ByAUJay
What Impact Does Migrating From Single-Proof Verification to Batched Proof Aggregation Have on Auditability and Compliance?
Description: Switching from one-proof-per-statement to aggregated or recursive proofs can really help cut down on verification costs and speed things up. But keep in mind, this shift brings a change to your evidence model. Here’s a straightforward, regulator-friendly playbook to help you maintain auditability and compliance as you embrace proof aggregation.
TL;DR for decision-makers
- Aggregation techniques like SNARKs and STARKs, along with BLS signature aggregation, really pack a punch by condensing multiple verifications into a single one. This not only slashes on-chain costs but also ramps up throughput. You’ll see these practices already powering production rollups and Ethereum consensus. (docs.polygon.technology)
- Instead of having to “prove each item,” you'll be shifting your compliance approach to “prove a set.” This new mindset calls for some fresh artifacts: think batch manifests, input commitments, deterministic IDs, and those reproducible verifier builds.
- With EIP-4844 coming into play, a good chunk of L2 batch data is stored in short-lived blobs (lasting about 18 days). So, auditors will need some solid pinning and archival strategies to keep that evidence safe and meet retention requirements. (eips.ethereum.org)
- As you look ahead to 2026, keep an eye on these regulatory landmarks: SEC Rule 17a-4 for audit trails and WORM options in the U.S.; the MiCA transitional regime deadlines in the EU (you’ve got until July 1, 2026, at the latest); and don’t forget about DORA, which has been applicable across EU finance since January 17, 2025. (sec.gov)
1) What “migration to batched proof aggregation” actually changes
Most teams kick things off with single-proof verification, where each transaction, block, or state transition gets its own proof that’s checked on-chain or through a compliance pipeline. But when they switch to batched proof aggregation, they can replace a whole bunch of those small verifications with a single, streamlined one.
Here are three patterns you’ll often come across:
- Signature aggregation for consensus/attestations (BLS): This cool technique allows multiple signatures on the same or different messages to be combined and verified just once. It comes with a proof of possession to stop any rogue-key shenanigans. Ethereum’s beacon chain uses this for attestation aggregation. Check out more about it here.
- SNARK proof aggregation: With cryptographic schemes like SnarkPack, you can bundle a ton of Groth16 proofs into a single proof that only takes logarithmic time to verify. Some impressive benchmarks show that they can aggregate 8192 proofs in a speedy 8.7 seconds, and verification takes around 163 milliseconds. Dive into the details here.
- Recursive proofs (SNARKs/STARKs): Think of these as a way to validate other proofs. They’re super handy, especially with systems like Nova/HyperNova and StarkWare recursion, allowing you to compress many Layer 2 batches into a single Layer 1 verification. If you want to learn more, head over here.
Production Examples You Can Check Out Today:
- So, Polygon zkEVM has this cool feature called an “Outer Prover/Verifier.” It groups together multiple L2 batches and sends them off in one go to L1. You can check out more about it here.
- On the other hand, Starknet/StarkEx is all about that recursive proving life. They’re actually using it in production right now to combine a bunch of proofs into one. This makes on-chain verification cheaper and faster. If you want to dive deeper, here’s the link: starknet.io.
Why Migration Happens:
Migration is a pretty complex phenomenon, and there are a bunch of reasons why people decide to move from one place to another. Here’s a breakdown of some of the key factors:
Economic Factors
- Job Opportunities: People often move in search of better job prospects or higher wages. Whether it's looking for a new career or just trying to make ends meet, economic conditions play a huge role in migration.
- Poverty: In some cases, individuals or families may leave their home countries to escape poverty and improve their living standards.
Social Factors
- Family Reunification: A lot of folks migrate to join family members who have already settled elsewhere. It’s all about keeping those family ties strong!
- Education: Many people pack their bags to seek better educational opportunities. Studying abroad is a common reason for migration, especially among young adults.
Political Factors
- Conflict and War: Unfortunately, violence and unrest can push people to flee their homes in search of safety. Refugees are often a result of these difficult circumstances.
- Persecution: People may migrate to escape persecution based on their religion, ethnicity, or political beliefs. Seeking a safe haven can be a primary motivator.
Environmental Factors
- Natural Disasters: Events like hurricanes, earthquakes, or floods can displace large populations, forcing them to relocate to safer areas.
- Climate Change: Gradual changes in the environment, like rising sea levels and changing weather patterns, are increasingly causing people to move in search of better living conditions.
Conclusion
So, whether it's for economic, social, political, or environmental reasons, migration is a multi-faceted issue that reflects human resilience and adaptability. People are always looking for ways to improve their lives and find a better place to call home.
- Cost and throughput: You get one on-chain verification instead of having to deal with thousands.
- Operational elasticity: Recursive trees allow you to parallelize proving, giving you the flexibility to adjust batch sizes to meet your fee and latency goals. (starknet.io)
What Changes for Audit/Compliance:
When it comes to audit and compliance, there are some shifts you should know about:
- Increased Scrutiny: Regulators are stepping up their game, taking a closer look at how companies manage their compliance processes. This means that you’ll need to be even more diligent with your documentation and procedures.
- Technology Integration: More organizations are adopting tech tools to streamline their audit processes. Using software can help automate tasks, making it easier to track compliance and reduce human error.
- Data Privacy Regulations: With all the buzz around data privacy, it’s crucial to stay updated on new and changing laws like GDPR and CCPA. Make sure your audits cover how you handle personal data to avoid any nasty surprises.
- Focus on ESG Compliance: Environmental, Social, and Governance (ESG) factors are becoming more important. Companies need to ensure they’re not just following financial regulations but also addressing sustainability and ethical governance in their audits.
- Remote Auditing: Thanks to the pandemic, remote audits are now more common. Be ready to adapt your practices to accommodate virtual evaluations, which might involve using video conferencing tools or sharing documents online.
- Training and Awareness: Ongoing training for staff is more important than ever. Regular workshops and seminars can help keep everyone updated on compliance requirements and best practices.
- Risk Assessment Updates: As new risks emerge -- like cyber threats or changes in regulations -- you'll want to revisit your risk assessments. Update your strategies to address these evolving challenges effectively.
In summary, keeping up with these changes in audit and compliance will help ensure that your organization stays on track and avoids any potential pitfalls.
- Instead of keeping track of evidence for each individual item, you begin to prove a whole set. This changes how you demonstrate “completeness” and “traceability” from focusing on single records to looking at batch manifests and commitment structures.
2) The evidence model: from per-proof artifacts to batch artifacts
With single proofs, auditors can easily go through and double-check each item. But when it comes to aggregation, it's important to keep enough metadata so you can piece together the set you actually proved.
Minimum Artifacts to Produce and Retain Per Batch:
When it comes to managing your batches, it’s essential to keep track of a few key artifacts. Here’s a quick rundown of the minimum you should produce and hold onto:
- Source Code: Always keep the latest version of your code. You never know when you might need to roll back to it.
- Build Artifacts: These include your compiled code, executables, and any other files created during the build process.
- Documentation: Don’t skimp on this! Make sure you have up-to-date documentation that explains the functionality and usage of your artifacts.
- Configuration Files: These files are crucial for setting up your environment. Keep them handy so you can replicate the setup when needed.
- Test Results: Documenting your test results is vital to ensure that everything works as expected and serves as a reference for future debugging.
By keeping these artifacts organized and accessible, you'll set yourself up for smoother processes down the line!
- Batch manifest: This is basically a list of statement IDs (like L2 block numbers, transaction hashes, or circuit instance IDs) all lined up in a standard order.
- Deterministic batch ID: Think of this as the hash that combines the sorted manifest with circuit/verifier identifiers and the random seed from the aggregator or recursor.
- Commitment over inputs: Here’s where KZG/Merkle commitments come into play - they tie down the batch manifest and any extra info you used while generating the proof. If you’re dealing with data from EIP‑4844 blobs, just keep track of those versioned hashes and KZG commitments (don’t forget to store the blob bodies off-chain too). (eips.ethereum.org)
- Verifier provenance: Nail down the exact verifier contract address and version, along with the verifying key or a commitment to it. You should also have the circuit version/commit (hey, that’s the Git SHA!), the curve, commitment scheme, and the transcript hash all ready to go.
- Randomness record: This is where you’ll keep track of the Fiat‑Shamir transcript domain separators and the per-batch randomness that ensures those secure batch checks.
- Failure bisection plan: You’ll want a clear, documented process (plus some handy tools!) for breaking down a failing batch into smaller sub-batches until you find the culprit. Auditors will definitely want to know how you sift through defects in an aggregated setup.
These artifacts help an auditor tackle questions like “what exactly was proven?” and “can we reliably reproduce the proof or verification process?”
3) Compliance anchors you must design to
- United States (broker-dealers): So, there's this update with SEC Rule 17a-4 that kicked in on January 3, 2023, and you’ll need to be compliant by May 3, 2023. You can either go with WORM storage or use an “audit-trail alternative” to recreate any original records if they get modified or deleted. Plus, you need to produce records in a usable format and get them out the door quickly. This really lines up with how you're storing batch manifests, commitments, and logs. Check it out here: (sec.gov)
- EU MiCA transition: If you're a CASP operating under the old national law, you can keep going until July 1, 2026, at the latest - with some flexibility based on your Member State’s rules. So, make sure you’re gearing up your aggregation evidence stack to meet the MiCA recordkeeping and disclosure requirements before the transition wraps up. ESMA’s Q&A clears up that July 1, 2026, is really the latest date you’ve got. More details here: (esma.europa.eu)
- EU DORA applicability: Starting January 17, 2025, DORA will apply to financial entities and ICT third-party providers. This means you'll need solid ICT risk management, incident reporting, and keep registers of your ICT third-party arrangements. Your proving/aggregation setup and its logs are definitely under the scope of these ICT risk controls. Get more info here: (eiopa.europa.eu)
- SOC 2/ISO 27001/PCI DSS 4.0:
- SOC 2 CC7 (System Operations) expects you to have continuous monitoring, incident response, and recovery in place. That means you need to keep an eye on your batch verifiers and aggregator pipelines with some alertable metrics. More on that here: (wilsonmar.github.io)
- ISO/IEC 27001:2022 Annex A has logging and monitoring controls (like A.8.15/8.16 in common mappings), so be sure your batch evidence is logged with both integrity and retention in mind. Check it out: (isms.online)
- PCI DSS 4.0 Requirement 10 is all about having comprehensive logging, automated log reviews, and keeping those logs for 12 months. If your proof generation or verification systems interact with cardholder systems or controls, you’ll want to apply these requirements. More info here: (bdo.com)
4) Ethereum’s EIP‑4844 changes your audit trail for L2 batches
If you're a rollup sharing data through EIP‑4844:
- So, here’s the deal with blobs: they stick around for about 4096 epochs, which is roughly 18 days. Once they expire, all you’ve got left on L1 are the KZG commitments (basically versioned hashes). If you need to keep things around for audits or re-proving, make sure to pin or archive the data somewhere else. (eips.ethereum.org)
- And let’s not forget that the nitty-gritty details are super important: you’ll want to remember that BYTES_PER_FIELD_ELEMENT is 32, FIELD_ELEMENTS_PER_BLOB comes in at 4096, and blob transactions are tagged with type 0x03. For point evaluation verification, there’s a handy precompile waiting for you at address 0x0A. Make sure your evidence captures which blobs and commitments your batch relied on. (eips.ethereum.org)
Operational Implication
You’ll want to integrate a blob archiver that keeps an ear out for your L2’s posting transactions. This archiver should grab those blob sidecars, check KZG proofs against the versioned hashes, and then create immutable records that connect the blobs to the batch ID and the manifest.
5) Security nuances unique to aggregation (and how to prove soundness to auditors)
- BLS rogue-key risk: It’s super important that aggregate signatures stop any rogue-key forgeries in their tracks. Production systems need to utilize proof-of-possession (PoP) for this. Make sure to document how PoP is enforced and check subgroups. Don’t forget to refer to the IETF draft and the Ethereum research notes that delve into batch verification randomness and subgroup validation. (datatracker.ietf.org)
- Batch verification randomness: Avoid using fixed coefficients for those linear-combination batch checks. It’s a good idea to keep track of the domain separation tags and randomness seeds for each batch, as auditors might ask for those when they’re re-verifying. (ethresear.ch)
- SNARK aggregation soundness: When working with schemes like SnarkPack, make sure you’re documenting the exact scheme version/parameters and the set of Groth16 verifying keys that are being aggregated. Some schemes need all the components to be uniform (like the same circuit/vk), while others can handle a mix--just ensure your controls line up with the cryptographic assumptions. (eprint.iacr.org)
- Recursion chains: If you're diving into Nova/HyperNova or STARK recursion, it’s vital to document every recursion node (think tree structure and inputs). This way, a reviewer will be able to replay the fold sequence or the Cairo verifier chain easily. (microsoft.com)
6) Worked example A: L2 rollup moves from per-block SNARKs to aggregated proofs
Before: each L2 block sends its data along with a Groth16 proof to L1.
After: a coordinator combines N L2 block proofs into a single recursive or aggregated proof and submits it once every window.
What’s New in Your Audit Package:
We’ve made some exciting updates to your audit package that you won’t want to miss! Here’s a quick rundown of the changes:
- Enhanced Reporting Features: We’ve revamped our reporting tools to give you more insights and clearer visuals. This should make it easier to spot trends and make informed decisions.
- User-Friendly Interface: Navigating through your audit package just got a whole lot simpler. We’ve streamlined the design, so you can find what you need without any hassle.
- Real-Time Collaboration: You can now work with your team in real-time. This means you can collaborate, share ideas, and get feedback instantly, which should help speed up the audit process.
- Updated Compliance Guidelines: We’ve refreshed our compliance section to reflect the latest regulations. Be sure to check out these guidelines to stay on top of your game!
- More Resources at Your Fingertips: Explore our expanded library of resources, including guides and FAQs, which provide additional support as you navigate through your audit.
If you have any questions or need help with these updates, don’t hesitate to reach out. Happy auditing!
- Batch Manifest and Deterministic ID
- The manifest contains [L2 block numbers], a neatly ordered list of L1 blob versioned hashes for data availability, the circuit version (like zkEVM circuits vX.Y.Z), and the hash of the verifying key.
- You can get the Batch ID by using this formula: Hash(manifest || verifier_address || vk_hash || transcript_domain || transcript_randomness).
2) Blob Archival
- For every versioned hash in the manifest, keep the blob body stored off-chain and pin it down. Also, save those KZG proof verification receipts that link back to the EIP-4844 constants. Don’t forget to verify your sidecars when you bring them in. (eips.ethereum.org)
3) Recursion Evidence
- Keep track of the recursion tree: the leaves represent the per-block proofs along with their public inputs; the internal nodes show the transcripts of the pairwise folding and verification; and the root corresponds to the public input of the proof submitted to L1. (starknet.io)
- Reproducible verification
- Keep a stateless CLI handy for re-checking the root proof against the on-chain verifier and for replaying blob KZG checks through the point-evaluation precompile spec. Don't forget to include a container image digest. (eips.ethereum.org)
Regulatory mapping in 2026:
- SEC 17a-4 audit-trail alternative or WORM for all manifests/logs: You’ll need to provide “reasonably usable” exports--think CSV/Parquet with signed digests. Check it out here: (sec.gov).
- PCI DSS 4.0: Get ready for automated reviews of prover/verifier logs with a minimum retention of 12 months. More details can be found here: (bdo.com).
- MiCA (EU): The transitional regime wraps up by July 1, 2026 at the latest. Make sure your CASP-facing disclosures clearly explain data availability windows (like blob expiry) and how you’ll handle archival. More info is available here: (esma.europa.eu).
- DORA: You need to treat the aggregator and blob archival as ICT critical services. Don't forget to keep a register of third-party contracts and track observable SLAs. Get the scoop here: (eba.europa.eu).
7) Worked example B: Enterprise chain adopts BLS signature aggregation for approvals
Scenario
Imagine a private blockchain where validators come together to give their thumbs up for each block. Instead of making 50 separate signature checks, we’re streamlining the process with BLS (Boneh-Lynn-Shacham) signatures, allowing us to replace all those individual verifications with just a single one. How cool is that?
Evidence and Controls:
In research, evidence plays a crucial role in validating our hypotheses and ensuring that our conclusions are based on solid foundations. Controls are an essential part of the process, helping to eliminate any biases and outside factors that could skew our results. Here’s a closer look at both of these elements:
1. Evidence
- Definition: Evidence refers to the data and information collected during research, which supports the claims you’re making.
- Types of Evidence:
- Quantitative: This is numerical data that can be measured and analyzed statistically. Think surveys, experiments, and any data that can be expressed in numbers.
- Qualitative: This type involves descriptive data that captures qualities and characteristics. Examples include interviews, open-ended surveys, and observational studies.
2. Controls
- Purpose: Controls help keep the research environment consistent, so the only factors influencing the results are the ones you’re testing.
- Types of Controls:
- Positive Controls: These are groups that receive a treatment known to produce results, helping to show that the experiment is capable of producing valid outcomes.
- Negative Controls: These groups don’t receive the treatment at all, allowing researchers to see what happens in the absence of the experimental treatment.
3. Implementing Evidence and Controls
When designing your research, keep these tips in mind:
- Always outline your specific hypotheses and determine what kind of evidence will best support these.
- Decide on your control groups early on and ensure you stick to similar conditions for each group throughout the study.
- Review your data regularly to ensure that the evidence aligns with your expectations and adjust as necessary.
For more detailed guidelines on forming effective research strategies, check out this resource.
Conclusion
Evidence and controls are the backbone of solid research. By meticulously collecting data and establishing robust controls, your findings will not only be more credible but also significantly more valuable to your field.
- Key lifecycle and PoP: We need to make sure we have proof-of-possession (PoP) when onboarding validators. This means storing PoP receipts along with subgroup-checked public keys. You can check out more details here.
- Aggregation transcript: It’s important to keep track of the ordered public key list, message digests, and the method used for aggregation (like fast-aggregate-verify vs aggregate-verify). Don’t forget to include randomness where it’s necessary! More info can be found here.
- Overlap prevention: We should monitor bitfields and indices to stop double-counting participants--this is a common pitfall when it comes to overlapping aggregates. For more insights, head over to this link.
- SOC 2 CC7 alignment: It’s crucial to have centralized logging for aggregation results, including any failures or attempts to reaggregate. We also need a clear plan for what to do if any verifications don’t go through. Check out further details here.
8) Best emerging practices we see succeeding in audits
- Publish a “batch evidence spec”
- Consider your batch manifest a key artifact (think JSON schema with versioning). Make sure to include: circuit commit SHA, vk hash, curve, commitment scheme, transcript domain, and RNG seed provenance.
2) Hierarchical Batches with Binary Bisection
- Use a tree-shaped aggregation plan that allows you to quickly narrow down a failure to the specific item causing the issue in just O(log N) time. This way, you can present your auditors with a clear and straightforward playbook.
3) Independent Re‑Verification Pipeline
- Keep a second verifier binary/container that's built separately to replay proofs and aggregation transcripts. Also, include both images and their SBOMs in the evidence set.
4) Immutable, Queryable Storage
- Go for WORM or audit-trail-compliant storage when dealing with manifests, transcripts, and logs. It’s a good idea to sign and timestamp each evidence file. Don’t forget to export everything in a “reasonably usable” format like CSV or Parquet for regulators. Check out more details on the SEC site.
5) Blob-aware retention
- If you’re using EIP‑4844, don’t think your retention period is just 18 days; it actually depends on what your regulations say. Make sure to pin those blobs, keep your KZG commitments safe, and jot down the point-evaluation proofs. (consensys.io)
6) Cryptographic Hygiene Checklists
- Make sure to run subgroup checks, keep a log of PoP events, and ensure that the randomness of salt batch verification is unique for each batch. Don't forget to pin your library versions and curve parameters, and always hold onto those entropy source attestations. (ethresear.ch)
7) Verifying Observability SLOs
- Here’s what you should keep an eye on: the number of items in each batch, the age and latency of those batches, the time it takes to generate proofs, gas costs for on-chain verification, failure rates at different stages (like leaf, internal node, and root), how long it takes to handle reorgs, and whether blob archival is successful.
9) Concrete do/don’t table for a first migration
- Do:
- Put together a solid Batch ID spec and make sure you implement it everywhere (think verifier, dashboard, and archives).
- Emit L1 events that include the Batch ID, manifest hash, vk hash, and any blob versioned hashes.
- Keep your circuits and verifying keys versioned; never roll them both out together without keeping a record of the changes.
- Introduce a “VerifyBatchLocally(batch_id)” command that replays everything and gives you a signed attestation.
- Don't:
- Don't toss out those per-item identifiers; even if you’re aggregating, you still need to keep track of everything.
- Don't just stick to deterministic coefficients for your batch checks; grab some fresh randomness and be sure to note it down. (ethresear.ch)
- Don't think those blobs are safe with Ethereum forever; they actually have an expiration date--make sure to archive them. (consensys.io)
10) When should you not switch yet?
- When the stakes are sky-high, auditors really want to see detailed, independent checks for each item, but your team isn’t quite ready with batch manifests and bisection tools yet.
- There are tricky setups across different regions where it’s still a bit fuzzy about where data should live and how long it needs to stick around (like before you've nailed down blob archiving and retention mapping).
11) A quick glossary to align teams
- Aggregation (SNARK): This cool technique packs multiple SNARK proofs into one neat proof--like SnarkPack for Groth16. You can dive deeper here.
- Recursion: Think of this as a proof that verifies other proofs. It’s pretty common in rollups, like what you’ll find with Starknet recursion. Check it out here.
- BLS aggregation: This one’s all about merging tons of signatures into a single one. Just keep in mind it needs PoP and subgroup checks to stay safe. You can learn more here.
- EIP‑4844 blob: This is short-term data linked to transactions. While the commitment stays on-chain, the actual data gets cleaned up after about 18 days. Want to know more? Head over here.
12) The bottom line for auditability and compliance
Shifting from single-proof verification to batched proof aggregation is definitely a win when it comes to cutting costs and boosting scalability. Plus, it's already become pretty standard in L2s and consensus systems. However, it does mean you'll need to produce some different types of evidence like batch-level manifests and commitments, reproducible verifier provenance, randomness records, and blob-aware retention. If you incorporate these into your software development lifecycle (SDLC) and logging setup, you’ll be well-prepared to tackle the regulations coming in 2026 (think SEC 17a-4, MiCA, DORA, SOC 2, PCI DSS) while still reaping the benefits of aggregation. Check out more details on the SEC's requirements here.
Appendix: Pointers and credible sources for your internal wiki
- Check out the EIP‑4844 constants/specification and KZG commitments. You can find all the details here.
- Curious about the blob expiry rationale and DA model? Dive into the topic over at ConsenSys.
- Get the scoop on the Polygon zkEVM aggregation architecture with a comprehensive overview right here.
- Want to know how Starknet recursive proving is faring in production? Check out the insights on their blog.
- If you’re into technical papers, don't miss the SnarkPack paper on practical SNARK aggregation; it’s available here.
- The IETF BLS signature draft covers topics like PoP and rogue-key defenses. Take a look here.
- There’s an interesting Ethereum Research thread discussing BLS batch verification security considerations. You can find that discussion here.
- For those keeping an eye on compliance, check out the SEC Rule 17a‑4 amendments, including effective dates and audit-trail alternatives here.
- The ESMA MiCA Q&A provides insights on the transitional regime extending through July 1, 2026; get all the details here.
- Lastly, DORA applicability and the reporting registers will kick off starting in 2025. Find more information on the EIOPA site.
About 7Block Labs
We’re here to help startups and big companies create rollups, proof systems, and solid evidence pipelines that meet compliance standards. If you’re thinking about migrating to aggregation or recursion, we can sketch out your batch evidence specs, set up blob archival, and ensure your verifier observability is on point. Plus, we’ll align everything with your SOC 2/ISO program and take your specific legal requirements into account.
Like what you're reading? Let's build together.
Get a free 30-minute consultation with our engineering team.
Related Posts
ByAUJay
Making VASP Reporting a Breeze: Simple Automation Solutions for Nigeria
Nowadays, automating VASP reporting in Nigeria is really about making genuine integrations happen. We’re talking goAML XML, Travel Rule messaging, sanctions screening, and NDPA-compliant data flows--way more than just some dry policy memos. Want to know how 7Block Labs manages to weave all these elements into a smooth process? Let’s dive into the details!
ByAUJay
The 'Commodity-Wrapper' Token: How to Structure Assets for CFTC Compliance
Summary: A lot of “tokenization” projects don’t make it past the starting line because teams struggle to show that their token qualifies as a commodity under the CEA while also meeting procurement, collateral, and exchange requirements. This playbook walks you through how a Commodity-Wrapped Token can help you navigate these challenges.
ByAUJay
Catch the Next Wave of Compliance Tools: Check Out 7Block Labs’ Trend Watch!
**Summary:** Enterprise compliance is evolving at lightning speed, often leaving delivery teams scrambling to keep up. This Trend Watch breaks down the key issues you really need to pay attention to right now--like DORA being enforced, the transition period for MiCA, FATF's 2025 travel-rule initiative, the rise of VC 2.0 wallets, ERC-3643, and zk.

