Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix: grammar and punctuation #372

Open
wants to merge 1 commit into
base: main
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@ If you have cloned this repo for the first time:

If the repo already exists locally:

1. Check your Node.js version and if necessary, update to [v18.17.0](https://nodejs.org/en/blog/release/v18.17.0) or higher, either by updating manually or using [nvm](https://github.com/nvm-sh/nvm) (required by [Gatsby v5](https://www.gatsbyjs.com/docs))
1. Check your Node.js version and, if necessary, update to [v18.17.0](https://nodejs.org/en/blog/release/v18.17.0) or higher, either by updating manually or using [nvm](https://github.com/nvm-sh/nvm) (required by [Gatsby v5](https://www.gatsbyjs.com/docs))
2. Delete the existing `node_modules`, `.cache`, and `public` folders in the repo's root directory
3. Delete the existing `package-lock.json` file
4. Install node modules with: `npm install --legacy-peer-deps`
Expand Down
4 changes: 2 additions & 2 deletions src/datas/careers/content.js
Original file line number Diff line number Diff line change
Expand Up @@ -6,8 +6,8 @@ import perkAnimation4 from '../../images/illustrations/career-4/data.json'

export const content = {
title : 'Careers',
subtitle: 'We’re on a mission to change the way that blockchains and decentralized applications are built—making them more secure, sovereign and scalable.',
text: 'Join our team of leading engineers, researchers and entrepreneurs in pioneering the first modular blockchain design.',
subtitle: 'We’re on a mission to change the way that blockchains and decentralized applications are built—making them more secure, sovereign, and scalable.',
text: 'Join our team of leading engineers, researchers, and entrepreneurs in pioneering the first modular blockchain design.',
button: {
text: 'Current openings',
url: 'https://jobs.lever.co/celestia/'
Expand Down
2 changes: 1 addition & 1 deletion src/datas/team/content.js
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
export const content = {
title : 'Meet the team',
subtitle: '',
text: 'We are on a mission to change the way that blockchains and decentralized applications are built—making them more secure, scalable and sovereign. We envision a world where global communities have the power to self-organize without being burdened by existing power structures.',
text: 'We are on a mission to change the way that blockchains and decentralized applications are built—making them more secure, scalable, and sovereign. We envision a world where global communities have the power to self-organize without being burdened by existing power structures.',
menus: [
{
id : 'team',
Expand Down
8 changes: 4 additions & 4 deletions src/datas/technology/content.js
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ export const content = {
subtitle: 'Celestia is pioneering a new paradigm in blockchain design. A minimal, modular consensus layer for rollups.',
columnSection: {
title: 'Celestia is for decentralized apps what cloud computing is for the traditional web.',
subtitle: 'Web infrastructure evolved from individual servers, to shared hosting services and finally individual virtual machines on a shared server. Similarly, decentralized infrastructure is evolving from individual execution chains to shared execution chains and finally individual execution chains on a shared consensus layer.',
subtitle: 'Web infrastructure evolved from individual servers, to shared hosting services and finally individual virtual machines on a shared server. Similarly, decentralized infrastructure is evolving from individual execution chains to shared execution chains, and finally individual execution chains on a shared consensus layer.',
columns: [{
title: 'Early web<br/>(1990s)',
text: 'Each website had its own physical server.',
Expand Down Expand Up @@ -42,7 +42,7 @@ export const content = {
export const Technologies = [
{
title: 'Separation of consensus and execution layers',
text: 'Standard “world computer" blockchains bundle consensus and execution while Celestia decouples them. Celestia provides a pluggable consensus layer, allowing developers to deploy their own execution layers to run on top. This enables more customizability and sovereignty for applications built on Celestia.',
text: 'Standard “world computer" blockchains bundle consensus and execution, while Celestia decouples them. Celestia provides a pluggable consensus layer, allowing developers to deploy their own execution layers to run on top. This enables more customizability and sovereignty for applications built on Celestia.',
animation: Technology1,
direction: 'ltr'
},{
Expand All @@ -52,12 +52,12 @@ export const Technologies = [
direction: 'rtl'
},{
title: 'Rollups for off-chain execution',
text: 'Celestia is perfectly suited for a novel scaling solution called rollups which push state execution off-chain and rely on a base chain for consensus and data availability. Optimistic rollups require data availability to detect fraud and zero-knowledge rollups require data availability to reconstruct the state of the chain.',
text: 'Celestia is perfectly suited for a novel scaling solution called rollups, which push state execution off-chain and rely on a base chain for consensus and data availability. Optimistic rollups require data availability to detect fraud, and zero-knowledge rollups require data availability to reconstruct the state of the chain.',
animation: Technology3,
direction: 'ltr'
},{
title: 'Secure light clients for interoperability',
text: 'Cross-chain interoperability relies on light clients which are typically not secure because they make an honest majority assumption. Light clients in Celestia do not make an honest majority assumption, unlocking truly secure cross-chain interoperability. Connecting chains will be as simple as deploying a smart contract.',
text: 'Cross-chain interoperability relies on light clients, which are typically not secure because they make an honest majority assumption. Light clients in Celestia do not make an honest majority assumption, unlocking truly secure cross-chain interoperability. Connecting chains will be as simple as deploying a smart contract.',
animation: Technology4,
direction: 'rtl'
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -58,24 +58,24 @@ The settlement task in modular blockchains is similar to solving arguments durin
![GATSBY_EMPTY_ALT](./images/settlement-analogy.png)

#### Consensus
Now imagine you were watching the football game between team A and B at home. The game finished and your favorite team (team A) won. Straight to the phone, you messaged your friend to tell him about your winning team.
Now, imagine you were watching the football game between teams A and B at home. The game finished, and your favorite team (team A) won. Straight to the phone, you messaged your friend to tell him about your winning team.

Your friend quickly replied back “yeah right, team B actually won!” The two of you spend 15 minutes arguing about the winner until it hits you. Both of you were watching two different games. No wonder you couldn’t agree about who won the game.
Your friend quickly replied, “yeah, right, team B actually won!” The two of you spend 15 minutes arguing about the winner until it hits you. Both of you were watching two different games. No wonder you couldn’t agree about who won the game.

The consensus task in modular blockchains works in a similar way. Transactions get ordered first. If people see different orders of the transactions, they won’t be able to agree on the right order - just like you and your friend couldn’t agree on which team won.

When people see the same order of transactions they can agree the order is correct - just like your friend agreeing on which team won after you both realized what games you were watching.
When people see the same order of transactions, they can agree the order is correct - just like your friend agreeing on which team won after you both realized what games you were watching.

![GATSBY_EMPTY_ALT](./images/consensus-analogy.png)

#### Data availability
Now team A and B are playing again. This time, the game is happening in your town. Of course you go to buy tickets. But it turns out that ticket prices are five times higher than usual. You can’t afford tickets to the stadium, but you could still watch the game online.

It gets worse. The game isn’t going to be streamed. Only people that go to the stadium would get to watch the game. Pretty unfair isn’t it? But there’s a bigger problem. Anyone could lie to you about who won. Without a recording, there’s no way to prove the score is real. You just have to trust someone that actually got to watch the game at the stadium.
It gets worse. The game isn’t going to be streamed. Only people who go to the stadium get to watch the game. Pretty unfair isn’t it? But there’s a bigger problem. Anyone could lie to you about who won. Without a recording, there’s no way to prove the score is real. You just have to trust someone that actually got to watch the game at the stadium.

The data availability task in modular blockchains is similar to recording and streaming a football game. Data availability lets anyone check the contents of a transaction to see what happened, just like a recording lets people at home watch the game to find out the score, even if they can’t afford to go to the stadium.

![GATSBY_EMPTY_ALT](./images/data-availability-analogy.png)

#### Conclusion
And those are all the modular blockchain tasks as aspects of a football game. It might take a little bit to memorize exactly what each task is. But the big thing to remember is that each modular blockchain fulfills a specific task they’re really good at. And of course, modular blockchains collaborate with each other to make the whole system work.
And those are all the modular blockchain tasks as aspects of a football game. It might take a little bit to memorize exactly what each task is. But the big thing to remember is that each modular blockchain fulfills a specific task they’re really good at. And, of course, modular blockchains collaborate with each other to make the whole system work.
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ Remember, a core idea of modular blockchains is that they separate functions acr
As for transactions, in the monolithic world, all apps live on the same chain. The downside is that users of different applications all have to compete to get their transactions processed. In the modular paradigm, apps live on separate chains. This means that a user of one app isn’t competing with the users of a different app for computation. So, transactions for many different apps can get processed at the same time.

#### Shared security
Each time a new monolithic blockchain launches, a crucial part of the process is that they must bootstrap their own validator set. Unfortunately, it can be difficult to source a large enough validator set to become secure. Differences between chains leads to uneven security in an ecosystem of monolithic chains. A few will have high security with large validator sets, while many others will have low security with small validator sets. If we expect thousands of chains or more to make up the multi-chain ecosystem, we can’t expect each one of them to have enough security.
Each time a new monolithic blockchain launches, a crucial part of the process is that they must bootstrap their own validator set. Unfortunately, it can be difficult to source a large enough validator set to become secure. Differences between chains lead to uneven security in an ecosystem of monolithic chains. A few will have high security with large validator sets, while many others will have low security with small validator sets. If we expect thousands of chains or more to make up the multi-chain ecosystem, we can’t expect each one of them to have enough security.

With shared security, deploying new blockchains like rollups doesn’t require bootstrapping a new validator set. Security is provided to blockchains by a common source, like Celestia. A new blockchain can deploy to Celestia and immediately tap into the security that it has built.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ description: "What are modular blockchains and what makes them different to thei
</head>

#### Summary
1. The first approach to building blockchains was a monolithic design where a single blockchain does everything.
1. The first approach to building blockchains was a monolithic design where a single blockchain did everything.
2. The idea of a modular blockchain is that it can specialize in a couple of functions instead of trying to do everything. Namely, modular blockchains decouple consensus from execution.
3. The monolithic approach causes some inherent problems with scaling, which includes expensive hardware, limited control, and high overhead.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -23,29 +23,29 @@ description: "A first principles perspective on modular blockchains."
#### Summary
* Modular blockchains prioritize decentralization for network security by reducing the cost for users to operate nodes and verify the network.
* Scaling enables modular blockchains to increase capacity without making it costly for users to verify and secure the network.
* A decentralized network of users are ultimately responsible for upholding the security of a blockchain in the presence of malicious validators.
* A decentralized network of users is ultimately responsible for upholding the security of a blockchain in the presence of malicious validators.

#### Introduction
Learning a concept by starting at its foundation provides the best path to reaching proficiency. Like any concept, modular blockchains are no different. They come with their own set of fundamental concepts that require understanding to grasp the advanced material. By beginning with the first principles of modular blockchains, their purpose and goals will become easier to understand.

#### Decentralization
One of the most important distinctions between blockchains and traditional distributed systems is that they are open and verifiable by any individual. A user can operate a node and personally verify that the blockchain is operating correctly. Nodes that fully verify the blockchain, such as full nodes, are critical to its security because they are responsible for ensuring that the rules of the chain are upheld.

Since verifiability is the core difference between web2 and web3 systems, we measure decentralization by the amount of users that can verify the chain directly themselves. More users running nodes increases decentralization which makes the blockchain more resilient to attacks. Modular blockchains prioritize decentralization for network security by reducing the cost for users to operate nodes and verify the network.
Since verifiability is the core difference between web2 and web3 systems, we measure decentralization by the number of users that can verify the chain directly themselves. More users running nodes increases decentralization, which makes the blockchain more resilient to attacks. Modular blockchains prioritize decentralization for network security by reducing the cost for users to operate nodes and verify the network.

#### Scalability
As users increase, blockchains must also increase the number of transactions they can process. However, increasing the number of transactions a blockchain processes increases the amount of work required to verify the chain. If it becomes more difficult to verify the chain, then less people can run nodes and the blockchain becomes more centralized.
As the number of users increases, blockchains must also increase the number of transactions they can process. However, increasing the number of transactions a blockchain processes increases the amount of work required to verify the chain. If it becomes more difficult to verify the chain, then less people can run nodes, and the blockchain becomes more centralized.

Transaction throughput measures how many transactions a blockchain can process, commonly referred to as transactions per second (TPS). To scale, a blockchain must increase the number of transactions it can process without an equal increase in the cost to operate a secure node.
Transaction throughput measures how many transactions a blockchain can process, commonly referred to as transactions per second (TPS). To scale, a blockchain must increase the number of transactions it can process without an equal increase in the cost of operating a secure node.

![GATSBY_EMPTY_ALT](./images/Scalability-equation.png)

If a blockchain can increase the number of transactions it processes without equally increasing the cost for nodes to verify the transactions, it is scaling. Scalability is a core property of modular blockchains which ensures they can increase capacity without making it costly for users to verify the network. Technologies like fraud proofs, validity proofs, and <a href="https://celestia.org/glossary/data-availability-sampling/" target="_blank" rel="noopener noreferrer" style="color:#7B2BF9;">data availability sampling</a> used in the modular blockchain stack enable nodes to verify transactions more efficiently than full nodes while maintaining equivalent security.
If a blockchain can increase the number of transactions it processes without equally increasing the cost for nodes to verify the transactions, it is scaling. Scalability is a core property of modular blockchains, which ensures they can increase capacity without making it costly for users to verify the network. Technologies like fraud proofs, validity proofs, and <a href="https://celestia.org/glossary/data-availability-sampling/" target="_blank" rel="noopener noreferrer" style="color:#7B2BF9;">data availability sampling</a> used in the modular blockchain stack enable nodes to verify transactions more efficiently than full nodes while maintaining equivalent security.

#### Security
While security covers a broad scope of topics, one fundamental aspect of blockchain security relates to the validators or miners. Most Proof of Stake blockchains have a validator set that encompasses a group of nodes responsible for processing transactions and adding them to the chain.
To participate as a validator, Proof of Stake blockchains require that nodes stake tokens as a security deposit. To punish malicious validators, their stake can be burnt in a process known as slashing.

Blockchains can only tolerate a certain threshold of malicious validators until certain guarantees are lost. However, no matter how many validators act dishonestly, they can’t break the rules of the chain. With a robust, decentralized network of users verifying the chain, the malicious activities of validators will be detected and punished.

Punishment can be administered automatically through slashing, which reduces their stake, or through social consensus to fork away from the malicious validators. Ultimately, checks and balances on power and security are in the hands of users that verify and uphold the rules of the chain.
Punishment can be administered automatically through slashing, which reduces their stake, or through social consensus to fork away from the malicious validators. Ultimately, checks and balances on power and security are in the hands of users who verify and uphold the rules of the chain.
Loading