PSE

1.7K posts

PSE banner
PSE

PSE

@PrivacyEthereum

PSE is a research and development lab delivering privacy to the Ethereum ecosystem.

เข้าร่วม Haziran 2021
30 กำลังติดตาม13.9K ผู้ติดตาม
ทวีตที่ปักหมุด
PSE
PSE@PrivacyEthereum·
1/ 🌱 The zkID team published OpenAC: Open Design for Transparent and Lightweight Anonymous Credentials earlier this week with a show proof time of 0.129 seconds. It describes a zero-knowledge identity construction designed to work with existing identity stacks and was purposely constructed to be compatible with the European Digital Identity Architecture and Reference Framework (EUDI ARF). github.com/privacy-ethere…
PSE tweet media
English
79
192
674
184K
PSE
PSE@PrivacyEthereum·
Design principle: No new classical privacy debt, the privacy honeypot can only be prevented from growing, it can never be drained. Recommendations: Quantify the privacy honeypot, build a confidentiality surface registry, ship reference libraries for tractable surfaces, and scope open problems (zkTLS, real-world zkID import) as non-blocking research tracks.
English
0
0
6
194
PSE
PSE@PrivacyEthereum·
Ethereum inherits PQ transport via Go 1.24's hybrid PQ TLS, but application-layer privacy like stealth addresses, zkID, confidential transactions; needs Ethereum-specific work Stealth addresses: ML-KEM replaces ECDH but ciphertexts are 33x larger. zkID export (Poseidon + STARKs) is tractable; real-world zkID import hits a 131x SNARK gap. zkTLS has no production MPC even for classical TLS 1.3.
English
1
0
7
236
PSE
PSE@PrivacyEthereum·
Post-Quantum Threats to Ethereum Privacy ethresear.ch/t/post-quantum… Most PQ work focuses on signature forgery. But privacy is more urgent! Harvest-now-decrypt-later means every on-chain ciphertext is permanently exposed right now. No protocol upgrade can re-encrypt it.
English
2
7
32
1.1K
PSE
PSE@PrivacyEthereum·
Seed phrases break. Users shouldn't lose their wallet when they do. Social Recovery SDK is a ref implementation of on-chain account recovery with threshold policies and timelocks. Guardians can be EOAs, passkeys, or even email, verified with ZK proofs with no data exposed. Solidity + Noir + TypeScript pse.dev/blog/social-re…
English
1
2
19
928
PSE รีทวีตแล้ว
IPTF
IPTF@iptf_updates·
PRIVATE LOGIC ON PUBLIC RAILS We built a DIY validium where the business logic is ordinary Rust, proved in zero knowledge, and verified on Ethereum Simple idea: write the rule, prove it, verify it on-chain iptf.ethereum.org/diy-validium/
English
2
6
20
4.3K
PSE รีทวีตแล้ว
zkmopro
zkmopro@zkmopro·
🚀 mopro now supports @Consensys gnark! With the mopro CLI v0.3.5, you can quickly generate gnark mobile apps for iOS, Android, React Native, and Flutter. Huge thanks to @FluxePay for contributing this feature! 🙏 zkmopro.org/docs/getting-s…
English
2
7
24
1.2K
PSE รีทวีตแล้ว
zkmopro
zkmopro@zkmopro·
1/ We put together a list of projects doing GPU-accelerated crypto & ZK proving on client-side devices. i.e. browsers, phones, laptops No server. No trusted backend. Just your hardware github.com/zkmopro/awesom…
English
3
14
79
4.6K
PSE รีทวีตแล้ว
IPTF
IPTF@iptf_updates·
Shielded pools give you private stablecoin transfers, but every tx writes commitments and nullifiers on-chain. ZK-plasma: chain stores block roots, signatures, and sender keys. Users prove balances locally. The block builder sees salted hashes, never transaction contents.
English
1
3
20
1.9K
PSE รีทวีตแล้ว
sophia
sophia@sodofi_·
is privacy just for criminals? i interviewed @PrivacyEthereum lead to debunk common privacy myths
English
7
9
69
4.4K
PSE
PSE@PrivacyEthereum·
🧪 Private Reads We kicked off collaboration with Tor Project with the aim to get Arti Tor client embeddable in browser context. Significant progress features a working prototype, and we’re now smoothing the rough edges. For wallets that want to route through Tor, particularly for eth_sendRawTx RPC calls, the tor-js library is now ready for experimentation.
English
0
0
0
318
PSE
PSE@PrivacyEthereum·
🪢 Private Proving • iO team has built GPU implementations of polynomial arithmetic and polynomial matrix operations for lattice-based cryptography, released in our mxx repository, achieving roughly 10× speedups for polynomial matrix multiplication over CPU baselines. We also reduced the circuit depth of modulo-q multiplication over BGG+ encodings from >150 to as low as 5 per multiplication, though the current approach relies on many lookup tables and is not yet practical on real BGG+ encodings; we are improving both circuit efficiency and LUT evaluation techniques. Finally, we are seeking more active collaborations with academic researchers—if you work on lattice-based cryptography and are interested, please get in touch. • @zkmopro just got better on dev experience: merged wasm-bindgen into mopro-ffi for smoother WASM builds. Noir provers live for Swift, Kotlin, React Native, Flutter. Updated mobile SDK docs (check out Semaphore’s homepage). Plus, our client-side GPU write-up is on the blog, exploring GPU potential in alignment with EF's quantum strategy. • @tlsnotary Alpha.14 is out: cleaner, faster, more reliable, better Prover/Verifier communication, improved error reporting, and new cryptographic features. We also shipped a simplified TLSNotary browser extension (over 50% code removed) with a smoother flow. • zkID team defined a 2026 roadmap, evaluated circuit rewrites using Bellpepper and Arkworks, and based on this research, continued with Circom and optimized the current implementation. We addressed paper feedback, started research on generalized predicates for OpenAC, continued work on integrations, and published the “Revocation in zkID: Merkle Tree-based Approaches” blog post. Coming next: implementing generalized predicates, continuing work on integrations, and publishing a revised version of the OpenAC paper. • Client-Side Proving team expanded the CSP benchmarks with broad Keccak-256 and Poseidon coverage across major stacks, tightened measurement correctness, and improved contributor/agent workflows (PRs welcome!). On the PQ CSP research front, we updated HyperPlonk-WHIR and Whirlaway to the latest WHIR, reran benchmarks, and saw excellent prover performance vs the baseline. Next: full 128-bit security, smaller proofs, then EVM verifier work.
English
1
0
3
343
PSE
PSE@PrivacyEthereum·
February may be the shortest month of the year, but it definitely didn’t feel that way for us 🚀 From major milestones to behind-the-scenes progress across tracks, PSE teams kept building, shipping, and collaborating all month long. Here’s a quick snapshot of what we worked on in February. Full updates by track below 👇
English
2
4
22
1.2K
PSE รีทวีตแล้ว
IPTF
IPTF@iptf_updates·
Every stablecoin payment on Ethereum is visible to competitors, analysts, and anyone with a block explorer. Institutions need payment privacy but can't pool funds with unknown parties. Gated shielded pools: KYC-verified entry, private transfers, viewing keys for regulators.
English
6
4
26
3.5K
PSE รีทวีตแล้ว
PSE รีทวีตแล้ว
IPTF
IPTF@iptf_updates·
We’re continuing our private tokenised bonds series, after building everything from scratch with custom private UTXOs, we're exploring privacy rollups where the network abstracts this for you.
English
4
4
22
1.8K
PSE รีทวีตแล้ว
Circles
Circles@aboutcircles·
Hidden powers of your Circles x Fileverse Floppy Disk ▪️ Claiming privacy is ZK secured thanks to @semaphoredevs / @PrivacyEthereum ▪️ Collaboration + storage is E2EE thanks to dDocs ▪️ Access is permissionless thanks to Gnosis Chain ▪️ Sovereignty is guaranteed thanks to @safe smart accounts Explore new forms of private, everyday collaboration. Soon, you'll also be able to use your Floppy to bypass the closed doors of new apps 👀
English
1
6
34
1.6K