What is Ditto Protocol?
Ditto Protocol is a decentralized protocol designed to execute intent-driven workflows and event-driven automations across blockchain ecosystems. By leveraging shared security, Ditto ensures trustless, reliable execution of workflows across EVM-compatible chains.
The protocol empowers builders to create and execute complex workflows under predefined conditions, unlocking new possibilities for decentralized automation.
How Ditto Protocol Works
Account Abstraction
Ditto Protocol employs an abstraction layer for user accounts, enhancing privacy and security. Users can perform transactions and launch workflows without exposing unnecessary details, ensuring a safer and more confidential blockchain experience.
Randomized Node Groups (Committees)
- Every workflow or transaction is processed by a randomly selected group of nodes (a committee).
- Randomization is ensured via the RANDAO verifiable randomness mechanism.
- Committees are formed from RANDAO participants to eliminate predictability and reduce attack risks.
- A committee leader is chosen based on verifiable randomness and stake size for added fairness.
Secure Workflow Execution
- Workflows require validation and signing by a majority of committee members using Byzantine Fault Tolerance (BFT).
- Process completes upon majority consensus, ensuring robustness even if some nodes act maliciously.
Rewards for Participants
Validators, operators, and keepers are rewarded with transaction fees for:
- Maintaining network stability
- Ensuring protocol integrity
- Incentivizing honest participation
Why Choose Ditto Protocol?
Feature | Description |
---|---|
Maximum Security | Randomized committees + BFT algorithm provide attack-resistant execution. |
Smart Execution | Build sophisticated workflows with unmatched composability. |
True Decentralization | No fixed nodes – committees are randomly formed. |
Cross-Chain Capabilities | Supports EVM-compatible chains for cross-chain automation. |
Roles in the Ditto Network
Operators
Maintain core infrastructure:
- ✅ Transaction processing
- 🔒 Staking required (slashing for violations)
- 🛠️ Network upkeep
Keepers
Provide auxiliary functions:
- 🔍 Monitoring for anomalies
- ⚙️ Technical support and optimization
- 📊 On-chain execution reporting
Validators
Key consensus participants:
- ✔️ Transaction validation via cryptographic proofs
- 🎲 Committee participation (RANDAO-based selection)
- 🌐 Ensures decentralization
Economic Security and Staking
Core Principles:
- 🛡️ Staking provides economic security
- ⚖️ Slashing for misbehavior (failures/attacks)
- ♻️ Restaking via Symbiotic integration enhances security
Key Benefits:
- Reliable workflow execution
- Incentivized honest participation
- Scalable network security