Subscribe to our newsletter

Sign up for early access to incentives, product launches, and Pier Two news.

The Pier Two Memo provides insider access to our product performance with enhanced data insights and trading trends.

By providing your email to us, you are subscribing to our newsletter and will receive updates, promotions, and information from us on a regular basis. We and/or our carefully selected business partners may send you direct marketing communications and information about our service and products. This may take the form of emails or other forms of communication, in accordance with the OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data. You may opt-out of receiving marketing materials from us by contacting us using the details set out below or by using the opt-out facilities provided (eg an unsubscribe link). Any personal information you provide will be handled in accordance with the Privacy Act 1988 (Cth). For information about how Pier Two collects personal information, please refer to our privacy policy here.

If you are interested in non-custodial ETH Staking, please provide some details. Our team will get in touch and ensure you get the best customer service and experience.

ETH StakingWeb3 InfrastructureBlogResearch
OUR WRITINGS

Our Writings

Search
EIP-4844 ‘proto-danksharding’ and scaling Ethereum

EIP-4844 ‘proto-danksharding’ and scaling Ethereum

How EIP-4844 is changing Ethereum and laying foundations for danksharding. Implemented as part of the Dencun hard-fork in Mar 2024. Decreasing gas fees on L2s.

Client diversity: crisis or distraction?

Client diversity: crisis or distraction?

Clients are programs validators are required to run allowing multiple on-chain services on Ethereum as well as the performing of duties in exchange for rewards.

Distributed Validator Technology (DVT): a brief overview

Distributed Validator Technology (DVT): a brief overview

Distributed Validator Technology (DVT) would allow for a validator’s private-key to be split amongst validators. Improving liquid staking experiences.

How withdrawals work

How withdrawals work

There are only two types of (voluntary) ETH Staking withdrawal that are accessible. Retrieving all stake and yields (full) or only yields (partial).

Relation between gas fees and validator rewards

Relation between gas fees and validator rewards

Gas fees (base fee and priority fee) are a mechanism that attach a market-demand price to a unit of gas representing costs of performing actions to a validator.

How can validators be slashed?

How can validators be slashed?

Reliability and security of Ethereum relies on over two thirds of active validators to be honest. Learn how validators could be slashed, and the consequences.

How do validators join the Ethereum network?

How do validators join the Ethereum network?

Years of research and development has seen a complete overhaul of the Ethereum consensus layer. Post The Merge find out how users join the Ethereum network as validators for staking.

Analysing Governance and Voting on Blockchain

Analysing Governance and Voting on Blockchain

Analysing where governance on blockchain sits in relation to other forms of political and corporate governance is necessary to the future of DeFi. Blockchain represents the future of decentralisation, but there is a growing realisation that the benefits of this philosophy is not necessarily exclusive with those of centralisation.

Evolution of the EVM Pt. 1

Evolution of the EVM Pt. 1

Understanding why the EVM came into existence is crucial towards understanding further nuance as to the ethos and principles of Ethereum. Equally so, it is essential when developing a new project to understand the limitations and intentions of the EVM, and to decide if such a system is optimal for one's use.

Investigation of Cryptocurrency as Legal Tender

Investigation of Cryptocurrency as Legal Tender

Cryptocurrency has seen significant innovation in a comparatively short period of time. Blockchain networks have laid the foundations for a new wave of thinking in terms of fiscal and monetary policy. Many proponents seek the end goal of realisation of a world more dependent on decentralised transactions.

An Introduction to Cryptography

An Introduction to Cryptography

Wider integration of applied cryptography in society has required significant developments in the tools and mechanisms, cryptosystems, needed to support society’s reliance. It has developed to become an incredibly interesting, but extensive, area to learn in parallel with its growing importance.

Reducing Smart Contract Faults Through a Functional Paradigm

Reducing Smart Contract Faults Through a Functional Paradigm

To balance the opportunity provided by smart contracts with the increased possibility of exploitations is perhaps the key challenge of the future of DeFi. To adapt to this, retrospection must be made of smart contract design choices, and proposals for future design choices can thereafter be applied.

Refined Hash-Chain Designs

Refined Hash-Chain Designs

One interesting notion that characterises hash-based cryptography is that at their initial time of conception they weren’t investigated thoroughly, and weren’t until much more recently with the rising popularity of applications such as Bitcoin and Ethereum.

Understanding MEV and Flashbots

Understanding MEV and Flashbots

Constructing a new blockchain network has revealed itself to be a task heavily dependent on ensuring a well-aligned incentives framework for all participants. Without such a framework participants may partake in behaviour negative towards said network.

Environmental and Societal Impact of Blockchain

Environmental and Societal Impact of Blockchain

Within this article the implications of blockchain technology in forming a part of a technological solution to current environmental and societal events is explored. Often oversimplified to suit particular arguments, blockchain is a significant and complex tool observed in this article.

Obfuscation and Verification of Functions

Obfuscation and Verification of Functions

This article discusses Functional-Verifiability as a scale, in which all functions are derived from. Perfect verifiability exists as one extreme of this scale, and perfect obfuscation exists as the other extreme.

The Journey of an Ethereum Transaction

The Journey of an Ethereum Transaction

Understanding how transactions are created, communicated across a network, executed, and used to support complex operations is essential to understanding how decentralised finance is possible. Throughout this article the information needed to observe the events and logs emitted by transactions are also shared, allowing for comprehension of what the data that exists on Ethereum is really saying.

Implications of Quantum Computation on Blockchain

Implications of Quantum Computation on Blockchain

With large amounts of investment fuelling research and development of scalable blockchain technologies, the next decade is likely to see a rapid growth in its mainstream adoption. Quantum computation proves a possible barrier to such adoption.

World of Light Clients

World of Light Clients

The ultimate motivation behind public blockchains lies in the concept of decentralisation. This concept refers to empowering individuals by distributing control such that no single entity can exert control over the majority.

CBDC Objectives and Design

CBDC Objectives and Design

CBDCs are digital representations of government currencies, thus they have a legal tender status. They are often described as digital banknotes, as they are a claim that people have on the central bank (CB).