A Comprehensive Analysis of Inscription Protocols: Principles, Applications, and Security Considerations

robot
Abstract generation in progress

Inscription Protocol Analysis: Implementation Principles, Application Scenarios, and Security Considerations

Recently, several well-known trading platforms have successively launched inscription markets, supporting various inscription protocols such as BRC-20 and EVM, which has sparked widespread attention in the market towards inscriptions. However, due to the complexity and novelty of inscription protocols, various security issues have arisen frequently, which not only threaten the security of user assets but also have a negative impact on the healthy development of the entire inscription ecosystem.

This article will organize the mainstream inscription protocols to help users understand the uses, implementation methods, and how to protect inscription assets.

Inscription Overview

Inscription is a mechanism on the blockchain that permanently records information with specific meanings. Once recorded, this information is difficult to alter and can be simple text or complex code, images, etc. The standardized inscription protocol enables the functionality of digital assets.

inscription Popular Science|Understand the use cases, implementation methods, and asset security of various major public chain inscription protocols

Inscription Ecosystem Status

Since the emergence of BRC-20 and other Bitcoin blockchain inscriptions, the inscription ecosystem has developed rapidly. Currently, multiple public chains have joined the inscription ecosystem, including:

  • The Ethscription protocol of the ETH public chain
  • ARC-20 protocol of the BTC public chain
  • BSC public chain's BSC-20 protocol
  • Polygon public chain's PRC-20 protocol

These protocols are designed for issuing inscriptions on their respective public chains.

inscription popular science|Learn about the use cases, implementation methods, and asset security of major public chain inscription protocols

Detailed Explanation of Mainstream Inscription Protocols

1. BRC-20

BRC-20 is based on the Bitcoin UTXO model and the Ordinals protocol.

The unspent transaction output UTXO( is the basic unit of Bitcoin transactions. The Ordinals protocol assigns a unique number to each Satoshi in the UTXO), the smallest unit of Bitcoin (, and supports writing various data.

BRC-20 writes uniformly formatted JSON text data into Satoshis through the Ordinals protocol, serving as a ledger for BRC-20 tokens. It mainly includes the following operations:

  • deploy: deploy token
  • mint: mint tokens
  • transfer: transfer tokens

By analyzing this textual data, we can deduce the holding and transfer status of the tokens.

![Inscription Popular Science|Understand the use cases, implementation methods, and asset security of various major public chain inscription protocols])https://img-cdn.gateio.im/webp-social/moments-aa196504f5af35aa25085df04e0ab079.webp(

) 2. ARC-20

ARC-20 is also based on the Bitcoin UTXO model, but differs from BRC-20:

  • The ARC-20 does not specify the token amount in the data.
  • Use the number of satoshis in the UTXO to represent the token amount ### satoshi = 1 ARC-20 token (

ARC-20 is also divided into three steps: deployment, minting, and transfer.

  • Deployment: Fill in the token name, total amount, and other information in the UTXO.
  • Minting: Fill in the token name in the UTXO, and the amount of satoshis in the UTXO is the minting quantity.
  • Transfer: Directly transfer the UTXO holding tokens without entering additional data.

When querying the balance of ARC-20 tokens, simply read the number of satoshis in the UTXO holding that token.

![inscription popular science|Understand the use cases, implementation methods and asset security of major public chain inscription protocols])https://img-cdn.gateio.im/webp-social/moments-321835e35ea77640589fe0d597450bfe.webp(

) 3. Inscription

Ethscription uses the calldata data blocks of Ethereum transactions to create and share data.

Create Ethscription:

  1. Convert the content ###, as shown in the image (, to a Base64 encoded URI.
  2. Convert URI to hexadecimal string
  3. Send a regular ETH transfer, fill the hexadecimal string into calldata.

Transfer Ethscription: The sender transfers to the receiving address, filling in the transaction hash that created the Ethscription in the calldata.

![inscription popular science|Understand the use cases, implementation methods, and asset security of various major public chain inscription protocols])https://img-cdn.gateio.im/webp-social/moments-083ea26b5d0298d0b292e8dd98c98103.webp(

) 4. EVM Chain Inscription

The inscription protocols of EVM chains such as BSC, Ethereum, and Polygon are similar, all utilizing calldata to store fixed format data.

Taking BSC as an example, the inscription format is:

data:,{"p":"","op":"","tick":"","amt":""}

  • p: protocol name ### like bsc-20(
  • op: operation ) like mint (
  • tick: Token Name
  • amt: token amount

Send a regular transfer to the target address during minting, and fill in the above format data in calldata.

Transfer to the receiving address, filling in the transaction hash that created the token in the calldata.

![inscription popular science|Understand the use cases, implementation methods, and asset security of major public chain inscription protocols])https://img-cdn.gateio.im/webp-social/moments-610e1d2dcbc2e515a3d77beeccae7208.webp(

Security Precautions

  1. The BTC inscription protocol is based on UTXO transactions, and users making ordinary BTC transfers may mistakenly transfer or "burn" inscription assets.

  2. Fully understand the implementation principles of each inscription protocol to avoid operational errors that may lead to asset loss.

  3. Although inscription trading can reduce additional fees, users must exercise extra caution to ensure correct operation.

  4. The inscription data formats of different EVM chains or protocols may vary, so be sure to distinguish them when using.

  5. Inscription assets are identified and displayed by offline servers, so it is important to choose a trusted indexing service.

In summary, while inscriptions lower the cost of user participation, their specificity also brings new security risks. Users should fully understand the relevant knowledge and operate cautiously when participating in the inscription ecosystem to ensure asset safety.

![inscription Overview|Understand the use cases, implementation methods, and asset security of major public chain inscription protocols])https://img-cdn.gateio.im/webp-social/moments-36d7d3b57a215d2e602c56b0cf49b593.webp(

View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • 6
  • Repost
  • Share
Comment
0/400
SundayDegenvip
· 10h ago
Again playing with inscriptions, leeks are being played for suckers.
View OriginalReply0
AllInDaddyvip
· 08-14 04:11
Suckers always miss out. Those who dare to go all in are my kind of people.
View OriginalReply0
FrontRunFightervip
· 08-14 04:08
another dark forest emerging... gonna be a mev bloodbath tbh
Reply0
RugPullAlertBotvip
· 08-14 04:08
Suckers are getting on board to run the points again.
View OriginalReply0
BlockchainFoodievip
· 08-14 04:06
inscriptions are like fine wine... they need proper storage or you'll get rekt
Reply0
TestnetFreeloadervip
· 08-14 03:58
Suckers enter the market to play people for suckers.
View OriginalReply0
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate app
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)