Developer of the cryptocurrency ecosystem known under the pseudonym Lawliet-chan, which he proposed the proposal on September 21st. Mevless ProtocolIt is designed to limit MEV practices (maximum removable values) that affect the functionality of cryptocurrency networks.
MEVs are not inherently harmful mechanisms, but rather mechanisms of market dynamics, but can have negative effects on users.
For example, these practices may include Reorganizing the transaction order In blocks by validators to capture additional value.
In Ethereum, these types of actions can be translated in operations that harm the user. Make transactions more expensive Alternatively, change the expected result of that operation.
How does the Mevless protocol work with Ethereum?
Mevless Works Hide transaction content Until the order in which they are included in the chain is established.
That’s how the blocks are produced They cannot advance or reorganize operations Depending on the information available to earn financial benefits.
According to the document, the protocol works through a system of two types of blocks. first, «Order Block» These include only transaction hashingi.e., an encrypted representation without displaying details.
It is then called in the next block «Execution Block»the transaction is executed In the same order as previously established. This mechanism prevents validators I know the actual content Of transactions at a stage where they can still manipulate them.
There are some attacks you’re trying to stop Front Running (Expectations for Spanish business), Validador is doing its own business To gain advantage, the user’s Sandwich attackit consists of placing victim transactions in two transactions and obtaining benefits for exchange operations on a Decentralized Finance Platform (DEFI).
According to the author, Mevless can be optionally supported by an Ethereum layer called Data Availability (DA, Data Availability).
Its quality requires that the transaction is available on the network, which means that You can’t keep them By block producers, and therefore enhance the transparency and integrity of the process.
Another aspect shown in the proposal is that if you only work with hashing in the order stage, it is Mevless It will reduce the need to ignore intensive resource processesreduces implementation costs for other solutions for MEV.
Mevless Protocol Process
The scheme published by Lawliet-chan details how the protocol is implemented.
In the first stage, the user sends both the hash and content of the transaction.
Hash is contained in “Block N” and the content is maintained It is out of reach until the order is defined.
This can be seen in the following image extracted from the Mevless document.
The block «n+1» is then incorporated into the complete transaction according to the order previously committed. Once verified and verified, they are clearly executed on the network.
This design establishes a Separation of planning and execution phaseswhich constitutes a system key to avoid transaction operations.
The protocol was designed to improve resistance to MEV, but its creators will clarify their recommendations.
“Here, MEVLess requires specific changes to blocks designed to resist MEVs and we do not recommend using the MeVLess protocol directly in MeVLess Protocol (particularly general purpose blockchains such as ETH and Solana) if it is not suitable for other types of business (particularly those that do not require resistance to MEVs).”
Lawliet-chan, creator of Mevless Proposal.
In this way, the author suggests, “locating Mefres in a defined application chain or Layer 2 solution and returning to ETH L1 for liquidation.