- Products
- Ecosystem
- Resources
- About
- Explore


As we navigate through Q3 2023, Analog has been hard at work building its product and technical infrastructure. Here’s an update of how far the project’s development has come along!
We are optimizing our Threshold Signature Scheme module:
Currently upgrading the frost-dalek crate to be EVM-compatible
Implementing and validating the collector node within TSS, empowering shards to manage keys and permissions efficiently
We are implementing arbitrary method calls (AMCs), a low-level message-passing SDK that allows users/applications to execute arbitrary smart contract functions only on the connected destination chains. This is a precursor to the General Message Passing (GMP) protocol.
The Connector SDK for EVM chains is now open-source.
We have implemented the following updates to the Timechain module:
Staking tokenomics
Accounts management pallet
Proxy accounts
Task management pallet
Task tokenomics
Task scheduler
Task executor
Analog JS Library now includes:
On-chain library
Analog Watch has seen these features added:
Collections
View builder
Publisher page
Profile page
For a summary of Analog’s key technologies to put things into perspective, head here! 👉 https://docs.analog.one/analog-network

There’s been a lot happening lately across the Analog ecosystem, and honestly, it’s starting to feel like the pieces are coming together. The big one: @Zenswap_io is live in public beta. It’s our omnichain DEX, and it’s finally out in the wild.
Read more

Blockchain platforms have always struggled with the balance between security, compatibility, and performance. We're excited to share how Analog's integration of PolkaVM technology is redefining these boundaries, achieving near native execution speeds for EVM contracts while maintaining full compatibility with the Ethereum ecosystem.
Read more

The rise of interconnected blockchains has ushered in a new era of possibilities, but it's not without its challenges.As the Web3 landscape expands, so does the potential for malicious attacks, and sybil attacks remain a persistent threat to the integrity and security of cross-chain systems.
Read more