
We Built a Private Algorand Network to Crack the Code of Transaction Ordering
15 Jul 2025
Private network tests prove Algorand MEV is a latency race, not a fee auction. Winning requires low-latency connections to high-staked proposer nodes.

Is There Any MEV Left on Algorand? An Empirical Study on Time-Constrained Arbitrage
15 Jul 2025
A study on an Algorand arbitrage algorithm reveals fierce MEV competition, proving opportunities must be captured intra-block, not on finalized states.

It’s Not What You Pay, It’s How Fast You Play: A History of MEV
15 Jul 2025
Research on MEV discovery focuses on cyclic arbitrage, but on FCFS networks like Algorand, latency-based strategies like spamming and backruns dominate.

Know Your Playground: The Essential Guide to Algorand for MEV Enthusiasts
15 Jul 2025
Algorand uses PPoS and FCFS ordering, with key DeFi players like Tinyman using AMMs. MEV searchers must navigate its unique consensus and network layers.

Deconstructing the Latency-Driven MEV Landscape on Algorand
15 Jul 2025
On the FCFS blockchain Algorand, MEV is a latency game. This paper details an arbitrage algorithm and network strategies for prioritized execution.

Secure Off-Chain Execution for Bitcoin Smart Contracts: A Failsafe Protocol
7 Jul 2025
A protocol moves Bitcoin contracts off-chain using signed state updates, slashing fees. Timelocks ensure an honest user can always enforce the contract on-chain

Building Trust on Bitcoin: A Look at How Pre-Signed Transaction Trees Secure Contracts
7 Jul 2025
On-chain Bitcoin contracts are executed as pre-signed transaction trees, where implicit signatures from all parties guarantee fair play and prevent stalling.

A New Blueprint for Bitcoin Contracts: Off-Chain Efficiency, On-Chain Guarantees
7 Jul 2025
A new protocol moves Bitcoin smart contracts off-chain to save fees, with an on-chain failsafe to guarantee correct execution against adversaries.

Efficient Proof Systems: How PoStake, PoSpace, and VDFs Impact Blockchain Security
2 Jul 2025
Explore how adversaries exploit blockchain systems through double spending, selfish mining, and efficient proof systems like PoStake and PoSpace.