Skip to content

Commit 2040adb

Browse files
committed
Add videos
1 parent e068cb9 commit 2040adb

File tree

4 files changed

+91
-37
lines changed

4 files changed

+91
-37
lines changed

docs/blockchain-development-tutorials/cadence/getting-started/index.md

Lines changed: 14 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,18 @@ keywords:
2121

2222
The Cadence is designed for the next generation of apps, games, and digital assets. This comprehensive tutorial series will guide you from setting up your development environment to deploying production-ready applications on Flow's mainnet while a complete Counter application that demonstrates all essential Flow development patterns.
2323

24+
<div style={{ position: 'relative', paddingBottom: '56.25%', height: 0, overflow: 'hidden', maxWidth: '100%' }}>
25+
<iframe
26+
style={{ position: 'absolute', top: 0, left: 0, width: '100%', height: '100%' }}
27+
src="https://www.youtube.com/embed/Bagn8kGllCU?si=5FUZit9bSrBCVGPk"
28+
title="YouTube video player"
29+
frameborder="0"
30+
allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share"
31+
referrerpolicy="strict-origin-when-cross-origin"
32+
allowfullscreen
33+
></iframe>
34+
</div>
35+
2436
## What You'll Learn
2537

2638
In this tutorial series, you'll discover how to:
@@ -73,7 +85,7 @@ Tutorial: [Production Deployment]
7385
After completing these tutorials, you'll be equipped with the fundamental skills needed for Flow development. Consider exploring our other tutorial series to expand your blockchain development expertise:
7486

7587
- [Cross-VM Apps] - Build applications that integrate Flow EVM and Cadence
76-
- [Native VRF] - Implement verifiable random functions in your applications
88+
- [Native VRF] - Implement verifiable random functions in your applications
7789
- [Token Launch] - Create and launch tokens on Flow
7890

7991
<!-- Relative links -->
@@ -84,4 +96,4 @@ After completing these tutorials, you'll be equipped with the fundamental skills
8496
[Production Deployment]: ./production-deployment.md
8597
[Cross-VM Apps]: ../../cross-vm-apps/introduction.md
8698
[Native VRF]: ../../native-vrf/index.md
87-
[Token Launch]: ../../tokens/index.md
99+
[Token Launch]: ../../tokens/index.md

docs/build/cadence/basics/mev-resistance.md

Lines changed: 53 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -11,65 +11,83 @@ keywords:
1111
- Blockchain Security
1212
---
1313

14-
# How Flow Suppresses MEV to Ensure Equitable Access
14+
# How Flow Suppresses MEV to Ensure Equitable Access
1515

16-
## The Hidden Cost of MEV in Decentralized Systems
16+
<div style={{ position: 'relative', paddingBottom: '56.25%', height: 0, overflow: 'hidden', maxWidth: '100%' }}>
17+
<iframe
18+
style={{ position: 'absolute', top: 0, left: 0, width: '100%', height: '100%' }}
19+
src="https://www.youtube.com/embed/9hyPqORY1vI?si=sNn0Y4ECmjaBXPGN"
20+
title="YouTube video player"
21+
frameborder="0"
22+
allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share"
23+
referrerpolicy="strict-origin-when-cross-origin"
24+
allowfullscreen
25+
></iframe>
26+
</div>
1727
18-
One of the most under-discussed benefits of decentralization is **equitable access**. Ideally, the value and quality-of-service you receive from a decentralized platform should not depend on your identity, computing power, or personal connections. However, **Maximal Extractable Value (MEV)** poses a significant threat to this principle.
28+
## The Hidden Cost of MEV in Decentralized Systems
1929

20-
MEV allows block producers to manipulate transaction ordering for profit—often at the direct expense of users. The ability to front-run, back-run, or sandwich transactions can extract value from ordinary users, reinforcing inequalities rather than eliminating them. In most blockchain networks, MEV is not just an unfortunate side effect; it is structurally embedded in how transactions are processed.
30+
One of the most under-discussed benefits of decentralization is **equitable access**. Ideally, the value and quality-of-service you receive from a decentralized platform should not depend on your identity, computing power, or personal connections. However, **Maximal Extractable Value (MEV)** poses a significant threat to this principle.
2131

22-
## Why MEV Persists on Most Blockchains
32+
MEV allows block producers to manipulate transaction ordering for profit—often at the direct expense of users. The ability to front-run, back-run, or sandwich transactions can extract value from ordinary users, reinforcing inequalities rather than eliminating them. In most blockchain networks, MEV is not just an unfortunate side effect; it is structurally embedded in how transactions are processed.
2333

24-
MEV is difficult to prevent on most blockchains because **each block has a single builder**. This builder must have:
34+
## Why MEV Persists on Most Blockchains
2535

26-
- A full copy of the blockchain state
27-
- The ability to simulate transactions before they are finalized
28-
- Absolute control over transaction selection and ordering
36+
MEV is difficult to prevent on most blockchains because **each block has a single builder**. This builder must have:
2937

30-
In practice, this means that **the entity responsible for adding your transaction to the blockchain can first simulate it to identify profit opportunities**. They can test hundreds or thousands of ways to rearrange transactions, inserting their own to extract MEV—often at **your** expense.
38+
- A full copy of the blockchain state
39+
- The ability to simulate transactions before they are finalized
40+
- Absolute control over transaction selection and ordering
3141

32-
For example, if a block builder can earn $10 by sandwiching your transaction, it means **you** likely lose $10 in value. This is functionally theft, and the worst part? If your transaction is airtight and offers no MEV opportunities, the block builder has no obligation to include it at all. Pay the toll, or get locked out.
42+
In practice, this means that **the entity responsible for adding your transaction to the blockchain can first simulate it to identify profit opportunities**. They can test hundreds or thousands of ways to rearrange transactions, inserting their own to extract MEV—often at **your** expense.
43+
44+
For example, if a block builder can earn $10 by sandwiching your transaction, it means **you** likely lose $10 in value. This is functionally theft, and the worst part? If your transaction is airtight and offers no MEV opportunities, the block builder has no obligation to include it at all. Pay the toll, or get locked out.
3345

3446
## How Flow Accomplishes MEV Resilience
3547

36-
Unlike many blockchains, **Flow was designed from the ground up to minimize MEV** through a unique multi-role architecture. Flow introduces key design choices that break the typical MEV-enabling structure:
48+
Unlike many blockchains, **Flow was designed from the ground up to minimize MEV** through a unique multi-role architecture. Flow introduces key design choices that break the typical MEV-enabling structure:
49+
50+
### 1. **Separating Transaction Selection from Execution**
51+
52+
On Flow, **Collection Nodes** select transactions, but they do not have access to the execution state or computing power to simulate them. Meanwhile, **Execution Nodes** run transactions but cannot choose or reorder them.
53+
54+
This separation significantly reduces the ability of block builders to test transactions before execution. Even if an attacker controls both a Collection Node and an Execution Node, they cannot easily extract MEV.
3755

38-
### 1. **Separating Transaction Selection from Execution**
39-
On Flow, **Collection Nodes** select transactions, but they do not have access to the execution state or computing power to simulate them. Meanwhile, **Execution Nodes** run transactions but cannot choose or reorder them.
56+
### 2. **Separating Transaction Ordering from Execution**
4057

41-
This separation significantly reduces the ability of block builders to test transactions before execution. Even if an attacker controls both a Collection Node and an Execution Node, they cannot easily extract MEV.
58+
Flow further decentralizes control by introducing **Consensus Nodes** that determine transaction order. These nodes are separate from both Collection Nodes and Execution Nodes.
4259

43-
### 2. **Separating Transaction Ordering from Execution**
44-
Flow further decentralizes control by introducing **Consensus Nodes** that determine transaction order. These nodes are separate from both Collection Nodes and Execution Nodes.
60+
For an attacker to perform MEV, they would need to:
4561

46-
For an attacker to perform MEV, they would need to:
47-
- Control a **Collection Node** to insert a transaction
48-
- Control a **Consensus Node** to place it in the desired order
49-
- Have execution state access to predict its effects
62+
- Control a **Collection Node** to insert a transaction
63+
- Control a **Consensus Node** to place it in the desired order
64+
- Have execution state access to predict its effects
5065

51-
This makes it vastly more difficult to extract MEV compared to traditional blockchains, where a single entity often controls all three functions.
66+
This makes it vastly more difficult to extract MEV compared to traditional blockchains, where a single entity often controls all three functions.
67+
68+
### 3. **Strict Transaction Execution Rules**
5269

53-
### 3. **Strict Transaction Execution Rules**
5470
Execution Nodes on Flow have a **simple, enforceable rule**:
55-
They **must** execute transactions exactly as ordered by Consensus Nodes—or they get slashed.
71+
They **must** execute transactions exactly as ordered by Consensus Nodes—or they get slashed.
72+
73+
Unlike traditional blockchains, where the same party both orders and executes transactions, Flow ensures that Execution Nodes cannot manipulate transaction order for profit.
74+
75+
### 4. **Parallel Processing for Extra MEV Resistance**
5676

57-
Unlike traditional blockchains, where the same party both orders and executes transactions, Flow ensures that Execution Nodes cannot manipulate transaction order for profit.
77+
Flow’s unique **pipelined execution model** adds another layer of complexity for potential attackers.
5878

59-
### 4. **Parallel Processing for Extra MEV Resistance**
60-
Flow’s unique **pipelined execution model** adds another layer of complexity for potential attackers.
79+
While one block is being executed, the next block is undergoing consensus, and a third block is still collecting transactions. This means that **to front-run or sandwich attack on Flow, an attacker must successfully predict the outcome of at least two unexecuted blocks—one of which hasn’t even been built yet**.
6180

62-
While one block is being executed, the next block is undergoing consensus, and a third block is still collecting transactions. This means that **to front-run or sandwich attack on Flow, an attacker must successfully predict the outcome of at least two unexecuted blocks—one of which hasn’t even been built yet**.
81+
Even with significant resources, this makes profitable MEV attacks incredibly difficult.
6382

64-
Even with significant resources, this makes profitable MEV attacks incredibly difficult.
83+
## The End Result: A Fairer Blockchain
6584

66-
## The End Result: A Fairer Blockchain
85+
Flow’s architecture ensures that:
6786

68-
Flow’s architecture ensures that:
69-
- The nodes selecting transactions **don’t know** their order
70-
- The nodes ordering transactions **don’t know** the blockchain state
71-
- The nodes executing transactions **can’t** modify the order
87+
- The nodes selecting transactions **don’t know** their order
88+
- The nodes ordering transactions **don’t know** the blockchain state
89+
- The nodes executing transactions **can’t** modify the order
7290

73-
By **intentionally separating powers**, Flow eliminates MEV at its root rather than merely mitigating its effects.
91+
By **intentionally separating powers**, Flow eliminates MEV at its root rather than merely mitigating its effects.
7492

7593
This level of protection against MEV is not an afterthought—it has been a fundamental design goal of Flow since day one. If equitable access matters, **why settle for anything less?**

docs/build/evm/how-it-works.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,18 @@ Flow EVM is designed with these major goals in mind:
1616
- Minimizing breaking changes to the Cadence ecosystem, software and tools
1717
- Maximum composability across environments: Allowing atomic and smooth interaction between EVM and Cadence environments.
1818

19+
<div style={{ position: 'relative', paddingBottom: '56.25%', height: 0, overflow: 'hidden', maxWidth: '100%' }}>
20+
<iframe
21+
style={{ position: 'absolute', top: 0, left: 0, width: '100%', height: '100%' }}
22+
src="https://www.youtube.com/embed/U4tR8abpclQ?si=dOGAJ1-QSDsscXKB"
23+
title="YouTube video player"
24+
frameborder="0"
25+
allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share"
26+
referrerpolicy="strict-origin-when-cross-origin"
27+
allowfullscreen
28+
></iframe>
29+
</div>
30+
1931
### EVM - A Smart Contract In Cadence
2032

2133
To satisfy the design goals and thanks to the extensibility properties of the Cadence runtime, Flow EVM is designed as a higher-level environment incorporated as a smart contract deployed to Cadence. This smart contract is not owned by anyone and has its own storage space, allows Cadence to query, and is updated through EVM transactions. EVM transactions can be wrapped inside Cadence transactions and passed to the EVM contract for execution. The artifacts of EVM transaction execution (e.g. receipts and logs) are emitted as special Cadence events (TransactionExecuted, BlockExecuted) and available to the upstream process (Flow transaction) to enable atomic operations.

docs/build/flow.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -38,6 +38,18 @@ Dieter Shirley, Chief Architect of Flow and co-author of the [ERC-721 NFT standa
3838

3939
> **_A computer that anyone can use, everyone can trust, and no one can shut down_**
4040
41+
<div style={{ position: 'relative', paddingBottom: '56.25%', height: 0, overflow: 'hidden', maxWidth: '100%' }}>
42+
<iframe
43+
style={{ position: 'absolute', top: 0, left: 0, width: '100%', height: '100%' }}
44+
src="https://www.youtube.com/embed/u0HMmIGRrFc?si=LO3cigYf1CgENn5C"
45+
title="YouTube video player"
46+
frameborder="0"
47+
allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share"
48+
referrerpolicy="strict-origin-when-cross-origin"
49+
allowfullscreen
50+
></iframe>
51+
</div>
52+
4153
Much of the protocol design is based on lessons learned from building Web3 applications while working at [Dapper Labs], particularly [CryptoKitties] — the first onchain game to reach [widespread popularity]. The game went viral, then [struggled under its own success] when it caused so much traffic that the Ethereum network itself was overwhelmed by the load.
4254

4355
The design of Flow was guided by the need to alleviate this burden while creating the best experience possible for both developers and users. The blockchain network of the future must be able to handle millions of users while upholding the key pillars of decentralization:

0 commit comments

Comments
 (0)