Navigate back to the homepage
HomeAbout

Creating light nodes using substrate-connect

Author avatar
Milica Vulić
December 15th, 2022 · 2 min read

I had the pleasure of joining the discussion about light nodes integrated into wallets hosted by Stefan Sopic from Parity Technologies.

Many web3 folks are not quite aware that things are pretty centralised in our decentralised world.

MetaMask blocked certain countries

Decentralisation in reality

MetaMask, behind the scenes, is using Infura infrastructure.

Stefan made a solid point that the focal point of all the requests* MetaMask handles is in fact based on the East Coast, USA, through the same blockchain node provider.

If that particular provider happens to experience some issues, users would find themselves unable to use the network 🤯

By mapping out the requests, it makes it possible to create a connection between IP addresses and multiple wallets (given the fact that MetaMask recently announced IP address collection) 🤔

Usage of Infura in Metamask

Path to decentralisation

Parity is developing substrate_connect.

They enable running a light node for each individual user, therefore preventing a central point of failure.

substrate_connect

Kudos to Parity - for developing both decentralised and more private network 👏

*𝘶𝘯𝘭𝘦𝘴𝘴 𝘵𝘩𝘦 𝘦𝘯𝘥-𝘶𝘴𝘦𝘳 𝘰𝘱𝘵𝘴 𝘵𝘰 𝘱𝘳𝘰𝘷𝘪𝘥𝘦 𝘵𝘩𝘦𝘪𝘳 𝘰𝘸𝘯 𝘣𝘭𝘰𝘤𝘬𝘤𝘩𝘢𝘪𝘯 𝘯𝘰𝘥𝘦

light nodeswalletssubstratemetamaskparity
Share:

More articles from 0xMilica

The most important blockchain development skill

Given my role, I often get the question “What is the most important thing to learn to make a proper transition from web2 to web3?” Indeed, no matter how important technologies are along the way because, of course, you can’t do without them, what sets a top-notch web3 developer apart is a complete change of mindset. Regardless of whether you are dealing with Solana, Polygon or Ethereum, you won’t go far without it. It is not only the ability to learn new things but also to UNLEARN previously ad

May 10th, 2022 · 2 min read

P

Public Key Infrastructure

Until the 1970s, symmetric encryption was the only type of encryption we know of. Like the lock with multiple keys, when using symmetric encryption, the sender sends a message encrypted with a key, and the receiver must hold the identical key to decrypt a message. In cryptography, we usually introduce Alice and Bob as the sender and the receiver. Alice and Bob must either meet physically or use some of the key exchange algorithms for both of them to have a copy of a secret key. This brings

May 31st, 2023 · 3 min read
0xMilica © 2023
HomeAbout
Link to $https://twitter.com/0xMilicaLink to $https://www.linkedin.com/in/0xMilica/Link to $https://github.com/0xMilica