Original author: YBB Capital Researcher Ac-Core

TLDR

  • Recently, Solana and Dialect jointly launched a new Solana concept "Actions and Blinks" to realize one-click Swap, voting, donation, Mint and other functions in the form of browser plug-ins.

  • Actions enable efficient execution of various operations and transactions, while Blinks ensures consensus and consistency of the network through time synchronization and sequential records. These two concepts work together to enable Solana to achieve high-performance and low-latency blockchain experience.

  • The development of Blinks requires the support of Web2 applications, and the first issues it brings up are trust, compatibility and cooperation between Web2 and Web3.

  • Compared with ActionsBlinks and FarcasterLens Protocol, the former relies on Web2 applications to obtain more traffic, while the latter relies more on the chain to obtain more security.

1. How Actions and Blinks work

Image source: Solana docs (Solana Action execution process life cycle)

1.1 Actions(Solana Actions)

Official definition: Solana Actions are specification-compliant APIs that return transactions on the Solana blockchain that can be previewed, signed, and sent in a variety of different contexts, including QR codes, buttons + widgets (user interface elements), and websites on the Internet.

Actions can be simply understood as transactions to be signed. In the Solana network, Actions can be understood as an abstract description of the transaction processing mechanism, covering a variety of tasks such as transaction processing, contract execution, and data operations. In terms of applications, users can send transactions through Actions, including token transfers, purchases of digital assets, etc. Similarly, developers also use Actions to call and execute smart contracts to implement complex on-chain logic.

  • Solana uses the form of "Transaction" to handle these tasks. Each transaction consists of a series of instructions that are executed between specific accounts. Through parallel processing and the use of the Gulf Stream protocol, Solana forwards transactions to validators in advance, thereby reducing the delay in transaction confirmation. Through a fine-grained locking mechanism, Solana is able to process a large number of non-conflicting transactions at the same time, greatly improving the throughput of the system.

  • Solana uses Runtime to execute transactions and smart contract instructions, ensuring the correctness of the input, output, and state of transactions during execution. After the initial execution, the transaction will wait for block confirmation. Once the block is agreed by the majority of validators, the transaction is considered to be finally confirmed. The Solana network is capable of processing thousands of transactions per second, with transaction confirmation times as low as less than 400 milliseconds. Thanks to the Pipeline and Gulf Stream mechanisms, the network's throughput and performance are further improved.

  • Actions do not just refer to certain tasks or operations, they can be transactions, contract executions, data processing, and more. These operations are similar to transactions or contract calls in other blockchains, but in Solana, Actions have their own unique advantages: First, efficient processing. Solana has designed an efficient way to process these Actions, enabling them to be quickly executed in large-scale networks. Secondly, low latency. Thanks to Solana's high-performance architecture, the processing latency of Actions is very low, allowing Solana to support high-frequency transactions and applications. Finally, flexibility. Actions can be used to perform a variety of complex operations, including the call of smart contracts, the storage and reading of data, etc. (See the extended link for more content).

1.2 Blinks(Blockchain links)

Official definition: Blinks converts any Solana Action into a shareable, metadata-rich link. Blinks enables clients that support Action (browser extension wallets, robots) to display more functionality to users. On the website, Blinks can immediately trigger a transaction preview in the wallet without jumping to the decentralized application; in Discord, the robot can expand Blink into a set of interactive buttons. This enables on-chain interaction with any web interface that can display a URL.

In layman's terms, Solana Blinks converts Solana Action into a shareable link (equivalent to http). By enabling the relevant functions in supporting wallets Phantom, Backpack, and Solflare wallet, websites and social media can be transformed into places for on-chain transactions, allowing any website with a URL to directly initiate Solana transactions.

In summary, although Solana Action and Blink are permissionless protocols/specifications, compared with the solver solving process of intent narratives, they still require client applications and wallets to ultimately help users sign transactions.

The direct purpose of ActionsBlinks is to directly "http link" the on-chain operations of Solana to Web2 application products such as Twitter.

Image source: @eli 5 _defi

2. Decentralized social protocol based on Ethereum

2.1 Farcaster Agreement

Farcaster is a decentralized social graph protocol based on Ethereum and Optimism, which enables applications to connect with each other and users through decentralized technologies such as blockchain, P2P networks and distributed ledgers. It allows users to seamlessly migrate and share content between different platforms without relying on a single centralized entity. Its open graph protocol (when users post relevant links in social network posts, the protocol automatically extracts the content in the link and injects interactive features) allows the content of the links posted by users to be automatically extracted and converted into interactive applications.

Decentralized network: Farcaster relies on a decentralized network, avoiding the single point of failure problem of centralized servers in traditional social networks. It uses distributed ledger technology to ensure the security and transparency of data.

Public key encryption: Each user has a pair of public and private keys on Farcaster. The public key is used to identify the user, and the private key is used to sign the user's operations. This ensures the privacy and security of user data.

Data portability: User data is stored in a decentralized storage system rather than a single server. This way, users have full control over their data and can migrate it between different applications.

Verifiable identity: Through public key cryptography, Farcaster ensures that each user's identity is verifiable. Users can prove their control over an account by signing.

Decentralized Identifier (DID): Farcaster uses decentralized identifier (DID) to identify users and content. DID is an identifier based on public key encryption, which is highly secure and tamper-proof.

Data consistency: To ensure data consistency in the network, Farcaster uses a consensus mechanism similar to blockchain (“posts” are nodes). This mechanism ensures that all nodes have a consensus on user data and operations, thereby ensuring data integrity and consistency.

Decentralized Applications: Farcaster provides a development platform that allows developers to build and deploy decentralized applications (DApps). These applications can be seamlessly integrated with the Farcaster network to provide users with a variety of functions and services.

Security and Privacy: Farcaster emphasizes the privacy and security of user data. All data transmission and storage are encrypted, and users can choose to make their content public or private.

In Farcaster's new Frames feature (different Frames are integrated with Farcaster and run independently), "cast" (analogous to "posts", including text, pictures, videos, links, etc.) can be turned into an interactive application. These contents are stored in a decentralized network to ensure their persistence and immutability. When a "post" is published, each of its casts has a unique identifier to make it traceable, and the user's identity is confirmed through a decentralized authentication system. As a decentralized social protocol, the Farcaster protocol allows its clients to directly and seamlessly access Frames.

2.2 The main principles include the following three aspects

Image source: Architecture l Farcaster

The Farcaster protocol is divided into three main layers: Identity Layer, Data Layer (Hubs) and Application Layer. Each layer has specific functions and roles.

Identity Layer

  • Function: Responsible for managing and verifying user identities; providing decentralized identity authentication to ensure the uniqueness and security of user identities; specifically composed of four registries: ld Registry, Fname, Key Registry, and Storage Registry (see reference link 1 for details).

  • Technical principle: Using decentralized identifiers (DIDs) based on public key cryptography; each user has a unique DID to identify and verify the user's identity; through public and private key pairs, it ensures that only the user can control and manage their own identity information. The identity layer ensures that users can seamlessly migrate and verify their identities between different applications and services.

Data Layer - Hubs

  • Function: Responsible for storing and managing user-generated data, providing a decentralized data storage system to ensure the security, integrity and accessibility of data.

  • Technical principle: Hubs are decentralized data storage nodes distributed throughout the network; each Hub is an independent storage unit responsible for storing and managing a portion of the data. The data is distributed and stored between Hubs, and encryption technology is used to protect data security. The data layer ensures high availability and scalability of the data, and users can access and migrate their data at any time.

Application Layer

  • Function: Provides a platform for developing and deploying decentralized applications (DApps), supporting various application scenarios, including social networking, content publishing, messaging, etc.

  • Technical principle: Developers can use the API and tools provided by Farcaster to build and deploy decentralized applications; the application layer is seamlessly integrated with the identity layer and data layer to ensure user identity authentication and data management when using the application; decentralized applications run on a decentralized network and do not rely on centralized servers, which improves the reliability and security of the application.

2.3 Summary

The direct purpose of Solana's ActionsBlinks is to open up the traffic channel for Web2 applications. The intuitive potential impact is: from the user's perspective: while simplifying transactions, it increases the risk of fund theft. From Solana's own perspective: it greatly enhances the traffic effect of breaking the circle, but there are still risks in the compatibility and support of applications under the Web2 censorship system. Perhaps in the future, with the support of Solana's huge system, such as Layer 2, SVM, mobile operating systems, etc., there will be further development.

Compared with Solana's strategy, Ethereum's Farcaster protocol weakens the traffic introduction of Web2 and enhances the overall anti-censorship and security. Overall, under the Fracster+EVM model, it is closer to the native concept of Web3.

2.4 Lens Protocol

Image source: Lens Frens

Lens Protocol is also a decentralized social graph protocol that aims to provide users with full control over their social data and content. Through Lens Protocol, users can create, own and manage their own social graphs, and these graphs can be seamlessly migrated between different applications and platforms. The protocol uses non-fungible tokens (NFTs) to represent users' social graphs and content, ensuring the uniqueness and security of the data. Lens Protocol and Farcaster, both located on Ethereum, also have some similarities and differences:

Same point:

  • User Control: Users have full control over their data and content in both.

  • Identity verification: Use decentralized identity (DID) and encryption technology to ensure the security and uniqueness of user identities.

difference:

  • Technology Architecture:

    Farcaster: Built on Ethereum (L1), it is divided into the identity layer (Identity Layer) to manage user identity, the data layer (Data Layer - Hubs) decentralized storage nodes to manage data, the application layer (Application Layer) provides a DApps development platform, and uses offline Hubs for data dissemination.

    Lens Protocol: Based on Polygon (L2), it uses NFT to represent users’ social graphs and content. All activities are stored in users’ wallets, emphasizing data ownership and portability.

  • Validation and Data Management:

    Farcaster: Use distributed storage nodes (Hubs) for data management to ensure data security and high availability. Handles need to be updated every year, and delta graph is used to achieve consensus.

    Lens Protocol: Personal data NFT ensures data uniqueness and security without the need for updates

  • Application Ecosystem:

    Farcaster: Provides a comprehensive DApps development platform that integrates seamlessly with its identity layer and data layer.

    Lens Protocol: focuses on the portability of user social graphs and content, supporting seamless switching between different platforms and applications.

Through the above comparison, we can see that Farcaster and Lens Protocol have similarities in user control and authentication, but there are significant differences in data storage and ecosystem. Farcaster focuses more on hierarchical structures and decentralized storage, while Lens Protocol emphasizes the use of NFTs to achieve data portability and ownership.

3. Which of the three can be the first to achieve large-scale application?

Through the above analysis, we can see that each of the three has its own advantages and challenges. Solana relies on its high performance and the ability to turn any website or application into a gateway for cryptocurrency transactions. It is the first to occupy the social media platform and rely on the advantage of Blinks to generate links to quickly gain popularity and traffic advantages. However, reliance on Web2 is also accompanied by the problem of exchanging traffic for security.

Lens Protocol was born in 2022 and has the longest history. Relying on the modular design and storage on the entire chain, it provides good scalability and transparency and has taken the lead in the market. However, it may also face challenges in cost and scalability and the market's FOMO sentiment.

The advantage of Farcaster is that its underlying design is the most consistent with Web3 logic protocol compared to the previous two, and it has the highest degree of decentralization, but the challenges it brings are the difficulty of technology iteration and user management issues.

Extension link: (1) https://solana.com/docs/advanced/actions

Reference articles:

【 1 】https://research.web3 caff.com/zh/archives/13066? ref= 416