Provably

194 posts

Provably banner
Provably

Provably

@GetProvably

Building Verifiable Databases & SQL for Distributed Systems like Blockchains, Databases and AI.

Switzerland Sumali Nisan 2024
157 Sinusundan356 Mga Tagasunod
Provably nag-retweet
Provably Shyam
Provably Shyam@ProvablyShyam·
We are getting ready to ship the next version of Provably. Heres a teaser. 1. You can bring your own data or find other peoples. 2. It will have a new SQL IDE to write queries. 3. Results come back instantly with proofs. No circuits to build or compile. #zk #verifiabledata
Provably Shyam tweet mediaProvably Shyam tweet media
English
1
3
7
2K
Provably nag-retweet
Provably Shyam
Provably Shyam@ProvablyShyam·
Telco networks can verify calls from sim cards but not VOIP calls or completely digital calls. You can use different Verifiable techniques, but key lesson is - IDENTITY alone is not enough. A verifiable intent - on why someone calls is very important too if the caller is unknown. Another cool way but needs to be adopted by email, messaging or VoiP platform is this: - caller must place funds in escrow. - if receiver accepts their call as legitimate - they can return the funds in escrow.
Provably Shyam tweet media
Dustin Burnham@ModernDad

My wife calls me, panicked. The call is from her number, and her voice is unmistakable- that’s my wife. ‘Babe, our son is hurt. He got in a bike wreck. I’m at the emergency room but they won’t take our insurance and I need cash to get him help. Please send me 3000 dollars as soon as you can, he’s really not doing well.’ Me- ‘Wow, that’s scary. Tell me our passphrase and then I’ll send the money.’ Her (it) - ‘What? What passphrase? This is your wife, our son is hurt. Send the money now!!’ Me- ‘I’ll call you back. I don’t believe that this is my wife. If it is, I’m sorry, but we discussed this.’ The number? Spoofed. Easy to do and there’s no way to tell if a phone number is being spoofed aside from hanging up and calling back to confirm. The voice? AI generated. Easily done. A few seconds of audio is all it takes to create a realistic audio deepfake. What can you do? 1) Create a family safe word or passphrase. Ours is definitely not ‘Keep Going’ although we considered it. Discuss the passphrase far away from phones or any recording device. This is as analog as possible. Don’t forget that the trigger for the passphrase is just as important as the phrase itself. So instead of asking ‘what’s the safe word?’ have a separate triggering question. For example, you could say ‘I’m eating banana cream pie’ and this would trigger your spouse to respond ‘purple velvet pillows’ if that’s the safe word. Make it fun, silly, and easy to remember. And DON’T WRITE IT DOWN. 2) Cognitive security is an essential skill in 2026. Assume every image and video you see online is fake until proven otherwise. Expect scams and spammers, and be pleasantly surprised when it’s not. 3) Figure out a backup communication option with people who you absolutely need to be able to reach. Don’t just rely on a phone number for communication. Have redundant, ideally encrypted methods of communication with family. What did I miss? I think (hope) Nikita is wrong on the timeframe- agentic bots like Claude bot are impressive but not quite ready to flood the phone lines in just 90 days. But I think it’s going to be a huge problem by the end of the year. I already get dozens of increasingly realistic spam calls and texts daily- it’s only going to get more annoying. Have a plan to keep your family and your finances safe!

English
1
1
4
458
Provably
Provably@GetProvably·
Verifiable Vector Databases for the AI Era Yesterday at @GetProvably, we welcomed Nicole Emanuele for a three-day research visit hosted with @SteDziembowski at the University of Warsaw. Provably CTO and co-founder @EmanueleRagnoli led the sessions, including a deep dive on Verifiable LSH in Halo2. Whilst at Provably we focus on verifiability of queries on relational databases, we work on another stream of research that is #verifiability and #privacy for Vector Databases such as #pgvector. This is becoming an important feature in AI infrastructure that uses private datasets. A vector is sensitive information, it is a semantic fingerprint of the original data. From leaked vectors, attackers can infer topics, reconstruct text, detect whether specific documents or people are in the database. An adversary could use leaked vectors to design poisoning attacks that mislead AI agents at retrieval time. To achieve privacy and security, @EmanueleRagnoli , Nicol and @atrombetta68, map group theory to floating-point arithmetics, and design #ZeroKnowledge systems in mathematical spaces that define cosine similarity, embeddings, approximate nearest-neighbour search and semantic distances based on inner products. We are adapting proof systems like #Halo2 to support quantisation and the noisy geometry of vector search. cc @DanBoneh, @BryanParno, @fanzhang, @TomGur, @Pinecone_io, @IronCoreLabs
Provably tweet media
English
1
2
4
175
Provably
Provably@GetProvably·
We keep saying: “Humans are the weakest link.” Now we’re replacing them with AI agents. Soon might be: Sorry, the model updated and also deleted your keys. Progress?
English
0
0
1
40
Provably
Provably@GetProvably·
fn keys_being_stored_somewhere() -> Result<(), HumanError> { Err(HumanError::LostForever) } The only truly trustless system is one where nobody is trusted with the keys.
English
1
0
2
45
Provably
Provably@GetProvably·
If humans can’t be trusted with cryptographic keys… can AI? IACR 2025 election just failed because a trustee irretrievably lost their private key. State-of-the-art crypto vs. human memory 1-0 (not cumulative) arstechnica.com/security/2025/…
English
1
1
3
113
Provably nag-retweet
Bitcoin Magazine NL
Bitcoin Magazine NL@BitcoinMagNL·
Big data is coming to crypto. Millions of transactions. Massive databases. But how do you prove it instantly with almost no data? We talked with Shyam Duraiswami from Provably (@GetProvably) @MidnightNtwrk
English
1
2
3
303
Provably nag-retweet
Zuitzerland
Zuitzerland@zuitzerland·
1/ Did a d/accer-a-day with Shyam from Provably last week. The lowdown: Blockchains create verifiable data. Provably seeks to give us verifiable answers on that data.
English
1
4
14
442