(Rian*)

142 posts

(Rian*) banner
(Rian*)

(Rian*)

@rianrab

@fhenix Prev: BD Gaming @0xPolygon Growth @AxieInfinity

NYC Se unió Aralık 2010
885 Siguiendo594 Seguidores
Fhenix
Fhenix@fhenix·
Congrats @DZeresh on presenting the UC threshold FHE work at @DeComputeConf! This research directly addresses one of the hardest problems in bringing FHE to production: how do you decrypt threshold-encrypted data at scale while maintaining security guarantees? The Fhenix team continues to ship 🔥 See you at the Encryption Day!
English
12
3
39
1.6K
Fhenix
Fhenix@fhenix·
Fhenix is Based CoFHE is now officially live on @base, along with our first encrypted mini app! Vibe code your own encrypted apps using CoFHE, and showcase them at Based CoFHE Corner during Encryption Day (Buenos Aires). Check out our demo for inspo: farcaster.xyz/miniapps/IhMOj…
Fhenix tweet media
English
60
36
264
46.3K
David Mihal.eth
David Mihal.eth@dmihal·
Calling x402 endpoints isn't cool. You know what's cool? Letting AI agent's call x402 endpoints. I made a quick demo showing how to make an agent in AgentBlocks that can choose which x402 services to use, call & pay them, and combine the results. Check it out:
David Mihal.eth@dmihal

New tool & video: x402 is hot right now. New standards like x402 need lots of people experimenting. So I spun up AgentBlocks, a forked version of n8n with nodes for x402 basics. Now anyone can try x402 without writing code! Watch me build an x402-gated ETH price API here:

English
33
24
230
35.4K
DappaDan
DappaDan@DAppaDanDev·
confessions of a terrible packer but not going to forget about Encryption Day with @fhenix ! (and you shouldn't either)
English
15
3
77
3.1K
vana
vana@coinempress·
been seeing more and more people explore what privacy actually means in web3. wanted to find one place where the people behind it actually meet and build. turns out it’s happening in buenos aires, at encryption day by @fhenix on nov 19th. link’s below if you’re curious too.
English
20
1
75
2.8K
(Rian*) retuiteado
Fhenix
Fhenix@fhenix·
Cool proposal from Carter. Encrypted intents powered by FHE unlock a fairer, MEV-resistant coordination layer - something we’ve been building toward with CoFHE. When computation stays private and verifiable, everyone wins.
Carter L. Woetzel ❎@l_woetzel

1/ 1inch x Encrypted Intents🔒 What could happen if DeFi’s leading intent-based DEX @1inch integrated fully homomorphic encryption (FHE via @fhenix )? A new era of private, fair, and verifiable coordination would be unleashed. Let’s unpack what this means👇

English
4
4
31
2.4K
(Rian*)
(Rian*)@rianrab·
@fhenix so what's on deck for the next one?
English
0
0
0
16
(Rian*) retuiteado
Fhenix
Fhenix@fhenix·
"If your privacy depends on a vendor’s attestation key, you have a service agreement - not privacy." Watch the full recording of TEE vs FHE discussion for more hot takes: x.com/i/broadcasts/1…
English
8
6
30
1.8K
(Rian*) retuiteado
Fhenix
Fhenix@fhenix·
TEEs had a good run, but this @intel response is exactly why we've been building toward FHE-first systems. The attack itself? Not shocking. But Intel basically saying "not our problem" kills any enterprise adoption path for TEE-only privacy. Here's what people miss: this isn't just about SGX dying. It's about what comes next. Pure MPC is still a non-starter for most applications - too slow, too complex, breaks with scale. But FHE? That's your new building block for the web. With FHE, your compute happens on encrypted data. No trusted hardware needed. No "trust the box" assumptions. Just math protecting your private state while still letting you build programmable applications on top. The era of "good enough" privacy is over. Time to build the real thing.
English
5
1
10
574
(Rian*) retuiteado
(Guy Zyskind*)
(Guy Zyskind*)@GuyZys·
The latest in TEE drama: I’ve known about WireTap for a while; paired with Battering RAM, it reinforces a point many of us have lived with for years: TEEs were a breakthrough, but can no longer serve as a single trust anchor. Quick context on where I’m coming from. I was the first to bring encrypted computation into blockchains: MPC with the Enigma whitepaper (2015), then TEEs with @SecretNetwork (2020), and today FHE with @fhenix. Each was right at the time; each has a place going forward. But only FHE can credibly be considered the end-game. Why FHE? Because it’s the only cryptographic solution that’s simple to build on. Pure MPC is a Rube Goldberg machine — communication-bound and fundamentally limited. I wrote both my Master’s and PhD dissertation on MPC. If anyone has sunk costs in MPC, it’s me. And yet I’ll say it: it can’t take us further. On the flipside, TEEs struggle under an expanding physical and micro-architectural attack surface. Still, projects employing TEEs like @SecretNetwork are the only real test cases we have for privacy at scale. Credit to them for building in public, patching, and reinforcing what will remain a key ingredient in privacy tech. It just can’t be the only (or main) line of defense. That must come from cryptography. So are TEEs dead? No. That’s a lazy take. TEEs still deliver solid defense-in-depth and cheap privacy in high-trust environments. And for huge LLMs that need GPUs and low latency, GPU-TEEs may remain a pragmatic bridge (see @SecretNetwork AI Cloud). With that said, all the anti-TEE privacy projects celebrating this “victory” should be more humble. How many of you are actually in production? That includes Fhenix, which I’m building right now. We all have a long way to go — and most of the posts I’ve seen from MPC/FHE/ZK projects are being disingenuous about their own privacy pitfalls. Where we’re failing, as a community, is vocabulary. We need clear privacy levels — something as legible as @l2beat’s rollup stages, but for privacy: what’s protected, against which adversary, with which residual risks. I’m drafting a framework; if you want to pressure-test it or contribute, DM me. The takeaway: treat TEEs as a component, not the foundation. Build toward FHE-first systems with MPC-hardened keying — and be explicit about the privacy level you’re actually delivering. That’s how we make programmable privacy for chains real.
(Guy Zyskind*) tweet media
English
8
16
42
4.3K