Back to Home

Distributed Systems & Cryptography Posts

Distributed Systems & Cryptography

Deterministic Proof-Of-Receipt Verification For Smart Contract Memos

Why I got obsessed with “receipt memos” I stumbled into a weird bug class while building a decentralized provenance system: the smart contract would ...

May 12, 2026Read more
Distributed Systems & Cryptography

I Built A Tee Attested Log Proof Pipeline For Blockchain Node Metadata

I ran into a weird but real problem while tinkering with blockchain infrastructure: node operators (including me) often have “clean” logs—until you tr...

Apr 29, 2026Read more
Distributed Systems & Cryptography

Building A Defi On-Chain Provenance Receipt For Single-Route Swaps

The itch that started this I kept seeing “audit trails” in DeFi described as events in logs—and every time I dug deeper, I found the same mismatch: ...

Apr 24, 2026Read more
Distributed Systems & Cryptography

Verifiable Timestamped Provenance Via Merkle-Tree Log Anchors

The provenance problem that kept bothering me I kept running into the same failure mode when building “digital provenance” systems: I could store ev...

Apr 17, 2026Read more
Distributed Systems & Cryptography

Timestamped Attestations In Smart Contracts With Cross-Chain Merkle Proofs

The weird problem I ran into: “same event” across chains I was building a small “digital provenance” system where an event—like “sensor reading X is ...

Apr 10, 2026Read more
Distributed Systems & Cryptography

Building An Onchain Twap Oracle From Trade Logs Using Merkle Proofs

I got curious about something that’s annoyingly under-explained in DeFi: how to build a time-weighted average price (TWAP) oracle without trusting a c...

Apr 5, 2026Read more
Distributed Systems & Cryptography

Aave V3 Risk For Erc4626 Vaults Using “Virtual Shares” Mispricing

The problem I stumbled into I spent a weekend trying to wire an ERC4626 vault into a DeFi portfolio and then feed its “share price” into an Aave v3 ...

Apr 3, 2026Read more
Distributed Systems & Cryptography

Air-Gapped Receipt Provenance With Merkleized Attachment Hash Chains

The problem I wanted to solve I once had to prove that a printed, scanned receipt image hadn’t been altered between a vendor’s laptop and an offline ...

Apr 3, 2026Read more