Into the Othentic World

We have recently witnessed the rise of shared security and AVS (Actively Validated Services), paving the path for emerging decentralized services.

In the new shared security economy, networks are required to execute diverse on-chain and off-chain computation work that represent unique services offered by AVSs.

AVS developers need to deploy their core service over a trustless execution environment, spin up a network of Operators that run their unique node specifications, reach on-chain agreements on arbitrary computational tasks, distribute rewards, and enforce penalties and slashing based on the Operators' attestations.

AVS developers are responsible for customizing a system that interacts with the shared security layer and developing critical core components that fit the new shared security economy.

Othentic Stack

The Othentic Stack is a self-deploy infrastructure to spin up distributed systems with shared security, with a mission to facilitate the creation of novel computing services.

Leveraging Othentic’s library of production-ready and configurable components, AVS developers can focus on their core service, minimize engineering overheads, and abstract away low-level implementations and error-prone infrastructure details.

The Orchestration Layer for Shared Security
The Orchestration Layer for Shared Security

Introducing Stateless Rollups

Othentic introduces a framework for Stateless Rollups, a promising avenue for decentralized compute scalability, offering a flexible and secure framework for the execution of off-chain computations.

Stateless Rollups are:

  • Computing services that provide services to other networks or applications

  • Decentralized networks that run their own validator set and are compatible with any EVM or non-EVM blockchain

The framework allows AVS developers to self-deploy (1) custom computational services over trustless execution environments, and (2) a network of Operators that run arbitrary compute tasks.

Stateless Rollups such as coprocessors, relayer networks, decentralized RPCs, oracles, ZK provers, exploit prevention systems, privacy-preserving computations, decentralized auth systems, AI inferences, composable data networks, decentralized solvers, and MEV auctions, provide services to other protocols without being constrained by any particular blockchain.

Othentic Task Consensus

An AVS’ operation can be broken down into units called “Tasks.” Each Task represents a unit of work to be carried out by the Operators.

One of the primary goals of Othentic is to support diverse node tasks and enable AVSs to submit unique task specifications.

Othentic Task Consensus is a scheme to execute, validate, and approve any given task.

Powered by a modular consensus engine, the Othentic Task Consensus allows the execution and validation of any computation use case.

The consensus algorithm leverages the leader election mechanism, a process for a quorum of nodes to attest on the execution of a Task, executed by other node. These claims are cryptographically signed to ensure the authenticity and immutability of task execution.

This structure allows AVS Operators to run customizable services, providing a foundation for a wide range of applications.

What’s Next?

The Othentic Stack is an ever-evolving system. As work on the Stack continues, novel modules will be integrated and become available for developers to plug in and configure.

Follow us on Twitter for Othentic alpha and to get in touch.

Subscribe to Othentic
Receive the latest updates directly to your inbox.
Mint this entry as an NFT to add it to your collection.
This entry has been permanently stored onchain and signed by its creator.