🚀Launching BitVMX FORCE : An industry-backed effort to establish BitVMX as the standard for Disputable Computing on Bitcoin.🚀Launching BitVMX FORCE : An industry-backed effort to establish BitVMX as the standard for Disputable Computing on Bitcoin.🚀Launching BitVMX FORCE : An industry-backed effort to establish BitVMX as the standard for Disputable Computing on Bitcoin.🚀Launching BitVMX FORCE : An industry-backed effort to establish BitVMX as the standard for Disputable Computing on Bitcoin.🚀Launching BitVMX FORCE : An industry-backed effort to establish BitVMX as the standard for Disputable Computing on Bitcoin.

Computing on Bitcoin #24
January 31, 2025 - Week 5

Hey everyone! A new edition of Fairgate Weekly is here to bring you the most updated and relevant news in the Disputable Computing scene.

Take a look, and have a great reading.

01

Fede Jinich from RootstockLabs built a Pokémon-like game using BitVMX, demonstrating its flexibility for running arbitrary computations on Bitcoin. The game, written in Zig, simulates a battle where players must select the right character to battle and claim the locked Bitcoins.

blog.rootstock.io
🔗 PKMN_BTTL: A Pokemon Battle Game, Written in Zig and Executed with BitVMX
BitVMX is a two-party optimistic execution protocol that allows the execution of arbitrary computations on Bitcoin. This enables transactions where the spending condition depends on the result of such computation. In this article, we will use it to create a Pokemon-like game, where players must select the right character to battle and claim the locked Bitcoins.

02

Fiamma introduces the Challenge Protocol, a security mechanism for its Bitcoin bridge. It uses fraud challenges and economic incentives to ensure trust-minimized BTC transfers without relying on a majority honest assumption. The protocol enhances security by allowing participants to dispute invalid transactions, reinforcing decentralized enforcement.

medium.com/@Fiamma.io
🔗 BBBB Blog 004: Challenge Protocol
From previous blogs, we understand that the Challenger plays the most crucial role in the Bridge protocol. The entire protocol’s security is predicated on having at least one honest Challenger. Given the importance of Challengers, we aim to increase the number of active Challengers in the operation of the Bridge. To achieve this goal, we propose:
1.Lowering the barriers to entry for becoming a Challenger;
2.Incentivizing the honest actions of Challengers:
· Including verification of true claims;
· Including challenges to false claims;
3. Allowing sufficient time for Challengers to identify malicious behavior and initiate challenges.

03

Bitlayer explores the evolution of BitVM and its role in enhancing Bitcoin’s programmability. The article highlights Bitlayer’s contributions, including Groth16 verifier optimizations, protocol implementations, and plans for Bitcoin rollups. It also discusses BitVM’s bridging mechanisms and dispute resolution.

blog.bitlayer.org/
🔗 BitVM and Bitlayer: Pioneering Bitcoin’s Programmable Future
Bitcoin, the most secure blockchain, and other widely adopted ecosystems, such as Ethereum, operate in silos, limiting their combined potential and introducing significant fragmented liquidity. This gap underscores the need for a trust-minimized cross-chain message relayer and verifier — a component that allows seamless, secure, and verifiable interactions between these ecosystems without compromising decentralization.

04

Syscoin leverages Zero-Knowledge Proofs (ZKPs) and BitVM to enhance blockchain scalability, security, and interoperability. Its modular design integrates Bitcoin’s security with Ethereum-compatible smart contracts, while zkDA and the Robin Bridge enable efficient data availability and trustless BTC transfers.

cryptorank.io
🔗 How Zero-Knowledge Proof is Shaping the Future of Blockchain Interoperability
Yes, blockchain is part of a new internet era but just think of a world where every blockchain could communicate seamlessly. Bitcoin, Ethereum and Binance Smart Chain could exchange data and value without friction.
This interconnected vision is what blockchain enthusiasts have been chasing for years. Yet, the reality is far from this ideal.
The current blockchain ecosystem operates in silos. Each network has unique protocols and architectures which has made communication always a challenge.

05

StarkWare explores how validity proofs and Layer 2 solutions ensure blockchain scalability and security while adapting to future demands.

starkware.co/blog
🔗 Building future-proof blockchain: What does it really mean?
To be future-proof in blockchain means designing systems that meet today’s needs but can also adapt to and withstand the challenges of tomorrow. This requires implementing security measures to protect against emerging threats, including the potential risks of quantum computing, which could compromise traditional cryptographic methods. It also involves achieving scalability through high transaction throughput even when demand spikes.

06

Two articles referring to this relevant event in the industry:
-LambdaClass, in collaboration with 3Mi Labs and Aligned, disclosed an exploit in Succinct’s SP1 zkVM. The vulnerability emerges from the interaction of two distinct security flaws, potentially impacting zero-knowledge virtual machines. The responsible disclosure aims to strengthen security in the ZK ecosystem.
-Succinct addresses the SP1 zkVM vulnerability reported by LambdaClass, 3Mi Labs, and Aligned. The update details the nature of the exploit, security patches, and steps taken to prevent similar issues. It also outlines the impact assessment and recommendations for users.

starkware.co/blog
🔗 Responsible disclosure of an exploit in Succinct's SP1 zkVM, found in partnership with 3MI Labs and Aligned, which arises from the interaction of two distinct security vulnerabilities.
We have seen in several engineering projects the development of long and complex codebases, with too many fearures and poor documentation and testing. Some people believe that having such codebases shows that you are smart, have excellent coding skills and given a lot of thought on everything. We think it otherwise: the proof of mastery lies in simplicity.

blog.succinct.xyz
🔗 SP1 Security Update: 1/27/25
TL;DR There were two vulnerabilities found in SP1 V3, one found by Aligned, LambdaClass, and 3MI Labs and one found by Succinct. There was also one vulnerability found in Plonky3, a critical dependency of SP1, by Lev Soukhanov and Onur Kilic. We sincerely thank these researchers for reporting these issues. These three vulnerabilities are now patched in SP1 Turbo, the latest production version of SP1. We recommend all users of SP1 upgrade to Turbo ASAP, and we have frozen the routers to the SP1 verifier contracts deployed on mainnets.

That's it for this edition of Fairgate Weekly! Don't forget to look for us in your mailbox each week to stay on top of the industry's latest news.
Thanks for reading!