Competing Security Models for Appchains | Nick White, Dev Ojha

Season 3 | Episode 3

In this episode of Bell Curve, Nick White and Dev Ojha join us to debate the pros and cons of applications owning the full tech stack vs leveraging a modular architecture. Applications that own their full tech stack can fully customize their chain (how they process MEV, encryption, etc) but is the overhead and cost worth it? In contrast, the modular ideology supports outsourcing all non-core functions to other providers (similar to how websites outsource payments to Stripe). We cover this debate, Celestia, the role of sequencers, security tradeoffs, the idea of the "minimum viable stack" and more!

- -


(00:00) Intro: Pre-Interview

(02:25) Guest Backgrounds

(04:13) Application Design Philosophies

(10:01) Sequencers: Their Role and Security Tradeoffs

(27:00) Tradeoffs: Focus vs Control

(33:38) Mesh Security, ICS and Restaking

(45:51) SDK Network Effects & the "Minimum Viable Stack"

(55:13) Building Credibly Neutral Software

(1:00:41) How Applications Should Approach MEV

(1:04:02) The Path Ahead

(1:06:19) Recap: Post-Interview

- -

Follow Myles: https://twitter.com/MylesOneil

Follow Mike: https://twitter.com/MikeIppolito_

Follow Nick: https://twitter.com/nickwh8te

Follow Dev: https://twitter.com/valardragon

Subscribe on YouTube: https://bit.ly/3R1D1D9

Subscribe on Apple: https://apple.co/3pQTfmD

Subscribe on Spotify: https://spoti.fi/3cpKZXH

- -






- -

Disclaimer: Nothing said on Bell Curve is a recommendation to buy or sell securities or tokens. This podcast is for informational purposes only, and any views expressed by anyone on the show are solely our opinions, not financial advice. Mike, Jason, Michael, Vance and our guests may hold positions in the companies, funds, or projects discussed.

Other Podcasts from our Network