Rumata888

261 posts

Rumata888

Rumata888

@rumata888

Security Team Lead at @aztecnetwork. @CTFZone organizer. Love cryptography, fuzzing, breaking systems. Views are my own.

Katılım Mart 2012
504 Takip Edilen358 Takipçiler
Rumata888 retweetledi
Rumata888 retweetledi
POC_Crew
POC_Crew@POC_Crew·
[POC2025] SPEAKER UPDATE 👤 Innokentii Sennovskii(@Rumata888) - "Zero Knowledge, Full Coverage: A Fuzzing Paradox" #POC2025
POC_Crew tweet media
English
0
7
77
5.8K
Rumata888 retweetledi
Ariel Gabizon
Ariel Gabizon@rel_zeta_tech·
token 2022 passed six audits, used one of the simpler and more conservative zk systems - bulletproofs for confidential transactions. And still had a fatal money printing zk bug. Moreover, a "not including all inputs in Fiat Shamir" bug, you'd think people would know to look for. Zk is hard. We need to think of soundness verifiability more than prover speed. In particular, it should be totally doable to come up with ways for the compiler to warn (or just not compile!) code with missing Fiat-Shamir inputs.
English
4
18
73
6.2K
Andre Omietanski
Andre Omietanski@punk6052·
POV of a crypto privacy lawyer attending their next 1:1 with founders after OFAC delisted tornado cash
Andre Omietanski tweet media
English
2
0
30
1.9K
Valentin Wüstholz
Valentin Wüstholz@vwuestholz·
I am thrilled that our fuzzer uncovered another critical bug in the Noir infrastructure, compromising both soundness and completeness (see github.com/noir-lang/noir…). 🔥 If you're interested in fuzzing your ZK infrastructure, let's talk! @NoirLang Kudos for the swift fix! 👏
English
16
24
150
22.4K
Rumata888
Rumata888@rumata888·
@levs57 Yes, the cost will be the same (I'm assuming you put the cost of writing module representations of A and B into O(1)). If using sumcheck + plonkish arithmetization + lookups you can easily disable unused relations so you are not paying for what you're calling "stack interactions"
English
2
0
1
43
Rumata888
Rumata888@rumata888·
@levs57 you can do this with lookups by making the selectors that enable/disable memory interaction and substitute indices for the permutation argument , it will just be part of the table
English
1
0
0
35
Rumata888
Rumata888@rumata888·
@levs57 wdym by "obviate stack interactions"?
English
1
0
0
33
🏴 LevS (of ether) 🏴 💙💛🇮🇱☀️🦁🗡️
@rumata888 likely very different, but I'd like to get a reference on this method, not sure to what this refers to if you mean fetching opcodes using vectorized lookups, then answer is yes, different - you will not be able to obviate stack interactions of the opcodes that were fetched
English
1
0
0
27
Rumata888
Rumata888@rumata888·
@levs57 Is this different from the known way of segment branching via lookups?
English
1
0
0
27
🏴 LevS (of ether) 🏴 💙💛🇮🇱☀️🦁🗡️
5./ But most important part is that it unlocks a totally new approach to branching: we can build a small VM which unrolls the loops dynamically and build the circuit, which then is executed by our circuit proof system.
English
2
0
5
253
Rumata888 retweetledi
Nico
Nico@nico_mnbl·
Nico tweet media
ZXX
33
94
715
56.6K
David Wong
David Wong@cryptodavidw·
Anyone needs an invite?
David Wong tweet media
English
51
2
67
10.5K
Rumata888
Rumata888@rumata888·
@weikengchen Yes, and there is a difference between a vulnerability discovered externally and sequential lapses in security
English
0
0
0
27
Weikeng Chen | BIP-420 🐱
Weikeng Chen | BIP-420 🐱@weikengchen·
@rumata888 you know a lot of people got into troubles during that FTX incident right? underperforming is okay, but betting incorrectly too many times does ruin a fund, and there are so many examples
English
1
0
0
73
Weikeng Chen | BIP-420 🐱
Weikeng Chen | BIP-420 🐱@weikengchen·
Here is my advice: talk to the management team to report a security bug, don’t talk to the security team. So many people in Kraken will lose jobs this time.
CertiK@CertiK

CertiK recently identified a series of critical vulnerabilities in @krakenfx exchange which could potentially lead to hundreds of millions of dollars in losses. Starting from a finding in @krakenfx's deposit system where it may fail to differentiate between different internal transfer statuses, we conducted a thorough investigation with three key questions: 1/ Can a malicious actor fabricate a deposit transaction to a Kraken account? 2/ Can a malicious actor withdraw fabricated funds? 3/ What risk controls and asset protection might be triggered by a large withdrawal request? According to our testing result: The Kraken exchange failed all these tests, indicating that Kraken’s defense in-depth-system is compromised on multiple fronts. Millions of dollars can be deposited to ANY Kraken account. A huge amount of fabricated crypto (worth more than 1M+ USD) can be withdrawn from the account and converted into valid cryptos. Worse yet, no alerts were triggered during the multi-day testing period. Kraken only responded and locked the test accounts days after we officially reported the incident. Upon discovery, we informed Kraken, whose security team classified it as Critical: the most serious classification level at Kraken. After initial successful conversions on identifying and fixing the vulnerability, Kraken’s security operation team has THREATENED individual CertiK employees to repay a MISMATCHED amount of crypto in an UNREASONABLE time even WITHOUT providing repayment addresses. In the spirit of transparency and our commitment to the Web3 community, we are going public to protect all users' security. We urge @krakenfx to cease any threats against whitehat hackers. Together, we can face risks and safeguard the future of Web3. #Web3 #Security #Transparency

English
1
0
1
1.2K
Rumata888
Rumata888@rumata888·
@weikengchen And investor job security should be directly related to their investments. They should be fired after one underperforming investment even if others are doing great.
English
1
0
0
37
Weikeng Chen | BIP-420 🐱
Weikeng Chen | BIP-420 🐱@weikengchen·
@rumata888 The way it works for security team is that they need to be aware that their job security is directly related to the platform security.
English
1
0
0
98
Rumata888
Rumata888@rumata888·
@mike_connor Yes, that's a wonderful way to demotivate deep work. Just spam typo PRs
English
0
0
2
46
Mike Connor
Mike Connor@mike_connor·
Also, further distinguishing airdrop amounts based on "number of commits" isn't benefiting me anymore, so please stop doing that too. :P
English
1
0
2
133
Mike Connor
Mike Connor@mike_connor·
Airdropping based on GitHub commits is lazy and divisive. Not everything needs to be automated. Reach out to teams. Ask them who contributes. E.g. there are so many amazing non-devs at Aztec Labs whose invaluable contributions are overlooked due to this. It's a real shame.
Mike Connor tweet media
English
2
0
10
1.3K