[R5] - Threshold 🏅

We helped Threshold name its Conditions-Based Decryption product and wrote the content piece "A Beginner's Guide to Bitcoin-to-Ethereum Bridges."

Challenges

Help us name our Conditions-Based Decryption product

Pool 1,000 USDC

Our team truly took the time to understand Threshold by researching its mission, values, technology, products, and branding. As a result, we were able to understand what the Conditions-Based Decryption product was from both a technical standpoint and a high-level overview (Bounty 1). By combining our understanding of the product with Threshold’s ethos, corporate image and branding, we came up with four unique names for the Conditions-Based Decryption product.

Create your best Threshold content ideas!

Pool 5,000 USDC

Since this was our team’s first time encountering Threshold, we approached the two bounties from a beginner’s perspective. This is a huge advantage for Bounty 2. Our team understands firsthand what type of questions people may have when they first encounter Threshold and its technologies and products. The Threshold website and the documentation for the Threshold Platform currently cater to those who are already familiar with or are experts in threshold cryptography services. People who are new to the area may feel intimated by the jargon and high-level concepts. By leading with the desire to welcome beginners and new users, we wrote “A Beginner’s Guide to Bitcoin-to-Ethereum bridges”, with hopes of helping Threshold reach a wider audience and user base.

Project details

No video added

Our team truly took the time to understand Threshold by researching its mission, values, technology, products, and branding. As a result, we could understand the Conditions-Based Decryption product from both a technical standpoint and a high-level overview (Bounty 1). Combining our understanding of the product with Threshold’s ethos, corporate image and branding, we devised four unique names for the Conditions-Based Decryption product.

The submission includes the following elements:

  • Research process before coming to product name ideation

  • Four potential names for the Conditions-Based Decryption product

  • Description of the ideation process behind each name

  • Explanation for the rationale behind all four name suggestions

  • Research backing up the viability of each name suggestion

Since this was our team’s first time encountering Threshold, we approached the two bounties from a beginner’s perspective. This is a massive advantage for Bounty 2. Our team understands firsthand what questions people may have when encountering Threshold and its technologies and products. The Threshold website and the documentation for the Threshold Platform currently cater to those who are already familiar with or are experts in threshold cryptography services. People who are new to the area may feel intimated by the jargon and high-level concepts. By leading with the desire to welcome beginners and new users, we wrote “A Beginner’s Guide to Bitcoin-to-Ethereum bridges” with hopes of helping Threshold reach a wider audience and user base.

The submission includes the following elements:

  • Research process prior to writing content

  • Content piece

    • What are Ethereum-to-Bitcoin bridges

    • How do Bitcoin-to-Ethereum bridges work?

    • What are examples of equivalent asset tokens that are used as Bitcoin-to-Ethereum bridges?

    • What is the difference between wBTC and tBTC v2?

    • What is the difference between tBTC and tBTC v2?

    • Why do we need Ethereum-to-Bitcoin bridges?