ecelannister.eth

7.3K posts

ecelannister.eth banner
ecelannister.eth

ecelannister.eth

@goodhypeonly0

content creator/researcher and always on-chain. powered by crypto

Katılım Temmuz 2024
397 Takip Edilen1.4K Takipçiler
Neon Solace
Neon Solace@Selanators76·
110 yaşındaki Türk ninenin uzun yaşam sırrı Rialo’yla hayat yeniden başladı Kendimi tekrar 20 yaşında hissediyorum 110 year old Turkish grandma shares her secret to a long life With Rialo life started again I feel 20 all over @goodhypeonly0
Neon Solace tweet mediaNeon Solace tweet media
Türkçe
19
0
32
314
DS
DS@duygusergi·
Gm all 🌞 Super busy day at work, but still time to rise & shine ✨ So what’s on the menu today? Any alpha 👀
DS tweet media
English
29
0
54
2.1K
slymnogunc
slymnogunc@slymnogunc·
BitRobot TeleArms erişim etkinliği tamamlandı! 🎉 Öncelikle katılan herkese kocaman teşekkürler. İlginiz ve enerjiniz inanılmazdı. Bu topluluk büyüyor ve siz bunun parçasısınız. Sonuçları eğlenceli bir videoyla paylaşıyorum izleyin, heyecan sona kadar devam ediyor. Kazananlar tamamen rastgele seçildi. Herhangi bir kriter ya da öncelik yok düz şans, herkes eşit şansta yarıştı. Ve işte BitRobot TeleArms private beta'ya giriş kazanan 4 isim: 🏆 @Hakanisleten 🏆 @neser_nk 🏆 @rftd09 🏆 @serhatweb3 Tebrikler! Erişim kodlarınızı almak için benimle Discord DM üzerinden iletişime geçin. Kazanamayanlar bu sadece başlangıç. @BitRobotNetwork ekosistemi büyümeye devam ediyor ve önümüzde yeni fırsatlar, yeni erişimler olacak. Takipte kalın, bir sonraki fırsat sizin olabilir.
slymnogunc@slymnogunc

Laptopumdan gerçek bir robot kolunu kontrol ettim. Şaka değil. Dünyanın öbür ucundaki bir robota bağlandım, kavrama yaptım, vana çevirdim, tencere taşıdım, raftan kitap aldım tamamen tarayıcıdan. Video'da gösterdim ve anlattım. Bu @BitRobotNetwork'ün TeleArms sistemi. Şu anda private beta'da ve 4 erişim kodum var. Ne yapıyor bu şey? BitRobot açık bir robotik laboratuvar. Kripto ile koordine edilen, gerçek dünya verisi toplayan ve bu veriyle AI modellerini eğiten bir ağ. TeleArms ise bunun en doğrudan giriş noktası robot sahibi olmana, mühendis olmana, para harcamana gerek yok. Sen robot kolunu kontrol ederken aslında bir şey daha oluyor: topladığın her veri, robotların kavramayı, hareket etmeyi, nesnelerle etkileşimi öğrenmesine katkı sağlıyor. Yani oynamıyorsun embodied AI'ın eğitimine katkı veriyorsun. Robotik 25 trilyon dolarlık bir pazar ve bu senin giriş kapın. 4 kişiye erişim kodu vereceğim: -BitRobot Discord'una katıl.(Link bir alttaki postta) -Bu postun altına yorum bırak.(DC adın ve düşüncelerin) Kazananları rastgele seçeceğim.(Eğlenceli bir oyunla) 🤖

Türkçe
10
2
25
1.5K
ecelannister.eth
ecelannister.eth@goodhypeonly0·
@koraydvl Merkezi güvene ihtiyaç duymadan güveni matematiğe emanet eden bir sistem kurmak gerçek vizyon ister. Rialo bu işe gerçekten doğru yerden bakıyor. gRialo
Türkçe
1
0
1
22
Koray
Koray@koraydvl·
You have a priceless treasure in your hands, and the vault holding that treasure can only be opened with a single key. Who would you entrust that key to? No matter who you give it to, there’s always the risk that person might lose the key, have it stolen, or succumb to their own malicious intent. In cybersecurity, we call the situation where all authority is concentrated in a single center or individual a Single Point of Failure. If that point is breached, it’s all over the entire system collapses. 👉Threshold Cryptography which forms the foundation of this series, eliminates this very fear. It takes the power away from a single person and distributes it among a group, relying on a logic that requires, for example, at least three out of five commanders to insert their own private keys into the lock simultaneously to open the safe. This minimum number is called a quorum. ✅The first step in setting up this system involves Distributed Key Generation (DKG). Normally, a trusted locksmith would generate and distribute these five separate keys. But what if the locksmith secretly makes a copy for themselves? Thanks to DKG, the group can generate a shared key on its own without a central distributor. 👉Everyone performs some fancy mathematical calculations known as Shamir’s Secret Sharing and Lagrange interpolation. In the end, pieces are formed where no one knows the full key, but when combined, they can unlock the lock. 👉However, there’s a small detail in the first part: it assumes everyone is an angel, acting flawlessly and honestly. What if someone in the group intentionally produces a faulty or fake key fragment to sabotage the system? ✅This is where Verifiable Secret Sharing (VSS) comes into play. Developed by mathematicians Feldman and Pedersen, these methods effectively turn the system into a lie detector. Group members can mathematically prove whether the received piece is genuine without ever seeing the entire password. If someone in the group cheats, the system immediately catches them, flags them, and disqualifies and expels them. With this system, Rialo has clearly demonstrated that the secret to building an unshakable security network from scratch one without any leader or central authority lies in trusting mathematics alone, rather than any individual :) @RialoHQ @RialoTR @slymnogunc @goodhypeonly0 @ericargent31113
Koray tweet media
Rialo@RialoHQ

Distributed trust is the cornerstone of robust security. We are diving deep with a 5-part technical series on how threshold systems eliminate single points of failure by requiring a quorum of participants to execute cryptographic operations. The first two modules are now live: 01 | Distributed Key Generation: An analysis of how groups jointly generate shared keys without any participant gaining knowledge of the full secret. This lesson covers Shamir's Secret Sharing, Lagrange interpolation, and honest-world key generation. 02 | Verifiable Secret Sharing: Moving beyond the honest-world assumption. This module explores Feldman’s VSS for share verification and Pedersen’s protocol for achieving DKG without a trusted dealer through complaint-based disqualification. Stay tuned for the remaining three parts of the series. Link below:

English
10
1
21
264
Hakan İşleten
Hakan İşleten@Hakanisleten·
The Missing Piece in Confidential Computing While examining @RialoHQ ’s technology and its recent posts, one thing caught my attention. Powerful cryptographic methods have been developed, but the systems that allow them to work together in real world environments still seem limited. Today, three technologies are usually highlighted when confidential computing is discussed: Multi-Party Computation, Fully Homomorphic Encryption, and Trusted Execution Environment. These approaches make it possible to process data while it remains encrypted. However, in practice the real challenge is not just performing the computation. The entire process needs to be managed in a secure way. Recently I noticed a system that approaches this problem from a different angle: Rialo Extended Execution. After looking into it, it seems less like a new computation method and more like a system that manages the whole process. REX oversees the workflow from verifying the programs that will run to routing encrypted data to the computation environment. The process only begins after both the application and the user give explicit consent. Once the operation is completed, the system can produce cryptographic verification that the computation was executed correctly. From my perspective, the goal here is not to invent a new cryptographic technique. It is about bringing existing technologies together and making them usable in real-world scenarios. In confidential computing, what has been missing might simply be this coordination layer. @itachee_x @slymnogunc @RialoTR
Hakan İşleten tweet media
Rialo@RialoHQ

MPC. FHE. TEEs. All powerful on their own, but none solve the coordination problem. The hard part isn’t just encrypting computation; it’s the orchestration required to make it functional and secure. That’s what Rialo Extended Execution (REX) does. REX is a protocol-level orchestration system for confidential computation that manages the entire lifecycle of a secure request: Program Governance – Programs to be executed are verified and approved for specific execution runs before they ever touch the core. Encrypted Routing – Encrypted inputs are routed cryptographically to a computation core only after the appropriate program logic is loaded. Explicit Consent – Computation is performed only after explicit authorization from both the application and the user, enforced by strict policy. Confidential Compute Core – Secure execution using MPC, FHE, or TEEs, including protected Web2 API calls within an isolated environment. Verifiable Outputs – The system generates and verifies cryptographic attestations that prove a specific computation was correctly executed before routing the result to its destination. REX transforms Rialo into infrastructure for real-world secure computation: Private AI agents that process personal data without seeing it. Sensitive enterprise workflows that maintain competitive secrecy. Authenticated API automation for secure, off-chain interactions. Verifiable off-chain compute with immutable on-chain guarantees. This is native privacy at the protocol layer. Get Real. Get Rialo.

English
7
0
11
119
Neon Solace
Neon Solace@Selanators76·
🗓️ Thursday | 9:00 PM BST 🎙️ Rialo Bangladesh X Space 📍 x.com/i/spaces/1yKAP… 🇧🇩 Rialo Bangladesh is heating up. And this Thursday, it’s going deeper 👀 Most Web3 communities talk @RialoHQ executes 👀 Because this isn’t just hype it’s rhythm + tech + culture 📅 Wednesday → Builder Hub Where ideas turn into real builds 📅 Thursday → Shark Tank Projects get tested Feedback is real 📅 Saturday → Turkey 🇹🇷Voice Community connects Culture forms This isn’t just activity It’s an ecosystem in motion People don’t just show up → they build They don’t just chat → they contribute They don’t just watch → they shape But what truly sets Rialo apart isn’t just the communit It’s the architecture behind it MPC. FHE. TEEs All powerful on their own But none of them solve the hardest problem: coordination Encrypting computation is one thing. Orchestrating it securely is another. That’s where Rialo Extended Execution (REX) comes in A protocol level orchestration layer for confidential computation that manages the entire lifecycle of a secure request ✅ Program Governance Code is verified and approved before it ever touches the core ✅ Encrypted Routing Inputs are routed only after the correct logic is loaded ✅ Explicit Consent Nothing executes without clear verifiable approval This means Not just secure computation but coordinated controlled execution. And that’s the real edge of @RialoHQ → A living breathing community → Continuous creation → Backed by real infrastructure Being bullish on Rialo isn’t just about the tech It’s about the people the coordination and the energy turning a system into a movement 🔥
Neon Solace tweet media
English
18
0
37
280
Kkelebek
Kkelebek@kkelebek76·
Kendimiz için kurgulayabileceğimiz (belki) milyon tane evren gidebileceğimiz milyon tane yol var. Bunların içinde en en kötüsü hiçbir şey yapmadan sadece düşünceler üreterek beklediğimiz evren. Hareketin en kötüsü hareketsizlikten iyidir İyi Haftalar 🫶🏻
Türkçe
5
0
54
2.5K
slymnogunc
slymnogunc@slymnogunc·
Benim gibi Laptobundan hiç bir ek donanıma ihtiyaç duymadan bir robotu kontrol etmek ve eğitmek istemez misin? Şimdi izle ve söyle bu seni de heyecanlandırmadı mı? @BitRobotNetwork TeleArms private beta'sına 4 kişiyi alacağım ve kazananlar Çarşamba açıklanacak. Katılmak için yapman gereken çok basit: → BitRobot Discord'una katıl → Aşağıdaki alıntılanan orijinal postun altına yorum bırak Yorumunu buraya değil, alttaki tweete bırak çekilişe altındaki posttan katılıyorsun. ⏳1 Nisan Çarşamba 'da 4 ismi açıklıyorum.
slymnogunc@slymnogunc

Laptopumdan gerçek bir robot kolunu kontrol ettim. Şaka değil. Dünyanın öbür ucundaki bir robota bağlandım, kavrama yaptım, vana çevirdim, tencere taşıdım, raftan kitap aldım tamamen tarayıcıdan. Video'da gösterdim ve anlattım. Bu @BitRobotNetwork'ün TeleArms sistemi. Şu anda private beta'da ve 4 erişim kodum var. Ne yapıyor bu şey? BitRobot açık bir robotik laboratuvar. Kripto ile koordine edilen, gerçek dünya verisi toplayan ve bu veriyle AI modellerini eğiten bir ağ. TeleArms ise bunun en doğrudan giriş noktası robot sahibi olmana, mühendis olmana, para harcamana gerek yok. Sen robot kolunu kontrol ederken aslında bir şey daha oluyor: topladığın her veri, robotların kavramayı, hareket etmeyi, nesnelerle etkileşimi öğrenmesine katkı sağlıyor. Yani oynamıyorsun embodied AI'ın eğitimine katkı veriyorsun. Robotik 25 trilyon dolarlık bir pazar ve bu senin giriş kapın. 4 kişiye erişim kodu vereceğim: -BitRobot Discord'una katıl.(Link bir alttaki postta) -Bu postun altına yorum bırak.(DC adın ve düşüncelerin) Kazananları rastgele seçeceğim.(Eğlenceli bir oyunla) 🤖

Türkçe
11
1
44
884
ecelannister.eth
ecelannister.eth@goodhypeonly0·
Bi’bakmışsın Ece kuyuda, bi’bakmışsın Ece Rialo’ya helper olmuş. Canı gönülden inandığım Rialo projesine bugün helper olarak atandım 🥳 @slymnogunc ile beraber (ilk helper) proje ve topluluk için elimizden geleni yapacağız. Rialo blockchainin iphone’udur layık olmaya çalışacağız :) gRialo @RialoHQ @RialoTR
ecelannister.eth tweet media
Türkçe
36
0
67
5.4K