jp4g

1.1K posts

jp4g banner
jp4g

jp4g

@jp4g_

~/ Katılım Kasım 2018
792 Takip Edilen653 Takipçiler
jp4g retweetledi
Fredrik
Fredrik@fredrik0x·
@AnthropicAI Could @ethereum have access? The Protocol Security team at @ethereumfndn could do a lot of good work with this by helping secure the open source projects that are being used in the Ethereum Protocol.
English
20
37
733
87.3K
Stephen Hall
Stephen Hall@stephenjhall·
@JSeyff @biancoresearch There was no consensus. There is no equivalent rollback in bitcoin. This is why bitcoin is not crypto.
English
1
0
1
73
jp4g retweetledi
MeekMill
MeekMill@MeekMill·
I need a GitHub too! Is it like that or nah?
English
870
1.5K
13.4K
5.8M
jp4g retweetledi
Precog
Precog@precogmarkets·
Every claim should have skin in the game. Those selling fake news should pay. Charlatans should get arbitraged. Introducing the new Precog. A fully onchain prediction market protocol. Built for signal. Here's what's new 🧵👇
Precog tweet media
English
24
30
108
3.7K
jp4g retweetledi
zooko🛡🦓🦓🦓 ⓩ
Good article explaining exactly how the continued use of the insecure "MD5" hash function in forensics and courts could result in wrongful conviction of the innocent and in the guilty going free. katelynsills.com/law/the-curiou…
English
1
7
36
5.1K
jp4g retweetledi
Lasha 🔑🗳️
Lasha 🔑🗳️@LashaAntadze·
Let me explain it in simple terms. Since 2024, when we first launched #freedomtool with the Russian opposition, we have been boiling in hot water on the ground to solve each issue and ensure every vote of dissent was secure (there were 40,000 participants). That might look small, but it was the largest protest gathering in Russia since 2021. There are two major caveats when working with passports. First, you need to ensure uniqueness so that 1 vote = 1 passport. For this you have three options: 1. Passport support (active authentication), where you can sign and get a nullifier directly from the document. But since the 2010s, major countries have abandoned support for that standard and it won’t work at scale. 2. An external signer: you can use a TEE, OPRF, secure server, whatever everyone is discussing. It adds an additional secret, and voila, it works. This is the architecture we used for the Russian use case. 3. A third way, which in my opinion is the purest but requires network effect: so-called “shielded privacy of passport hashes,” where you junk up all the passport hashes in an on-chain registry and reuse them for different use cases, granting everyone plausible deniability. I call this pure because there is zero dependency on any vendor. You get a system like blockchain was for money. one that works outside anyone’s control and no one can switch off. When you touch reality, we forget that MPC networks halt operations for certain jurisdictions on governmental notice, that states control bandwidth and can block your traffic, and that wherever you don’t face hostility, participation isn’t a crime and you don’t need these hard setups. That’s the reality check most builders lack with voting tools. It’s not just an engineering question, it’s a political one. When you hit the ground, you learn it on your skin and the skin of others. The second problem; governments issuing fake passports can be solved in two ways: First, a similarity proof of the passport photo and the person holding a phone (we’ve built that with ZKML Bionetta). Or, the second and more elegant one: a ZK graph, where you build participation commitments over time. That can become a much more valuable foundation to reimagine digital democracy. (We’ve built that too with ERC7812) So thank you all for your contributions, but it’s still odd that after all these years we’re discussing the same topics, yet no one asks the real question: what are the true barriers to bringing these tools to the masses, and under what circumstances they actually work?
Ameen Soleimani@ameensol

gm eth nerds who care about ZK voting

English
36
44
166
125.7K
jp4g
jp4g@jp4g_·
@Starknet Cairo does client side privacy now???
jp4g tweet media
English
1
0
1
655
Starknet (Privacy arc) 🥷
1/ The STRK20s Technical Paper is now live. It outlines the design, architecture, and core ideas behind STRK20s, a privacy capability for any ERC-20. If you’re bullish on privacy as crypto’s next major unlock, this paper is for you 🧵
Starknet (Privacy arc) 🥷 tweet media
English
59
115
380
155.2K
jp4g retweetledi
Fran ~ priv/acc
Fran ~ priv/acc@Franacc_·
Oh sorry that I didn't reply for the last 2h 13min, I was out of tokens and didn't want to handcraft a message to you.
English
0
1
3
163
jp4g
jp4g@jp4g_·
@maxdesalle @intranazionale @Zcash @nym @Arcium There is no way to detect passive collision (follow the protocol, reconstruct shares afterwards) in MPC schemes Staking can only be used to incentivize liveliness it does nothing to promote privacy MPC gud but it's multisigs for privacy, you incur very large trust assumptions
English
0
0
0
37
Maxime Desalle
Maxime Desalle@maxdesalle·
Yes, that's MPC. Arcium is well aware of the collusion risk, which is why each cluster has one node randomly picked, they also have a staking system, etc. and importantly, *all* nodes in the cluster would have to be dishonest and collude. And yes, it's a mainnet alpha, they are obviously first launching in a controlled way, don't see a problem with that.
English
2
0
0
106
Ameen Soleimani
Ameen Soleimani@ameensol·
gm eth nerds who care about ZK voting
Ameen Soleimani tweet media
English
29
11
120
133.5K
jp4g retweetledi
Pedro
Pedro@zkpedrongmi·
Do you hold any ETH on @arbitrum ? Then you can now prove it in ZK and claim Arbitrum Sepolia ETH from abetterfaucet.xyz Privacy is always better. Built with @NoirLang 👽
English
1
2
16
1.1K