Author: Faust Host & Guests: Jomosis, Geek Web3; Kevin He, Co-Founder of Bitlayer; Baiyu, CKB Eco Fund Partner; Kai, Research of Bool Network 1. Jomosis: Could you please briefly introduce yourselves? Kevin: I am Kevin, the co-founder of Bitlayer. I have been mainly engaged in public chain and Layer2 related work before. I have launched 4 public chains in total, and also worked on Ethereum ZK-Rollup and MPC asset management platform. As for Bitlayer, we are committed to turning BitVM from a concept into a physical object, solving the problem of Bitcoin Layer 2 status verification on Layer1, and building a Trustless two-way cross-chain bridge based on this verification capability. At the same time, we hope to support multiple VMs instead of just being limited to the EVM ecosystem, bringing a better experience to developers and users. Baiyu: I am Baiyu, a partner of CKB Eco Fund. As for CKB, everyone knows that it is a PoW and UTXO public chain. It has been transformed into a Bitcoin layer 2 since the end of last year. The core is that CKB is originally a UTXO smart contract platform, which is completely isomorphic to Bitcoin and is also POW. Secondly, we proposed RGB++ and defined the concept of isomorphic binding. UTXO assets such as RGB, Runes, and Atomicals can be bound to CKB or other UTXO chains without a cross-chain bridge. Kai: I am Kai, a researcher at Bool Network. Regarding Bool Network, it is not a Layer2 in the traditional sense, but a third-party infrastructure that provides a trusted and secure cross-chain mechanism for Layer2. We use MPC and TEE, as well as our own privacy-preserving ring VRF and trusted verification to ensure the security of bridged assets between L1 and L2. We also provide asset redemption functions such as forced withdrawals for Bitcoin L2. 2. Jomosis: What do you think about the current development of the Bitcoin ecosystem? Kevin: First of all, I think that the proposed BTC second-layer model is almost complete. The core issue is to make people believe that your second-layer is secure enough, which is more critical. In terms of technical routes, there are different paths such as BTC on-chain verification and off-chain verification. If it is on-chain verification, it means verifying Layer2 on the first layer of Bitcoin. For off-chain verification, there are different methods such as client verification, isomorphic binding, multi-signature, POS, etc....