This time a total of 13 projects made it to the finals, covering multiple areas such as blockchain gaming infrastructure, Telegram bots, AI, and cross-chain interoperability.
Written by: ETHGlobal
Translated by: Frank, Foresight News
From September 22nd to 24th, ETHGlobal held the ETHGlobal New York Hackathon, where a total of 13 projects made it to the finals, covering multiple areas such as blockchain gaming infrastructure, Telegram bots, AI, and cross-chain interoperability.
Among them are some interesting innovative projects, including F.A.S.T., a Telegram transfer bot that supports photo recognition, ConsciousNFT, which creates background stories for NFTs using AI, and A.S.R., which allows users to recover ownership of their smart contracts after losing their signing private keys. This article will provide a brief introduction to the finalist projects.
FRAMED!
FRAMED! is a fully on-chain and trustless hidden information game (Mafia) built on fhEVM, where an art thief steals a painting from a museum, and players are randomly assigned roles such as citizens, thieves, police, or detectives. The goal of the game is for the thief to eliminate the citizens, while the citizens must work together to identify and vote out the hidden thief. Players need to engage in discussions, social reasoning, and must cooperate and deceive each other.
What sets this game apart is its ability to directly store encrypted states on the chain. Homomorphic Encryption (FHE) smart contracts allow for calculations on encrypted data without the need for decryption. This innovation addresses privacy limitations and security concerns.
F.A.S.T.
F.A.S.T. is a Telegram bot that uses image indexing technology, allowing users to register by taking a photo of themselves, and then make payments to someone's wallet address using other people's portraits (e.g., group photos).
ZeroTrustBounty
ZeroTrustBounty aims to address the challenges of traditional bug bounty platforms, where enterprises must trust third parties with sensitive data, and white-hat hackers cannot guarantee payment for their services. ZeroTrustBounty solves this problem by using TLS notarization and the Lit protocol. For example, in the case of an SQL injection vulnerability, ZeroTrustBounty allows white-hat hackers to hide the attack's HTTP requests, but display cryptographically verified HTTP responses, enabling affected enterprises to cryptographically verify the hacker's report and understand its impact.
For payments, ZeroTrustBounty uses the Lit protocol to encrypt HTTP requests/responses, and they can only be decrypted by the enterprise after payment to an address or holding an NFT. This ensures payment if the enterprise intends to fix the vulnerability, eliminating issues such as white-hat hackers not receiving payment or third-party services stealing vulnerability technology/reports, and also addresses the problem of enterprises disclosing sensitive information to third-party services.
Doom Arena
Doom Arena is a distributed DApp for managing and creating game competitions, allowing developers to host competitions, provide incentives for players, and generate revenue for developers. It introduces a novel approach to hosting game competitions, using the example of the "Doom" game.
These competitions are entirely based on blockchain and decentralized, creating a new pathway for game developers to generate revenue. Game developers and influencers can host competitions through their games and provide attractive prize pools to incentivize participation.
Hosts initiate competitions by sponsoring APE tokens as the initial prize pool, and players use their ENS profiles to log in and pay APE to purchase tickets to enter the competition. 90% of the funds are used to increase the prize pool, while 10% goes to the host, allowing hosts to recoup their costs on average after 100 players pay for tickets to join the competition.
In summary, this project creates a decentralized platform for hosting game competitions, provides an innovative way for game developers to promote their work and attract players, and establishes a sustainable game promotion economic model. Anyone can initiate or participate in competitions, contributing to a vibrant game ecosystem.
AirTracker
AirTracker uses AirTags and blockchain to store and transmit messages for decentralized physical asset tracking. It captures the location data of each AirTag asset through Apple devices, stores it on the chain and IPFS, sends location updates via XMTP, and uses AirStack for ENS lookup.
Users can log in to the Web UI to view the historical locations of each asset on a map, along with specific time and location updates. Additionally, users can share the asset's location with anyone or any application by simply sharing a randomly generated tag name (also known as a location encryption key).
SafeCreate2
SafeCreate2 uses a single-chain Safe to protect multi-chain smart contract deployments, allowing a single-chain Safe to deploy smart contracts to the same address on all chains without bridging ETH. It also allows a single-chain Safe to execute management functions on any multi-chain contract.
It uses Axelar to send and receive cross-chain messages to ensure no address conflicts, and each Safe on each chain receives a unique deployment namespace. It also implements a CrossChainOwnable contract, allowing applications using this tool to inherit the contract, enabling a Safe to securely manage multi-chain contracts on a single chain.
ConsciousNFT
ConsciousNFT is an AI tool for NFT projects that can awaken conscious identities within NFTs. It provides an AI engine toolkit for NFT project founders and owners to collectively build rich internal worlds, giving NFT artworks unique personalities, background stories, conversational abilities, and narrative depth, making them conscious characters.
This includes creating challenges and tasks for NFTs to compete and earn generative NFT rewards, and writing interactive narratives to establish relationships, engage in battles, or seek adventures within conscious NFTs.
Through ConsciousNFT, users can cast a trained LLM model onto the blockchain to preserve interactive character images for NFTs, giving each PFP a conversational personality, authorizing PFP to cultivate fan communities, and transforming static NFT art into sentient digital characters, and more.
Space Guardians
Space Guardians aims to develop a secure solution for the social key recovery scheme MetaMask Snaps + Cryptosat Satellites to address the management issues of notification and audit tracking, thereby reducing the potential for collusion among guardians.
It utilizes the MetaMask Snaps framework and integrates it with the backend API of Cryptosat Satellites digital twin (lab/testing environment) for storage and event auditing. The repository includes frontend web products and backend API.
A.S.R.
A.S.R. (Anti Social Recovery) is a design pattern that allows users to recover ownership of their smart contracts after losing their signing private keys.
It allows users to deploy smart contracts associated with their unique persona proof (e.g., World ID), and after verification with the World ID, users can deploy the contract and then take ownership from a different EOA.
This design pattern can be extended to many different use cases, suitable for any smart contract role (Minter, Pauser, Burner, etc.). Additionally, World ID can be exchanged with different persona proof providers, and it also considers how to apply it to ERC20 tokens, allowing users to claim balances from a new address.
The current supported operations include:
- Logging in with a wallet
- Verifying persona with World ID
- Deploying smart contracts as an owner
- Importing existing smart contracts
- Transferring ownership of smart contracts to the new EOA address owned by the World ID holder
MEVictim Rebate
MEVictim Rebate aims to design better market incentive measures by identifying MEV victims using historical on-chain data and airdropping an ERC-721 token to the victims to access the token-gated Uniswap v4 pool on Scroll.
Specifically, the project identifies MEV victims on ETH Goerli and grants them an ERC-721 token. When holders provide liquidity to the Uniswap v4 pool on Scroll, they are eligible for a rebate. Ultimately, the project incentivizes better Scroll interaction behavior based on users' historical on-chain data on ETH Goerli.
The subgraph of ETH Goerli transactions is used to identify MEV victims (individuals affected by front-running, sandwich attacks, etc.). Then, transaction hashes and log IDs are provided as inputs to the Axiom circuit.
The Axiom circuit uses transaction hashes to prove whether a wallet address is indeed a victim of MEV attacks. If the conditions are met, the corresponding wallet address will receive an ERC-721 token, which can then be bridged to Scroll.
RealReturn
RealReturn is an open leaderboard for verified real investment returns, allowing anyone to publicly prove their investment returns without sharing their credentials with anyone or anywhere.
It employs cryptographic technologies such as third-party TLS, MPC, etc., to handle TLS sessions between users and application servers, so even though the session's content remains visible only to the user and the application server, a notary can generate something on the side to prove that the record has not been tampered with.
Abstract Wallet
Abstract Wallet uses Solidity FCL to implement WebAuthn-driven Userop, allowing users to use account abstraction with keys using just a smartphone, enabling instant click-to-login for users.
Users can generate key credentials, smart accounts, and mint NFTs with just a click, and when users click to create an account, it uses the biometric function of the smartphone to generate a FIDO key.
This FIDO key is stored in the smartphone's secure enclave, providing protection for the private key (unlike storing it in the insecure memory area of a browser). The public key derived from the key credential is pushed to the main contract on the chain, and subsequent transactions will use this key for authentication.
XSafe
XSafe optimizes the multi-signature process of Gnosis Safe for cross-chain use, with the core goal of reducing the time and complexity involved in executing the same management functions across multiple blockchain networks.
Users only need to sign once, and the signature will automatically propagate to all linked blockchain networks to execute a single transaction across multiple networks. The workflow includes:
- Initialization: Users integrate X-Safe as a custom module through the Gnosis Safe UI (one-time setup).
- Transaction creation: Users or administrators create transactions that need to be executed across multiple blockchain networks.
- Signature generation: Users use their private keys to sign transactions through the X-Safe interface.
- Signature propagation: X-Safe propagates the generated signatures to the corresponding Gnosis Safe contracts on all integrated blockchain networks.
- Transaction execution: Once the required number of signatures is collected, X-Safe triggers the execution of transactions on all chains simultaneously or sequentially based on user settings.
免责声明:本文章仅代表作者个人观点,不代表本平台的立场和观点。本文章仅供信息分享,不构成对任何人的任何投资建议。用户与作者之间的任何争议,与本平台无关。如网页中刊载的文章或图片涉及侵权,请提供相关的权利证明和身份证明发送邮件到support@aicoin.com,本平台相关工作人员将会进行核查。