devcon 6 / heyanonxyz
Duration: 00:14:33
Speaker: Vivek Bhupatiraju
Type: Talk
Expertise: Beginner
Event: Devcon
Date: Oct 2022
Making defensive technology offensive: How to get cypherpunk ideals to the masses
Cryptography is an inherently defensive tool; it hides your information from adversaries. This is crucial to prevent censorship or monitoring of your data. But it's often sold to consumers with fearmongering about all-powerful malicious actors, which is often ignored by all except the privacy-conscious. We explore real-life examples of offensive cryptographic affordances like interoperability, efficiency, and user consent as stronger motivations for the masses to migrate to cypherpunk tech.
Keynote: Make Ethereum Cypherpunk Again: Why we need privacy
The Web3 revolution seeks to address the sins of Web2. However, in doing so, it’s created an even worse outcome for users - users’ data is publicly available and makes them vulnerable to state-level censorship and adverse actions. This talk will address the philosophical as well as practical considerations of privacy in Web3. Privacy is an industry-wide issue and sits at the heart of all that is Web3. Understanding why privacy matters involves recognizing that it is not an isolated concept bu
Optimizing Cryptographic Algorithms used in Gnark
.
Proof Systems for zkRollups
.
Scaling up Trustless Neural Network Inference with Zero-Knowledge Proofs
We present the first ZK-SNARK proof of valid inference for a full resolution ImageNet model. We will describe the arithmetization and quantization optimizations enabling us to SNARK large neural networks as well as a software package enabling transpilation from off-the-shelf models to halo2 circuits. We design protocols using our circuits to verify machine learning model predictions and accuracy and present concrete estimates of overhead costs based on our circuit implementations. This is joint
SNARK Light Clients
During this session, we'll go over basic components of Miden VM and describe how we've implemented them using the STARK proving system. We'll also provide a high-level overview of Miden VM features, and compare them against other ZK virtual machines.
STARKs in SNARKs
We'll create a ZK circuit live, build a STARK, and build a SNARK that verifies the STARK.
Unirep Social - A demo application of Unirep protocol
Unirep is a private reputation system. In this session we will use a social media app called Unirep Social to demo the Unirep protocol.
Using ZKP for better p2p messaging with Waku
In this short demo we'll look at Waku, the communication layer for Web3, and how it uses ZK for its service network. We'll demo using Waku with RLN for private, economic spam protection and what this means for you as a user and node operator. We'll also briefly look at how we can incentivize other services in the network in a private manner. Finally we'll show how you can actively participate in and contribute to the network yourself as a node operator, developer or end user.
Worldcoin
.