If snaps aren't being mined, it's time to be suspicious.
<CookieDotFun knows all your tricks ๐>
Recently, I posted about @tenprotocol and saw some people still saying "I'm at 0 snaps ใ
ใ
"..
Here's a checklist for the Sbangdan, just in case.
โ ๏ธActions considered as farming/abusing:
- Spamming the same content, excessive hashtags/mentions
I haven't seen many people doing this yet, but let's be careful.
- Participation begging like "Please like/quote/comment"
? Oh, come on, saying "Please quote my comment" is a no-go now;;
- Copying/pasting others' posts/plagiarism
It's not quoting if you're just copying the content outright, right?
- Uploading adult content, etc.
Let's keep it clean~~
- Reckless uploading of low-quality AI-generated content
Don't just copy-paste results from AI; rewrite it yourself.
- Artificially boosting participation using bots
I've been seeing bots around lately, and I've muted those accounts.. Should I block them based on this...? Or not...?
- Promoting multiple projects in a short time
I don't know how short this timeframe is, but let's not go crazy.
- Group farming where everyone promotes each other (mutual follows, likes, comments)
To be honest, unless it's done at an abusive level, it seems like this isn't being caught.. Just be careful with the comments that are just mutual support.
Let's keep it healthy! It seems like an algorithm encouraging consistent writing based on one's thoughts, experiences, and insights.
Anyway, let's widely share these tips so that Koreans can reach the global rankings!

Who is the Korean who has snapped the most vooi in 3 days? - It's me~
It's the recipe that the bartender Luffy makes for @tenprotocol~
First of all, there are top 50 allocations for Koreans in Ten Protocol, so you have to "participate" for sure, right?
But the advantage of these guys is that it's a bit complicated, so if someone isn't very interested in crypto, it might be hard to understandใ
ใ
Still, I will explain it as clearly as possible so that everyone can comprehend (you all have to post too, right...?)!
First of all, they are an Ethereum Layer 2 project.
There is an Ethereum Layer 1 blockchain, and on top of that, another Ten Protocol Layer 2 blockchain operates. (Even if you don't know Layer 1 and 2, just write EVM Layer 2, it sounds cool lol)
And there are many Layer 2 projects (Avalanche, Base Chain, etc....) but the technology they are pushing is TEE.
Trusted Execution Environments (TEEs)
This means a trusted execution environment. Until now, blockchain node operators have been responsible for receiving user requests (e.g., "I want to buy Trump coin! How much should I buy!") and processing them before sending them to the blockchain for recording.
However, since they were processing this internally, the Node could know who was doing what just before it was recorded on the blockchain.
The reason this is a problem is that from the user's perspective,
if I sent a request saying, "I want to buy $1 million of Trump,"
the Node operator would think,
"The price is going to rise? Then I'll buy $1,000 of Trump before that person buys $1 million, and after they buy $1 million, I'll sell my $1,000 back! Haha"
This is what happens.
This is called the MEV attack by the Node operator, which is just a nasty attack.
There are other things they can do, like if an NFT listing comes up at a ridiculously low price, the operator can snatch it up first... This led to the idea of TEE (Trusted Execution Environment) because it feels unfair.
TEE is a verification program that runs on the Node (other blockchain nodes also run some verification programs), but it first encrypts and sends its hardware and program status to Ten Protocol. And the TEE can only start operating correctly if the verification is done properly.
It maintains security in the following way:
1. TEE sends a key and a box to the user.
2. The user puts their request inside the box, locks it with the key, and sends it to TEE. (The key is discarded)
3. TEE has the same key, so it opens it internally and only it can see (the Node cannot know the contents during the process of handing the box to TEE)
4. It sends the result to the blockchain~
This is how they maintain security.
โก(Important)โก
Now, I will summarize the keywords you need to post:
1. Introduce it as an EVM Layer 2 project.
2. Summarize how annoying the existing MEV attacks are. Just create social evils.
3. After explaining the technical content mentioned above, you can say that TEE can prevent MEV attacks. Clap clap -
+ If you add personal insights, memes, stories, or photos, you can make a post.
๐It's done๐
So please quote this article and make your own content! Haha Let's all dip our toes into the Ten Project a little bit (it's nice to farm leisurely after opening the blood)~
I really struggled a bit to look through the internal algorithms, but I just took out all the difficult stuff and brought only the easy content....
There are technical limitations (like hardware attacks), but we don't care about that, right? Just feed us..!




4.19K
58
The content on this page is provided by third parties. Unless otherwise stated, OKX is not the author of the cited article(s) and does not claim any copyright in the materials. The content is provided for informational purposes only and does not represent the views of OKX. It is not intended to be an endorsement of any kind and should not be considered investment advice or a solicitation to buy or sell digital assets. To the extent generative AI is utilized to provide summaries or other information, such AI generated content may be inaccurate or inconsistent. Please read the linked article for more details and information. OKX is not responsible for content hosted on third party sites. Digital asset holdings, including stablecoins and NFTs, involve a high degree of risk and can fluctuate greatly. You should carefully consider whether trading or holding digital assets is suitable for you in light of your financial condition.