gist:796adfc5317dc76a0c33cf167ebd6f44
Created August 4, 2024 16:06 — forked from rxaviers/gist:7360908
Complete list of github markdown emoji markup

People

:bowtie: :bowtie: πŸ˜„ :smile: πŸ˜† :laughing:
😊 :blush: πŸ˜ƒ :smiley: ☺️ :relaxed:
😏 :smirk: 😍 :heart_eyes: 😘 :kissing_heart:
😚 :kissing_closed_eyes: 😳 :flushed: 😌 :relieved:
πŸ˜† :satisfied: 😁 :grin: πŸ˜‰ :wink:
😜 :stuck_out_tongue_winking_eye: 😝 :stuck_out_tongue_closed_eyes: πŸ˜€ :grinning:
πŸ˜— :kissing: πŸ˜™ :kissing_smiling_eyes: πŸ˜› :stuck_out_tongue:
@aruokhai
aruokhai / gist:3eb008757cbaafa2a0723e9bdd810683
Created August 4, 2024 16:06 — forked from rxaviers/gist:7360908
Complete list of github markdown emoji markup

People

:bowtie: :bowtie: πŸ˜„ :smile: πŸ˜† :laughing:
😊 :blush: πŸ˜ƒ :smiley: ☺️ :relaxed:
😏 :smirk: 😍 :heart_eyes: 😘 :kissing_heart:
😚 :kissing_closed_eyes: 😳 :flushed: 😌 :relieved:
πŸ˜† :satisfied: 😁 :grin: πŸ˜‰ :wink:
😜 :stuck_out_tongue_winking_eye: 😝 :stuck_out_tongue_closed_eyes: πŸ˜€ :grinning:
πŸ˜— :kissing: πŸ˜™ :kissing_smiling_eyes: πŸ˜› :stuck_out_tongue:
@aruokhai
aruokhai / gist:6d2d3155b2b8f6fb957687d800133c65
Last active May 1, 2024 15:25
Watchtower Accountability Accumulators
**Problem**
The Current Iteration Of The Watchtower Specification (Bolt 13 Draft), makes use of signatures for accountability purpose. While appropriate for this usecase, it is frought with very perculiar problems, which spans but not limited to
1) The linear storage cost growth of message and Signatures in respective to appointments O(n), client must store both message and data [Client Problem].
2) The inability of Towers to fully delete Appointments, its Signature must live on , due to non zero probability of rufuting claims in the future. [Tower Problem]
3) In the advent of a breach that wasn't dealt with, there is a chance of Client not being able to prove because the lose of data.
**Solution**
The usage of accumulators would prove to solve the problems caused by signatures, but there are some design goals, such constaints should adhere.