Dusk is evolving into a three‑layer modular stack that cuts integration costs and timelines while preserving the privacy and regulatory advantages that set the network apart. The new architecture slots a consensus/data‑availability/settlement layer (DuskDS) beneath an EVM execution layer (DuskEVM) and a forthcoming privacy layer (DuskVM). Multilayer Architecture The multilayer architecture is achieved by integrating EIP-4844 into Rusk, the implementation of Dusk node as well as adding a port of optimism as EVM execution layer to settle on Dusk ledger. This brings the following benefits: • DuskDS: Data & Settlement Layer It handles consensus, staking, data availability, native bridge, and settlement. The MIPS-powered pre-verifier on the DuskDS node (i.e. Rusk) checks state transitions before they hit the chain, so there is no 7-day fault window like on Optimism. • DuskEVM: EVM Application Layer It runs standard Solidity contracts via familiar tools. It becomes the primary venue for DeFi and compliant apps, streamlining onboarding for developers, exchanges, and custodians. Moreover, it will also feature Homomorphic Encryption (HE) operations to enable auditable confidential transactions and obfuscated order books, ideal for regulated financial instruments. • DuskVM: Privacy Application Layer Executes complete privacy‑preserving applications using the Phoenix output‑based transaction model and Piecrust virtual machine. Development is led by Dusk’s internal team of expert engineers, in consultation with Lumos (the team that audited Kadcast), an external development organization we are collaborating with for faster rollout. Lumos is assisting with core runtime infrastructure, the DuskDS/DuskEVM bridge, and starter applications.
- Advantages ✓ Operational Efficiency The modular design reduces overhead as each layer can be optimised for its specific role, making the system cheaper to maintain, easier to scale, and more secure. ✓ Faster Time to Market Custom integrations on a bespoke L1 can take 6-12 months and cost 50× more than EVM deployments. Exchanges, for example, spent months adapting to native Dusk, whereas EVM integrations can be completed in weeks. ✓ Plug‑and‑Play Compatibility & Interoperability The EVM Application Layer uses standard Ethereum tooling and removes the need for custom explorers or proprietary wallets. External EVM dApps can migrate to Dusk and bring their user base while gaining native compliance, access to regulated tokenised assets, privacy‑preserving infrastructure, and a fully licensed environment. ✓ Controlled State Growth DuskDS stores only succinct validity proofs; execution‑heavy state lives on the application layers, keeping full‑node hardware requirements low. @Dusk #Dusk $DUSK
At the core of Dusk’s security model is a carefully curated suite of cryptographic primitives, many of which Dusk has helped pioneer. From the first Rust implementation of PLONK to research on PlonKup, FORT, and both the Reinforced Concrete hash and Poseidon Hash, Dusk has been pushing the state of the art to combine institutional-grade privacy with verifiable performance. Other building blocks such as BLS12-381, JubJub, Schnorr, sparse Merkle tree, and the PLONK proving system, form the low-level toolkit that powers Dusk. • Dusk primitives
At the foundation of Dusk’s architecture are the cryptographic primitives - BLS12_381, JubJub, Schnorr and Poseidon. These cryptography tools provide the robust security and privacy features of the network. Besides these, we also make use of our own Merkle tree implementation called dusk-merkle, and our own PLONK proving system. • BLS12_381 BLS12_381 is a pairing-friendly elliptic curve used within Dusk to enable aggregation of signatures, which significantly reduces the amount of data to be stored and transmitted over the network, improving overall efficiency of the blockchain. This curve is especially crucial in the context of zero-knowledge proofs, where it provides the backbone for secure and private transactions. • JubJub JubJub is an elliptic curve specifically designed to enable fast, secure zero-knowledge proofs. This curve is utilized within Dusk for the construction of efficient zk-SNARKs, allowing transactions and contracts to maintain privacy and integrity without the need to reveal underlying data. • Schnorr Signatures Schnorr signatures are a type of digital signature scheme. They offer resistance against forgery. In Dusk, Schnorr signatures contribute significantly to securing user transactions and smart contract interactions. They ensure that only valid transactions are processed and added to the blockchain. • Poseidon Poseidon is a cryptographic hash function specifically designed for use in zero-knowledge circuits. It is optimized for performance, security and data integrity within Dusk. By producing a unique hash value for every distinct input, it forms the heart of Dusk’s data structures, making it virtually impossible to alter transaction data once it’s included in the blockchain. • Dusk-Merkle Dusk also includes a custom, sparse Merkle tree implementation that is agnostic to the choice of hash function. Merkle trees are a fundamental part of many blockchains, enabling efficient and secure verification of large data structures. The Dusk Merkle tree is designed for flexibility and performance, given it’s used in multiple locations like the stake and transfer contract, and Citadel. • PLONK PLONK is a versatile proof system developed to facilitate the implementation of zero-knowledge proofs. It forms the core of Dusk’s proof system, allowing efficient and private transactions on the network that are both small in proof size and fast to verify. With PLONK, developers can define custom and reusable circuits that can be integrated into Dusk based smart contracts.
Succinct Attestation (SA) is the native Proof-of-Stake (PoS) consensus protocol for the Dusk network, designed to achieve fast finality and high security in a decentralized network. • Core Mechanics ✓ Provisioners' Role: Stakers or provisioners, are those who maintain the network by generating blocks and validating them. ✓ Deterministic Sortition (DS): SA uses a DS algorithm to make sure decentralization occurs without a central coordinator. This process is non-interactive and allows provisioners to determine locally whether they have been selected for a particular role without having to communicate with anybody beforehand. ✓ Dynamic Selection: At each newly coming block, the DS selects: 1. One Block Generator: One node that has the job of proposing the next block. 2. Voting Committees: Uniquely composed groups of provisioners who validate and vote for the validity of a proposed block. • Features: ✓ Permissionless: Any user who meets the staking requirements of Dusn can become a provisioner. ✓ Succinctness: It minimizes the amount of data that needs to be transmitted for validation, according to its design. It easily justifies the network's focus on privacy and efficiency. ✓ Instant Finality: Unlike probabilistic systems that opt for eventual settlement-like Bitcoin-S Hamp;S will seek to settle transactions the instant they occur, meaning once a block is added, it cannot be reversed or reorganized.
Dusk utilizza l'Attestazione Succinta (SA), un protocollo di proof-of-stake basato su comitato progettato specificamente per applicazioni finanziarie orientate alla privacy e regolamentate, dove i partecipanti chiamati fornitori convalidano i blocchi in modo efficiente e sicuro. @Dusk #Dusk $DUSK
Meet the Dusk, where privacy meets performance: Kadcast obfuscates message origins while keeping communication structured and timely. Dusk ensures efficient, resilient peer-to-peer networking without compromising security. @Dusk #Dusk $DUSK
Built on Kademlia DHT, Kadcast tackles traditional P2P issues like high bandwidth use and delayed messages. Dusk’s network stays secure, private, and low-latency, perfect for modern blockchain environments. @Dusk #Dusk $DUSK
Dusk leverages Kadcast P2P to broadcast blocks, transactions, and consensus votes efficiently. By reducing redundancy and collisions, Dusk ensures fast, reliable communication across all nodes—even in low-resource networks. @Dusk #Dusk $DUSK
The vision: Regulated DeFi Dusk network has closed the gap between traditional finance and DeFi by providing blockchain designed specifically for regulation. It's not just bout privacy, it's about compliant privacy. Dusk is the engine for the next generation of institutional finance. @Dusk #Dusk $DUSK
Protocollo di Cambiamento Multi-Stage: Walrus introduce un protocollo di cambiamento multi-stage per gestire i nodi che partono naturalmente. Questo approccio trasferisce responsabilità in modo efficiente, previene blocchi di scrittura e si allinea perfettamente ai principi di archiviazione sicura e decentralizzata. @Walrus 🦭/acc #Walrus $WAL
Seamless Storage Across Epochs: Walrus ensures continuous read and write availability even as storage nodes churn in a permissionless system. By managing epochs with different committees, Walrus avoids resource races and ensures smooth operation without interrupted access to your data. @Walrus 🦭/acc #Walrus $WAL
The red stuff in the Walrus protocol has two dimensions. • The low-threshold dimension can be used from nodes that did not get the symbols during the write flow to recover what they missed. • The high-threshold dimension can be used for the read flow to prevent the adversary from slowing down honest nodes during challenge periods and collecting sufficient information to reply to challenges. @Walrus 🦭/acc #Walrus $WAL
Walrus protocol has Red stuff, which is the first decentralized storage protocol having ability to work in asynchronous network while supporting storage challenges. The 2D coding allows for different encoding thresholds per dimension, ensuring reliability and verifiable storage. @Walrus 🦭/acc #Walrus $WAL
Walrus è un nuovo approccio allo storage decentralizzato di blob progettato per scalare fino a centinaia di nodi di archiviazione mantenendo alta resilienza con un minimo sovraccarico di archiviazione. Walrus segue un'architettura codificata per cancellazione, consentendo una forte tolleranza ai guasti senza i costi eccessivi di replicazione visti nei sistemi tradizionali. Al centro di Walrus si trova un nuovo protocollo di codifica chiamato Red Stuff. Red Stuff impiega uno schema di codifica bidimensionale (2D) che è intrinsecamente auto-guarente. A differenza dei meccanismi di codifica per cancellazione convenzionali che richiedono una larghezza di banda proporzionale alla dimensione totale del blob durante il recupero, Red Stuff consente la ricostruzione di frammenti persi utilizzando una larghezza di banda proporzionale solo ai dati mancanti, specificamente
Walrus Protocol: The Challenge of Continuous Storage Verification
Regardless of whether a system relies on replication or erasure coding, all decentralized storage networks face a fundamental challenge: ensuring that storage nodes continuously and honestly retain the data they are paid to store.
In open network, economic incentives alone are insufficient. Storage providers must be regularly challenged to prove that they still possess the assigned data and have not silently discarded it. This requirement goes beyond a simple honest-versus-malicious model and addresses rational behavior, where nodes may attempt to minimize costs while still collecting rewards. Existing decentralized storage solutions typically rely on a continuous stream of cryptographic challenges. These mechanisms, however, implicitly assume a synchronous network model, where messages are delivered within known time bounds. Under this assumption, an adversary cannot retrieve missing data from honest nodes quickly enough to fabricate valid challenge responses. Walrus departs from this fragile assumption. Instead of depending on strict network synchrony, Walrus is designed to tolerate asynchrony and adversarial scheduling, ensuring that possession proofs remain sound even when message delays are unpredictable. By decoupling data availability guarantees from timing assumptions, Walrus provides stronger security foundations for decentralized storage in real-world network conditions. In essence, Walrus treats verifiable data retention as a core protocol primitive—robust not only against malicious behavior, but also against rational, incentive-driven strategies in an asynchronous network. Key aspects of Walrus protocol approach include: • Erasure coding foundation • Beyond synchronicity • Incentive alignment • Efficient verification @Walrus 🦭/acc #Walrus $WAL
Walrus treats churn not as afterthought, but as a first-class systems parameter. Erasure coding dramatically reduces storage overhead compared to full replication, but it introduces a subtle operational challenge– node recovery under churn. Walrus naturally favors low-churn environments, which can limit how permission-less the network can be. By optimizing high data availability, verifiability, and predictable recovery costs, Walrus ensures nodes are long-lived and economically incentivized to remain online. @Walrus 🦭/acc #Walrus $WAL
Scalability and Storage Efficiency in Walrus Protocol
Walrus protocol generally falls into two main categories. • The first category includes systems with full replication. The main advantage of these systems is the complete availability of the blob on the storage nodes, which allows for easy access and seamless migration if node goes offline. This setup enables a permissionless environment since storage nodes do not need to rely on each other for file recovery. However, the reliability of these systems hinges on the robustness of the selected storage nodes. For instance, assuming a classic 1/3 static adversary model and an infinite pool of candidate storage nodes, achieving “twelve nines” of security– meaning a probability of less than 10−12 of losing access to a file– requires storing more than 25 copies on the network3. This results in a 25x storage overhead. A further challenge arises from Sybil attacks, where malicious actors can pretend to store multiple copies of a file, undermining the system’s integrity.
• The second category of decentralized storage services uses Reed-Solomon (RS) encoding. RS encoding reduces replication requirements significantly. For example, in a system similar to blockchain operations, with𝑛 nodes, of which1/3maybemalicious, andinanasynchronousnetwork,RSencodingcanachievesufficient security with the equivalent of just 3x storage overhead. This is possible since RS encoding splits a file into smaller pieces, that we call slivers, each representing a fraction of the original file. Any set of slivers greater in total size to the original file can be decoded back into the original file.
The XPL token is the native cryptocurrency of Plasma Layer-1 blockchain. Plasma is designed for stablecoin settlement via PlasmaBFT consensus mechanism that enhances security and speed. It powers smart contracts via a Reth execution layer and incorporates a trust- minimized Bitcoin bridge. @Plasma #Plasma $XPL
How does Plasma (XPL) become the chrome for stablecoin infrastructure?
Individual investors are seeking interest in stablecoins globally. There is a need to remove the stablecoin barriers with free transfers and instant settlement.
But the question arises; Do you really understand stablecoins? Stablecoins are digital assets pegged into USDT, to preserve price stability. Resilience makes them distinct from traditional financial infrastructure. Traditional networks have multiple layers of intermediaries. Each additional layer introduces both time delays and higher costs. Cross-border remittances often require days or weeks to settle, with significant fees. Stablecoins remove these frictions by connecting users directly to blockchain. You need no approvals or permissions. Your transfers can be made instantly, anytime, anywhere with internet access.
Consider an illustrative example. A freelancer in Argentina can open a digital wallet without bank approval to save in dollars. Smart contracts then enable automatic monthly deposits. Currency exchange costs decline from $10 to $0.10. Within seconds of receiving payment, earnings convert into stable dollars, protecting income from inflation.
• Plasma as the chrome of stablecoins :- This statement explains how #Plasma has revolutionized the digital world.
Internet Explorer is the popular website but users tolerated complex plugin installs, frequent crashes, slow performance, weak security and poor standards. Google chrome changed everything, fast performance, multi-processed architecture, and improves security automatically. Within just five years chrome emerged as a global leader. The stablecoin market faces a similar situation. Existing blockchains support stablecoins but like Internet explorer, fail to unlock full potential.
@Plasma enters the market as a dedicated, high-performance Layer-1 blockchain for stablecoins. Just as Chrome redefined the web browser, Plasma aims to redefine stablecoin infrastructure.
1. PlasmaBFT Traditional blockchains often required minutes or even hours for transaction finality. Plasma addresses this problem fundamentally. With its new consensus mechanism, PlasmaBFT, transactions finalize within a second. The Fast HotStuff algorithm accelerates consensus. It secures agreement among participants with fewer steps. Multiple node signatures are aggregated, simplifying verification. The number of messages exchanged per step is also reduced. New block proposals can start without waiting for prior block completion. As a result, overall throughput increases. Under optimal conditions, only two consecutive proofs are needed for finality. Plasma optimizes transaction processing, improving stability across the entire network.
2. EVM Compatibility For developers, the most critical factor is using existing knowledge and tools without modification. Plasma supports all Ethereum applications and tools without code changes. Plasma delivers full EVM compatibility by building on Reth, a high-performance Ethereum client written in Rust. Smart contracts can migrate to Plasma without altering a single line of code, removing major barriers to entry. Plasma integrates seamlessly with the existing Ethereum ecosystem.
3. Native Bitcoin Bridge Plasma is developed a Bitcoin bridge alongside its stablecoin infrastructure. The initiative has two primary goals: issuing BTC-collateralized stablecoins and building a Bitcoin-centered financial ecosystem. In stablecoin systems, the reliability of collateral assets is critical. Bitcoin, is the most secure digital asset available. However, its lack of native smart contract functionality has limited its use as direct collateral. Traditionally, centralized custodians have held Bitcoin and issued wrapped tokens. This model introduced two persistent issues: single points of failure and high transaction costs. Plasma’s native bridge addresses these constraints by enabling Bitcoin to be transferred directly into EVM environments, where it can function as programmable collateral.
4. Zero-Fee USDT Transfers Zero-fee USDT transfers are a core feature enabling Plasma to function as stablecoin infrastructure. As Chrome disrupted browsers with free access, Plasma targets stablecoin adoption through free transfers. Users only need to hold USDT. A system-level paymaster covers transaction fees on their behalf. This applies only to official USDT token transfers. Basic identity checks and transfer limits prevent abuse. In practice, the Plasma Foundation allocates a fee budget to cover gas costs. Users can complete all transactions with USDT alone, without any gas fee.
5. Custom Gas Tokens Traditional blockchains restrict fees to native tokens. Ethereum requires $ETH, Polygon requires $POL, and Tron requires $TRX. Users must manage additional tokens beyond USDT. Plasma removes this friction. Users can pay fees directly with familiar assets such as USDT or BTC. From an approved list, they select a token, and a trusted oracle sets fees based on real-time exchange rates.
6. Confidential Payments A core feature of blockchains is transaction transparency. Anyone can view amounts, senders, and recipients. While this ensures openness, it limits privacy. By contrast, traditional finance protects privacy but relies on regulatory oversight. Plasma is researching a confidential payment module, selectively applied when needed. So that transactions can remain public or private depending on context. Technically, recipient identities are hidden using one-time addresses, and transaction details are encrypted within memos. The system operates in the EVM environment, ensuring DeFi compatibility. Importantly, regulators can still access information when required for anti-money laundering or tax compliance. This balance enables privacy without sacrificing regulatory standards.
Talus x Sui x Walrus: The Next Phase in Onchain AI
Talus is thrilled to partner with Sui to bring our next-gen Talus AI Agents to one of the most innovative Layer 1 ecosystems in Web3. This marks a major milestone in Talus’s mission to pioneer a world where an empowered community leads the integration of AI agents into every facet of digital life. Walrus, a decentralized data storage solution that aligns perfectly with Talus’s emphasis on decentralization, performance, and accessibility. •Why Talus Chose Sui? Since our inception, Talus has been devoted to bringing Talus AI agents to users as quickly as possible. After careful deliberation, we found that Sui offered an ideal environment for our first onchain AI products: Speed to Market – The AI Agent sector is expanding at lightning speed, and deploying Talus Agents on Sui allows us to bring Nexus and other consumer applications to users faster than ever. Strong Ecosystem & Technology – Powered by the Move programming language, Sui delivers exceptional performance and aligns seamlessly with our vision for Nexus and decentralized AI agents. Accelerating the Move Ecosystem – By developing on Sui, we’re also contributing to the broader Move ecosystem. We believe in its potential and want to grow the adoption of this cutting-edge smart contract language. • Enter Walrus Protocol: Decentralized Data Storage A key component of our solution stack is Walrus, a decentralized storage network that securely stores and delivers raw data and media files (think videos, images, PDFs) without compromising performance or accessibility. By leveraging Walrus, Talus ensures that our AI Agents operate with models and data that’s always available, reliable, and safe from any centralized points of failure. This partnership underlines our commitment to robust infrastructure as we scale our onchain AI ambitions. • Meet Tallys: Inhabitants of Lilypad Town Nestled in the wetlands of Lilypad Town, Tallys NFTs grant holders a seat in Tally’s council, guiding the flow of Talus AI Agents on Sui and shaping the future from the water’s edge. There are 5,555 Tallys available. They will be launched and sold directly through our landing page and via Tradeport. Each Tally NFT is uniquely generated, representing our iconic mascot, Tally, the spirit of Talus’s determination, innovation, and community-driven ethos. As a Tally holder, you’ll be a vital part of this new era of crypto and AI, helping define the future landscape of Talus AI Agents on Sui. • How You Can Prepare Get a Sui Wallet – Our products (including the Tallys NFT mint) will launch on Sui. Make sure to download a Sui-compatible wallet—Sui Wallet or Phantom Wallet—to be ready. Join the Talus Community – Membership grants you first access to rewards, upcoming features, exclusive content, and more. Stay Tuned – Our biggest updates are on the horizon, and we will be releasing a minting process blog soon that explains all the ins and outs. If you’re excited about the intersection of Crypto and AI, you won’t want to miss what’s coming next. @Walrus 🦭/acc #Walrus $WAL