💙 Gate Square #Gate Blue Challenge# 💙
Show your limitless creativity with Gate Blue!
📅 Event Period
August 11 – 20, 2025
🎯 How to Participate
1. Post your original creation (image / video / hand-drawn art / digital work, etc.) on Gate Square, incorporating Gate’s brand blue or the Gate logo.
2. Include the hashtag #Gate Blue Challenge# in your post title or content.
3. Add a short blessing or message for Gate in your content (e.g., “Wishing Gate Exchange continued success — may the blue shine forever!”).
4. Submissions must be original and comply with community guidelines. Plagiarism or re
A Comprehensive Analysis of Inscription Protocols: Principles, Applications, and Security Considerations
Inscription Protocol Analysis: Implementation Principles, Application Scenarios, and Security Considerations
Recently, several well-known trading platforms have successively launched inscription markets, supporting various inscription protocols such as BRC-20 and EVM, which has sparked widespread attention in the market towards inscriptions. However, due to the complexity and novelty of inscription protocols, various security issues have arisen frequently, which not only threaten the security of user assets but also have a negative impact on the healthy development of the entire inscription ecosystem.
This article will organize the mainstream inscription protocols to help users understand the uses, implementation methods, and how to protect inscription assets.
Inscription Overview
Inscription is a mechanism on the blockchain that permanently records information with specific meanings. Once recorded, this information is difficult to alter and can be simple text or complex code, images, etc. The standardized inscription protocol enables the functionality of digital assets.
Inscription Ecosystem Status
Since the emergence of BRC-20 and other Bitcoin blockchain inscriptions, the inscription ecosystem has developed rapidly. Currently, multiple public chains have joined the inscription ecosystem, including:
These protocols are designed for issuing inscriptions on their respective public chains.
Detailed Explanation of Mainstream Inscription Protocols
1. BRC-20
BRC-20 is based on the Bitcoin UTXO model and the Ordinals protocol.
The unspent transaction output UTXO( is the basic unit of Bitcoin transactions. The Ordinals protocol assigns a unique number to each Satoshi in the UTXO), the smallest unit of Bitcoin (, and supports writing various data.
BRC-20 writes uniformly formatted JSON text data into Satoshis through the Ordinals protocol, serving as a ledger for BRC-20 tokens. It mainly includes the following operations:
By analyzing this textual data, we can deduce the holding and transfer status of the tokens.
![Inscription Popular Science|Understand the use cases, implementation methods, and asset security of various major public chain inscription protocols])https://img-cdn.gateio.im/webp-social/moments-aa196504f5af35aa25085df04e0ab079.webp(
) 2. ARC-20
ARC-20 is also based on the Bitcoin UTXO model, but differs from BRC-20:
ARC-20 is also divided into three steps: deployment, minting, and transfer.
When querying the balance of ARC-20 tokens, simply read the number of satoshis in the UTXO holding that token.
![inscription popular science|Understand the use cases, implementation methods and asset security of major public chain inscription protocols])https://img-cdn.gateio.im/webp-social/moments-321835e35ea77640589fe0d597450bfe.webp(
) 3. Inscription
Ethscription uses the calldata data blocks of Ethereum transactions to create and share data.
Create Ethscription:
Transfer Ethscription: The sender transfers to the receiving address, filling in the transaction hash that created the Ethscription in the calldata.
![inscription popular science|Understand the use cases, implementation methods, and asset security of various major public chain inscription protocols])https://img-cdn.gateio.im/webp-social/moments-083ea26b5d0298d0b292e8dd98c98103.webp(
) 4. EVM Chain Inscription
The inscription protocols of EVM chains such as BSC, Ethereum, and Polygon are similar, all utilizing calldata to store fixed format data.
Taking BSC as an example, the inscription format is:
data:,{"p":"","op":"","tick":"","amt":""}
Send a regular transfer to the target address during minting, and fill in the above format data in calldata.
Transfer to the receiving address, filling in the transaction hash that created the token in the calldata.
![inscription popular science|Understand the use cases, implementation methods, and asset security of major public chain inscription protocols])https://img-cdn.gateio.im/webp-social/moments-610e1d2dcbc2e515a3d77beeccae7208.webp(
Security Precautions
The BTC inscription protocol is based on UTXO transactions, and users making ordinary BTC transfers may mistakenly transfer or "burn" inscription assets.
Fully understand the implementation principles of each inscription protocol to avoid operational errors that may lead to asset loss.
Although inscription trading can reduce additional fees, users must exercise extra caution to ensure correct operation.
The inscription data formats of different EVM chains or protocols may vary, so be sure to distinguish them when using.
Inscription assets are identified and displayed by offline servers, so it is important to choose a trusted indexing service.
In summary, while inscriptions lower the cost of user participation, their specificity also brings new security risks. Users should fully understand the relevant knowledge and operate cautiously when participating in the inscription ecosystem to ensure asset safety.
![inscription Overview|Understand the use cases, implementation methods, and asset security of major public chain inscription protocols])https://img-cdn.gateio.im/webp-social/moments-36d7d3b57a215d2e602c56b0cf49b593.webp(