Safe CEX design, in detail
Design ideas for safer CEXs
At Accessor Labs we apply cutting-edge cryptographic research to solve the highest-impact problems for institutions and individuals. To this end we also publish (i) commercial analysis and (ii) technical research for business leads, software engineers and cryptographers in web3 and beyond.
We’ve been prototyping a new exchange architecture which combines the trustless, non-custodial features of DEXs with the regulatory, performance and privacy features of CEXs. You can read more about the motivating factors here.
Much of the information from the above post has been condensed into a short 3-minute video which describes the problem as it stands today, outlines a high-level description of a validium solution and lists some potential features of a validium solution as a layer 3 app-specific rollup.
💡 Applied Cryptography | Collaborative Enterprise | Self-Sovereignty
Accessor Labs applies cutting-edge cryptographic research to solve the highest-impact problems for institutions and individuals.
Novel cryptographic primitives, such as zero-knowledge, will transform modern communication. When combined with blockchains and other peer-to-peer networks, we can unlock private and scalable data flows, in pursuit of a more collaborative, creative internet. We see a future in which platforms no longer disempower individuals. Instead, we will be self-sovereign over our own information.
Accessor Labs pursues this vision by (1) identifying high-impact applications of cryptography and (2) building tools, standards and prototypes. In the spirit of open collaboration and to further communal knowledge, we share our research with the world.
Thanks for reading Accessor Labs! Subscribe for free to receive new posts and support my work.