ommore.eth

983 posts

ommore.eth banner
ommore.eth

ommore.eth

@devommore

🚀 Web3 dev @octav3_music 🖼️ Golanging and minting my friends on NFTs 🍊 Community hero @gitpod 🧩 Developer Dao https://t.co/m2LCSUbmBB

India เข้าร่วม Ekim 2017
202 กำลังติดตาม92 ผู้ติดตาม
ommore.eth
ommore.eth@devommore·
Village toime
ommore.eth tweet media
Eesti
1
0
3
25
Lee Ash
Lee Ash@hazae41·
Introducing Latrine 2.0 — Secure and private WalletConnect client - No trackable identifier - Supply-chain hardened - Minimalist and reliable - Can work on Deno/Node github.com/hazae41/latrine
Lee Ash@hazae41

Reminder that WalletConnect can easily track and link all the dapps you visit and who you are WalletConnect relays can know that some wallet with some website domain used by some device with some IP address, is connected to some dapp with some website domain used by some device with some IP address Let's say you connect from MetaMask on your iPhone at home, to Uniswap on your computer at home but under VPN WalletConnect will know for sure that: - wallet is MetaMask (got from MetaMask's project ID) - wallet used this IP address and thus some relatively precise location - wallet is on a phone (if we suppose lack of HTTP headers with means it's a native app which means it's probably on a phone) - dapp is Uniswap (got from HTTP origin header or by Uniswap's project ID) - dapp used this IP address which is a VPN and thus can link your home address to your VPN address as both are connected together - dapp used these language settings (got from HTTP language header) - dapp used Chrome/Firefox/whatever (got from HTTP user-agent headers) So they know all the dapps you used with MetaMask on your phone, as well as your IP addresses and other funny metadata Even worse, WalletConnect has a cookie-like thing named "client_id" that can track you even if you change your IP address, so they can know all the previous IP addresses of some user So if you use VPNs thinking it would break the link, it actually reinforces it by linking your VPN address to whatever previous IP adresses you used, unless you actually clear all caches But now I will release some tools to fix it all so like and subscribe ☀️

English
2
4
29
4.5K
ommore.eth
ommore.eth@devommore·
@MejiasDev did u tried Kimi k2.6, it is not on par with gpt5.5 but the limits are insane. Using with Kimi-cli.
English
0
0
1
64
Mejias
Mejias@MejiasDev·
today have been a miss with gpt-5.5 :( I have to explicitly prompt it to use agent-browser to verify a bug fix otherwise it says it's fixed, when it's not.
English
1
0
1
107
ommore.eth
ommore.eth@devommore·
@cal_nix thank you for your work, cannot believe this material is free
English
2
0
1
32
calnix
calnix@cal_nix·
this took me much more iterations than i had originally anticipated
RareSkills@RareSkills_io

When we released the ZK Book over a year ago, we took the ZK education space a huge step forward. Our book pioneered the approach of "just enough math" to learn ZK. Today we do it again with a new addition to the ZK Book. "Circom and Constraint Design Patterns" This new section focuses on how to design, create, and audit non-trivial ZK circuits. You've probably seen a lot of tutorials about how to prove you know the evaluation of a polynomial using Circom. But how do you go from there to designing a ZKVM or proving you know the primage of a traditional hash function (like MD5 or Keccak256)? The new part of our ZK Book takes you on a journey from multiplying to numbers together to: - building a ZKVM from scratch - coding constraints for the MD5 hash function - learn the recurring design patterns in constraint design The last part was interesting because some of the established "design patterns" don't even have names for them. We had to invent some terminology! As usual, we are extremely thoughtful about how we introduce the reader to new ideas to avoid overwhelming someone new. We are careful to ensure we teach the prerequisites in a sensible order and with a lot of examples. Each chapter shows how to build a circuit for an increasingly complex application. With each chapter, you both review what you learned previously and learn a new design pattern. Once you build up a collection of these design patterns, you can compose them together to build more complex applications, like the ZKVM or a non-trivial hash function. We put a huge effort into making sure that the material is both easy to understand and correct without any important omissions. We'd like to thank @ChainLight_io, @VeridiseInc, @PrivacyScaling, and @zksecurityXYZ for allocating time to review this work and provide suggestions. We are particularly grateful to @marcobesier from @zksecurityXYZ for working through several revisions to really get the chapters into a polished state. Special shoutout to @cal_nix for coauthoring the first seven chapters in this new part of the book! The topics we cover here are extremely fundamental. If you don't understand the materials here, learning the internals of more modern ZKVM or ZK L2 client will be quite challenging. Up until now, the absence of newcomer-oriented explanations for such foundational concepts has held the ZK space back. This new body of work isn't simply a "better explanation" of existing materials, but the first explanation at all -- outside of academic papers. We use Circom as the language of instruction since we consider it the most beginner-friendly. However, what you learn here generalizes to other frameworks like Plonky3, Halo2, o1js, and Gnark. The new articles now make the ZK Book over 38,000 words longer. You do not have to know how a ZK-SNARK works to read this section of the book, but there are a few prerequisites. These are listed in the "Introduction to Circom" chapter. As usual, the material is completely free with no login required.

English
1
0
7
711
ommore.eth
ommore.eth@devommore·
material 3 is nice
ommore.eth tweet media
English
0
0
1
33
Fun At All X
Fun At All X@Ishita_Sharma42·
Creativity on it's peak💀
Fun At All X tweet media
English
466
390
5.1K
115.9K
ommore.eth
ommore.eth@devommore·
@brave Safari is lighter on Mac, wish brave was same.
English
1
0
4
932
Brave
Brave@brave·
Is Brave one of multiple browsers you use? If so, what would make you fully switch to Brave? 👀
English
2.6K
133
5.4K
356K
ommore.eth
ommore.eth@devommore·
glm 4.7 flash, wtf
ommore.eth tweet media
Eesti
0
0
0
38
AutoPap
AutoPap@AutoPap·
Bloody hell, if this is real I'm in!
AutoPap tweet mediaAutoPap tweet mediaAutoPap tweet media
English
191
62
1.8K
197K
Angela Steffens (she/her)
Angela Steffens (she/her)@wonderwomancode·
@shawmakesmagic I use a single Claude Code Max 20x and I rarely go over, but I also have it pretty well tuned for dropping down to cheaper models when appropriate and I'm running those small models locally on my laptop rather than spending more on Groq.
English
1
0
1
1.1K
Shaw (spirit/acc)
Shaw (spirit/acc)@shawmakesmagic·
How the fuck are you guys surviving on 2 max plans
Shaw (spirit/acc) tweet media
English
157
12
994
187.8K
Tibo
Tibo@thsottiaux·
What could we do better on Codex? App, model, strategy and features… what’s wrong in how we approach things that we should improve immediately?
English
1.2K
11
945
101.4K
ommore.eth รีทวีตแล้ว
The Figen
The Figen@TheFigen_·
Cats secretly rule the world.
English
651
4.5K
25.7K
2.5M
Cats for Happiness.
Cats for Happiness.@JoyfullCat·
There were days when even cats couldn’t sleep because of overthinking… huh…
English
12
866
9.9K
125K