Workflow
Cryptography
icon
Search documents
X @Ansem
Ansem 🧸💸· 2025-10-21 05:29
RT Riccardo Spagni (@fluffypony)ZCash is a VC / hedge fund backed centralised (bankster) coin that literally cripples itself to become compliant. It’s not a revenge against any of that, it’s a full on embrace of all of that.Does ZCash embrace the cypherpunk manifesto by Eric Hughes? Consider some key quotes, but I encourage you to read it all:“Since we desire privacy, we must ensure that each party to atransaction have knowledge only of that which is directly necessaryfor that transaction. Since any informa ...
X @mert | helius.dev
mert | helius.dev· 2025-10-20 20:43
Privacy Properties - Zcash possesses the strongest possible privacy properties mathematically and technically due to its use of ZK (Zero-Knowledge cryptography) [1] - A growing shielded pool with an increasing number of transactions inherently provides a higher level of privacy than probabilistically traceable decoy systems [1] - Allowing transparent transactions creates an entry point for regular users to shield their transactions, further expanding the anonymity set [1] User Experience - The potential for user error is higher for new users when using optional privacy features unless a wallet like Zashi is utilized [1] - Zashi wallet has addressed the UX problem associated with optional privacy, leading to a vertical increase in the shielded pool [1] Technical Comparison - Zcash encrypts data, rendering it invisible to trackers, unlike decoy systems that use ring signatures to "confuse" trackers [1]
X @BSCN
BSCN· 2025-10-20 06:05
⚡ VITALIK’S NEW OBSESSION — GKR PROTOCOL IS HERE!A cryptographic framework cutting ZK proof costs by up to 100x through input-output commitments only 👇https://t.co/DHLqt9tIGD ...
X @mert | helius.dev
mert | helius.dev· 2025-10-18 10:31
RT sacha 🦣 (@ssaintleger)my answer to why zcash can't be copied (even if you somehow manage to bootstrap a $1bn+ shielded pool and a mission driven group of world class cryptographers)"firstly, what you can't copy is the proof of work distribution over 10 years... with no premine, with no ICO, with 10 years of down only, with miners having to sell all the timesecondly, it's very difficult to get a social layer that has people that have lived through the cypherpunk era, in the 1980s in the 1990s, when they h ...
X @vitalik.eth
vitalik.eth· 2025-10-18 05:28
Efficiency Metrics in Cryptography - The industry suggests reporting cryptographic overhead as a ratio of in-cryptography computation time versus raw computation time [1] - This ratio provides a hardware-independent measure of efficiency loss when using cryptographic applications instead of trust-dependent ones [1] - Overhead factor aids developers in estimating cryptographic computation time based on their existing knowledge of raw computation time [1] Challenges in Overhead Measurement - Measuring overhead is complex due to heterogeneous operations in execution and proving, especially with SIMD/parallelization and memory access patterns [2] - Despite imperfections, the industry believes overhead factor remains a valuable metric [2]
X @mert | helius.dev
mert | helius.dev· 2025-10-13 19:02
Privacy Technology - The industry emphasizes that privacy relies on both technology and user behavior [1] - The industry suggests zk-SNARK privacy is superior to decoy privacy (ring signatures) due to its deterministic nature [1] - Determinism is mathematically superior to probabilities in privacy systems [1] - The industry highlights that technology is the single point of failure in privacy systems, regardless of user opsec [1] Cryptocurrency Ecosystem - The industry criticizes the argument that XMR's privacy is solely due to its limited exchange availability [1] - The industry believes the "cryptography" aspect of cryptocurrency is crucial for privacy [1] - The industry advocates for collaboration among privacy systems against surveillance, rather than competition [1]
X @Polyhedra
Polyhedra· 2025-10-13 12:30
Technology & Security - zkPyTorch 可以加密证明 Gemma-3 的结果,确保数据安全 [1] - 该技术确保每次计算都可验证 [1] Artificial Intelligence - AI 应用广泛,但如何信任其输出是一个问题 [1]
X @Nick Szabo
Nick Szabo· 2025-10-12 01:45
Geopolitical & Economic Analysis - The US political system mirrors the late Roman empire, exhibiting similar characteristics such as a corrupt senate, over-extended military, and currency debasement [1] - Globalism is perceived as declining, creating opportunities for agorists and cypherpunks who leverage new technologies [3] - Elites are investing in AI for control and perception engineering [4] Technological & Cryptographic Focus - Hard cryptography is identified as a crucial tool for resistance, enabling sovereign economies, free speech, and community defense in ungovernable internet spaces [4] - The crypto industry is urged to recognize the importance of hard cryptography and its potential value [5] Societal & Ideological Commentary - Current societal trends, including neo-christianity and MAGA, are viewed as ineffective solutions, with a call for a return to local community, nations, and patriotic ethno-regionalism [2] - Progressive elites are described as aiming to accelerate big tech and asteroid mining, potentially requiring mass conscription of labor [3]
X @mert | helius.dev
mert | helius.dev· 2025-10-10 11:11
crypto without privacy is not crypto ...
X @Cointelegraph
Cointelegraph· 2025-10-09 04:00
🔥 TODAY: Ethereum Foundation announces “Privacy Cluster” composed of 47 top researchers, engineers, and cryptographers to expand privacy efforts for the Ethereum L1 network. https://t.co/9nLPROdwgP ...