Try   HackMD

What's New in Eth2 - 6 December 2019

Image Not Showing Possible Reasons
  • The image file may be corrupted
  • The server hosting the image is unavailable
  • The image path is incorrect
  • The image format is not supported
Learn More →
Ben Edgington (PegaSysConsenSys — but views expressed are all my own)

Edition 31 at eth2.news

The Who is @twigwam? Edition[1]

Top picks

  • Yay, the Ethereum Foundation Blog is back!
    Image Not Showing Possible Reasons
    • The image file may be corrupted
    • The server hosting the image is unavailable
    • The image path is incorrect
    • The image format is not supported
    Learn More →
    Back through 2014-16 it was a terrific resource. More recently it has been much used pretty much only for announcements. Carl Beekhuizen to the rescue with Validated: Staking on eth2 #0. And in French.
  • Danny Ryan is putting me out of work with Eth2 monster update #5
  • A reminder that Ethereum 2.0 Info is a thing. I've given it a little refresh more to come.

Phase 0: The Beacon Chain implementation

We have new kids on the block! Nethermind has come out of stealth with Cortex, an in-progress Eth2 beacon chain implementation in .Net. Welcome to the party!

Image Not Showing Possible Reasons
  • The image file may be corrupted
  • The server hosting the image is unavailable
  • The image path is incorrect
  • The image format is not supported
Learn More →

Testnet news

Prysmatic Labs' testnet continues to run well, and now boasts not one but two block explorers, from Etherchain and Etherscan respectively. Some people are quite excited about this! And it has just officially become the first public multi-client network, with the news this week that Parity's Shasper client was able to join

Image Not Showing Possible Reasons
  • The image file may be corrupted
  • The server hosting the image is unavailable
  • The image path is incorrect
  • The image format is not supported
Learn More →

But it's not the only testnet in town. Status also has a public testnet with the Nimbus client (tweetstorm here), and Sigma Prime plans to release their Lighthouse-based public testnet in the next few days.

Expect a lot more of this over the next weeks, with clients hopping on to each others' networks from time to time. I'd look out for a proper long-lived, large-scale, multi-client, public network sometime in January.

Deposit contract

Jim McDonald found a front-running weakness in the workflow around the deposit contract when delegating to a staking pool (more detailed write-up here, and Jim's proposed fix). Further discussion on Gitter, and more on Gitter (keep reading). A suggested workaround: don't use a staking pool

Image Not Showing Possible Reasons
  • The image file may be corrupted
  • The server hosting the image is unavailable
  • The image path is incorrect
  • The image format is not supported
Learn More →

Meanwhile, Runtime Verification continues to audit the deposit contract bytecode, with the final report expected later this month. (Depending on what we decide to do or not do about the issue above, I guess).

BLS Signatures

The other blocker to deploying the deposit contract has also been resolved. As reported last time, the standardisation of the BLS signature scheme is now at the point where we are confident enough to adopt it for Eth2. There's a draft implementation for py_ecc. I have some work to do on my own implementation to bring it up to date with the final spec. A decent alternative to spending Christmas with the family

Image Not Showing Possible Reasons
  • The image file may be corrupted
  • The server hosting the image is unavailable
  • The image path is incorrect
  • The image format is not supported
Learn More →

Spec updates

As explained by Danny, a fix to the fork choice rule is in flight, arising from some verification work being done by researchers at San Jose State University. I'm super happy that the spec is getting more scrutiny from academia - this is hugely encouraging.

It was agreed on this week's call that the signing root would be removed from the spec, a simplification that has been widely welcomed.

Networking

Least Authority has audited the discv5 node discovery protocol that we plan to use in Eth2. Full report here. Their main recommendation is to implement a DoS protection mechanism (such as the kind of proof-of-work proposed by Ari Juels and my PegaSys colleague John Brainard way back in 1999). As discussed on the networking call this week, this omission is deliberate for now while other approaches are researched.

Phase 1: Sharding implementation

We are expecting the new sharding spec to be merged and stable around New Year.

Phase 2: Execution environments

Matt Garnett kicked off a terrific conversation on potential Execution Toolchains for Ethereum 2.0. And Will V has written up a bunch of open questions on State Providers and Stateless Networks in Eth2.

Calls

This was the week of calls. Eth2 development has finally sharded itself into a bunch of parallel workstreams.[1]

Client Implementers' call

Call #29 took place on the 5th of December. The original and the best.

Phase 2 call

The inaugural Phase 2 call took place on December 3rd with this agenda. It was not recorded or livestreamed, but there are notes. The plan is for this call to take place monthly. Calls are announced on the Eth2 Phase 2 Telegram channel.

Networking call

The inaugural Eth2 Networking call was on the 4th. My notes and Mamy's notes. Next call in two weeks.

Update: recording of the second call.

Light client call

And the Light Client Task Force call #2 was also on the 4th. I haven't found a recording yet, but will let y'all know if one appears. There is a recording and detailed transcript and notes from the first call on the 4th of November.

Eth 1.x call

The next Eth 1.x call will be on December 17th. Why am I telling you this? Because there are increasing commonalities between the directions of Eth1 and Eth2, and part of the effort is to prepare Eth1 for a transition to Eth2 one day. The future is stateless.

Research

A couple of engineering focused research articles:

The second Legendre PRF bounty has been claimed. As a reminder, the Legendre PRF may be useful for generating multi-party proofs of custody for Phase 1. This needed when you want to trustlessly divide a single stake between multiple validators acting together.

Also on ethresear.ch:

In other news

And finally

I've been doing Advent of Code again. This year in Haskell

Image Not Showing Possible Reasons
  • The image file may be corrupted
  • The server hosting the image is unavailable
  • The image path is incorrect
  • The image format is not supported
Learn More →
Feel free to come and mock my efforts.


Follow me on Twitter and/or Peepeth to hear when the next edition is out 🙌.

 We also have an RSS feed.