#walrus $WAL What makes Walrus special is not just that it stores data, but how it protects it over time. When something breaks, Walrus does not pull data from users again. It reconstructs missing pieces using its internal grid, keeping storage efficient and preventing the endless recovery loops that plague other systems.@Walrus 🦭/acc
#walrus $WAL Walrus was built for a world where servers fail, networks glitch, and operators disappear. Instead of hoping nothing goes wrong, it assumes everything will. By letting data repair itself inside the network, Walrus keeps files available without needing users to reupload or trust any single provider.@Walrus 🦭/acc
#walrus $WAL Traditional decentralized storage systems treat every failure like a disaster. Walrus treats it like routine maintenance. Its RedStuff design allows small missing pieces to be regenerated from nearby data instead of forcing the entire file to be rebuilt, keeping the network stable even under heavy stress.@Walrus 🦭/acc
#walrus $WAL In Walrus geht das Verlieren eines Knotens nicht mit dem Verlust einer Datei einher. Das System verwendet überlappende Daten, die über Zeilen und Spalten verteilt gespeichert sind, um das Fehlende wiederherzustellen. Dadurch kann Walrus sich stillschweigend im Hintergrund selbst heilen, während Benutzer weiterhin Daten lesen und schreiben, ohne etwas bemerkt zu haben.@Walrus 🦭/acc
#walrus $WAL Most storage networks depend on copying full files again and again to survive failures. Walrus takes a different path. Its two dimensional encoding lets the network rebuild only the lost parts, so data stays alive even when many nodes disappear. That is why Walrus can survive churn without becoming expensive.@Walrus 🦭/acc
How Walrus Repairs Missing Files Without Rebuilding Everything
In almost every decentralized storage system built before Walrus, there is a quiet disaster waiting to happen. It is not a hack. It is not a protocol failure. It is something far more ordinary: a storage node simply disappears. Hard drives die. Cloud providers shut down. Operators walk away. Data centers go dark. When this happens in traditional decentralized storage, the system does not just lose a piece of data. It loses a dependency. And to repair that dependency, it usually has to do something incredibly expensive: rebuild the file. This is the hidden tax of decentralized storage. Every time a shard goes missing, the network must collect many other shards, reconstruct the full file, and then create a new shard to replace the missing one. Over time, as nodes churn, this process becomes constant. The system is always re-downloading, re-encoding, and re-uploading. Storage becomes a never-ending recovery machine. Walrus was designed to escape this trap. At the heart of Walrus is a simple but radical idea: missing data should be repaired locally, not globally. And this is exactly what its RedStuff encoding system makes possible. To understand why this is so powerful, we need to understand how Walrus stores data in the first place. Instead of cutting a file into a single line of shards, Walrus arranges the file into a two-dimensional grid. The data is encoded across rows and across columns. Every storage node holds two things: one row and one column from this grid. These are called primary and secondary slivers. This grid is not just a layout. It is a mathematical structure. Each row is an erasure-coded version of the data. Each column is also an erasure-coded version of the same data. That means every piece of the file exists in two independent directions at once. Now imagine one node disappears. In a normal system, a shard is simply gone. The system must gather many shards from across the network and rebuild the entire file to regenerate it. In Walrus, what disappears is a single row slice and a single column slice. But the rest of that row still exists across other columns. And the rest of that column still exists across other rows. The missing pieces can be reconstructed by intersecting these two dimensions. The network does not need the whole file. It only needs the neighbors. This is what makes Walrus self-healing. When a node fails or is caught cheating, other nodes take over its responsibility. They contact a small set of peers that hold the same row and the same column. Using the redundancy built into RedStuff, they reconstruct the missing slivers. These new slivers are then assigned to a replacement node. The rest of the file remains untouched. No user is asked to upload anything. No full file is rebuilt. No massive bandwidth spike occurs. The system heals itself using only the data that already exists. This local repair property changes everything. In traditional erasure-coded systems, recovery cost grows with the size of the file. A 100 MB file costs far more to repair than a 1 MB file. In Walrus, recovery cost depends on how much was lost, not on how big the file is. Losing one sliver costs the same whether the file is small or large. This makes Walrus viable for massive datasets, not just small objects. It also makes Walrus resilient to churn. In a permissionless network, nodes are constantly joining and leaving. In most systems, this churn triggers continuous full-file recoveries that eat bandwidth and slow down the network. In Walrus, churn is handled quietly in the background by many small, cheap repairs happening in parallel. This is why the whitepaper describes Walrus as optimized for churn. It is not just tolerant of change. It expects it. There is also a deep security benefit here. Because data is stored in a grid, it is very hard for a malicious node to pretend to store data it does not have. Its row and column are mathematically linked to the rest of the grid. If it deletes its slivers, it will fail challenges. The inconsistency will be visible to honest nodes, who can prove that the data is missing and trigger recovery. This means Walrus does not rely on trust. It relies on geometry and cryptography. Another important consequence is that Walrus can migrate data across epochs. Walrus operates in epochs, where the set of storage nodes changes over time. When the network moves from one epoch to the next, data must be transferred from the old committee to the new one. In a traditional system, this would require copying enormous amounts of data. In Walrus, only missing slivers need to be reconstructed. Most of the grid can remain intact. The new nodes simply fill in the gaps. This makes long-term operation possible. Walrus does not get slower or more expensive as it ages. It keeps flowing, repairing small pieces as needed, without ever rebuilding everything. What RedStuff really gives Walrus is something rare in infrastructure: graceful degradation. Even if a large fraction of nodes fail, the data does not suddenly disappear. It becomes harder to access, but still recoverable. This gives the system time to heal instead of collapsing. In the real world, nothing is perfect. Machines break. Networks lie. People disappear. Walrus was designed for that world, not for a lab. That is why it does not rebuild files when something goes wrong. It simply stitches the fabric of its data grid back together, one sliver at a time, until everything is whole again. @Walrus 🦭/acc $WAL #walrus
Wie RedStuff Walrus ermöglicht, Daten zu heilen, ohne Dateien erneut hochzuladen
In den meisten dezentralen Speichersystemen wird etwas sehr Einfaches im Laufe der Zeit sehr teuer: Ein Knoten verschwindet. Eine Festplatte versagt Ein Rechenzentrum geht offline Ein Betreiber schaltet ab Ein Cloud-Anbieter ändert seine Richtlinie Wenn das geschieht, ist ein Teil der Daten verloren. Und in fast jedem Speichersystem, das vor Walrus gebaut wurde, ist die einzige Möglichkeit, dies zu beheben, die Neuerstellung der Datei von Grund auf und das erneute Hochladen der Teile. Das bedeutet enorme Bandbreitenkosten, langsame Wiederherstellung und ständigen Druck auf das Netzwerk. Im Laufe der Zeit werden diese Reparaturstürme stillschweigend zur größten versteckten Kostenquelle dezentraler Speicherung.
A person who was only 4 points ahead of me yesterday now has a 100-point lead on the leaderboard, even though the difference between our scores today is just 6 points.
ParvezMayar
--
⚠️ Bedenken bezüglich der CreatorPad-Punkteabrechnung auf der Dusk-Rangliste.
Dies ist keine Beschwerde über die Platzierungen. Es ist eine Anfrage nach Klarheit und Konsistenz.
Laut den veröffentlichten CreatorPad-Regeln sind die täglichen Punkte am ersten gültigen Tag (einschließlich Square/X-Follow-Aufgaben) auf 105 begrenzt, und auf nachfolgenden Tagen (einschließlich Inhalt, Engagement und Handel) auf 95. Über fünf Tage beträgt die angemessene Obergrenze für die kumulierten Punkte.
Auf der Dusk-Rangliste werden jedoch mehrere Konten mit 500–550+ Punkten innerhalb desselben Zeitraums von fünf Tagen angezeigt. Gleichzeitig haben mehrere Kreative... einschließlich mir und anderen, die ich persönlich kenne, das Gegenteil erlebt:
• Ersttag-Beiträge, Trades und Engagements wurden nicht berücksichtigt
• Inhalte, die die Zulassungsbedingungen erfüllten, erzielten null Punkte
• Konten mit weniger als 30 Aufrufen sammelten ungewöhnlich hohe Punkte
• Tägliche Aufschlüsselungen, die sich nicht mit der sichtbaren Aktivität decken
Dies führt zu zwei Problemen:
1. Die Rangliste wird mathematisch inkonsistent mit dem veröffentlichten System
2. Berechtigte Kreative können nicht erkennen, ob das Problem systematisch ist oder selektiv
Wenn Punktmultiplikatoren, Bonusmechanismen oder manuelle Anpassungen aktiv sind, sollte dies klar kommuniziert werden. Falls es Eingabeverzögerungen oder Backend-Fehler am ersten Tag gab, sollte dies anerkannt und korrigiert werden.
CreatorPad funktioniert, wenn die Regeln vorhersehbar und einheitlich angewendet werden. Derzeit deutet die Dusk-Rangliste jedoch darauf hin, dass dies nicht der Fall ist.
Anfrage: Bestätigung der tatsächlichen täglichen und kumulativen Grenzwerte
• Klärung der Bonus- oder Multiplikatormechanismen (falls vorhanden)
• Überprüfung der Eingabefehler am Tag 1 für Beiträge, Trades und Engagement
Markierung zur Sichtbarkeit und Klärung: @Daniel Zou (DZ) 🔶 @Binance Customer Support @Dusk
Es geht um Fairness und Transparenz, nicht um individuelle Punktzahlen.
Why Walrus Uses Two-Dimensional Encoding Instead of Simple Sharding
Most decentralized storage systems look simple on the surface. A file is broken into pieces, those pieces are spread across nodes, and when someone wants the file back, the system collects the pieces and reassembles them. This approach is usually called sharding. It feels logical and clean. But the Walrus whitepaper shows why this intuition breaks down the moment you try to build storage that must survive real-world conditions like node failures, network delays, malicious actors, and long time horizons. Walrus does not just want to store data. It wants to preserve it under stress, across years, across churn, and across adversarial behavior. That is why it does not rely on simple one-dimensional sharding. Instead, it uses a two-dimensional encoding system called RedStuff, and this choice is not cosmetic. It is the foundation of why Walrus can be both cheap and extremely reliable at the same time. To understand this, we first need to understand why simple sharding is fragile. In a typical sharded system, a file is split into chunks. Each chunk goes to a different storage node. If enough chunks are available, the file can be reconstructed. If too many chunks are missing, the file is lost. This is usually combined with erasure coding, where extra repair pieces are added so that some chunks can go missing without killing the file. On paper, this looks strong. In practice, it has a fatal weakness: recovery is global. When a single shard goes missing, the system must gather many shards from many nodes, reconstruct the entire file, and then generate a new shard to replace the missing one. That means recovery is expensive, slow, and bandwidth heavy. Worse, it must happen every time a node goes offline or is replaced. In a permissionless network where nodes constantly come and go, this recovery storm never ends. The system is always trying to heal itself, but healing costs almost as much as storing the data in the first place. That is why traditional decentralized storage either becomes extremely expensive through massive replication, or extremely fragile through slow erasure-coded recovery. Walrus rejects both outcomes. Walrus starts from a different assumption. It assumes that nodes will fail. It assumes that machines will die, disks will break, and operators will disappear. It assumes the network will be asynchronous, meaning messages may be delayed, reordered, or temporarily blocked. Instead of pretending this will not happen, Walrus builds its encoding scheme around it. This is where two-dimensional encoding enters. Rather than slicing a file into one list of shards, Walrus arranges the data into a grid. You can think of the file being laid out into rows and columns. Each row is encoded, and each column is also encoded. The system produces two kinds of pieces: primary slivers and secondary slivers. Each storage node holds one row and one column from this grid. This creates a powerful geometric structure. Every piece of data is protected in two independent directions. If a node disappears, the row can be reconstructed from other columns. The column can be reconstructed from other rows. The data is no longer protected by one fragile chain of shards, but by a web of intersecting encodings. The most important result of this design is local recovery. In simple sharding, when one shard is lost, you often need to touch a large fraction of the entire file to recover it. In Walrus, when a sliver is lost, only its row and column are needed. Recovery happens in a small, bounded neighborhood of the data grid. This keeps bandwidth costs low, makes recovery fast, and prevents cascading repair storms. This local recovery property is what makes Walrus self-healing. The system does not need to re-upload files or rely on users to fix missing data. Storage nodes can repair each other by exchanging only small pieces. Even under heavy churn, where nodes constantly leave and join, the system can keep up because repairs are cheap and parallel. Two-dimensional encoding also changes the security model. In one-dimensional sharding, a malicious node can delete its shard and hope that the system does not notice quickly. In an asynchronous network, where delays are normal, this kind of cheating is hard to detect. Walrus counters this by making every node’s data verifiable through its row and column commitments. If a node claims to store a sliver but cannot produce the correct piece when challenged, the inconsistency is provable. The grid structure ensures that missing data shows up as contradictions between rows and columns. This is why Walrus can run its challenge protocol. Nodes are periodically asked to prove they hold their assigned data. They cannot fake this, because their slivers are mathematically tied to the rest of the grid. Two-dimensional encoding gives the system the ability to detect lies without reconstructing entire files. This also explains why Walrus can use far less storage overhead than replication. Instead of storing 25 full copies of a file to survive failures, Walrus stores about 4.5 times the original size. Yet it achieves comparable or better durability. The grid lets Walrus spread redundancy in a much more efficient way. Every extra symbol contributes to both a row and a column, giving double protection for the same storage cost. Another subtle but crucial advantage is that two-dimensional encoding supports migration. Walrus is designed to run in epochs. Over time, the set of storage nodes changes. Old nodes leave, new ones join. Data must be moved from the old committee to the new one. In a sharded system, this would mean transferring huge amounts of data, because each shard is an independent unit. In Walrus, the grid structure lets the system transfer and repair data incrementally. Missing pieces can be filled in by the new nodes using the remaining rows and columns from the old committee. The cost of migration scales with how much data is actually missing, not with the total size of all stored files. This is why the whitepaper says Walrus optimizes for churn. It does not freeze when the network changes. It flows with it. Two-dimensional encoding also gives Walrus a form of graceful degradation. Even if a large number of nodes fail, as long as enough rows and columns remain, data can still be recovered. The system does not have a sharp cliff where suddenly everything is lost. It fades slowly, giving time for repairs and recovery. In contrast, simple sharding has brittle thresholds. Once too many shards are gone, the file is irrecoverable, no matter how close you were to the limit. Walrus avoids this by turning storage into a geometric problem rather than a linear one. Data lives in a matrix, not in a chain. This is why the choice of two-dimensional encoding is not just a technical trick. It is a philosophical statement about how infrastructure should be built. Walrus assumes the world is messy, adversarial, and unstable. It responds by building a storage system that is redundant in multiple directions, locally repairable, globally verifiable, and economically enforceable. Simple sharding is what you use when you expect the system to be calm. Two-dimensional encoding is what you use when you expect it to be attacked, stressed, and constantly changing. Walrus chose the second, because it is building not for demos, but for decades. @Walrus 🦭/acc $WAL #walrus
#dusk $DUSK Dusk allows banks and funds to use blockchain without exposing their balances, trades, or client data. Unlike public chains, Dusk uses zero-knowledge proofs to keep financial activity private while still fully verifiable. This makes it suitable for real institutions, not just speculative DeFi users.@Dusk
#dusk $DUSK Auf den meisten Blockchains kann jeder alles sehen. Das macht Front-Running, Spionage und Manipulation einfach. Dusk behebt dies, indem Transaktionsdaten verborgen werden, während gleichzeitig nachgewiesen wird, dass die Regeln eingehalten wurden. Das bietet Institutionen die Privatsphäre, die sie benötigen, und Aufsichtsbehörden die Transparenz, die sie verlangen.@Dusk
#dusk $DUSK Dusk was built for regulated assets like stocks, bonds, and funds. These markets cannot operate on fully public ledgers. By combining privacy with compliance, Dusk creates a blockchain that can actually support legal digital securities instead of just anonymous tokens and liquidity pools. @Dusk
#dusk $DUSK DeFi funktioniert für Spekulation, aber sie versagt bei ernsthafter Finanzwirtschaft. Banken benötigen vertrauliche Abwicklung, private Verträge und nachvollziehbare Aufzeichnungen. Dusk liefert alle drei Aspekte mithilfe von Kryptografie statt Vertrauen. Deshalb zielt es auf die institutionelle Akzeptanz ab, anstatt kurzfristiger Hype zu verfolgen.$DUSK
#dusk $DUSK Dusk does not try to replace the financial system. It upgrades it. By letting regulated institutions move assets on chain without exposing sensitive data, Dusk makes blockchain usable for the real economy, not just for traders chasing yields.$DUSK
Crypto likes to pretend that finance is a game. Charts move, memes spread, yields appear out of nowhere, and money flows faster than anyone can explain. This culture created energy, but it also created a distorted idea of what finance really is. Most blockchains today are built for traders, speculators, and short-term opportunists. They are built for degens. Dusk was not. Dusk was built for the part of finance that actually matters: the slow, regulated, deeply structured world of banks, funds, brokers, and institutions that move trillions of dollars every day. This world does not care about hype. It cares about privacy, legal certainty, and risk control. Dusk understands this, and that is why its architecture looks nothing like most crypto networks. Banks do not operate on radical transparency. They operate on confidentiality. Client balances, transaction histories, and trading strategies are legally protected information. Exposing them publicly would violate data protection laws and destroy trust. Most blockchains make this impossible because every transaction is visible to everyone. Dusk flips this model by using zero-knowledge cryptography to keep financial data private while still allowing transactions to be verified. This is not secrecy for criminals. This is confidentiality for lawful institutions. A bank must be able to prove that it followed the rules without showing all of its internal data. A fund must be able to settle trades without revealing its strategy. A regulator must be able to audit activity without turning markets into a surveillance state. Dusk was built around this reality. It provides what public blockchains cannot: privacy with accountability. Degens do not care about this. They chase yield, speed, and hype. If a protocol breaks, they move on. If liquidity disappears, they accept it as part of the game. Banks cannot do that. They have customers, laws, and balance sheets. They need systems that are stable, predictable, and legally defensible. That is why Dusk focuses on regulated assets like tokenized stocks, bonds, and funds instead of anonymous liquidity pools. These assets require shareholder records, compliance checks, and confidential settlement. Dusk’s smart contracts and transaction system were designed to support exactly that. It allows ownership, transfers, and corporate actions to happen on chain without exposing sensitive information to the public. Most crypto chains optimize for speed and throughput because degens want instant trades. Dusk optimizes for finality and correctness because financial markets care more about accurate settlement than flashy numbers. A stock trade that settles wrongly is not an inconvenience. It is a legal disaster. Dusk’s consensus and privacy systems are designed to prevent that kind of failure. Even the way Dusk moves data through its network reflects this philosophy. Instead of gossip-based chaos, it uses structured broadcast so information arrives fairly and privately. No one gets data early. No one can spy on activity. This is how real financial infrastructure works. Degens thrive in environments where rules are loose and risk is someone else’s problem. Banks do not. They need systems that can survive audits, lawsuits, and decades of operation. Dusk is built for that world. It is not trying to replace banks with code. It is giving banks a blockchain that actually fits how finance works. That is why Dusk is designed for banks, not degens. @Dusk $DUSK #dusk
Why Dusk Targets Regulated Finance Instead of DeFi Chaos
Most blockchains were built with a simple idea in mind: everything should be public, and anyone should be able to participate without permission. This worked well for early crypto, but it created a system that is fundamentally hostile to real finance. In public DeFi, every balance is visible, every transaction can be tracked, and every trading strategy is exposed. This is fine for speculation and experimentation, but it is impossible for banks, funds, and regulated institutions that are legally required to protect client data and market integrity. Dusk was built for a different world. Real financial markets depend on three things: privacy, accountability, and legal certainty. A bank must keep customer balances confidential. A hedge fund must protect its trading strategies. A stock exchange must ensure fair execution without leaking information that allows front-running or manipulation. Public blockchains break all three. They replace private ledgers with global transparency, which sounds good in theory but destroys fairness in practice. Dusk solves this by separating what must be provable from what must be visible. Using zero-knowledge cryptography, Dusk allows transactions and smart contracts to be verified without revealing their underlying data. This means a trade can be proven valid without exposing its size. Ownership can be confirmed without revealing identities. Compliance rules can be enforced without turning the blockchain into a surveillance system. This is exactly what regulated finance needs but what normal DeFi chains cannot provide. DeFi chaos exists because there is no native way to enforce or audit rules without exposing everything. When something goes wrong on a public chain, investigators either see too much or too little. Either private data is leaked, or there is no trustworthy record at all. Dusk was designed to produce confidential auditability. Regulators and courts can verify what happened, but competitors and attackers cannot spy on it. This is why Dusk focuses on regulated assets like tokenized stocks, bonds, and funds instead of permissionless yield farms. These assets already exist in a world of law and oversight. They cannot move onto chains that ignore that reality. Dusk gives them a way to use blockchain infrastructure while still respecting financial regulations, data protection laws, and investor rights. Dusk is not trying to escape the financial system. It is trying to modernize it. Instead of turning finance into a casino, it turns blockchain into something that banks, asset managers, and institutions can actually trust. That is why Dusk targets regulated finance instead of DeFi chaos. @Dusk $DUSK #dusk
Most blockchains move data the same way rumors move in a crowd. One person tells a few people, those people tell a few more, and eventually the message spreads. This is how gossip networks work. They are simple, flexible, and good enough for casual systems. But when the data being shared represents financial transactions, validator votes, and settlement decisions, “good enough” is not good enough. Dusk was designed for regulated financial markets, not for meme coins or social tokens. That changes everything about how its network must behave. In finance, the network itself becomes part of the trust system. If messages arrive late, get duplicated, or leak information about who is talking to whom, then privacy, fairness, and even legality can be compromised. That is why Dusk rejects gossip networking and instead uses Kadcast, a structured, cryptographically controlled broadcast system. The Hidden Weakness of Gossip Gossip sounds decentralized, but it has a dangerous property: it is statistical, not deterministic. In a gossip network, when a node sends a transaction or a vote, it randomly chooses peers to forward it to. Over time, most nodes will receive the message. But there is no strict guarantee about who sees it first, who sees it last, or who might not see it at all during congestion or attack. This creates several problems: • Timing leaks : attackers can infer who created or voted on something by watching propagation patterns • Front-running risk : whoever hears a transaction first gains advantage • Unfair validator influence : some validators get information earlier than others • Network instability : during load spikes, gossip collapses into chaos These issues are annoying in DeFi. They are catastrophic in regulated finance. A stock exchange cannot tolerate “maybe your trade arrived on time.” Kadcast: Broadcasting Without Chaos Kadcast is built on a Kademlia-style structured overlay. Instead of randomly shouting into the crowd, every node knows exactly who it must forward messages to. When a transaction, vote, or block is sent: • It is routed through a deterministic tree • Each node has a predefined forwarding role • No node can manipulate who hears first • The network load is evenly distributed This turns message propagation from a rumor mill into a cryptographic delivery system. Every validator receives data in predictable time, through predictable paths, without revealing who originated it. That predictability is what makes privacy and fairness possible at scale. Why This Matters for Financial Privacy Dusk does not just hide transaction amounts. It hides who is doing what, when, and with whom at the network layer. In gossip networks, even if transactions are encrypted, traffic patterns expose: • Who is sending • Who is voting • Who is leading • Who is reacting This is devastating for financial actors. Banks, funds, and institutions cannot allow their strategies to be inferred from network behavior. Kadcast breaks this surveillance model. Because messages move through fixed, balanced paths, traffic analysis becomes meaningless. You cannot tell whether a node originated a transaction or simply forwarded it. Privacy is not added on top. It is baked into how data moves. Why Kadcast Prevents Power Accumulation In gossip networks, nodes with more connections or better bandwidth become information hubs. They see data earlier. They influence outcomes. Over time, they gain soft power. Kadcast removes this advantage. Every node has a mathematically defined position in the broadcast tree. No one can optimize their connectivity to become more important. No one can become an information broker. This is crucial for Dusk’s committee-based consensus, where validator anonymity and fairness are core to security. If no validator can hear or speak earlier than others, collusion and manipulation collapse. Why Regulated Finance Needs Kadcast Financial markets are built on three pillars: • Fair access • Simultaneous information • Verifiable delivery Gossip networks violate all three. Kadcast enforces them. When Dusk settles a private asset trade, distributes a voting message, or confirms a block, every participant receives the data in a controlled, auditable, and non-leaking way. That is what makes it possible to run: • Tokenized securities • Confidential asset transfers • Institutional trading • Regulatory-grade settlements on a public blockchain. The Real Reason Dusk Chose Kadcast Most blockchains choose gossip because it is easy. Dusk chose Kadcast because finance is not easy. If you want a network where: • No one gets information early • No one can spy on behavior • No one can dominate communication • And every message has delivery guarantees then gossip is not a feature. It is a liability. Kadcast is what turns Dusk from just another blockchain into a financial-grade communication layer for the future of on-chain finance. @Dusk $DUSK #dusk