

Interpretation of Botanix: decentralized BTC L2 for network asset management (with interactive tutorial)
Yesterday, Botanix Labs announced that it has completed a total of US$11.5 million in financing, with participation from Polychain Capital, Placeholder Capital and others. Financing will be used to build the decentralized EVM equivalent of BTC L2 Botanix.
Spiderchain combines the ease of use of EVM with the security of Bitcoin. Since the launch of the testnet in November 2023, there have been more than 200,000 active addresses. Odaily will analyze Botanix’s characteristic mechanism and testnet interaction process in this article.
Botanix
According to the official definition, Botanix is a decentralized Turing-complete L2 EVM built on Bitcoin and consists of two core components: Ethereum Virtual Machine (EVM) and Spiderchain. .
EVM uses the PoS mechanism, aiming to use EVM to provide ease of use and versatility, while using the PoW mechanism of the Bitcoin network to provide security, and user rights (Staking) are equivalent to the user’s The number of Bitcoins staked in the multisig wallet.
And Spiderchain is the core mechanism of Botanix. Spiderchain is a set of dynamic, continuously changing, decentralized multi-signature wallets that can protect the security of Bitcoin assets on Botanix. Spiderchain pioneered the "decentralized multi-signature wallet", which is protected by a random subset of participants to achieve a highly decentralized protection mechanism. The official definition may be too confusing and difficult to understand, so we will use the following section to analyze it.
Spiderchain
There is no official definition of BTC L2. One solution is to build an EVM network (that is, the Layer of the Bitcoin network 2) Users deposit assets into the official multi-signature wallet and then "map" them to the EVM network. Except for the cross-chain between L1 and L2, subsequent user operations are only related to the EVM network and no longer consume the Bitcoin network. resource. Transferring assets from this type of L2 is equivalent to destroying the assets from the EVM network, and then releasing the assets to the user from the multi-signature wallet. At this time, the security of assets in multi-signature wallets is the primary concern of users. Previously, several major L2 assets were actually under official control, and the risk of "escaping" has become a major concern and pain point.
Spiderchain aims to solve the centralization problem of asset multi-signature wallets. The name Spiderchain comes from the idea of a multi-signature wallet, in which each "leg" of the spider represents a different participant. Each block will randomly select a group of participating nodes and multi-signature wallets, and the group will participate. for asset management.
Spiderchain calls these nodes Orchestrator. Every time a block is produced on the Bitcoin main network, a new multi-signature wallet will be simultaneously generated to manage the stored Bitcoin assets. Which nodes to choose The management is handled by VRF (verifiable random function), each group has about 100 nodes. The randomness and continuous variability avoid the risk of single point loss of control and the risk of malicious attacks from the project side's super authority.
In addition, Spiderchain’s nodes also have permission-free joining features. Anyone can invest assets to become an Orchestrator node to provide a sufficient number of nodes. According to official disclosures, it currently supports 10,000 to 100,000 full nodes. To achieve decentralization characteristics.
So it’s not difficult to understand if we come back and look at the official definition “Spiderchain is a set of dynamic, continuously changing, decentralized multi-signature wallets”.
In addition to the above features, the operating logic of Spiderchain is similar to that of regular nodes. Users can freely join the creation of nodes, but if there is malicious operation or other bad behavior, the node pledge The assets will be slashed. Security follows the PoS security model. As long as the number of malicious nodes is smaller than other Orchestrator nodes, mathematical security is guaranteed.
Financing details
Rootdata data shows that Botanix has completed two rounds of financing:
The seed round was held in May 2024 It was completed on September 7 with a financing amount of US$8.5 million, with participation from Polychain Capital, Placeholder Capital, Valor Equity Partners, and a series of angel investors such as Andrew Kang, Fiskantes, Dan Held, The Crypto Dog, and Domo.
Pre’s seed round was completed in June 2023, with a financing amount of US$3 million. UTXO Management, Edessa Capital, XBTO Humla Ventures and others participated in the investment.
Test network interaction
Enter the official Faucet and click to add the test network to the wallet
- ##Click to receive the network test token. If you cannot receive it at this site, you can go to other sites to receive it:
Currently, Botanix has launched two applications, AvocadoSwap and Bitzy. The latter requires Access Code to be used. Users can follow the official X account and send private messages to obtain it.
However, it is worth noting that Botanix does not promise the rights and interests of testnet participants. Whether it is worth batch interaction requires readers to make their own decisions.
Conclusion
Botanix’s Spiderchain solution is an important step towards decentralization in BTC L2 in the direction of EVM, and the financing amount is also at a higher level among BTC L2. According to official disclosures, the mainnet is about to be launched, and readers can stay tuned for a long time.
The above is the detailed content of Interpretation of Botanix: decentralized BTC L2 for network asset management (with interactive tutorial). For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



OKX is a global digital asset trading platform. Its main functions include: 1. Buying and selling digital assets (spot trading), 2. Trading between digital assets, 3. Providing market conditions and data, 4. Providing diversified trading products (such as derivatives), 5. Providing asset value-added services, 6. Convenient asset management.

Solve the problem of third-party interface returning 403 in Node.js environment. When we use Node.js to call third-party interfaces, we sometimes encounter an error of 403 from the interface returning 403...

The impact of sharing of Redis connections in Laravel framework and select methods When using Laravel framework and Redis, developers may encounter a problem: through configuration...

The handling fees of the Gate.io trading platform vary according to factors such as transaction type, transaction pair, and user VIP level. The default fee rate for spot trading is 0.15% (VIP0 level, Maker and Taker), but the VIP level will be adjusted based on the user's 30-day trading volume and GT position. The higher the level, the lower the fee rate will be. It supports GT platform coin deduction, and you can enjoy a minimum discount of 55% off. The default rate for contract transactions is Maker 0.02%, Taker 0.05% (VIP0 level), which is also affected by VIP level, and different contract types and leverages

How to avoid the third-party interface returning 403 error in the Node environment. When calling the third-party website interface using Node.js, you sometimes encounter the problem of returning 403 error. �...

The main reasons why you cannot log in to MySQL as root are permission problems, configuration file errors, password inconsistent, socket file problems, or firewall interception. The solution includes: check whether the bind-address parameter in the configuration file is configured correctly. Check whether the root user permissions have been modified or deleted and reset. Verify that the password is accurate, including case and special characters. Check socket file permission settings and paths. Check that the firewall blocks connections to the MySQL server.

The advantage of multithreading is that it can improve performance and resource utilization, especially for processing large amounts of data or performing time-consuming operations. It allows multiple tasks to be performed simultaneously, improving efficiency. However, too many threads can lead to performance degradation, so you need to carefully select the number of threads based on the number of CPU cores and task characteristics. In addition, multi-threaded programming involves challenges such as deadlock and race conditions, which need to be solved using synchronization mechanisms, and requires solid knowledge of concurrent programming, weighing the pros and cons and using them with caution.

SQL IF statements are used to conditionally execute SQL statements, with the syntax as: IF (condition) THEN {statement} ELSE {statement} END IF;. The condition can be any valid SQL expression, and if the condition is true, execute the THEN clause; if the condition is false, execute the ELSE clause. IF statements can be nested, allowing for more complex conditional checks.