<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: DC</title>
    <description>The latest articles on DEV Community by DC (@dc600).</description>
    <link>https://dev.to/dc600</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2900291%2F39cae2b5-c4d4-436f-a982-cad67f3b24ae.jpg</url>
      <title>DEV Community: DC</title>
      <link>https://dev.to/dc600</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/dc600"/>
    <language>en</language>
    <item>
      <title>Agentic Economy With x402 Gets A Boost From ROFL's Verifiable, Private Compute Layer</title>
      <dc:creator>DC</dc:creator>
      <pubDate>Mon, 23 Mar 2026 06:15:16 +0000</pubDate>
      <link>https://dev.to/dc600/agentic-economy-with-x402-gets-a-boost-from-rofls-verifiable-private-compute-layer-fdf</link>
      <guid>https://dev.to/dc600/agentic-economy-with-x402-gets-a-boost-from-rofls-verifiable-private-compute-layer-fdf</guid>
      <description>&lt;p&gt;Autonomous AI agents can do a lot of things, but for a long time, internet-native payments were out of their purview. So, when I first learned about x402, I was intrigued by the possibilities. But the privacy-first blockchain, Oasis, raises an important question: Is the agentic economy adequately addressing verifiable privacy? &lt;/p&gt;

&lt;p&gt;In this piece, I will explore x402, the value added by ERC-8004 in this context, as the standard for agent discovery, and the role Oasis's expertise in offering verifiable privacy with off-chain compute and on-chain trust can play.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;x402 101&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Let's start with some context. x402 is not a recent discovery related to web3 or AI. It pre-dates even the privacy narrative, going back to those days when the internet (also known as web2 in web3 terminology) was still using "HTTP" rather than "HTTPS". The code 402 simply designated 'payment required'.&lt;/p&gt;

&lt;p&gt;The code was a stepping stone to internet-native payments, heralding a future in which servers could charge per request. But as long as online payment was not viable beyond theoretical discourse, this remained practically unused.&lt;/p&gt;

&lt;p&gt;How does web3 fit in this conversation? The answer lies in what web3 made possible. Stablecoins, sub-second settlement, no chargebacks, and scalable blockchain protocols have become quite the norm. This is when HTTP 402 can evolve into x402. This ensures an open standard, enabling web2's request-response loop and allowing any service to charge for API or content access over HTTP. &lt;br&gt;
Result: zero dependency on traditional accounts, sessions, or credentials. &lt;/p&gt;

&lt;p&gt;It is interesting to note how awareness of x402 emerged in the cryptoAI space. It was triggered as a &lt;strong&gt;&lt;a href="https://oasis.net/blog/erc-8004-trustless-agents" rel="noopener noreferrer"&gt;ERC-8004&lt;/a&gt;&lt;/strong&gt; utility. There is a close correlation between x402 and ERC-8004, enabling autonomous agents to trustlessly discover and transact. I will revisit this later.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;x402 Functionality&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;So, how does x402 work? You start with a human/agent client, a server with the desired resource, and a facilitator (infra for payments). The following steps then unfold.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;A request is made to a server, which could be anything, such as an API call or a piece of content&lt;/li&gt;
&lt;li&gt;This resource needs to be paid for&lt;/li&gt;
&lt;li&gt;The server responds with an HTTP 402 code&lt;/li&gt;
&lt;li&gt;The code comes with payment instructions, specifying the token type, the amount, the network, and the destination address&lt;/li&gt;
&lt;li&gt;The client-side wallet reads the 402 response and generates a signature authorizing the payment&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;The variation in this process would depend on whether the client is human or an agent.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;If human, a pre-programmed policy in the wallet's smart contract can eliminate the need for manual signature steps.&lt;/li&gt;
&lt;li&gt;If an agent, a pre-programmed policy in the wallet's smart contract can ensure that pre-set limits and rules are obeyed.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;An overview of the process flow (source: &lt;a href="https://docs.cdp.coinbase.com/x402/core-concepts/how-it-works):" rel="noopener noreferrer"&gt;https://docs.cdp.coinbase.com/x402/core-concepts/how-it-works):&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyv2r9aaqdb0w43v6e41q.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyv2r9aaqdb0w43v6e41q.png" alt=" " width="800" height="462"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Key Takeaways&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Signature uses the &lt;strong&gt;transferWithAuthorization&lt;/strong&gt; function (&lt;a href="https://eips.ethereum.org/EIPS/eip-3009" rel="noopener noreferrer"&gt;EIP-3009&lt;/a&gt;). This means the client doesn't need to manage gas and private keys. This permission transaction, combined with a facilitator, enables seamless client sign-off on the transfer. Since anyone can submit it to the blockchain, the facilitator plays that role here.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The client's signed payment goes back to the server. There are a few steps before trust is established. First, the signature is forwarded to the facilitator's &lt;strong&gt;/verify&lt;/strong&gt; endpoint. Then, the signature's legitimacy is authenticated. Next, the facilitator's &lt;strong&gt;/settle&lt;/strong&gt; endpoint executes payment transfer. Finally, with all these steps complete, the server responds to the client's resource request.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;This entire sequence of events occurs within a second or less with x402, ensuring smooth, composable payments. For the client, it is a simple HTTP code; for the agent, it is another API call.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;x402 In Practice&lt;/strong&gt;
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Universal design -&amp;gt; seamless UI/UX.&lt;/strong&gt; x402 uses HTTP's standard operating procedure (SOP). So, there is no need to add additional tools or software development kits (SDKs) when integrating with existing infrastructure.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Web2-native.&lt;/strong&gt; Since x402 uses HTTP's SOP, it is also compatible with every major programming language, framework, and hosting platform on the internet. The seamlessness of web2 is thus replicated in web3.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Lightning-fast settlements.&lt;/strong&gt; Payment authorization only involves a single request-response and is completed in sub-seconds. The settlement is asynchronous and has instant finality, with the server trusting the facilitator for on-chain execution.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Micropayments.&lt;/strong&gt; Pricing granularity and tiny charges are made possible thanks to the zero-fee protocol and extremely low-cost transactions that only comprise of gas fees for the facilitator.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Traditional solutions are closed systems, needing constant customization every time the platforms or API providers change. This is exactly the pain point x402 solves.&lt;br&gt;
Additionally, x402 enables micropayments, which were problematic earlier when everything would be bundled, by default, with subscriptions. &lt;a href="https://blog.cloudflare.com/introducing-pay-per-crawl/" rel="noopener noreferrer"&gt;Live example&lt;/a&gt; of the benefit includes pay-per-crawl APIs, where agents pay nano-payments to scrape content.&lt;/p&gt;

&lt;p&gt;Another crucial advantage of x402 is understood when we consider how this protocol can logically extend its functionality with agents on both sides of the request-response pairing.&lt;br&gt;
All this leads to setting up a new agentic future involving an autonomous agent economy. Consider this: &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Agent 1 queries the data API, then hires Agent 2 to process the output, while paying a compute node to run simulations. &lt;/li&gt;
&lt;li&gt;Zero human intervention needed at any stage of the process.&lt;/li&gt;
&lt;li&gt;No restrictions by traditional payment rails.&lt;/li&gt;
&lt;li&gt;Result: All transactions conditional (payment only when valid response) and composable, running at thousands of fractional payments per minute/hour.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;x402 x ERC-8004 x ROFL&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;The potential of x402 grows when integrated with other crypto primitives. &lt;/p&gt;

&lt;p&gt;As I mentioned earlier, x402 and ERC-8004 share a connection. X402 standardizes agentic payment, and ERC-8004 standardizes agentic discovery and introduces the need-for-trust factor. This is a critical factor we need to examine, as the data is exposed no matter what, whenever there is API access or inference.&lt;/p&gt;

&lt;p&gt;The &lt;a href="https://x.com/0xtestpilot/status/1981613172369871067" rel="noopener noreferrer"&gt;agentic trust gap&lt;/a&gt; is solvable. &lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbo76k06kdwkdrhejq8pl.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbo76k06kdwkdrhejq8pl.png" alt=" " width="800" height="311"&gt;&lt;/a&gt;&lt;br&gt;
We know that ERC-8004 gives us the agent coordination/discovery layer, involving on-chain registries for identity, reputation, and validation, but it is neutral about establishing trust. The solution comes from the Oasis &lt;a href="https://oasis.net/ai-agents" rel="noopener noreferrer"&gt;ROFL&lt;/a&gt; (runtime off-chain logic) framework for trustless compute, providing data privacy, decentralized key management, and verifiable, tamper-proof execution.&lt;br&gt;
Together, the setup ensures code verification, key isolation, and end-to-end confidentiality.&lt;/p&gt;

&lt;p&gt;As we have seen in this x402 discussion, the facilitators play an important role. ROFL offers the opportunity to move away from highly centralized and opaque facilitators to a decentralized trustless TEE cloud for running the x402 facilitator. This can ensure that the payment layer is decentralized and verifiable even as the entire stack operates without extra, unnecessary trust assumptions.&lt;/p&gt;

&lt;p&gt;Check out this &lt;a href="https://x.com/peterus/status/1998369513444646923" rel="noopener noreferrer"&gt;example of a live public testnet deployment&lt;/a&gt; of a trustless and verifiable facilitator. There is also a sample implementation including a &lt;a href="https://github.com/oasisprotocol/rofl-x402-service" rel="noopener noreferrer"&gt;document summarization service&lt;/a&gt; that runs Ollama inference inside an ROFL container. And then there is a demo using multiple LLM models with &lt;a href="https://github.com/ptrus/verisage.xyz" rel="noopener noreferrer"&gt;cross-validation for oracle consensus&lt;/a&gt;. All of these being open-source, anyone can replicate or tweak for further developments.&lt;/p&gt;

&lt;p&gt;So, what is the final takeaway? x402, ERC-8004, and Oasis ROFL each solve a distinct layer of the agentic stack. Together, they make a trustless, private, composable agent economy not just conceivable but ready to be developed.&lt;/p&gt;

</description>
      <category>agents</category>
      <category>http</category>
      <category>web3</category>
      <category>privacy</category>
    </item>
    <item>
      <title>The Flashback Labs Case Study On Privacy-first AI Training</title>
      <dc:creator>DC</dc:creator>
      <pubDate>Fri, 20 Mar 2026 07:27:08 +0000</pubDate>
      <link>https://dev.to/dc600/the-flashback-labs-case-study-on-privacy-first-ai-training-2gbm</link>
      <guid>https://dev.to/dc600/the-flashback-labs-case-study-on-privacy-first-ai-training-2gbm</guid>
      <description>&lt;p&gt;Our interactions with AI and our shared experiences are growing exponentially. We know AI needs extensive training for all this, but how much thought or effort is put into ensuring data privacy? &lt;/p&gt;

&lt;p&gt;Oasis, as a privacy-first blockchain, has taken essential steps in bringing confidentiality to decentralized AI (DeAI). So, no wonder that Flashback Labs &lt;a href="https://oasis.net/blog/flashback-privacy-first-ai-training" rel="noopener noreferrer"&gt;adopted&lt;/a&gt; the game-changing technology of runtime off-chain logic (&lt;a href="https://www.youtube.com/watch?v=JFYnEyMFgRE" rel="noopener noreferrer"&gt;ROFL&lt;/a&gt;) to integrate verifiable privacy into their AI training setup. The result of that collaboration is the basis of this case study.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Decoding Flashback&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Flashback Labs helps train AI to understand people through lived human experiences. On their platform, a conversational AI app, people can interact with the AI to talk about their lives and preserve memories.&lt;/p&gt;

&lt;p&gt;How this works is: say you type in a prompt with a personal piece of conversation, or run a stream-of-consciousness with a voice assistant. The chatbot, like any other conversational AI model, will pick up the cue and ask follow-up personal questions. The data that flows as a result is structured around you personally - places, emotions, and timelines.&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwhzlszow1s6fq2oq2ix4.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwhzlszow1s6fq2oq2ix4.png" alt=" " width="800" height="181"&gt;&lt;/a&gt;&lt;br&gt;
The Flashback app can then generate a short animated video from your inputs, using photos, text, and voice narration like a call-back memory. As you go through multiple sessions, a sort of graph forms in the AI database, and the more you use it, the more enriching your personal experience becomes. &lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Flashback x Oasis&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Flashback's platform deals with extremely sensitive information, from personal memories to relationships, even health-related or finance-related conversations, as a personalized experience is directly dependent on personal shares with the app. It is, therefore, critical that there is implicit trust.&lt;/p&gt;

&lt;p&gt;Opaque systems or even fully transparent decentralized solutions are ill-equipped to handle this. &lt;br&gt;
Oasis enters the equation here by becoming the encryption layer and plugging the trust gaps. &lt;/p&gt;

&lt;p&gt;The result is both elegant and crucial. Now, all the inputs ever made into the platform - photos, videos, stories, etc, are wallet-owned, processed and secured by &lt;a href="https://oasis.net/blog/verifiable-ai-with-tees" rel="noopener noreferrer"&gt;TEEs&lt;/a&gt; (trusted execution environments), and stored on-chain after being consented to by the user.&lt;/p&gt;

&lt;p&gt;Now, let's look at the AI training aspect. It entails dealing with massive datasets and processing them. Flashback uses 0G, BNB Greenfield as storage networks, but they do not offer data privacy. Oasis provides the ideal confidentiality solution to encrypt the data files before storing them. Users can verify on-chain that their encrypted data is safe and secure. &lt;br&gt;
Interestingly, Oasis has also been developing a dedicated solution for privacy-enabled &lt;a href="https://oasis.net/blog/storage-encryption-access-management" rel="noopener noreferrer"&gt;decentralized storage&lt;/a&gt; with programmable access control, which the ecosystem urgently needs.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Scaling Progress&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Flashback Labs has focused little on marketing hype or gimmick. Still, their initiative has struck a chord and fuelled a wide response and active participation. Some of the key milestones achieved include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;more than 1k users with close to 1k early contributions&lt;/li&gt;
&lt;li&gt;3k+ on-chain, encrypted files at the rate of almost 200 per day&lt;/li&gt;
&lt;li&gt;almost 10k on-chain transactions generated at the rate of almost 700 per day&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The metrics, growing as more users come in, tell a clear story - private AI is getting scaled.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Flash Forward: What Future Promises&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;The case study of Flashback Labs and its success is a huge step forward for DeAI, as its target is the mainstream audience, and its use cases are not part of traditional crypto utility. &lt;/p&gt;

&lt;p&gt;At the moment, as &lt;a href="https://www.flashbacklabs.com/" rel="noopener noreferrer"&gt;Flashback&lt;/a&gt; goes through its roadmap for 2026, the team has multiple products underway. One is related to Alzheimer's care, while another is a product developed in collaboration with notable bereavement non-profits in the US to help people cope with the process of loss of a family member.&lt;/p&gt;

&lt;p&gt;There are also plans to develop an agentic framework that empowers Flashback's AI rendering to proactively reach out to users for memory collection and preservation. Hardware integration, like in robotic companion devices, to assist in hospice and elder care settings, is another promising development. &lt;/p&gt;

&lt;p&gt;The bottom line: personalized AI is going to be more and more an integral part of our memorable experiences, and the data confidentiality that this undertaking must assure is non-negotiable, both during training and in storing the processed data. And, Oasis is the industry expert for this solution - verifiable privacy. &lt;/p&gt;

</description>
      <category>ai</category>
      <category>machinelearning</category>
      <category>web3</category>
      <category>privacy</category>
    </item>
    <item>
      <title>Do You Vibe Code? A DeAI Primer By Oasis</title>
      <dc:creator>DC</dc:creator>
      <pubDate>Wed, 18 Mar 2026 07:40:56 +0000</pubDate>
      <link>https://dev.to/dc600/do-you-vibe-code-a-deai-primer-by-oasis-3h8j</link>
      <guid>https://dev.to/dc600/do-you-vibe-code-a-deai-primer-by-oasis-3h8j</guid>
      <description>&lt;p&gt;AI integration is moving fast, and the accessibility to develop AI is becoming easier by the day. The &lt;a href="https://oasis.net/blog/oasis-building-blocks-decentralized-ai" rel="noopener noreferrer"&gt;decentralized AI (DeAI)&lt;/a&gt; space has also picked up momentum as the new-gen web3 solutions all come with an AI edge. So, if you are a web3 developer, it is no longer imperative that you be a Solidity expert or know the ins and outs of building on-chain applications. Vibe coding is your friend.&lt;/p&gt;

&lt;p&gt;In this guide, I will show you new tools and help you learn how to build with AI on Oasis, with privacy by default. We will be using an &lt;strong&gt;llms.txt&lt;/strong&gt; file, a &lt;strong&gt;Context7&lt;/strong&gt; MCP integration, for the purpose of this tutorial.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;AI context&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;AI is prone to forgetting, and its way of remembering needs some understanding. To understand AI memory and context, check out this &lt;a href="https://oasisrose.garden/lessons/ai-memory/" rel="noopener noreferrer"&gt;Oasis Academy course&lt;/a&gt;. &lt;/p&gt;

&lt;p&gt;Suffice it to say, large language models (LLMs) need context to respond to any prompts, especially when you are asking them to build something. So, patchy memory or outdated context might result in a code that looks correct on a quick review but fails in practice. There are two possible solutions so that the AI tool can directly access Oasis docs to correctly consult instead of hallucinating, and I will outline them both.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;llms.txt&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Model context protocol (MCP)&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;llms.txt&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;For anyone familiar with AI, this is a standardized file format. It functions like a sitemap and is specifically designed for AI so that it can access a project's documentation as a structured index. It provides a brief description of the documentation and links to detailed markdown files for the AI to find and read.&lt;/p&gt;

&lt;p&gt;For our purpose, we will be referring to these files:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;a href="https://docs.oasis.io/llms.txt" rel="noopener noreferrer"&gt;https://docs.oasis.io/llms.txt&lt;/a&gt; — a curated index with page titles, descriptions, and URLs&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://docs.oasis.io/llms-full.txt" rel="noopener noreferrer"&gt;https://docs.oasis.io/llms-full.txt&lt;/a&gt; — the complete documentation content consolidated in one file&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;If the AI supports project context, such as Cursor's docs feature or a &lt;strong&gt;CLAUDE.md&lt;/strong&gt; file, good. Alternatively, copy-pasting the URLs in the LLM chat directly works too.&lt;/p&gt;

&lt;p&gt;The usefulness of having two versions is dictated by AI memory and context limits. &lt;strong&gt;llms.txt&lt;/strong&gt; is designed for a quick overview, and &lt;strong&gt;llms-full.txt&lt;/strong&gt; is when you need the AI to know everything, unabridged.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;MCP&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;MCP is an open standard. If you don't use MCP, then AI will only read the prompt submitted at face value. Using MCP not only gives AI structured access to all external context - documentation, codebases, tools, and runtime information- but also enables the AI to refer to them on demand and query external tools if and when needed.&lt;/p&gt;

&lt;p&gt;As mentioned earlier, Oasis documentation is indexed on &lt;strong&gt;Context7&lt;/strong&gt;, an MCP server that serves docs to AI coding assistants. The library ID is &lt;strong&gt;llmstxt/oasis_io_llms_txt&lt;/strong&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Setting Up&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;I will show here Cursor and Claude as primary tools, as they are the most popular among vibe coders.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Using Cursor&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The first step is to add the following snippet to your .cursor/mcp.json:&lt;br&gt;
json&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight json"&gt;&lt;code&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"mcpServers"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="nl"&gt;"context7"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
      &lt;/span&gt;&lt;span class="nl"&gt;"url"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"https://mcp.context7.com/mcp"&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This will prompt Cursor to connect to Context7. So, now when you generate code, you will have full access to the Oasis documentation. &lt;br&gt;
&lt;strong&gt;Pro tip&lt;/strong&gt;: It is advisable to add a rule to your Cursor settings so that the AI always consults the Oasis docs. It can be phrased like this - Always use Context7 MCP with library ID &lt;strong&gt;llmstxt/oasis_io_llms_txt&lt;/strong&gt; for Oasis documentation reference.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Using Claude&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Run:&lt;br&gt;
bash&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;claude mcp add &lt;span class="nt"&gt;--transport&lt;/span&gt; http context7 https://mcp.context7.com/mcp
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The next step is to verify configuration is correctly done:&lt;br&gt;
bash&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;claude mcp list
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;When you see context7 listed, you are good to go.&lt;br&gt;
&lt;strong&gt;Pro tip&lt;/strong&gt;: The same rule applies for your project's &lt;strong&gt;CLAUDE.md&lt;/strong&gt; - Always use &lt;strong&gt;Context7&lt;/strong&gt; MCP with library ID &lt;strong&gt;llmstxt/oasis_io_llms_txt&lt;/strong&gt; for Oasis documentation reference.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Other AI tools&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Even though Cursor and Claude are popular choices, you may be using other AI tools such as VS Code, JetBrains, Windsurf, Zed, etc. &lt;strong&gt;Context7&lt;/strong&gt; supports 40+ clients, and you can refer to the &lt;a href="https://context7.com/docs/resources/all-clients" rel="noopener noreferrer"&gt;&lt;strong&gt;full list here&lt;/strong&gt;&lt;/a&gt; to check the setup instructions specific to your tool of choice.&lt;/p&gt;
&lt;h2&gt;
  
  
  &lt;strong&gt;Before We Start&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;If you are set up, there are still a few things you will need before starting to vibe code.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Node.js&lt;/strong&gt;: This is required for Hardhat. You can check if your terminal has it installed by &lt;strong&gt;running node -v&lt;/strong&gt;. It will show a version number, if it is already available. If not, download the LTS version from &lt;a href="https://nodejs.org/en" rel="noopener noreferrer"&gt;https://nodejs.org/en&lt;/a&gt;, install it, then reopen your terminal and recheck to confirm successful installation. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Wallet&lt;/strong&gt;: Since we are working with DeAI, you will need a &lt;a href="https://docs.oasis.io/general/manage-tokens/#the-wallets" rel="noopener noreferrer"&gt;wallet&lt;/a&gt; with its private key. &lt;br&gt;
If using CLI, refer to this: &lt;a href="https://docs.oasis.io/build/tools/cli/wallet" rel="noopener noreferrer"&gt;https://docs.oasis.io/build/tools/cli/wallet&lt;/a&gt;. The best approach is to create a new &lt;a href="https://metamask.io/download/" rel="noopener noreferrer"&gt;MetaMask&lt;/a&gt; wallet. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Testnet tokens&lt;/strong&gt;: You will need testnet tokens, too, in the wallet to proceed with your vibe coding. First, you need to add the Sapphire testnet to your &lt;a href="https://docs.oasis.io/general/manage-tokens/#metamask" rel="noopener noreferrer"&gt;MetaMask wallet&lt;/a&gt;. You can then request free TEST tokens from &lt;a href="https://faucet.testnet.oasis.io/" rel="noopener noreferrer"&gt;https://faucet.testnet.oasis.io/&lt;/a&gt;. Remember to select &lt;strong&gt;Sapphire&lt;/strong&gt; from the network dropdown and provide the wallet address created above.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;
  
  
  &lt;strong&gt;Example: Deploying a Confidential Smart Contract&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;I will use a basic example here to demonstrate how this will all work. Once you have connected your Integrated Development Environment (IDE) with the Oasis MCP, start a fresh project. Let's use this prompt:&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;Create a confidential smart contract on Sapphire with Hardhat. It should store a secret message that only the owner can set. Anyone can submit a guess, but the actual secret should never be visible on-chain.&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Your chosen AI tool will immediately pull the documentation and perform the following steps seamlessly:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Identify the correct Hardhat config.&lt;/li&gt;
&lt;li&gt;Infer that the contract state on Sapphire is private by default.&lt;/li&gt;
&lt;li&gt;Generate a working contract with a full project structure, including a deploy script, interaction examples, and tests. &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Note that Claude will ask for permission before running commands. So, you might want to select "don't ask again" if you prefer. &lt;br&gt;
There will also be a &lt;strong&gt;.env.example&lt;/strong&gt; file generated in the process. You need to copy it to &lt;strong&gt;.env&lt;/strong&gt; and add your wallet's private key.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;cp&lt;/span&gt; .env.example .env
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;For those developers who are new to the decentralized setup, the private key can be found on your MetaMask wallet account with these steps: click the three dots next to the account name → account details → reveal private keys → enter password. &lt;br&gt;
This private key will have to be added to the &lt;strong&gt;.env&lt;/strong&gt; file as &lt;strong&gt;PRIVATE_KEY=0x...&lt;/strong&gt;, and then deployed:&lt;br&gt;
bash&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;npm run deploy:testnet
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;When you see a contract address returned in your terminal, it confirms the successful deployment of a confidential smart contract live on the testnet, using just the prompt mentioned at the start of this segment.&lt;/p&gt;

&lt;p&gt;You can further test the confidentiality of the contract when you try calling &lt;strong&gt;eth_getStorageAt&lt;/strong&gt; on your contract at &lt;a href="https://explorer.oasis.io/testnet/sapphire" rel="noopener noreferrer"&gt;Oasis Explorer&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;As Oasis enables verifiable privacy and confidential computation, this is the gateway to developing private applications. You can start exploring the possibilities at &lt;a href="https://oasis.net/" rel="noopener noreferrer"&gt;https://oasis.net/&lt;/a&gt; and start vibe coding to build the next-gen dApps. With your AI coding tool connected to the docs, it will be the model doing all the work.&lt;/p&gt;

&lt;p&gt;Sources referred: &lt;a href="https://docs.oasis.io/build/tools/llms/" rel="noopener noreferrer"&gt;https://docs.oasis.io/build/tools/llms/&lt;/a&gt;&lt;br&gt;
Help needed? Ask the dev team: &lt;a href="https://oasis.io/discord" rel="noopener noreferrer"&gt;https://oasis.io/discord&lt;/a&gt;&lt;/p&gt;

</description>
      <category>tutorial</category>
      <category>ai</category>
      <category>web3</category>
      <category>privacy</category>
    </item>
    <item>
      <title>AI Has a Memory Problem. Decentralization and Privacy Might Have a Solution. Part 3</title>
      <dc:creator>DC</dc:creator>
      <pubDate>Mon, 23 Feb 2026 11:26:51 +0000</pubDate>
      <link>https://dev.to/dc600/ai-has-a-memory-problem-decentralization-and-privacy-might-have-a-solution-part-3-2288</link>
      <guid>https://dev.to/dc600/ai-has-a-memory-problem-decentralization-and-privacy-might-have-a-solution-part-3-2288</guid>
      <description>&lt;p&gt;In the &lt;a href="https://dev.to/dc600/ai-has-a-memory-problem-decentralization-and-privacy-might-have-a-solution-part-1-14ib"&gt;first part&lt;/a&gt; of this 3-part series, I covered AI memory and its classification, while in the &lt;a href="https://dev.to/dc600/ai-has-a-memory-problem-decentralization-and-privacy-might-have-a-solution-part-2-3kpk"&gt;second part&lt;/a&gt;, I discussed in detail the types of AI memory and security risks associated with the architectures.&lt;br&gt;
Here, I will refer to Oasis technology for a potential solution to AI memory pain points through the decentralization and privacy approach. I will also talk about some working use cases for portable AI memory.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Zero-Trust and DeAI Solutions&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;There are two distinct pain points of the AI memory architectures: security threats, and data silos and redundancy.&lt;/p&gt;

&lt;p&gt;As a believer in decentralized AI (DeAI), I think the solution to attack risks is best addressed by security-first architectures that adopt a Zero-Trust model. &lt;br&gt;
How does this work? Basically, all data is monitored at the ingestion stage, and any sensitive information is identified and redacted before it moves to the vector storage phase. &lt;strong&gt;Role-Based Access Control&lt;/strong&gt; (RBAC) and &lt;strong&gt;Attribute-Based Access Control&lt;/strong&gt; (ABAC) are enforced at the retrieval layer. Result: the system only considers document subsets that the specific user is authorized to see.&lt;/p&gt;

&lt;p&gt;Now, what about the other pain point - information silos and redundant work? Simple answer: it is preventable. Let's understand how, with reference to the multi-agent collaboration we discussed regarding stateful memory loops. &lt;br&gt;
DeAI ensures a shared workspace allowing different agents (for example, an Architecture Agent and an Implementation Agent) to work in tandem, querying and updating the same memory instance. This is also the seed for AI context flow, where data silos do not result in context loss.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Role of Confidential Computing and Oasis Tech&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;A serious bottleneck in ensuring secure AI memory is protecting the data being computed. Traditional encryption can handle data at rest and in transit. But what about the information that is decrypted during the actual retrieval and inference processes?&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Hardware-Backed Privacy via TEEs&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Confidential Computing is the answer to this security gap, utilizing hardware-backed Trusted Execution Environments (TEEs). The secure enclaves isolate memory as the content is made cryptographically inaccessible to any unauthorized access, even by the infrastructure operators. For the AI systems, the prompts and embeddings are only decrypted inside the enclave's black box. As a result, the vector searches and inference building can occur smoothly without exposing any raw data.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftxdvalr5q9qlvfeorgy6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftxdvalr5q9qlvfeorgy6.png" alt=" " width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The reason to use Oasis technology as a reference to a potential solution for secure AI memory is how it combines and optimizes on-chain and off-chain components - the first production-ready confidential Ethereum Virtual Machine (EVM), &lt;strong&gt;&lt;a href="https://oasis.net/sapphire" rel="noopener noreferrer"&gt;Sapphire&lt;/a&gt;&lt;/strong&gt;, and the Runtime Off-chain Logic (&lt;strong&gt;&lt;a href="https://oasis.net/decentralized-ai" rel="noopener noreferrer"&gt;ROFL&lt;/a&gt;&lt;/strong&gt;) framework. By utilizing hardware isolation (Intel SGX/TDX), it is ensured that transaction inputs, return values, or the internal state of the smart contract remain confidential at all times.&lt;/p&gt;

&lt;p&gt;For complex AI memory systems requiring computation-heavy processing, Oasis utilizes the ROFL framework instead of wholesale on-chain logic. So, model training and inference can be done securely off-chain while verifiable settlement can happen on-chain. This combination is the foundation for trustless AI agents that can manage private keys and sensitive user context within a secure enclave. The personal information and sensitive data consequently become a portable, secure asset.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Industry-Specific Implementations of AI Memory&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;What AI memory architectures need vary across regulated industries needing dynamic blueprints for solutions. Let's talk about healthcare and finance as the two most highly impacted areas.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Healthcare&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Here, AI systems must adhere to strict standards like the Health Insurance Portability and Accountability Act (HIPAA) and Health Information Trust Alliance (HITRUST) to protect electronic Protected Health Information (ePHI). Such a memory architecture must include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Zero-Retention Architectures&lt;/strong&gt;: Data is isolated and cannot be reused for any other training purpose. A volatile memory approach is ideal where data is processed in-memory and immediately discarded.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;FHIR-First Data Foundations&lt;/strong&gt;:The Fast Healthcare Interoperability Resources (FHIR) standard helps create a standardized operational data layer. This eliminates schema chaos and enables AI assistants to retrieve clinical facts using a shared, consistent language. &lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Auditability and Explainability&lt;/strong&gt;: Verifiable audit trails for agentic workflows ensure that we know which medical databases were accessed and why. This is critical for regulatory compliance.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Finance&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Here, there needs to be a fine balance between collaborative analytics and exposure to private and proprietary data through transparency. &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Secure Multi-Party Computation (SMPC)&lt;/strong&gt;: An example would be where multiple banks are analysing transaction data for fraud detection, but no single institution can access another’s private customer records.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Homomorphic Encryption&lt;/strong&gt;: Financial institutions use this to perform computations directly on encrypted data, ensuring that sensitive financial parameters are never exposed during processing.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Working Use Cases&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;There are already a few companies that are working on solutions for AI memory problems and tackling how to implement portable memory systems.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;a href="https://plurality.network/" rel="noopener noreferrer"&gt;&lt;strong&gt;Plurality&lt;/strong&gt;&lt;/a&gt; is developing the Open Context Layer. It allows users to autonomously store their data and chats in specific memory buckets for better context management, and also for sharing.&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.memsync.ai/" rel="noopener noreferrer"&gt;&lt;strong&gt;MemSync&lt;/strong&gt;&lt;/a&gt; is building the Unified Memory Layer. It allows users to create a persistent “digital twin” based on personalized conversation and knowledge. This enables the AI system to know the user, track their evolving ideas, and serve as a private sounding board for reflection and decision-making.&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.ekailabs.xyz/" rel="noopener noreferrer"&gt;&lt;strong&gt;Ekai&lt;/strong&gt;&lt;/a&gt; is offering a developer-focused solution. It allows users to switch among various AI models via smart model routing without context loss.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Final Takeaway&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;The future of AI memory? A &lt;strong&gt;portable context model&lt;/strong&gt;. This means that you, as a user, are not obligated to commit to a single model or AI assistant, or have your digital history trapped in large platforms like OpenAI or Anthropic. When you move and switch as you need and choose, the memory travels with you, encrypted and under control, working like a neutral, interoperable memory layer.&lt;/p&gt;

&lt;p&gt;Realizing this vision requires a fundamental reimagining of memory as infrastructure. We can combine stateful memory loops, DeAI, and confidential computing technologies like Oasis ROFL and Sapphire to build AI systems that are smarter and personalized while also being fundamentally secure and user-owned. &lt;strong&gt;Result: Private, portable AI memory that is a sovereign asset, free from data privacy liability.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Resources referred:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;a href="https://oasisrose.garden/lessons/ai-memory/" rel="noopener noreferrer"&gt;Oasis Academy course&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.forbes.com/sites/digital-assets/2025/12/12/why-crypto-needs-portable-ai-memory/" rel="noopener noreferrer"&gt;Forbes article by Marko Stokić&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;

</description>
      <category>machinelearning</category>
      <category>ai</category>
      <category>web3</category>
      <category>privacy</category>
    </item>
    <item>
      <title>AI Has a Memory Problem. Decentralization and Privacy Might Have a Solution. Part 2</title>
      <dc:creator>DC</dc:creator>
      <pubDate>Mon, 23 Feb 2026 09:11:35 +0000</pubDate>
      <link>https://dev.to/dc600/ai-has-a-memory-problem-decentralization-and-privacy-might-have-a-solution-part-2-3kpk</link>
      <guid>https://dev.to/dc600/ai-has-a-memory-problem-decentralization-and-privacy-might-have-a-solution-part-2-3kpk</guid>
      <description>&lt;p&gt;In the &lt;a href="https://dev.to/dc600/ai-has-a-memory-problem-decentralization-and-privacy-might-have-a-solution-part-1-14ib"&gt;first part&lt;/a&gt; of this 3-part series, I covered AI memory and its classification. &lt;br&gt;
Here, I will start with a deep dive into the types of AI memory, and then discuss the pain points in AI memory architectures.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;A Deep Dive Into AI Memory Classification&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;As I mentioned in the first part, how human and AI memory work is different. The broad classification of short-term and long-term AI memory requires further analysis.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Short-Term Memory: Managing Ephemeral Context&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This spans a single conversation session. The memory is preserved temporarily across a few prompts and responses. The context window, thus, encompasses the whole chat in the session, utilizing sliding windows or token-based buffers.&lt;/p&gt;

&lt;p&gt;Short-term memory can be hence defined as the system’s ability to maintain continuity within a specific session or task. Working memory is a subset of short-term memory. While working memory only deals with tokens being processed immediately, short-term memory can strategically manage continuity to a certain extent as the conversation grows.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Implementation Strategies&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Let's start by understanding why short-term memory fails. Simply because it outgrows the context window and hence cannot remember beyond the model's token limit. To counter this, the system can delete and overwrite earlier information or, because it is full, fail to add new information, leading to memory failure and possible hallucination.&lt;br&gt;
There are three techniques to manage this:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Conversation Buffers&lt;/strong&gt;: These maintain a list of recent messages. There are two types of buffers - &lt;strong&gt;full&lt;/strong&gt;, which remembers everything, and &lt;strong&gt;windowed&lt;/strong&gt;, which retains the last few turns, ensuring the model works within its limits and the earlier context is not totally lost.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Summarization&lt;/strong&gt;: This technique compresses the conversation history into a concise summary of essential facts by forgetting redundant details. While this can extend the session limits, nuances from earlier context might get filtered out.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Token Budgeting&lt;/strong&gt;: This optimization technique is a variation of summarization where only the system prompt and the latest five turns are preserved, pruning the rest. Research suggests this middle data is often ignored by models anyway, and hence discarding that portion of the context is an acceptable approach.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The Key-Value (KV) cache plays a vital role in short-term memory. It preserves the exact attention patterns of recent turns and can sometimes perform better than standard Retrieval-Augmented Generation (RAG). There is, however, a trade-off between speed and memory capacity. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Long-Term Memory: Shift to Persistent and Adaptive Knowledge&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This spans multiple conversation sessions. The memory is preserved for longer periods, resulting in better context. External databases (vector databases, key-value stores) help to refer to persistent data outside the model.&lt;/p&gt;

&lt;p&gt;Long-term memory can be hence defined as the system’s ability to maintain continuity across sessions and days, sometimes even weeks, months, or years. It builds relationships rather than transactions, as external databases synchronize with the model’s built-in knowledge, and RAG is the single-most critical technology to achieve this.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;RAG Pipeline and Role of Vector Databases&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A typical RAG architecture computes information only one-way. Documents are converted into high-dimensional vector embeddings and stored in a vector database. The advantage of the RAG system is that the data is organized based on semantic meaning instead of literal matches.&lt;/p&gt;

&lt;p&gt;So, when a user submits a prompt, the system embeds the query and retrieves a chunk of data that is most similar. This information is pulled into the context window, and the AI can generate answers based on private, proprietary, or real-time data, not necessarily part of its original training. Research suggests this can cut down factual errors and increase efficiency. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjwtaynl2zn3zsf80d3c1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjwtaynl2zn3zsf80d3c1.png" alt=" " width="800" height="253"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;From Stateless RAG to Stateful Memory Loops&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;An essential point to note here, if it has not been apparent, is that RAG is fundamentally stateless. What does this mean? It means that every query is independent, and its significance lies in the fact that the system does not learn anything from interacting with the user. The next logical step is, therefore, moving towards stateful AI memory architectures that can operate as a continuous loop of learning.&lt;/p&gt;

&lt;p&gt;There are 4 critical components of a truly stateful memory system.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Extraction&lt;/strong&gt;: First, the LLM evaluates user interactions to identify and filter salient facts or user preferences.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Synthesis and Learning&lt;/strong&gt;: Next, synchronization between new information and existing knowledge takes place. The system determines whether new information is a new addition entirely or an overwriting of older, redundant data.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Conflict Resolution&lt;/strong&gt;: Next, any contradiction arising from the new data addition is resolved by the intelligent agentic system so that consistency and continuity are maintained.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Consolidation&lt;/strong&gt;: Finally, all knowledge deemed as significant is moved from the short-term context to a long-term Memory Graph or relational store.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;It stands to reason that such a stateful loop needs multi-agent collaboration. &lt;/p&gt;

&lt;p&gt;Since we are discussing the various types of AI memory, there is another that deserves mention - &lt;strong&gt;User Profile Memory&lt;/strong&gt;. It is usually a subset of the long-term memory with particular emphasis on the user and their preferred language, time zone, conversational and response style, etc. These structured user profiles are stored in databases and injected into prompts, giving the appearance of personalized conversations.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Security and Privacy Risks in AI Memory Architectures&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmrlheidn68hu0og97ayw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmrlheidn68hu0og97ayw.png" alt=" " width="800" height="279"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;AI memory is built over time, processing through huge and complex datasets that can encompass critical and sensitive information. As vector databases and RAG pipelines become live memory, there is an inevitable vulnerability to severe, crippling security threats.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Data Leakage and Unauthorized Access&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This is related to the exposure of Personal Identifiable Information (PII) or proprietary content. RAG systems pull context from a vast range of documents and sources. All the data needs to be properly cleaned, classified, and scoped so that the AI models do not reveal sensitive facts by mistake. This type of context leakage is common when prompts by one user retrieve another user’s private embeddings due to misconfigured access controls.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Embedding Inversion and Data Poisoning&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Embedding Inversion&lt;/strong&gt; occurs when embeddings in the vectors, which are essentially high-dimensional semantic relationships, are inverted, leading to the reconstruction of the original source text, compromising anonymity. &lt;br&gt;
&lt;strong&gt;Data Poisoning&lt;/strong&gt; occurs when malicious actors inject false or adversarial data through subliminal texts hidden in documents into a knowledge base accessed by the model, leading to erroneous or harmful responses.&lt;/p&gt;

&lt;p&gt;In the &lt;a href="https://dev.to/dc600/ai-has-a-memory-problem-decentralization-and-privacy-might-have-a-solution-part-3-2288"&gt;concluding part&lt;/a&gt; of the series, I will discuss a potential solution in decentralized and privacy-first AI, along with a mention of working use cases of portable AI memory.&lt;/p&gt;

</description>
      <category>machinelearning</category>
      <category>ai</category>
      <category>web3</category>
      <category>privacy</category>
    </item>
    <item>
      <title>AI Has a Memory Problem. Decentralization and Privacy Might Have a Solution. Part 1</title>
      <dc:creator>DC</dc:creator>
      <pubDate>Mon, 23 Feb 2026 06:21:45 +0000</pubDate>
      <link>https://dev.to/dc600/ai-has-a-memory-problem-decentralization-and-privacy-might-have-a-solution-part-1-14ib</link>
      <guid>https://dev.to/dc600/ai-has-a-memory-problem-decentralization-and-privacy-might-have-a-solution-part-1-14ib</guid>
      <description>&lt;p&gt;We are on the cusp of an AI revolution. AI agents today are building social networks, negotiating contracts, and even contributing to creativity, like making music. All aspects of our lives are affected every day, as we can choose from a range of AI models and assistants for our interactions and experiences. But there is a chronic problem with AI that often flows under the radar. AI has a memory problem.&lt;/p&gt;

&lt;p&gt;Anyone who uses an AI solution has faced it. It does not matter whether you are using Claude, GPT, or anything else; it does not matter whether you are a developer or an end user. If we ever need to switch models, we have to start again from scratch, rebuilding the context of our conversations every time. The same forgetfulness can also happen across different sessions or between different chats in the same model. &lt;/p&gt;

&lt;p&gt;Here in this 3-part series, I will discuss what AI memory is, how it works, what types there are, the pain points regarding its architecture, and a potential solution through decentralization and privacy, with Oasis technology as a reference. I will also mention a few working use cases tackling the AI memory problem.&lt;br&gt;
In the first part, I will cover AI memory and its classification.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;What is AI memory?&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;AI memory is the ability of an AI system to retain, recall, and use information from past interactions. While human memory is associative due to being organic, AI associations come from data engineering and code-based architecture. In other words, Large Language Models (LLMs) do not and cannot remember anything. Every interaction is processed fresh. So, what appears to be memory is basically an association achieved through engineering and algorithms.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Human brain&lt;/strong&gt;: a biological organ where memory is always on, where learning, remembering, and forgetting happen organically.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;LLM&lt;/strong&gt;: a codebase that learns and forgets, but can be made to remember by being given contextual refreshers manually or by smart engineering on a short-term basis.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;The Context Window&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Before expanding on the different types, it is useful to note that the context window is the most basic form of AI memory. This is quantifiable and measured in &lt;strong&gt;tokens&lt;/strong&gt; or the amount of text that any given model can process in a single interaction. Approximately 150 tokens can constitute about 100 words. And every word in an interaction, those you send and those the AI responds with, together make up the context window limit.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How Context Works&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Most conversations with an AI model consist of multiple prompts. What we do not know as an end user is that the system does not remember previous messages. So, what happens? The system typically resends the entire conversation history as part of each new request. Take this example.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;You send “Hello” -&amp;gt; AI sees: [Hello]&lt;/li&gt;
&lt;li&gt;You send “How are you?” -&amp;gt; AI sees: [Hello, AI reply, How are you?]&lt;/li&gt;
&lt;li&gt;You send “Tell me about crypto” -&amp;gt; AI sees: [Hello, AI reply, How are you?, AI reply, Tell me about crypto]&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;As the conversation carries on, the token count also increases. On reaching the context window limit, the older messages get dropped. This is where AI forgetfulness and hallucination begin.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Context Window Sizes (Typical in 2025)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxk3kzsg19shl6ronhgh2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxk3kzsg19shl6ronhgh2.png" alt=" " width="800" height="207"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Any long, detailed conversation can thus stretch and exhaust even high token capacity models. That is why we need more advanced memory systems. &lt;/p&gt;

&lt;p&gt;In 2026, the trends indicate that 1M+ token capacity is going to become common, with more focus on scale and performance. For example, top-tier models (e.g., potential Llama 4 iterations) can reach up to 10 million tokens.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Active Models&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Qwen3-Coder-480B&lt;/strong&gt;: Designed for coding with a 256K to 1M token range.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Gemini 2.5 Pro&lt;/strong&gt;: Offers 1M+ token windows, with 2M+ expected.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;GPT-4.1 Turbo&lt;/strong&gt;: 128K–1M tokens with advanced "Context Compression" to manage efficiency.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The context window size increase without "smarter" context management is, however, also problematic, as it can lead to "needle in a haystack" failures where models struggle while searching for specific information within a vast context.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;The Taxonomy of AI Memory&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;The analysis of AI memory architecture reveals the various components according to their temporal duration and functional purpose. All modern systems use a multi-tiered memory hierarchy that can balance real-time processing speed with the need for vast, durable storage.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8u77en2a01loyfwjj860.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8u77en2a01loyfwjj860.png" alt=" " width="800" height="351"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Working memory&lt;/strong&gt; is at the vanguard of this architecture. Its capacity is limited and critical for achieving coherence through raw token processing and immediate inference building. &lt;br&gt;
&lt;strong&gt;Short-term memory&lt;/strong&gt; is the next stage that strings together working memory. It builds and maintains context across a specific session through sliding windows or summarization techniques.&lt;br&gt;
&lt;strong&gt;Long-term memory&lt;/strong&gt; is the embodiment of continuity. It can be externalized into durable storage systems, acting as an unbounded index of knowledge.&lt;br&gt;
Interesting to note that long-term memory can encompass and go beyond &lt;strong&gt;procedural memory&lt;/strong&gt;, which is fixed within learned logic and inference.&lt;/p&gt;

&lt;p&gt;In the &lt;a href="https://dev.to/dc600/ai-has-a-memory-problem-decentralization-and-privacy-might-have-a-solution-part-2-3kpk"&gt;next part&lt;/a&gt; of the series, I will discuss at length the short-term and long-term AI memory, and also the security and privacy risks associated with AI memory architecture.&lt;/p&gt;

</description>
      <category>machinelearning</category>
      <category>ai</category>
      <category>web3</category>
      <category>privacy</category>
    </item>
    <item>
      <title>Guide To Cross-Chain Key Generation (EVM / Base) With Oasis ROFL</title>
      <dc:creator>DC</dc:creator>
      <pubDate>Fri, 20 Feb 2026 12:26:19 +0000</pubDate>
      <link>https://dev.to/dc600/guide-to-cross-chain-key-generation-evm-base-with-oasis-rofl-38c8</link>
      <guid>https://dev.to/dc600/guide-to-cross-chain-key-generation-evm-base-with-oasis-rofl-38c8</guid>
      <description>&lt;p&gt;Oasis introduced the framework for runtime off-chain logic (&lt;a href="https://oasis.net/decentralized-ai" rel="noopener noreferrer"&gt;ROFL&lt;/a&gt;) to help build and run apps off-chain while ensuring privacy and maintaining trust with on-chain verifiability. There are many moving parts to building with ROFL. &lt;br&gt;
In this tutorial, I will demonstrate how to build a tiny TypeScript app, &lt;strong&gt;generating a secp256k1 key inside ROFL&lt;/strong&gt;. It will be using the &lt;strong&gt;@oasisprotocol/rofl-client TypeScript SDK&lt;/strong&gt;, which talks to the &lt;strong&gt;&lt;a href="https://docs.oasis.io/build/rofl/features/appd/" rel="noopener noreferrer"&gt;appd REST API&lt;/a&gt;&lt;/strong&gt; under the hood. The TypeScript app will also:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;derive an &lt;strong&gt;EVM address&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;sign&lt;/strong&gt; messages&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;deploy a contract&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;send&lt;/strong&gt; EIP-1559 transactions on &lt;strong&gt;Base Sepolia&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;There will be a simple &lt;strong&gt;smoke test&lt;/strong&gt; that prints to logs.&lt;/p&gt;
&lt;h2&gt;
  
  
  &lt;strong&gt;Prerequisites&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;To do the steps described in this guide, you will need:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Node.js 20+&lt;/strong&gt; and &lt;strong&gt;Docker&lt;/strong&gt; (or Podman)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Oasis CLI&lt;/strong&gt; and a minimum of 120 TEST tokens in your wallet (&lt;a href="https://faucet.testnet.oasis.io/" rel="noopener noreferrer"&gt;Oasis Testnet faucet&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Some Base Sepiola test ETH (&lt;a href="https://docs.base.org/base-chain/tools/network-faucets" rel="noopener noreferrer"&gt;Base Sepiola faucet&lt;/a&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;For the setup details, please refer to the documentation on &lt;a href="https://docs.oasis.io/build/tools/cli/setup" rel="noopener noreferrer"&gt;Quickstart Prerequisites&lt;/a&gt;. &lt;/p&gt;
&lt;h2&gt;
  
  
  &lt;strong&gt;Init App&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;The first step is to initialize a new app using the Oasis CLI.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;oasis rofl init rofl-keygen
cd rofl-keygen
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  &lt;strong&gt;Create App&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;At the time of creating the app on the Testnet, you will be required to deposit tokens. Assign 100 TEST tokens at this point.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;oasis rofl create --network testnet
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;As output, the CLI will produce the &lt;strong&gt;App ID&lt;/strong&gt;, denoted by rofl1.... &lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Init a Hardhat (TypeScript) project&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Now, you are ready to kickstart the project.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;npx hardhat init
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Since we are showcasing a TypeScript app, &lt;strong&gt;choose TypeScript&lt;/strong&gt; when prompted, and then accept the defaults.&lt;br&gt;
Next step would be to add the small runtime deps for use outside of Hardhat.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;npm i @oasisprotocol/rofl-client ethers dotenv @types/node
npm i -D tsx
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Hardhat’s TypeScript template automatically creates a &lt;strong&gt;tsconfig.json&lt;/strong&gt;. We need to add a small script so that the app code can compile to &lt;strong&gt;dist/&lt;/strong&gt;.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;// tsconfig.json
{
  "compilerOptions": {
    "rootDir": "./src",
    "outDir": "./dist"
  },
  "include": ["src"]
}
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  &lt;strong&gt;App structure&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;In this section, we will add a few small TS files and one Solidity contract.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;src/
├── appd.ts               # thin wrapper over @oasisprotocol/rofl-client
├── evm.ts                # ethers helpers (provider, wallet, tx, deploy)
├── keys.ts               # tiny helpers (checksum)
└── scripts/
    ├── deploy-contract.ts  # generic deploy script for compiled artifacts
    └── smoke-test.ts       # end-to-end demo (logs)
contracts/
└── Counter.sol           # sample contract
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;src/appd.ts&lt;/strong&gt; — thin wrapper over the SDK&lt;br&gt;
Here, you will need to use the official client to talk to &lt;strong&gt;appd&lt;/strong&gt; (UNIX socket). We will also need to keep an explicit &lt;strong&gt;local‑dev fallback&lt;/strong&gt; when running outside ROFL.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;import {existsSync} from 'node:fs';
import {
  RoflClient,
  KeyKind,
  ROFL_SOCKET_PATH
} from '@oasisprotocol/rofl-client';

const client = new RoflClient(); // UDS: /run/rofl-appd.sock

export async function getAppId(): Promise&amp;lt;string&amp;gt; {
  return client.getAppId();
}

/**
 * Generates (or deterministically re-derives) a secp256k1 key inside ROFL and
 * returns it as a 0x-prefixed hex string (for ethers.js Wallet).
 *
 * Local development ONLY (outside ROFL): If the socket is missing and you set
 * ALLOW_LOCAL_DEV=true and LOCAL_DEV_SK=0x&amp;lt;64-hex&amp;gt;, that value is used.
 */
export async function getEvmSecretKey(keyId: string): Promise&amp;lt;string&amp;gt; {
  if (existsSync(ROFL_SOCKET_PATH)) {
    const hex = await client.generateKey(keyId, KeyKind.SECP256K1);
    return hex.startsWith('0x') ? hex : `0x${hex}`;
  }
  const allow = process.env.ALLOW_LOCAL_DEV === 'true';
  const pk = process.env.LOCAL_DEV_SK;
  if (allow &amp;amp;&amp;amp; pk &amp;amp;&amp;amp; /^0x[0-9a-fA-F]{64}$/.test(pk)) return pk;
  throw new Error(
    'rofl-appd socket not found and no LOCAL_DEV_SK provided (dev only).'
  );
}
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;src/evm.ts&lt;/strong&gt; — ethers helpers&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;import {
  JsonRpcProvider,
  Wallet,
  parseEther,
  type TransactionReceipt,
  ContractFactory
} from "ethers";

export function makeProvider(rpcUrl: string, chainId: number) {
  return new JsonRpcProvider(rpcUrl, chainId);
}

export function connectWallet(
  skHex: string,
  rpcUrl: string,
  chainId: number
): Wallet {
  const w = new Wallet(skHex);
  return w.connect(makeProvider(rpcUrl, chainId));
}

export async function signPersonalMessage(wallet: Wallet, msg: string) {
  return wallet.signMessage(msg);
}

export async function sendEth(
  wallet: Wallet,
  to: string,
  amountEth: string
): Promise&amp;lt;TransactionReceipt&amp;gt; {
  const tx = await wallet.sendTransaction({
    to,
    value: parseEther(amountEth)
  });
  const receipt = await tx.wait();
  if (receipt == null) {
    throw new Error("Transaction dropped or replaced before confirmation");
  }
  return receipt;
}

export async function deployContract(
  wallet: Wallet,
  abi: any[],
  bytecode: string,
  args: unknown[] = []
): Promise&amp;lt;{ address: string; receipt: TransactionReceipt }&amp;gt; {
  const factory = new ContractFactory(abi, bytecode, wallet);
  const contract = await factory.deploy(...args);
  const deployTx = contract.deploymentTransaction();
  const receipt = await deployTx?.wait();
  await contract.waitForDeployment();
  if (!receipt) {
    throw new Error("Deployment TX not mined");
  }
  return { address: contract.target as string, receipt };
}
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;src/keys.ts&lt;/strong&gt; — tiny helpers&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;import { Wallet, getAddress } from "ethers";

export function secretKeyToWallet(skHex: string): Wallet {
  return new Wallet(skHex);
}

export function checksumAddress(addr: string): string {
  return getAddress(addr);
}
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;src/scripts/smoke-test.ts&lt;/strong&gt; — single end‑to‑end flow&lt;br&gt;
This is an important step as this script has multiple functions:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;print the App ID (inside ROFL), address, and a signed message&lt;/li&gt;
&lt;li&gt;waits for funding&lt;/li&gt;
&lt;li&gt;deploy the counter contract
&lt;/li&gt;
&lt;/ul&gt;
&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;import "dotenv/config";
import { readFileSync } from "node:fs";
import { join } from "node:path";
import { getAppId, getEvmSecretKey } from "../appd.js";
import { secretKeyToWallet, checksumAddress } from "../keys.js";
import { makeProvider, signPersonalMessage, sendEth, deployContract } from "../evm.js";
import { formatEther, JsonRpcProvider } from "ethers";

const RPC_URL = process.env.BASE_RPC_URL ?? "https://sepolia.base.org";
const CHAIN_ID = Number(process.env.BASE_CHAIN_ID ?? "84532");
const KEY_ID = process.env.KEY_ID ?? "evm:base:sepolia";

function sleep(ms: number): Promise&amp;lt;void&amp;gt; {
  return new Promise((r) =&amp;gt; setTimeout(r, ms));
}

async function waitForFunding(
  provider: JsonRpcProvider,
  addr: string,
  minWei: bigint = 1n,
  timeoutMs = 15 * 60 * 1000,
  pollMs = 5_000
): Promise&amp;lt;bigint&amp;gt; {
  const start = Date.now();
  while (Date.now() - start &amp;lt; timeoutMs) {
    const bal = await provider.getBalance(addr);
    if (bal &amp;gt;= minWei) return bal;
    console.log(`Waiting for funding... current balance=${formatEther(bal)} ETH`);
    await sleep(pollMs);
  }
  throw new Error("Timed out waiting for funding.");
}

async function main() {
  const appId = await getAppId().catch(() =&amp;gt; null);
  console.log(`ROFL App ID: ${appId ?? "(unavailable outside ROFL)"}`);

  const sk = await getEvmSecretKey(KEY_ID);
  // NOTE: This demo trusts the configured RPC provider. For production, prefer a
  // light client (for example, Helios) so you can verify remote chain state.
  const wallet = secretKeyToWallet(sk).connect(makeProvider(RPC_URL, CHAIN_ID));
  const addr = checksumAddress(await wallet.getAddress());
  console.log(`EVM address (Base Sepolia): ${addr}`);

  const msg = "hello from rofl";
  const sig = await signPersonalMessage(wallet, msg);
  console.log(`Signed message: "${msg}"`);
  console.log(`Signature: ${sig}`);

  const provider = wallet.provider as JsonRpcProvider;

  let bal = await provider.getBalance(addr);
  if (bal === 0n) {
    console.log("Please fund the above address with Base Sepolia ETH to continue.");
    bal = await waitForFunding(provider, addr);
  }
  console.log(`Balance detected: ${formatEther(bal)} ETH`);

  const artifactPath = join(process.cwd(), "artifacts", "contracts", "Counter.sol", "Counter.json");
  const artifact = JSON.parse(readFileSync(artifactPath, "utf8"));
  if (!artifact?.abi || !artifact?.bytecode) {
    throw new Error("Counter artifact missing abi/bytecode");
  }
  const { address: contractAddress, receipt: deployRcpt } =
    await deployContract(wallet, artifact.abi, artifact.bytecode, []);
  console.log(`Deployed Counter at ${contractAddress} (tx=${deployRcpt.hash})`);

  console.log("Smoke test completed successfully!");
}

main().catch((e) =&amp;gt; {
  console.error(e);
  process.exit(1);
});
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;


&lt;p&gt;&lt;strong&gt;contracts/Counter.sol&lt;/strong&gt; — minimal sample&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;// SPDX-License-Identifier: MIT
pragma solidity ^0.8.24;

contract Counter {
    uint256 private _value;
    event Incremented(uint256 v);
    event Set(uint256 v);

    function current() external view returns (uint256) { return _value; }
    function inc() external { unchecked { _value += 1; } emit Incremented(_value); }
    function set(uint256 v) external { _value = v; emit Set(v); }
}
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;src/scripts/deploy-contract.ts&lt;/strong&gt; — generic deployer&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;import "dotenv/config";
import { readFileSync } from "node:fs";
import { getEvmSecretKey } from "../appd.js";
import { secretKeyToWallet } from "../keys.js";
import { makeProvider, deployContract } from "../evm.js";

const KEY_ID = process.env.KEY_ID ?? "evm:base:sepolia";
const RPC_URL = process.env.BASE_RPC_URL ?? "https://sepolia.base.org";
const CHAIN_ID = Number(process.env.BASE_CHAIN_ID ?? "84532");

/**
 * Usage:
 *   npm run deploy-contract -- ./artifacts/MyContract.json '[arg0, arg1]'
 * The artifact must contain { abi, bytecode }.
 */
async function main() {
  const [artifactPath, ctorJson = "[]"] = process.argv.slice(2);
  if (!artifactPath) {
    console.error("Usage: npm run deploy-contract -- &amp;lt;artifact.json&amp;gt; '[constructorArgsJson]'");
    process.exit(2);
  }

  const artifactRaw = readFileSync(artifactPath, "utf8");
  const artifact = JSON.parse(artifactRaw);
  const { abi, bytecode } = artifact ?? {};
  if (!abi || !bytecode) {
    throw new Error("Artifact must contain { abi, bytecode }");
  }

  let args: unknown[];
  try {
    args = JSON.parse(ctorJson);
    if (!Array.isArray(args)) throw new Error("constructor args must be a JSON array");
  } catch (e) {
    throw new Error(`Failed to parse constructor args JSON: ${String(e)}`);
  }

  const sk = await getEvmSecretKey(KEY_ID);
  // NOTE: This demo trusts the configured RPC provider. For production, prefer a
  // light client (for example, Helios) so you can verify remote chain state.
  const wallet = secretKeyToWallet(sk).connect(makeProvider(RPC_URL, CHAIN_ID));
  const { address, receipt } = await deployContract(wallet, abi, bytecode, args);

  console.log(JSON.stringify({ contractAddress: address, txHash: receipt.hash, status: receipt.status }, null, 2));
}

main().catch((e) =&amp;gt; {
  console.error(e);
  process.exit(1);
});
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  &lt;strong&gt;Hardhat (contracts only)&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;At this stage, we will need minimal config to compile &lt;strong&gt;Counter.sol&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;hardhat.config.ts&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;import type { HardhatUserConfig } from "hardhat/config";

const config: HardhatUserConfig = {
  solidity: {
    version: "0.8.24",
    settings: {
      optimizer: { enabled: true, runs: 200 }
    }
  },
  paths: {
    sources: "./contracts",
    artifacts: "./artifacts",
    cache: "./cache"
  }
};

export default config;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Point to note is that local compilation is optional, so you can skip it if you want. Next step is a choice - either delete the existing &lt;strong&gt;contracts/Lock.sol&lt;/strong&gt; file or you can update it to Solidity &lt;strong&gt;version 0.8.24&lt;/strong&gt;.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;npx hardhat compile
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  &lt;strong&gt;Containerize&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;This is an essential step. Here, you need to a Dockerfile that builds TS and compiles the contract. The file will also run the &lt;strong&gt;smoke test&lt;/strong&gt; once, and then stand idle while you inspect logs.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Dockerfile&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;FROM node:20-alpine
WORKDIR /app

COPY package.json package-lock.json* ./
RUN npm ci

COPY tsconfig.json ./
COPY src ./src
COPY contracts ./contracts
COPY hardhat.config.ts ./
RUN npm run build &amp;amp;&amp;amp; npx hardhat compile &amp;amp;&amp;amp; npm prune --omit=dev

ENV NODE_ENV=production
CMD ["sh", "-c", "node dist/scripts/smoke-test.js || true; tail -f /dev/null"]
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Next, you must mount &lt;strong&gt;appd socket&lt;/strong&gt; provided by ROFL. Rest assured that no public ports are exposed in the process.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;compose.yaml&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;services:
  demo:
    image: docker.io/YOURUSER/rofl-keygen:0.1.0
    platform: linux/amd64
    environment:
      - KEY_ID=${KEY_ID:-evm:base:sepolia}
      - BASE_RPC_URL=${BASE_RPC_URL:-https://sepolia.base.org}
      - BASE_CHAIN_ID=${BASE_CHAIN_ID:-84532}
    volumes:
      - /run/rofl-appd.sock:/run/rofl-appd.sock
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  &lt;strong&gt;Build the image&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;It is important to remember that ROFL only runs on Intel TDX-enabled hardware. So, if you're compiling images on a different host, such as macOS, then passing the &lt;strong&gt;--platform linux/amd64&lt;/strong&gt; parameter is an essential extra step.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;docker buildx build --platform linux/amd64 \
  -t docker.io/YOURUSER/rofl-keygen:0.1.0 --push .
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;An interesting point to note here is that you can opt for extra security and verifiability. You just need to pin the digest and use &lt;strong&gt;image: ...&lt;a class="mentioned-user" href="https://dev.to/sha256"&gt;@sha256&lt;/a&gt;:...&lt;/strong&gt; in &lt;strong&gt;compose.yaml&lt;/strong&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Build ROFL bundle&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;There is a step that you must take before running the &lt;strong&gt;oasis rofl build&lt;/strong&gt; command. Since building the image segment comes after containerization, you will need to update the &lt;strong&gt;services.demo.image&lt;/strong&gt; in &lt;strong&gt;compose.yaml&lt;/strong&gt; to the image you built.&lt;br&gt;
For simple TypeScript projects, like this one, there is sometimes a possibility that the image size is larger than anticipated. It is thus advisable to update the &lt;strong&gt;rofl.yaml&lt;/strong&gt; &lt;strong&gt;resources&lt;/strong&gt; section to at least: &lt;strong&gt;memory: 1024&lt;/strong&gt; and &lt;strong&gt;storage.size: 4096&lt;/strong&gt;.&lt;br&gt;
Now, you are ready.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;oasis rofl build
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;You can next publish the enclave identities and config.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;oasis rofl update
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  &lt;strong&gt;Deploy&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;This is an easy enough step where you deploy to a Testnet provider.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;oasis rofl deploy
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  &lt;strong&gt;End‑to‑end (Base Sepolia)&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;This is a 2-step process, although the second step is optional.&lt;br&gt;
First, you view smoke‑test logs.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;oasis rofl machine logs
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;If you have completed all the steps till now correctly, you will see in the output:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;App ID&lt;/li&gt;
&lt;li&gt;EVM address and a signed message&lt;/li&gt;
&lt;li&gt;A prompt to fund the address&lt;/li&gt;
&lt;li&gt;Once funding is done, a Counter.sol deployment&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Next, local dev. Here, you need to run &lt;strong&gt;npm run build:all&lt;/strong&gt; command to compile the TypeScript code and the Solidity contract. Skip this step if not needed.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt; export ALLOW_LOCAL_DEV=true
 export LOCAL_DEV_SK=0x&amp;lt;64-hex-dev-secret-key&amp;gt;   # DO NOT USE IN PROD
 npm run smoke-test
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  &lt;strong&gt;Security &amp;amp; notes to remember&lt;/strong&gt;
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Provider logs are not encrypted at rest. So, **never **log secret keys.&lt;/li&gt;
&lt;li&gt;The appd socket &lt;strong&gt;/run/rofl-appd.sock&lt;/strong&gt; exists &lt;strong&gt;only inside ROFL&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;There may be rate limits in public RPCs. So, it is advisable to opt for a dedicated Base RPC URL.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;There is a key generation demo in the Oasis GitHub, which you can refer to as an example of this tutorial. &lt;a href="https://github.com/oasisprotocol/demo-rofl-keygen" rel="noopener noreferrer"&gt;https://github.com/oasisprotocol/demo-rofl-keygen&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now that you have successfully generated a key in ROFL with &lt;strong&gt;appd&lt;/strong&gt;, signed messages, deployed a contract, and moved ETH on Base Sepolia, let us know in the comments section your feedback. For a quick chat with the Oasis engineering team for help with specific issues, you can drop your comments in the &lt;strong&gt;dev-central channel&lt;/strong&gt; in the official &lt;a href="https://discord.com/invite/BQCxwhT5wS" rel="noopener noreferrer"&gt;Discord&lt;/a&gt;.&lt;/p&gt;

</description>
      <category>tutorial</category>
      <category>web3</category>
      <category>solidity</category>
      <category>devex</category>
    </item>
    <item>
      <title>Developing in Web3: Deploying Privacy-First dApps with Sapphire + ROFL</title>
      <dc:creator>DC</dc:creator>
      <pubDate>Tue, 20 Jan 2026 06:28:08 +0000</pubDate>
      <link>https://dev.to/dc600/developing-in-web3-deploying-privacy-first-dapps-with-sapphire-rofl-aof</link>
      <guid>https://dev.to/dc600/developing-in-web3-deploying-privacy-first-dapps-with-sapphire-rofl-aof</guid>
      <description>&lt;p&gt;&lt;strong&gt;TL;DR&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Sapphire provides confidential EVM smart contracts. OPL lets existing dApps add privacy without migrating chains.&lt;/li&gt;
&lt;li&gt;ROFL enables verifiable, privacy-preserving off-chain computation.&lt;/li&gt;
&lt;li&gt;Together, Sapphire + ROFL form a full stack for building private, AI-ready web3 applications.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The crypto landscape today is flooded with web3 and AI dApps (decentralized applications). You need to choose the right chain and the right tools to develop and deploy your dApp, as it can make all the difference in attracting the right attention from the end-users. The choices are too many, and they often distract more than add value. It is also hard to come by solid, reliable information to make a decision.&lt;/p&gt;

&lt;p&gt;I believe in Oasis as a pioneer of smart privacy for web3 and AI. Let me tell you point by point why I became a believer.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;The Tech Stack: Sapphire EVM&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;In the blockchain trilemma scene, privacy has always taken the backseat, as most protocols emphasize decentralization and scalability. And then there is the debate and confusion of how to frame the rising privacy narrative - is it privacy coin or privacy blockchain?&lt;/p&gt;

&lt;p&gt;Oasis has emerged as a pioneer in the field of smart privacy. It is a modular L1 blockchain that aims to finally complete the blockchain picture - decentralization, scalability, and privacy (and security) together.&lt;/p&gt;

&lt;p&gt;Privacy-preserving techniques have garnered much attention in recent times. Long before zero-knowledge proofs (ZKPs), fully homomorphic encryption (FHE), and secure multiparty computation (sMPC) became trending, Oasis had adopted trusted execution environments (&lt;a href="https://oasis.net/security-and-tees" rel="noopener noreferrer"&gt;TEEs&lt;/a&gt;) for end-to-end encryption and confidential computation.&lt;/p&gt;

&lt;p&gt;In Oasis &lt;a href="https://oasis.net/sapphire" rel="noopener noreferrer"&gt;Sapphire&lt;/a&gt;, you get the world's first and only production-ready confidential EVM. Its key features help you build better dApps that are privacy-first.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;EVM compatibility&lt;/li&gt;
&lt;li&gt;Private storage&lt;/li&gt;
&lt;li&gt;Encryption precompiles&lt;/li&gt;
&lt;li&gt;Free view calls&lt;/li&gt;
&lt;li&gt;Web2 authentication&lt;/li&gt;
&lt;li&gt;ROFL (runtime off-chain logic)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;So, as a web3 developer, you get to work with smart privacy, cross-chain simplicity, and low technical overhead. How it differs from most other projects also offering privacy solutions is that you get the best of both worlds here - transparent when you need it, confidentiality when it matters. Further, you can build with full spectrum of confidentiality customization - 100% public to 100% private or anywhere in between.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://docs.oasis.io/dapp/sapphire/" rel="noopener noreferrer"&gt;Build with docs&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/oasisprotocol/sapphire-paratime" rel="noopener noreferrer"&gt;Repository research&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=c_N8edT41-Q" rel="noopener noreferrer"&gt;Sapphire 101 video tutorial&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Deployed already? Use the OPL hack&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;But what happens if you have already built your dApp on another EVM chain? It is unfeasible to dismantle everything there and start rebuilding from scratch for the sake of privacy. Acknowledging this dilemma, Oasis offers the services of the Oasis Privacy Layer (&lt;a href="https://oasis.net/opl" rel="noopener noreferrer"&gt;OPL&lt;/a&gt;).&lt;/p&gt;

&lt;p&gt;OPL is simple to use - a few hundred lines of code, practically a plug-and-play solution. Behind the scenes, it uses a message passing bridge and a gas relayer.&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbn4gvzshqlcvnaa42r1n.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbn4gvzshqlcvnaa42r1n.png" alt=" " width="800" height="449"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;It gives the flexibility to leverage Sapphire's features and functionalities for your dApp right from your home network, paying transaction fees with your chain's native token. What you assuredly get from this setup:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Customizable privacy&lt;/li&gt;
&lt;li&gt;Cross-chain convenience&lt;/li&gt;
&lt;li&gt;Productive transparency&lt;/li&gt;
&lt;li&gt;Low complexity&lt;/li&gt;
&lt;li&gt;Access to cryptographic primitives&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Learn more about OPL's technical advantage and utility &lt;a href="https://oasis.net/blog/opl-features-uses-explainer" rel="noopener noreferrer"&gt;here&lt;/a&gt;, and &lt;a href="https://docs.oasis.io/dapp/opl/" rel="noopener noreferrer"&gt;start building&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;The Framework: ROFL&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Now, Sapphire is the runtime on-chain logic, but computation-heavy dApps, with end-to-end encryption and/or powered by AI, are a huge challenge. When you add the criteria that the privacy you get and the computations you process should be verifiable and trustless, the feasibility of doing everything on-chain plummets.&lt;/p&gt;

&lt;p&gt;The challenges mount when dealing with cryptoAI, as it has two main problems - crypto's limited application layer and AI's trust issues. Off-chain computation is a viable answer in this situation. Oasis has thus developed the &lt;a href="https://oasis.net/decentralized-ai" rel="noopener noreferrer"&gt;ROFL&lt;/a&gt; framework, essentially working like a decentralized TEE cloud with on-chain privacy and verifiability.&lt;/p&gt;

&lt;p&gt;ROFL's 5-part architecture involves a hardware layer, an application layer, a remote attestation layer, a blockchain layer, and a user interaction layer. Key features include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Uncapped computational power&lt;/li&gt;
&lt;li&gt;Tamper-proof processing&lt;/li&gt;
&lt;li&gt;Verifiable execution&lt;/li&gt;
&lt;li&gt;Decentralized key management solution&lt;/li&gt;
&lt;li&gt;Direct access to confidential virtual machines&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The reason ROFL is so crucial and pivotal to the next-gen private and trustless web3 and AI dApps can be simply summed up by what it doesn't need, which you will definitely appreciate.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;No chain dependency&lt;/li&gt;
&lt;li&gt;No coding language dependency&lt;/li&gt;
&lt;li&gt;No prior TEE experience&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6uu06g4ui5mdzktn6q3g.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6uu06g4ui5mdzktn6q3g.png" alt=" " width="680" height="383"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Start exploring the scope of ROFL with these resources:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://rofl.app/" rel="noopener noreferrer"&gt;Build with templates&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://docs.oasis.io/build/rofl/" rel="noopener noreferrer"&gt;Build with CLI&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Real-World Integrations&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;The applicability of the Sapphire + ROFL solution, with its impact and scope, is limitless. The features and primitives that ROFL unlocks are also significant.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://oasis.net/blog/decentralized-key-management-agents" rel="noopener noreferrer"&gt;decentralized key management&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://oasis.net/blog/multichain-wallet-agents" rel="noopener noreferrer"&gt;multi-chain wallet control&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://oasis.net/blog/rofl-proxy-frontend-hosting" rel="noopener noreferrer"&gt;frontend hosting&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://oasis.net/blog/erc-8004-trustless-agents" rel="noopener noreferrer"&gt;value add-on for ERC-8004&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://oasis.net/blog/x402-https-internet-native-payments" rel="noopener noreferrer"&gt;value add-on for x402&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Already, multiple live collaborations have transpired.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Zeph&lt;/strong&gt; - developing AI companions empowered by DeAI and DeCC&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Tamarin&lt;/strong&gt; - empowering secure and private cross-border healthcare data analysis&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Tradable&lt;/strong&gt; - trading with privacy-preserving AI insights&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Flashback&lt;/strong&gt; - privacy-first AI training that lets users own and monetize their data&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Plurality&lt;/strong&gt; - confidential reputation scoring and AI context flow&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Talos&lt;/strong&gt; - combining DAO 2.0 and DeFAI in the form of a new model for on-chain sovereign intelligence&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;zkAGI&lt;/strong&gt; - building PawPad, a privacy-preserving platform for trustless trading agents&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Heurist&lt;/strong&gt; - enabling privacy-first MCP servers for AI agents&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Huralya&lt;/strong&gt; - building private AI wellness assistants&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Carrotfunding&lt;/strong&gt; - servicing on-chain prop trading, introducing a new model for parallel verification of the risk and evaluation engine&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://oasisrose.garden/lessons/sovereign-intelligence-the-rise-of-ai-owned-autonomous-protocols/" rel="noopener noreferrer"&gt;Talos&lt;/a&gt; and &lt;a href="https://oasisrose.garden/lessons/verifiable-on-chain-prop-trading/" rel="noopener noreferrer"&gt;Carrotfunding&lt;/a&gt; here deserve special focus, standing out as pathbreaking case studies redefining DeFi.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Final words&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;The takeaway from all this is that what Oasis offers to blockchain and web3 developers is not just some concept - it's something real and tangible. &lt;br&gt;
In a space where half-baked or well-intentioned ideas sound promising but often don't deliver in their execution, a working blueprint for next-gen dApp builders stands out.&lt;/p&gt;

&lt;p&gt;So, if you want to deploy your dApp in a web3 universe where privacy, scalability, trustlessness, and AI-ready performance all matter equally, take a moment to explore Oasis - and help shape what comes next.&lt;/p&gt;

</description>
      <category>webdev</category>
      <category>web3</category>
      <category>verifiablecomputation</category>
      <category>verifiableprivacy</category>
    </item>
    <item>
      <title>Verifiable On-Chain Prop Trading &amp; the Emergence of Trustless Market Infra: A Case Study</title>
      <dc:creator>DC</dc:creator>
      <pubDate>Mon, 19 Jan 2026 13:44:45 +0000</pubDate>
      <link>https://dev.to/dc600/verifiable-on-chain-prop-trading-the-emergence-of-trustless-market-infra-a-case-study-170p</link>
      <guid>https://dev.to/dc600/verifiable-on-chain-prop-trading-the-emergence-of-trustless-market-infra-a-case-study-170p</guid>
      <description>&lt;h2&gt;
  
  
  &lt;strong&gt;TL;DR&lt;/strong&gt;
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;   Prop trading relies on opaque risk engines that traders cannot verify.&lt;/li&gt;
&lt;li&gt;   This creates structural incentives for payout denial and abuse.&lt;/li&gt;
&lt;li&gt;   Carrotfunding introduces parallel verification with Oasis ROFL to audit AWS-based execution.&lt;/li&gt;
&lt;li&gt;   The result is a hybrid architecture that brings verifiable compute, privacy, and trustless settlement to prop trading.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Introduction&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Decentralized trading is one of the most popular applications of cryptocurrency technology. Have we become stagnant in our approach? For example, proprietary (prop) trading, despite being a $60 billion industry, faces a verification crisis common in the modern financial landscape. &lt;/p&gt;

&lt;p&gt;Aspiring traders seek capital from centralized institutions. However, an opaque “black box” operational model widens the gap between the industry's assurances that skill earns reward of capital and the reality where proving performance and worthiness is erratic and arbitrary. &lt;/p&gt;

&lt;p&gt;The web2 paradigm adjudicates trader performance and rewards on private servers that are not auditable. Moreover, the evaluating firms profit more when traders fail, as it means there is less capital disbursement.&lt;/p&gt;

&lt;p&gt;Decentralized finance (DeFi) has blockchain's built-in transparency to solve the blind spots of the traditional web2 approach. However, adoption has been low over the years because on-chain trading has failed to match the speed and complex solutions that traditional institutional finance (TradFi) offers.&lt;/p&gt;

&lt;p&gt;In this post, I will refer to the Carrotfunding case study to examine how it can serve as an example of an emergent trustless market infrastructure. I will first demonstrate the gaps in the incumbent systems, and then show how a framework like Oasis ROFL can elevate the process by bringing decentralization, verifiability, and privacy to the table.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Black Box Evaluation Engine&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;The evaluation engine is the backbone of any prop trading firm. This software logic monitors trader activity, calculates real-time equity, enforces parameters and limitation criteria, and, finally, approves or denies payout requests. Private cloud infrastructure, like AWS, Azure, etc hosts such a risk engine with its access and management entirely in the firm's discretion.&lt;/p&gt;

&lt;p&gt;Sounds simple and is "trusted", right? But the traders can never verify the validity of the metrics on which they are observed and evaluated. Let's now take a look at how ambiguity in rules and retroactively applied rules can result in most payout denials.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Consistency Rule Exploitation&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;A common practice among firms is that a trader's most profitable day cannot exceed a certain percentage of their total profit. This creates an untenable bind for traders when centralized databases can arbitrarily change risk parameters and payout criteria without explicitly detailing them beforehand. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ff2zfxrlgweft1wq8u1sr.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ff2zfxrlgweft1wq8u1sr.png" alt=" " width="800" height="400"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;B-Book Model&lt;/strong&gt;
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;A-Book is when the broker passes a trade to the market involving live liquidity providers and earns a commission.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;B-Book is when the broker keeps the trade internal, where the firm acts as the counterparty to every trade. The broker here keeps the deposit if the trader loses money, and pays out of pocket if the trader wins.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The B-Book model creates an incentive system where a profitable trader becomes a liability. So, the incentive is on the firm to disqualify traders and disadvantage them, and without a verifiable infrastructure, regulators cannot do much.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Liquidity Illusion in Tokenization&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Blockchain technology's initial solution of tokenizing trader performances is more theoretical than practical. Tokenization of trading activities can lead to an illusion of liquidity unsupported by reality. So, tokenization that lacks a robust legal and technical framework can result in zombie assets - tokens exist on-chain, but there is no genuine liquidity market or a reliable mechanism for value accrual. &lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Carrotfunding Case Study: Architecture and Implementation&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Carrotfunding, even before integrating Oasis ROFL, had already implemented web3 solutions for its prop trading venture. Its on-chain liquidity adopts the Arbitrum's gTrade solution for trade execution, while utilizing Rethink Finance for on-chain investment vehicles with gamification mechanics and vault transparency for capital safety. &lt;/p&gt;

&lt;p&gt;This takes care of the execution layer and the capital layer, but what happens to the verifiable compute and security layer? This is the domain of Oasis ROFL, and deserves a closer look.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Parallel Verification Model (Phase 1)&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;In this phase, Carrotfunding continues to use AWS infrastructure for its platform and strengthens it with parallel verification with an ROFL-based auditor. The workflow unfolds in five stages.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;A trader executes a trade on the gTrade platform via the Carrotfunding interface.&lt;/li&gt;
&lt;li&gt;This bifurcates into two distinct paths:

&lt;ul&gt;
&lt;li&gt;Legacy: The trade data goes to Carrot’s AWS execution engine.&lt;/li&gt;
&lt;li&gt;ROFL: The data simultaneously goes to the ROFL node network.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;The computation takes place independently.

&lt;ul&gt;
&lt;li&gt;AWS calculates the impact on the trader's account, for example, the trader's daily profit and loss statement.&lt;/li&gt;
&lt;li&gt;ROFL, running inside a trusted execution environment (TEE), performs the same evaluation using the same code logic.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;ROFL provides attestation and verifiability through comparison. This is based on the cryptographic proof generated from its calculation and submitted on-chain, where both the AWS and the ROFL results are matched.&lt;/li&gt;
&lt;li&gt;The finality of the process is provided by ROFL. If the two results match, no problem. If they differ, then ROFL's result, having cryptographically verifiable proof, is accepted over the AWS result, which might be potentially compromised or based on an erroneous database.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;The “Trustless AWS” Paradigm&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;We can call this architecture “Trustless AWS”. ROFL, often described as a decentralized TEE cloud, enables the best of both worlds in terms of developer experience - the benefits of a centralized cloud, involving deployment of Docker containers and running complex logic, while also having the advantages of the security properties of a blockchain.&lt;/p&gt;

&lt;p&gt;A comparison of the computational models will clarify further.&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fiddv6quz1avu6nlupusi.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fiddv6quz1avu6nlupusi.png" alt=" " width="800" height="280"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;
  
  
  &lt;strong&gt;Proxy-Based Frontend Hosting&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Carrotfunding utilizes the ROFL primitive called proxy-based frontend hosting. Typically, a decentralized application (dApp)'s smart contract logic is on-chain, but the website, which is the frontend, is still hosted in a centralized cloud provider, for example, AWS. So, if the cloud server goes down, the UI is also down.&lt;/p&gt;

&lt;p&gt;With ROFL, Carrotfunding can host the frontend inside the TEE. As a result, the node can automatically provision TLS certificates using a built-in ACME client inside the secure enclave. There is also end-to-end security as a user's connection via SSL terminates only inside the TEE. This protects user privacy, shielding IP addresses and login patterns from the node operator and infrastructure provider.&lt;/p&gt;
&lt;h2&gt;
  
  
  &lt;strong&gt;Secret Management and Proprietary IP&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;For any prop trading firm, keeping its internal risk algorithms secret is how it stays competitive. Full transparency of blockchain technology is counterproductive in this regard. The smart privacy feature of Oasis technology ensures that both transparency and confidentiality can co-exist.&lt;/p&gt;

&lt;p&gt;So, with the code running inside the TEE, Carrotfunding can keep its algorithms private. Here, the hash of the code is accessible publicly for verification, but the source code remains encrypted, out of public viewing scope, and unrevealed to the node operator. &lt;/p&gt;
&lt;h2&gt;
  
  
  &lt;strong&gt;Security: Threat Model and Defense&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Integrating TEE often opens up the question of security, as the SGX/TDX technology can succumb to various vulnerabilities.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Side-Channel Attacks&lt;/strong&gt;: This is mitigated in two ways. The ROFL framework ensures that the latest microcode patches from Intel are used. So, any node that is found without a TEE trusted computing base (TCB) update is rejected by Oasis's confidential runtime on-chain logic, Sapphire's registry. Also, using “data-oblivious” code helps block pattern analysis of memory access.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Oracle Manipulation&lt;/strong&gt;: This is mitigated by simultaneous TLS connections to multiple independent data providers for the price feed, computed inside the enclave for the median price, used to evaluate instead of relying entirely on a single on-chain oracle update.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Key Leakage&lt;/strong&gt;: This is mitigated by a decentralized key management system where the master key is sharded across multiple nodes. So no single node ever possesses the full key. Also, ROFL enables ephemeral keys so that they exist only in volatile memory and will be wiped and lost whenever the enclave restarts or if any tampering is ever attempted.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In addition, the adoption of consensus as a verifier by a Byzantine Fault Tolerance (BFT) network like Oasis ensures that all potential gaps in remote attestations of the TEEs are addressed. &lt;/p&gt;
&lt;h2&gt;
  
  
  &lt;strong&gt;The Verifiability X-factor&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;This is crucial in understanding the role Oasis ROFL plays in upgrading the risk engine of Carrotfunding from what traditional models can provide. Any user can, therefore, audit the system by using the command:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;oasis rofl build –verify
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ul&gt;
&lt;li&gt;Reproducible builds allow users to download the source code, compile it locally using the deterministic build environment provided by Oasis, and obtain the MRENCLAVE hash.&lt;/li&gt;
&lt;li&gt;Users can then query the Sapphire runtime for an on-chain check if their generated hash matches the one registered by active nodes. If yes, it is the immutable proof that the code on GitHub is the code running on the server.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;From Prop Trading to Autonomous Agents (Phase 2)&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Integrating Oasis ROFL to verify the AWS risk engine by Carrotfunding is just the stepping stone to a paradigm shift in prop trading. It aims to evolve into a self-sustaining infrastructure that can ultimately replace the AWS system altogether. &lt;/p&gt;

&lt;p&gt;This full decentralization mode becomes viable only after there is sufficient stability and enough node operators in place to guarantee 99.99% uptime. With the transition to a ROFL-first architecture, the Carrotfunding platform can then use only ROFL nodes to authorize Rethink Finance's capital layer for fund release.&lt;/p&gt;

&lt;p&gt;The evolution of the platform's architecture and functionality into autonomous trading agents is also part of the future roadmap. This envisions a marketplace for verifiable intelligence, where the AI agents compete for capital in a trustless environment, protected by the privacy guarantees of Oasis and the settlement assurances of Arbitrum.&lt;/p&gt;

&lt;p&gt;Decentralized Identity (DID) is another key area to explore since  ROFL can process sensitive personal data (KYC documents) inside the enclave to verify a trader’s identity and reputation score.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Conclusion&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;The study suggests that DeFi can hold its own against TradFi, which had a historical monopoly in the prop trading market. Now, there is a live example of how the limitations of web2 finance, where asset management meant opaque computation logic, can be improved with web3's verification layer to prove the process. &lt;/p&gt;

&lt;p&gt;By removing trust assumptions and plugging the trust gap, Carrotfunding has engineered a system that aligns the incentives of traders, capital providers, and the platform itself. We now await the full decentralization and agentic future for on-chain prop trading, redefining the standards of transparency, security, and efficiency for the next-gen trustless digital asset market.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Resources referred:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://oasisrose.garden/lessons/verifiable-on-chain-prop-trading/" rel="noopener noreferrer"&gt;Oasis Academy course&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://oasis.net/blog/carrot-verifiable-compute-onchain-trading" rel="noopener noreferrer"&gt;Oasis blog on prop trading and Carrot&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://x.com/OasisProtocol/status/2001608407208378697" rel="noopener noreferrer"&gt;Oasis X article&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://x.com/carrotfunding/status/2001678954839539981" rel="noopener noreferrer"&gt;Carrotfunding X article&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="https://oasis.net/blog/rofl-proxy-frontend-hosting" rel="noopener noreferrer"&gt;Oasis blog on ROFL primitive of proxy support for frontend hosting&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://oasis.net/blog/decentralized-key-management-agents" rel="noopener noreferrer"&gt;Oasis blog on decentralized key management&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://oasis.net/blog/tee-attestation-is-not-enough" rel="noopener noreferrer"&gt;Oasis blog on attestation is not enough&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>trading</category>
      <category>onchain</category>
      <category>verifiability</category>
      <category>web3</category>
    </item>
    <item>
      <title>Why I Believe Verifiable TEEs Can Become Essential For Blockchain Security &amp; Privacy</title>
      <dc:creator>DC</dc:creator>
      <pubDate>Thu, 15 Jan 2026 11:33:57 +0000</pubDate>
      <link>https://dev.to/dc600/why-i-believe-verifiable-tees-can-become-essential-for-blockchain-security-privacy-jck</link>
      <guid>https://dev.to/dc600/why-i-believe-verifiable-tees-can-become-essential-for-blockchain-security-privacy-jck</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Foia0tsz31fpxi390wi7v.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Foia0tsz31fpxi390wi7v.png" alt=" " width="716" height="406"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Last year, I began digging seriously into trusted execution systems (TEEs) as a foundation for blockchain security systems and as a privacy-preserving technique. The findings convinced me of the viability of TEEs. First, I will briefly recap my reasoning and then share fresh evidence that bolsters my belief in verified TEEs.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Privacy scorecard: TEEs and others&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbu7h1xglydxhpz0i4k7d.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbu7h1xglydxhpz0i4k7d.png" alt=" " width="800" height="380"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;For a long time, thanks to the penchant for zero-knowledge proofs (ZKPs) by Ethereum and other L2s, TEEs remained in the periphery. With other privacy solutions as options in the mix, too, TEEs captured the attention of very few. &lt;/p&gt;

&lt;p&gt;This perception has, gradually but surely, been changing with &lt;a href="https://oasisprotocol.org/blog/tees-web3-summary" rel="noopener noreferrer"&gt;research&lt;/a&gt; demonstrating that TEEs play a crucial role as the optimal infrastructure in building the next-gen web3 and AI. &lt;br&gt;
The success and popularity of the five editions of the Afternoon TEE Party - Devcon Bangkok in late 2024, and ETHDenver, Token2049 Dubai, EthCC Cannes, and Devconnect Buenos Aires across 2025 also are testament to how TEEs are finding recognition and acceptance steadily.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Remote Attestation: Integral TEE Component&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4l7p96lkhtqqsfnhsu54.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4l7p96lkhtqqsfnhsu54.png" alt=" " width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;How TEEs function is as simple as the image above. But verifiability is always essential, and this is where remote attestations come in. Attestation in tandem with reproducible builds critically enhances the integrity and trust for TEEs. So, you know that software built from the same source code always produces identical binaries. &lt;/p&gt;

&lt;p&gt;We all know virtual machines (VMs) and cryptography are the backbone of blockchain technology, and the crux of the matter is that protocols need remote attestation to mitigate vulnerabilities. Oasis Foundation Director, Jernej Kos, did a deep dive technical analysis on the &lt;a href="https://oasisprotocol.org/blog/tees-remote-attestation-process" rel="noopener noreferrer"&gt;remote attestation&lt;/a&gt; process. &lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Attestation Is Not Enough&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpm6gqy7cxj23iklkdycu.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpm6gqy7cxj23iklkdycu.png" alt=" " width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This is new research and consolidates how TEEs stand the test of being a prominent player in blockchain security and privacy. It underlines how attestation needs to be fortified with other aspects to make TEEs truly formidable.&lt;/p&gt;

&lt;p&gt;What we get from TEEs are facts, and they are undisputed.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Privately run code with all fully-encrypted off-chip state gives &lt;strong&gt;isolated execution&lt;/strong&gt;. &lt;/li&gt;
&lt;li&gt;Cryptographic keys built in the CPU itself, used to encrypt data and sign attestation messages gives &lt;strong&gt;per-CPU root of trust&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Proof of a specific binary code running in a specific enclave from &lt;strong&gt;remote attestation&lt;/strong&gt;, as mentioned.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Let's now examine why attestations may fall short of expectations, what the missing pieces are that need to be addressed, and a potential solution.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;What Attestation Actually Proves&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Now, unless you are a hardware security expert, verifying an SGX/TDX quote is a stiff challenge. It will involve parsing a multi-KB binary blob, extracting fields, fetching collateral, checking FMSPC, interpreting TCB status, validating cert chains, etc. And, all this leaves the entire security model at risk of collapse at any point.&lt;/p&gt;

&lt;p&gt;Let's assume that you have managed to execute the whole process without failure, but still, the fact remains that the validation is true only for &lt;strong&gt;one moment&lt;/strong&gt;, and not guaranteed for other times when the verification is not run:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;So, the measurement &lt;em&gt;was&lt;/em&gt; correct &lt;em&gt;then&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;The hardware TCB &lt;em&gt;was&lt;/em&gt; acceptable &lt;em&gt;then&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;The quote presented by the operator &lt;em&gt;was then&lt;/em&gt; &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7ykiqu9n8m6sqauye0tt.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7ykiqu9n8m6sqauye0tt.png" alt=" " width="800" height="376"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;None of the assumptions in the right column is the default. This means what we usually get are the presentation of raw attestation data and a row of green checkmarks in the name of verification. So, the burden of proof simply rests on the user, and anyone who isn't an expert simply doesn't know any different.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Missing Pieces &amp;amp; Possible Solution&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;At least half a dozen critical gaps can often be found when taking a deep dive into any TEEs these days that claim to be &lt;strong&gt;&lt;em&gt;verified&lt;/em&gt;&lt;/strong&gt;. &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Freshness &amp;amp; Liveness&lt;/strong&gt;: A quote, once validated, is not refreshed automatically, and the old, pre-verified one is used unless a new one is specifically called for.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;State Continuity &amp;amp; Anti-Rollback&lt;/strong&gt;: Only by anchoring the enclave to a live ledger as the timekeeper can it be ascertained that the data is current for the attested code, and not the case where a malicious host simulates live data by restarting an enclave and feeding it an older version of its encrypted state.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;TCB governance&lt;/strong&gt;: As &lt;a href="https://oasis.net/blog/oasis-tee-vulnerabilities" rel="noopener noreferrer"&gt;demonstrated&lt;/a&gt; by recent security exploits, manufacturers, like Intel in this case, might consider physical attacks (wiretapping, battering ram) out of scope. This calls for stricter threat models for verifiers, where continuous policy checks and additional on-chain measures can plug the trust gap left by outdated or insecure "trusted" CPUs.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Operator Binding&lt;/strong&gt;: Attestation verifies what is running in the code, but there is no accountability for who is running that code. Binding the hardware’s cryptographic identity to a slashable, on-chain operator identity with economic cost for malicious acts can be the answer here.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Upgrade history&lt;/strong&gt;: A transparent history must be a prerequisite to guarantee data confidentiality. It basically means that only a current secure version is not enough; there must be a track record of valid attested versions to check the code continuity, bug fixes and all.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Code Provenance&lt;/strong&gt;: I already mentioned reproducible builds earlier. Without someone being able to independently compile the code and verify that its hash matches the deployed version, attestations are incomplete. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Policy enforcement&lt;/strong&gt;: Only clearly defined policies and their enforcement can define without ambiguity what &lt;em&gt;verified TEEs&lt;/em&gt; mean - which binary should run, which hardware is acceptable, re-attestation frequency, approved locations, etc.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Consensus as Verifier&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;The discussion so far underlines that the architectural design of the TEEs needs sufficient infrastructure support that addresses the gaps, and does it all automatically. A Byzantine Fault Tolerance (BFT) attestation-verifier network is very handy in this respect.&lt;/p&gt;

&lt;p&gt;This takes into consideration that while every client parsing every code all the time might be ideal, that is not feasible. So, what then? The BFT model, where trust in attestation validity is established by the consensus of many. The process would be like this:&lt;br&gt;
&lt;strong&gt;-&amp;gt;&lt;/strong&gt; Stake-bearing, slashable nodes submit enclave attestations and verification evidence&lt;br&gt;
&lt;strong&gt;-&amp;gt;&lt;/strong&gt; A fault-tolerant set of validators collectively verifies hardware TCB, measurements, policies, freshness, etc&lt;br&gt;
&lt;strong&gt;-&amp;gt;&lt;/strong&gt; Consensus agreement on verified identities, operators, and attestation policies becomes the on-chain state&lt;/p&gt;

&lt;p&gt;When it is made open for anyone to verifiably query the on-chain state, &lt;strong&gt;attestations stop being static and complex, and become usable on-chain signals&lt;/strong&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Final words&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://oasis.net/" rel="noopener noreferrer"&gt;Oasis&lt;/a&gt; is a prime example of the type of BFT attestation-verifier network I have been talking about. The fact is that it's just one example, but the principle applies more generally to all who use TEEs.&lt;/p&gt;

&lt;p&gt;So, what makes TEEs truly secure enclaves? When we move away from mere isolated black boxes, and implement processes to get integrated, verifiable components within larger trust systems. &lt;/p&gt;

&lt;p&gt;As a matter of fact, all this can go beyond simple attestations checks, and what I described for on-chain can be extended to trusted off-chain applications. But that is a story for another day.&lt;/p&gt;

</description>
      <category>blockchain</category>
      <category>privacy</category>
      <category>tee</category>
      <category>cryptosecurity</category>
    </item>
    <item>
      <title>ERC-8004 Brings Flexible Trust Models; Oasis ROFL Plugs The Gap</title>
      <dc:creator>DC</dc:creator>
      <pubDate>Tue, 23 Dec 2025 06:22:51 +0000</pubDate>
      <link>https://dev.to/dc600/erc-8004-brings-flexible-trust-models-oasis-rofl-plugs-the-gap-258h</link>
      <guid>https://dev.to/dc600/erc-8004-brings-flexible-trust-models-oasis-rofl-plugs-the-gap-258h</guid>
      <description>&lt;h2&gt;
  
  
  &lt;strong&gt;TL;DR&lt;/strong&gt;
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Autonomous agents working in silos create incompleteness&lt;/li&gt;
&lt;li&gt;Agent-to-Agent (A2A) is great in theory, but full of trust assumptions&lt;/li&gt;
&lt;li&gt;ERC-8004 standardizes agent discovery and ideates flexible trust models, still missing out on security responsibility&lt;/li&gt;
&lt;li&gt;ROFL stands up with a secure compute layer that implements trustlessness and verifiable privacy&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Problem Statement&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;The rise of autonomous agents is all around us. Today, I will talk about the decentralized AI landscape. I think we can all agree that when everyone builds their own solutions without interacting with each other, it only leads to problems like siloed agent frameworks, marketplaces with incompatible schemas, etc. &lt;/p&gt;

&lt;p&gt;Google's A2A starts the conversation on collaboration, as it was donated to Linux. But it has its own set of default trust assumptions, and its functionality is also limited within organizational boundaries.&lt;/p&gt;

&lt;p&gt;So, how do we solve this? ERC-8004 is the answer.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Defining ERC-8004&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;ERC-8004 is the proposed standard that defines a discovery framework for autonomous AI agents on Ethereum. It builds upon A2A in a simplistic design. It consists of 3 on-chain registries serving as the basic primitives for flexible trust models. They lay the groundwork for agents to find, evaluate, and interact with each other trustlessly.&lt;/p&gt;

&lt;p&gt;It is important to understand here that it is not enough. Why? Because the standard does not try to solve the concept of "trust" and only facilitates visibility. So, as a developer, you are left to choose any method to suit your needs. This is what a bootstrapping of the agent economy looks like. Here, discovery and trust emerge organically, but without the complex on-chain logic to guide it, there is no mandatory implementation criteria.&lt;/p&gt;

&lt;p&gt;I will discuss this gap again later; for now, let us elaborate on what the standard does talk about at length.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Core Registries &amp;amp; Flexible Trust Models&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;The 3 core registries ERC-8004 introduces are:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Identity&lt;/strong&gt; - Agents get a unique ID, an address, and a domain pointer. Their capabilities are stored off-chain in a JSON file. As a developer, you can register on-chain; however, the agent's skillsets, along with supported protocols and trust models, stay off-chain, flexible, and ready to update as and when needed.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Reputation&lt;/strong&gt; - Whenever agents accept any task, by default, they pre-authorize the clients to leave feedback. What it signifies is that, irrespective of the fact that the actual data is off-chain, the authorization produces a permanent on-chain audit trail. This enables you, as a developer, to be able to go through the feedback and build your own reputation algorithms. Pretty nifty!&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Validation&lt;/strong&gt; - There are two independent validation mechanisms, and the agents can choose either.&lt;br&gt;
a. &lt;strong&gt;crypto-economic validation&lt;/strong&gt; - Here, validators stake capital and re-execute computations. However, if the validation turns out to be incorrect, the validators get penalised through slashing.&lt;br&gt;
b. &lt;strong&gt;cryptographic validation&lt;/strong&gt; - Here, privacy-preserving techniques like trusted execution environments (TEEs) and zero-knowledge proofs (ZKPs) provide correct execution and enable confidentiality.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;The greatest USP of the ERC-8004 standard is how it defines the trust models as flexible. This is because the validation registry stays agnostic to implementation, without any preference or bias. &lt;/p&gt;

&lt;p&gt;So, for simple tasks, the feedback model accumulates social consensus and provides the basic security as needed. For more complex tasks, such as financial transactions, however, one of the two validation methods outlined above would need to be chosen. &lt;/p&gt;

&lt;p&gt;Is this tiered approach for matching the security level to the use case sufficient? Short answer, no.&lt;/p&gt;

&lt;p&gt;The limitations of this system are fairly evident. The standard's minimalism fosters flexibility, but at the cost of low security and high risk when threats become increasingly complex. It will simply fail against MEV-style attacks on domain registration, feedback manipulation through missing authorization checks, and storage exhaustion from unbounded validation.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Validating With TEEs&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;As promised, in this section, I  will emphasize how to plug the gaps that ERC-8004, despite its best intentions, leaves. I have already mentioned TEEs as one of the major ways of validating with the cryptographic method. Oasis is ideally positioned to step in here thanks to its runtime off-chain logic (ROFL) framework.&lt;/p&gt;

&lt;p&gt;ROFL essentially functions as a decentralized TEE cloud, providing verifiable integrity to all computations. Agents execute inside secure enclaves that generate tamper-proof cryptographic attestations. And everything is verifiable on-chain. For sensitive AI workloads, ROFL processes data confidentially while ensuring correct execution.&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fepwul1lbb6knabtyr3ik.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fepwul1lbb6knabtyr3ik.png" alt=" " width="800" height="449"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Why I think ROFL is a great fit for adding value to the ERC-8004 standard is that it goes beyond basic validation and enables stronger trust minimization and greater autonomy for the agents. &lt;br&gt;
It does so with primitives like decentralized key management, multi-chain wallet control, proxy support for frontend hosting, and a decentralized compute marketplace with granular control over who runs the agent and under what policies.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Adopting ERC-8004&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;As you may have gauged by now, ERC-8004, while very promising, is still in the early phase. You have to admit the problem it set out to solve and somewhat does, and, when paired with ROFL, the powerhouse it can potentially become is exciting. The scope of utility is wide-ranging with far-reaching impact. &lt;/p&gt;

&lt;p&gt;You think of MCP support for broader compatibility, NFT-based agent ownership using ERC-721, more flexible on-chain data storage for reputation, cleaner integration with the x402 payment protocol - ERC-8004 can provide standardisation for all that.&lt;/p&gt;

&lt;p&gt;In fact, with &lt;a href="https://www.x402.org/" rel="noopener noreferrer"&gt;x402&lt;/a&gt; already live in A2A, stewarded by the x402 Foundation and backed by Coinbase/Cloudflare, the distribution opportunity is not limited to Ethereum alone. &lt;br&gt;
Remember that Cloudflare powers approximately one-fifth of all websites. So, its full-fledged support of x402 as the A2A payment primitive is already finding adoption, enabling a growing agent economy. The reason is simple - once discovery and trust are addressed, payments are the logical next piece of the puzzle. But this is a whole other story that would need to be told elsewhere.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Final Words&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Bringing back focus on ERC-8004 as a standard, I believe there is still much room for improvement. Each implementation is also looking to test and prove out different trust models to further strengthen the standard. &lt;br&gt;
If you are interested, you can check out the &lt;a href="https://efdn.notion.site/8004-Devconnect-Builder-Program-271d9895554180aeb4f3eb62e72d8711" rel="noopener noreferrer"&gt;builder program&lt;/a&gt; in place. It is designed to support teams working on everything from DeFi trading agents to code review services to gaming.&lt;/p&gt;

&lt;p&gt;In conclusion, ERC-8004 provides standardized identity and validation. A solid technical foundation for verifiable AI agents, using TEEs or ZKPs or a combination of both, is also in place already. Together, this heralds a new age of agents than we have been experiencing till now. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;References&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://eips.ethereum.org/EIPS/eip-8004" rel="noopener noreferrer"&gt;ERC-8004: Trustless Agents (EIP Draft)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://ethereum-magicians.org/t/erc-8004-trustless-agents/25098" rel="noopener noreferrer"&gt;Ethereum Magicians: ERC-8004 Discussion&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://developers.googleblog.com/en/a2a-a-new-era-of-agent-interoperability/" rel="noopener noreferrer"&gt;Google A2A Protocol Announcement&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Oasis Resources&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;a href="https://oasisrose.garden/lessons/trustless-ai-agents-an-analysis-of-erc-8-004-and-its-synergy-with-oasis-rofl/" rel="noopener noreferrer"&gt;Oasis Academy course&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;ROFL a. &lt;a href="https://docs.oasis.io/build/rofl/" rel="noopener noreferrer"&gt;Docs&lt;/a&gt; b. &lt;a href="https://github.com/oasisprotocol/rofl-app" rel="noopener noreferrer"&gt;GitHub&lt;/a&gt; c. &lt;a href="https://rofl.app/" rel="noopener noreferrer"&gt;App&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Sapphire a. &lt;a href="https://docs.oasis.io/dapp/sapphire/" rel="noopener noreferrer"&gt;Docs&lt;/a&gt; b. &lt;a href="https://github.com/oasisprotocol/sapphire-paratime" rel="noopener noreferrer"&gt;GitHub&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;CLI a. &lt;a href="https://github.com/oasisprotocol/cli" rel="noopener noreferrer"&gt;GitHub&lt;/a&gt; b. &lt;a href="https://formulae.brew.sh/formula/oasis" rel="noopener noreferrer"&gt;Homebrew&lt;/a&gt;
&lt;/li&gt;
&lt;/ol&gt;

</description>
      <category>agents</category>
      <category>web3</category>
      <category>decentralizedai</category>
      <category>verifiableprivacy</category>
    </item>
    <item>
      <title>Not to be missed!</title>
      <dc:creator>DC</dc:creator>
      <pubDate>Mon, 22 Dec 2025 07:34:29 +0000</pubDate>
      <link>https://dev.to/dc600/not-to-be-missed-1pn</link>
      <guid>https://dev.to/dc600/not-to-be-missed-1pn</guid>
      <description>&lt;div class="ltag__link"&gt;
  &lt;a href="/dc600" class="ltag__link__link"&gt;
    &lt;div class="ltag__link__pic"&gt;
      &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2900291%2F39cae2b5-c4d4-436f-a982-cad67f3b24ae.jpg" alt="dc600"&gt;
    &lt;/div&gt;
  &lt;/a&gt;
  &lt;a href="https://zeroday.forem.com/dc600/tees-as-digital-sanctums-architectural-resilience-in-untrusted-environments-4c79" class="ltag__link__link" rel="noopener noreferrer"&gt;
    &lt;div class="ltag__link__content"&gt;
      &lt;h2&gt;TEEs As Digital Sanctums - Architectural Resilience In Untrusted Environments&lt;/h2&gt;
      &lt;h3&gt;DC ・ Oct 21&lt;/h3&gt;
      &lt;div class="ltag__link__taglist"&gt;
        &lt;span class="ltag__link__tag"&gt;#blockchain&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#cryptography&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#privacy&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#tee&lt;/span&gt;
      &lt;/div&gt;
    &lt;/div&gt;
  &lt;/a&gt;
&lt;/div&gt;


</description>
      <category>blockchain</category>
      <category>cryptography</category>
      <category>privacy</category>
      <category>tee</category>
    </item>
  </channel>
</rss>
