This time a total of 13 projects made it to the finals, covering multiple areas such as blockchain gaming infrastructure, Telegram bots, AI, and cross-chain interoperability.
Authored by: ETHGlobal
Translated by: Frank, Foresight News
From September 22nd to 24th, ETHGlobal held the ETHGlobal New York Hackathon, where a total of 13 projects made it to the finals, covering multiple areas such as blockchain gaming infrastructure, Telegram bots, AI, and cross-chain interoperability.
Among them are some interesting innovative projects, including the F.A.S.T. Telegram transfer bot that supports photo recognition, ConsciousNFT which creates background stories for NFTs using AI, and A.S.R. which allows users to recover ownership of their smart contracts after losing their signing private key. This article will provide a brief introduction to the finalist projects.
FRAMED!
FRAMED! is a fully on-chain and trustless hidden information game (Mafia) built on fhEVM, where art thieves steal a painting from a museum, and players are randomly assigned roles such as citizens, thieves, police, or detectives. The goal of the game is for the thieves to eliminate the citizens, while the citizens must work together to identify and vote out the hidden thieves. Players need to engage in discussions, social reasoning, and must cooperate and deceive each other.
What sets this game apart is its ability to directly store encrypted states on the chain. Fully Homomorphic Encryption (FHE) smart contracts allow for computations on encrypted data without the need for decryption. This innovation addresses privacy limitations and security concerns.
F.A.S.T.
F.A.S.T. is a Telegram bot that uses image indexing technology, allowing users to register by taking a photo of themselves, and then make payments to someone's wallet address using portraits of other people (e.g., group photos).
ZeroTrustBounty
ZeroTrustBounty aims to address the challenges of traditional bug bounty platforms where enterprises must trust a third party with sensitive data, and white-hat hackers cannot guarantee payment for their services. ZeroTrustBounty uses TLS notarization and the Lit protocol to solve this problem. For example, in the case of an SQL injection vulnerability, ZeroTrustBounty allows white-hat hackers to conceal the attack's HTTP requests, but display cryptographically verified HTTP responses, enabling affected enterprises to cryptographically verify the white-hat hacker's report and understand its impact.
In terms of payment, ZeroTrustBounty uses the Lit protocol to encrypt HTTP requests/responses, and they can only be decrypted by the enterprise after payment to a specific address or holding an NFT. This ensures payment if the enterprise intends to fix the vulnerability, eliminating issues such as white-hat hackers not receiving payment or third-party services stealing vulnerability technology/reports, and also addresses the problem of enterprises disclosing sensitive information to third-party services.
Doom Arena
Doom Arena is a distributed DApp for managing and creating game competitions, allowing developers to host competitions, provide solutions for players, and generate revenue for developers. It introduces a novel approach to hosting game competitions, using the example of the "Doom" game.
These competitions are entirely based on blockchain and decentralized, creating a new path for game developers in the economic sense. Game developers and influential figures can host competitions through their games, and provide attractive prize pools to incentivize participation.
Hosts initiate competitions by sponsoring APE tokens as the initial prize pool, and players use their ENS profiles to log in and pay APE to purchase tickets to enter the competition. 90% of the funds are used to increase the prize pool, while 10% goes to the host. On average, after 100 players pay for tickets to join the competition, the host can recoup the cost.
In summary, this project has created a decentralized platform for hosting game competitions, providing an innovative way for game developers to promote their work, attract players, and establish a sustainable game promotion economic model. Anyone can host or participate in competitions, contributing to a vibrant gaming ecosystem.
AirTracker
AirTracker uses AirTags and blockchain to store and transmit messages for decentralized physical asset tracking. It captures the location data of each AirTag asset through Apple devices, stores it on the chain and IPFS, and sends location updates via XMTP, using AirStack for ENS lookup.
Users can log in to the Web UI to view the historical locations of each asset on a map, along with specific time and location updates. Additionally, users can share the asset's location with anyone or any application by simply sharing a randomly generated tag name (also known as a location encryption key).
SafeCreate2
SafeCreate2 uses single-chain Safe to protect multi-chain smart contract deployments, allowing a single-chain Safe to deploy smart contracts to the same address on all chains without bridging ETH. It also allows single-chain Safe to execute management functions on any multi-chain contract.
It uses Axelar to send and receive cross-chain messages to ensure no address conflicts, and each Safe on each chain receives a unique deployment namespace. It also implements a CrossChainOwnable contract, allowing applications using this tool to inherit the contract, enabling Safe to securely manage multi-chain contracts on a single chain.
ConsciousNFT
ConsciousNFT is an AI tool for NFT projects that can awaken conscious identities within NFTs. It provides an AI engine toolkit for NFT project founders and owners to collectively build rich internal worlds, giving NFT artworks unique personalities, background stories, conversational abilities, and narrative depth, making them conscious characters.
This includes creating challenges and tasks for NFTs to compete and earn generative NFT rewards, and writing interactive narratives to establish relationships, engage in battles, or embark on adventures within conscious NFTs.
Through ConsciousNFT, users can cast a trained LLM model onto the blockchain to preserve interactive character images for NFTs, giving each PFP a conversational personality, authorizing PFP to cultivate fan communities, and transforming static NFT art into sentient digital characters, and more.
Space Guardians
Space Guardians aims to develop a secure solution for the social key recovery scheme MetaMask Snaps + Cryptosat Satellites to address the management issues of notification and audit tracking, thereby reducing the potential for collusion among guardians.
It uses the MetaMask Snaps framework and integrates it with the backend API set of Cryptosat Satellites digital twin (lab/testing environment) for storage and event auditing. The repository includes frontend web products and backend APIs.
A.S.R.
A.S.R. (Anti Social Recovery) is a design pattern that allows users to recover ownership of their smart contracts after losing the signing private key.
It allows users to deploy smart contracts associated with their unique identity proof (e.g., World ID). After verification with the World ID, users can deploy the contract and then take ownership from a different EOA.
This design pattern can be extended to many different use cases, applicable to any smart contract role (Minter, Pauser, Burner, etc.). Additionally, World ID can be exchanged with different identity proof providers, and it also considers how to apply it to ERC20 tokens, allowing users to claim balances from a new address.
Supported operations include:
- Logging in with a wallet
- Verifying personality with World ID
- Deploying smart contracts as an owner
- Importing existing smart contracts
- Transferring smart contract ownership to the holder of the World ID's new EOA address
MEVictim Rebate
MEVictim Rebate identifies MEV victims using historical on-chain data and airdrops an ERC-721 token to access the token-gated Uniswap v4 pool on Scroll, designing better market incentive measures.
Specifically, the project identifies MEV victims on ETH Goerli and grants them an ERC-721 token. When holders provide liquidity to the Uniswap v4 pool on Scroll, they are eligible for a rebate. Ultimately, the project incentivizes better Scroll interaction behavior based on users' historical on-chain data on ETH Goerli.
The subgraph of ETH Goerli transactions is used to identify MEV victims (individuals affected by front-running, sandwich attacks, etc.). Then, transaction hashes and log IDs are provided as inputs to the Axiom circuit.
The Axiom circuit uses transaction hashes to prove whether a wallet address is indeed a victim of MEV attacks. If the conditions are met, the corresponding wallet address will receive an ERC-721 token, which can then be bridged to Scroll.
RealReturn
RealReturn is an open leaderboard for verified real investment returns, allowing anyone to publicly prove their investment returns without sharing their credentials with anyone or anywhere.
It uses cryptographic technologies such as third-party TLS, MPC, etc., to handle TLS sessions between users and application servers. Even though the session content remains visible only to the user and the application server, notaries can generate something on the side to prove that the records have not been tampered with.
Abstract Wallet
Abstract Wallet uses Solidity FCL to implement WebAuthn-driven Userop. Users can use account abstraction with keys using only a smartphone, enabling instant click-to-login for users.
Users can generate key credentials, smart accounts, and mint NFTs with just a click. When users click to create an account, it uses the biometric function of the smartphone to generate a FIDO key.
The FIDO key is stored in the smartphone's secure enclave, providing protection for the private key (unlike storing it in an insecure memory area like a browser). The public key derived from the key credential is pushed to the main contract on the chain, and subsequent transactions will use this key for authentication.
XSafe
XSafe optimizes the multi-signature process of Gnosis Safe for cross-chain use, with the core goal of reducing the time and complexity involved in executing the same management functions across multiple blockchain networks.
Users only need to sign once, and the signature will automatically propagate to all linked blockchain networks to execute a single transaction across multiple networks. The workflow includes:
- Initialization: Users integrate X-Safe as a custom module through the Gnosis Safe UI (one-time setup).
- Transaction creation: Users or administrators create transactions that need to be executed across multiple blockchain networks.
- Signature generation: Users sign the transaction using their private key via the X-Safe interface.
- Signature propagation: X-Safe propagates the generated signature to the corresponding Gnosis Safe contracts on all integrated blockchain networks.
- Transaction execution: Once the required number of signatures is collected, X-Safe triggers the execution of transactions simultaneously or sequentially on all chains based on user settings.
免责声明:本文章仅代表作者个人观点,不代表本平台的立场和观点。本文章仅供信息分享,不构成对任何人的任何投资建议。用户与作者之间的任何争议,与本平台无关。如网页中刊载的文章或图片涉及侵权,请提供相关的权利证明和身份证明发送邮件到support@aicoin.com,本平台相关工作人员将会进行核查。