[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]  Jimak👨🏿💻✊🏿💢 [@therealjimak](/creator/twitter/therealjimak) on x XXX followers Created: 2025-07-17 07:19:33 UTC @Caccy_001 @union_build I like how it uses zk proofs and Merkle roots to let blockchains check each other’s info without bridges. It’s great for trustless oracles and token validation. Just wondering though, how do you make sure the Merkle roots stay safe from attacks? XX engagements  **Related Topics** [token](/topic/token) [coins oracle](/topic/coins-oracle) [zk](/topic/zk) [Post Link](https://x.com/therealjimak/status/1945745170294587453)
[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]
Jimak👨🏿💻✊🏿💢 @therealjimak on x XXX followers
Created: 2025-07-17 07:19:33 UTC
@Caccy_001 @union_build I like how it uses zk proofs and Merkle roots to let blockchains check each other’s info without bridges. It’s great for trustless oracles and token validation. Just wondering though, how do you make sure the Merkle roots stay safe from attacks?
XX engagements
Related Topics token coins oracle zk
/post/tweet::1945745170294587453