POPULARITY
with @danboneh @succinctJT @smc90This episode is all about quantum computing -- explaining what it is, how it works, what's hype vs. reality, and how to prepare for it/ what builders should do. Specifically, we cover: What quantum computing is and isn't, and what people are really talking about when they worry about a quantum computer that can break classic computing-based cryptography systems -- a cryptographically relevant post-quantum computer.When is it happening/ what are the "timelines" for quantum computing becoming a reality -- how many years away are we? -- and when are the U.S. government's deadlines/ NIST standards for post-quantum cryptography?How will different types of cryptography be affected, or not? What are different approaches and tradeoffs?Where does quantum computing and post-quantum crypto apply to blockchains -- which are not only more easily upgradable, but also by and large rely on signatures, not encryption, so may be more quantum-resistant in many ways (and not in others).As always, we tease apart the signal vs. the noise in recent "science-by-press release" corporate quantum-computing milestone announcements. We also help answer questions on when do builders need to plan their switch to a post-quantum crypto world, what pitfalls to avoid there (hint: bugs! software upgrades!). Finally, we briefly cover different approaches to post-quantum crypto; and also dig deeper on zero-knowledge/ succinct-proof systems and how they relate to post-quantum crypto. Our expert guests are: Dan Boneh, Stanford University professor and applied cryptography expert and pioneer; also Senior Research Advisor to a16z crypto;Justin Thaler, research partner at a16z, professor at Georgetown, and longtime expert and pioneer in interactive and ZK proof systems.SEE ALSO: Post-quantum blockchains by Valeria Nikolaenkomore resources + papers on topics mentioned:A Graduate Course in Applied Cryptography by Dan Boneh and Victor Shoup [see also]Proofs, Arguments, and Zero-Knowledge by Justin ThalerLatticeFold+: Faster, Simpler, Shorter Lattice-Based Folding for Succinct Proof Systems by Dan Boneh and Binyi ChenNeo: Lattice-based folding scheme for CCS over small fields and pay-per-bit commitments by Wilson Nguyen and Srinath Setty"Q-Day Clock" from Project Eleven -- public dashboard to visually track timeline for quantum computing to reach cryptographically relevant capabilities and break widely used encryption algorithmson hard forks for quantum emergenciesQuantum analysis of AES, Kyungbae Jang, Anubhab Baksi, Hyunji Kim, Gyeongju Song, Hwajeong Seo, Anupam ChattopadhyayThe Google Willow Thing by Scott AaronsonFAQs on Microsoft's topological qubit thing by Scott AaronsonMicrosoft's claim of a topological qubit faces tough questions, American Physical SocietyAs a reminder, none of this is investment, business, legal, or tax advice; please see a16z.com/disclosures for more important information including a link to our investments.
Summary This week, Anna catches up with cohosts, Tarun (https://x.com/tarunchitra), Nico (https://x.com/nico_mnbl) and Guillermo (https://x.com/GuilleAngeris) to do a look back at the zk research and applications that came out in 2024. They go on to discuss the challenges facing the ecosystem. And they wrap with a brief look forward, covering what to expect in ZK in 2025. This will be the last ep of 2024, thank you for joining us this year! Further Reading: Circle STARKs by Haböck, Levit and Papini (https://eprint.iacr.org/2024/278.pdf) StarkWare Unveils New 'Stwo' Cryptographic Prover That's 'Blazingly Fast' (https://www.coindesk.com/tech/2024/02/29/starkware-unveils-new-stwo-cryptographic-prover-thats-blazingly-fast) ZK12: WHIR: Reed-Solomon Proximity Testing with Super-Fast Verification by Eylon Yogev (https://www.youtube.com/watch?v=iPKzmxLDdII) Episode 290: Exploring, Teaching and Auditing ZK with David Wong (https://zeroknowledge.fm/290-2/) Episode 345: Latest ZK Research with Dan Boneh (https://zeroknowledge.fm/345-2/) LatticeFold: A Lattice-based Folding Scheme and its Applications to Succinct Proof Systems by Dan Boneh and Binyi Chen (https://eprint.iacr.org/2024/257.pdf) LaBRADOR: Compact Proofs for R1CS from Module-SIS? by Ward Beullens and Gregor Seiler (https://eprint.iacr.org/2022/1341.pdf) Quantum Algorithms for Lattice Problems by Yilei Chen (https://eprint.iacr.org/2024/555.pdf) Episode 325: Web Proofs with Tracy from Pluto (https://zeroknowledge.fm/325-2/) ZODA: Zero-Overhead Data Availability by Evans, Mohnblatt and Angeris (https://angeris.github.io/papers/da-construction.pdf) Check out the ZK Jobs Board (https://jobsboard.zeroknowledge.fm/) for the latest jobs in ZK at jobsboard.zeroknowledge.fm (https://jobsboard.zeroknowledge.fm/) If you like what we do: * Find all our links here! @ZeroKnowledge | Linktree (https://linktr.ee/zeroknowledge) * Subscribe to our podcast newsletter (https://zeroknowledge.substack.com) * Follow us on Twitter @zeroknowledgefm (https://twitter.com/zeroknowledgefm) * Join us on Telegram (https://zeroknowledge.fm/telegram) * Catch us on YouTube (www.youtube.com/channel/UCYWsYz5cKw4wZ9Mpe4kuM_g)
Summary In this week's episode, Anna (https://x.com/AnnaRRose) catches up with Dan Boneh (https://twitter.com/danboneh), Professor of Computer Science and Electrical Engineering, Stanford University. They discuss the focus of his research today, covering new ZK research problems and themes. This includes work on lattice-based SNARKs, ZK for content provenance, ZK in the FHE context, updates on ZK in ML and more! Here's some additional links for this episode: 0:03:08.3 Episode 256: New ZK Use Cases with Dan Boneh (https://zeroknowledge.fm/256-2/) Episode 100: Dan Boneh on the past, present & future of cryptography (https://zeroknowledge.fm/100-2/) 0:03:44.6 Episode 341: coSNARKs with Ais and Lukas from TACEO (https://zeroknowledge.fm/341-2/) 0:07:57.2 LaBRADOR: Compact Proofs for R1CS from Module-SIS? Ward Beullens and Gregor Seiler (https://eprint.iacr.org/2022/1341.pdf) 0:07:57.2 Bulletproofs: Short Proofs for Confidential Transactions and More by Bünz, Bootle, Boneh, Poelstra, Wuille, and Maxwell (https://eprint.iacr.org/2017/1066.pdf) 0:09:44.7 Greyhound: Fast Polynomial Commitments from Lattices by Nguyen and Seiler (https://eprint.iacr.org/2024/1293.pdf) 0:11:28.3 LatticeFold: A Lattice-based Folding Scheme and its Applications to Succinct Proof Systems Dan Boneh and Binyi Chen (https://eprint.iacr.org/2024/257.pdf) 0:12:48.2 Protostar: Generic Efficient Accumulation/Folding for Special-sound Protocols by Bünz and Chen (https://eprint.iacr.org/2023/620.pdf) 0:13:03.3 BaseFold: Efficient Field-Agnostic Polynomial Commitment Schemes from Foldable Codes by Zeilberger, Chen and Fisch (https://eprint.iacr.org/2023/1705.pdf) 0:13:03.3 Blaze: Fast SNARKs from Interleaved RAA Codes by Brehm, Chen, Fisch, Resch, Rothblum and Zeilberger (https://eprint.iacr.org/2024/1609.pdf) 0:13:03.3 Episode 277: Nova and Beyond with Srinath Setty (https://zeroknowledge.fm/277-2/) 0:31:16.5 Verifiable FHE via Lattice-based SNARKs by Atapoor, Baghery, Pereira and Spiessens (https://eprint.iacr.org/2024/032.pdf) 0:35:15.6 ARC: Accumulation for Reed–Solomon Codes by Bünz, Mishra, Nguyen and Wang (https://eprint.iacr.org/2024/1731.pdf) 0:49:10.9 VerITAS: Verifying Image Transformations at Scale by Datta, Chen and Boneh (https://eprint.iacr.org/2024/1066.pdf) 1:00:42.7 ZK Whiteboard Sessions - Module One: What is a SNARK? by Dan Boneh (https://zkhack.dev/whiteboard/module-one/) ZK Hack V (https://zkhack.dev/zkhackV/) kicks off this week, running from Nov 26 to Dec 17! Sign up for your spot here (https://zkhack.dev/zkhackV/). Check out the latest jobs in ZK at the ZK Podcast jobs board here! (https://jobsboard.zeroknowledge.fm/) Aleo (http://aleo.org/) is a new Layer-1 blockchain that achieves the programmability of Ethereum, the privacy of Zcash, and the scalability of a rollup. As Aleo is gearing up for their mainnet launch in Q1, this is an invitation to be part of a transformational ZK journey. Dive deeper and discover more about Aleo at http://aleo.org/ (http://aleo.org/). If you like what we do: * Find all our links here! @ZeroKnowledge | Linktree (https://linktr.ee/zeroknowledge) * Subscribe to our podcast newsletter (https://zeroknowledge.substack.com) * Follow us on Twitter @zeroknowledgefm (https://twitter.com/zeroknowledgefm) * Join us on Telegram (https://zeroknowledge.fm/telegram) * Catch us on YouTube (www.youtube.com/channel/UCYWsYz5cKw4wZ9Mpe4kuM_g)
Dans cet épisode, je rencontre Pablo Veyrat, co-fondateur et CEO d'Angle Labs, l'équipe derrière Angle Protocol. Pablo a fait ses débuts à Polytechnique, où il a étudié l'économie et les cryptos avant de plonger dans l'informatique à Stanford, sous la supervision de Dan Boneh, un ponte de la cryptographie.En 2021, Pablo et son équipe ont lancé Angle Protocol, un projet à l'intersection des finances traditionnelles et décentralisées. Avec ses stablecoins et multiples produits financiers, Angle compte révolutionner le monde de la finance au sens large.Nous revenons sur son parcours, la vision d'Angle pour des stablecoins transparents et décentralisés, et l'importance d'une finance plus juste, efficace, et composée de produits stables et accessibles. Pablo nous éclaire également sur le rôle essentiel des blockchains pour améliorer des briques financières archaïques comme celle du FOREX.Si vous souhaitez mieux comprendre pourquoi les stablecoins sont essentiels pour l'avenir de la finance , et découvrir les challenges qui persistent face à cet avenir, cet épisode est pour vous !Angle Labs, c'est avant tout une équipe de passionnés qui cherchent à secouer le status quo financier grâce à la technologie. Pablo n'est que la pointe d'un iceberg immergé, dont vous entendrez parlé à l'avenir.Liens: • Pablo Veyrat: https://x.com/pablo_veyrat • Angle Protocol: https://angle.money/ • Merkl: https://merkl.angle.money/ Merci à Ethereum-France (https://www.ethereum-france.com/) de soutenir ce podcast.Hébergé par Ausha. Visitez ausha.co/politique-de-confidentialite pour plus d'informations.
Summary This week Anna (https://x.com/AnnaRRose) and Nico (https://x.com/nico_mnbl) chat with Lukas Helminger (https://x.com/luhelminger) and Ais Connolly (https://x.com/aisconnolly) from TACEO (https://x.com/TACEO_IO). They discuss Lukas & Ais' early work in cryptography and privacy preserving technologies, the founding of TACEO and their recent work on coSNARKs - or Collaborative SNARKs - that combine MPC and ZK. They explore how these coSNARKs are created, their coCircom language, the characteristics of these systems as well as how they can be applied in the real world. Here's some additional links for this episode: TACEO (https://taceo.io/) TACEO Docs (https://docs.taceo.io/) TACEO GitHub (https://github.com/TaceoLabs) Hashing it out: coSNARKs at TACEO (https://blog.taceo.io/hashing-it-out/) Experimenting with Collaborative zk-SNARKs: Zero-Knowledge Proofs for Distributed Secrets by Ozdemir and Boneh (https://eprint.iacr.org/2021/1530.pdf) Privately Connecting Mobility to Infectious Diseases via Applied Cryptography Bampoulidis, Bruni, Helminger, Kales, Rechberger, and Walch (https://eprint.iacr.org/2020/522.pdf) Large-Scale MPC: Scaling Private Iris Code Uniqueness Checks to Millions of Users by Bloemen, Kales, Sippl and Walch (https://eprint.iacr.org/2024/705.pdf) Collaborative SNARKs by Roman Walch (https://rwalch.at/talk/pse_tokyo_co-circom/) Notes on Collaborative zkSNARKs (https://www.leku.blog/co-snarks/) MPC Primer - coCircom (https://docs.taceo.io/mpc-primer.html) ZK Podcast clip about Collaborative Zero-Knowledge Proofs (https://share.snipd.com/snip/818975b8-8178-437b-bfa3-b5f82b1b7fcc) from Episode 256: New ZK Use Cases with Dan Boneh (https://zeroknowledge.fm/256-2/) coSNARKs - coCircom (https://docs.taceo.io/collsnarks.html) Exploring Collaborative Zero-Knowledge Proofs (https://www.zkon.xyz/blog/collaborative-zero-knowledge-proofs-co-zkps-web3) ZK11: MPC-Enabled Proof Markets - Daniel Kales (https://www.youtube.com/watch?v=4-W5nnsf9-A) coCircom Repo (https://github.com/TaceoLabs/collaborative-circom) coSNARKs Demo: Max Pick Challenge (https://blog.taceo.io/max-pick-challenge/) MPC Uniqueness Check GitHub (https://github.com/worldcoin/mpc-uniqueness-check) coSNARKs Telegram Channel (https://t.me/collaborativeSNARK) Check out the ZK Jobs Board (https://jobsboard.zeroknowledge.fm/) for the latest jobs in ZK at jobsboard.zeroknowledge.fm (https://jobsboard.zeroknowledge.fm/) zkSummit12 is happening in Lisbon on Oct 8th! Applications to attend are now open at zksummit.com (https://www.zksummit.com/), apply today as spots are limited! Episode Sponsors Attention, all projects in need of server-side proving, kick start your rollup with Gevulot's ZkCloud, the first zk-optimized decentralized cloud! Get started with a free trial plus extended grant opportunities for premier customers until Q1 2025. Register at Gevulot.com (https://gevulot.com/). Aleo (http://aleo.org/) is a new Layer-1 blockchain that achieves the programmability of Ethereum, the privacy of Zcash, and the scalability of a rollup. As Aleo is gearing up for their mainnet launch in Q1, this is an invitation to be part of a transformational ZK journey. Dive deeper and discover more about Aleo at http://aleo.org/ (http://aleo.org/). If you like what we do: * Find all our links here! @ZeroKnowledge | Linktree (https://linktr.ee/zeroknowledge) * Subscribe to our podcast newsletter (https://zeroknowledge.substack.com) * Follow us on Twitter @zeroknowledgefm (https://twitter.com/zeroknowledgefm) * Join us on Telegram (https://zeroknowledge.fm/telegram) * Catch us on YouTube (www.youtube.com/channel/UCYWsYz5cKw4wZ9Mpe4kuM_g)
This is our second interview analyzing the impact of Google's decision not to deprecate third-party cookies on its Chrome browser. Daniel Jaye is a seasoned technology industry executive and currently is CEO and founder of Aqfer, a Marketing Data Platform on top of which businesses can build their own MarTech and AdTech solutions. Daniel has provided strategic, tactical and technology advisory services to a wide range of marketing technology and big data companies. Clients have included Brave Browser, Altiscale, ShareThis, Ghostery, OwnerIQ, Netezza, Akamai, and Tremor Media. He was the founder and CEO of Korrelate, a leading automotive marketing attribution company -purchased by J.D. Power in 2014- as well as the former president of TACODA -bought by AOL in 2007. Daniel was also the founder and CTO of Permissus, an enterprise privacy compliance technology provider. All of the above were preceded by his role as founder and CTO of Engage, acting CTO of CMGI and director of High Performance Computing at Fidelity Investments. He also worked at Epsilon and Accenture (formerly Andersen Consulting). Daniel Jaye graduated magna cum laude with a BA in Astronomy and Astrophysics and Physics from Harvard University. References: Daniel Jaye on LinkedIn Aqfer P3P: Platform for Privacy Preferences (W3C) Luke Mulks (Brave Browser) on Masters of Privacy Adnostic: Privacy Preserving Targeted Advertising (paper by Vincent Toubiana, Arvind Narayanan, Dan Boneh, Helen Nissenbaum, Solon Barocas)
with Dan Boneh @tim_roughgarden @smc90In this special 50th episode of the web3 with a16z podcast, we discuss how work in the blockchains/ crypto space has led to advances in several important technologies — which can be (and are being) used by many other industries beyond crypto.Tim Roughgarden (a16z crypto Head of Research and professor at Columbia University) and Dan Boneh (a16z crypto Senior Research Advisor and professor at Stanford University) discuss these advances in conversation with Sonal Chokshi. Topics covered include automated market makers; credible auctions, collusion, and mechanism design not possible before; as well as zero knowledge; trusted execution environments (TEEs) and fully homomorphic encryption (FHE); and much more. We also discuss the recurring theme of how web3 provides a laboratory not only for experiments in governance, but for macroeconomics and more. The two also offer many useful explanations for anyone new to these technologies or seeking to understand why they matter in the big picture. It's an innovation story we've seen over and over again, from the space program to other massive invention efforts: Technologies developed for one purpose often lead to benefits for humanity overall.Pieces mentioned in this episode and other resources:On some results and challenges in cryptoeconomics -- Tim Roughgarden, CESC 20228 reasons why blockchain mechanism design is hard -- Tim Roughgarden, a16zcrypto.com, 2024The computer in the sky (short version) -- Tim Roughgarden, 2024Zero knowledge canon -- with Justin Thaler's annotated bibliography, a16zcrypto,com 2022Using zero-knowledge proofs to fight disinformation -- Trisha Datta and Dan Boneh, IACR 2023VerITAS: Verifying Image Transformations at Scale -- Trisha Datta, Binyi Chen, Dan Boneh, 2024Achieving crypto privacy and regulatory compliance [+pdf of full paper]-- Joseph Burleson, Michele Korver, Dan Boneh, 2022Credible auctions: A trilemma -- Mohammad Akbarpour, Shengwu Li, Econometrica, 2020Auction design for web3 [episode 3 of this podcast] -- Scott Duke Kominers, Tim Roughgarden, Sonal Chokshi, 2022Building Cicada: Private on-chain voting using time-lock puzzles -- Michael Zhu, 2023Transaction fee mechanism design for the Ethereum blockchain: An economic analysis of EIP-1559 -- Tim Roughgarden, 2020Collusion-resilience in transaction fee mechanism design -- Hao Chung, Tim Roughgarden, Elaine Shi, 2024Transaction fee mechanism design in a Post-MEV world -- Maryam Bahrani, Pranav Garimidi,Tim Roughgarden, 2024Notes on Proposer-Builder Separation (PBS) -- Barnabé Monnot, 2022Complexity-approximation trade-offs in exchange mechanisms: AMMs vs. LOBs -- Jason Milionis, Ciamac Moallemi, Tim Roughgarden, 2023Trusted execution environments (TEEs) for blockchain applications -- Ari Juels, a16zcrypto.com, 2023 As a reminder, none of the following is investment, business, legal, or tax advice; please see a16z.com/disclosures for more important information including a link to a list of our investments.
This week's episode is a little different from the usual and is split into two parts with Anna (https://twitter.com/annarrose) and Kobi (https://twitter.com/kobigurk) exploring the history of ZK Hack, its origins and how the event has evolved into what it is today, including current activity in the ZK Hack ecosystem. The second half of the show splits off into Anna and Nico (https://twitter.com/nico_mnbl) chatting the top 3 hackers from ZK Hack IV Online, which wrapped back in February. Each mini interview catches up with one of the winners and dives into what it was like to hack on the puzzles, which their favourites were and how they can be improved in the future. Here's some additional links for this episode: ZK Jobs Board (https://jobsboard.zeroknowledge.fm/) ZK Hack Website (https://zkhack.dev/) Episode 211: It's a wrap! ZK Hack Takeaways & What's Next! (https://zeroknowledge.fm/211-2/) ZK HACK IV - Overview & Workshop Introductions: map featured at 1m28s (https://www.youtube.com/watch?v=ttKs4esfTM0) ZK Hack Discord (https://discord.com/invite/5FQymwzAnf) ZK Hack Whiteboard Sessions (https://zkhack.dev/whiteboard/) Proofs, Arguments, and Zero-Knowledge by Justin Thaler (https://people.cs.georgetown.edu/jthaler/ProofsArgsAndZK.pdf) ZK Hack Whiteboard Session 1 - What is a SNARK? with Dan Boneh (https://zkhack.dev/whiteboard/module-one/) ZK Hack Whiteboard Session 2 - Building a SNARK (Part I) with Dan Boneh (https://zkhack.dev/whiteboard/module-two/) ZK Hack Whiteboard Session 3 - Building a SNARK (Part II) with Dan Boneh (https://zkhack.dev/whiteboard/module-three) Groth16 Malleability by Geometry (https://geometry.xyz/notebook/groth16-malleability) Episode 309: ZK Jargon Decoder with Nico Mohnblatt (https://zeroknowledge.fm/309-2/) Zellic Wins Second Place in ZK Hack IV Blog (https://www.zellic.io/blog/zellic-wins-second-place-in-zkhack-iv/) SSTIC (https://www.sstic.org/2024/news/) Techiepriyansh GitHub (https://techiepriyansh.github.io/) Sampritipanda GitHub (https://github.com/sampritipanda) Niooss-ledger GitHub (https://github.com/niooss-ledger) Applications to attend zkSummit11 are now open, head over to the zkSummit website (https://www.zksummit.com/) to apply now. The event will be held on 10 April in Athens, Greece. Aleo (http://aleo.org/) is a new Layer-1 blockchain that achieves the programmability of Ethereum, the privacy of Zcash, and the scalability of a rollup. This is an invitation to be part of a transformational ZK journey. Dive deeper and discover more about Aleo at http://aleo.org/ (http://aleo.org/) If you like what we do: * Find all our links here! @ZeroKnowledge | Linktree (https://linktr.ee/zeroknowledge) * Subscribe to our podcast newsletter (https://zeroknowledge.substack.com) * Follow us on Twitter @zeroknowledgefm (https://twitter.com/zeroknowledgefm) * Join us on Telegram (https://zeroknowledge.fm/telegram) * Catch us on YouTube (https://zeroknowledge.fm/)
In this week's episode, Anna (https://twitter.com/annarrose) catches up in person with Guillermo (https://twitter.com/GuilleAngeris), Tarun (https://twitter.com/tarunchitra) and Alex Evans (https://twitter.com/alexhevans) for a look back at 2023. They revisit their state of mind back in Jan 2023 and share how the year unfolded and evolved for each of them as well as the ZK space as a whole. They survey the themes, applications and research topics that dominated ZK throughout this year and offer retrospective takes on how the ecosystem has changed. Hope you enjoy! We are taking the next week off, but will return with our look forward to 2024 episode in the new year. Here's some additional links for this episode: Episode 265: Where ZK and ML intersect with Yi Sun and Daniel Kang (https://zeroknowledge.fm/265-2/) Episode 256: New ZK Use Cases with Dan Boneh (https://zeroknowledge.fm/256-2/) Episode 260: ZK in 2023 with Kobi, Guillermo, and Tarun (https://zeroknowledge.fm/260-2/) Episode 302: ZK for web2 interop with zkLogin & ZK Email (https://zeroknowledge.fm/302-2/) zkSummit9 Playlist (https://www.youtube.com/watch?v=sj5yY3wguIo&list=PLj80z0cJm8QFnY6VLVa84nr-21DNvjWH7&index=44) ZK Hack Lisbon (https://www.zklisbon.com/) ZK Hack Istanbul (https://www.zkistanbul.com/) SPLA Study Group (https://zkhack.dev/study-group-spla/) ZK Hack IV online is coming soon, sign up for the [kick-off session on 16th Jan here]https://hopin.com/events/zkhackiv-1). For the latest news on the event check out the zhhack.dev/zkhackIV (https://zkhack.dev/zkhackIV/) website. Aleo (http://aleo.org/) is a new Layer-1 blockchain that achieves the programmability of Ethereum, the privacy of Zcash, and the scalability of a rollup. As Aleo is gearing up for their mainnet launch in Q1, this is an invitation to be part of a transformational ZK journey. Dive deeper and discover more about Aleo at http://aleo.org/ (http://aleo.org/) If you like what we do: * Find all our links here! @ZeroKnowledge | Linktree (https://linktr.ee/zeroknowledge) * Subscribe to our podcast newsletter (https://zeroknowledge.substack.com) * Follow us on Twitter @zeroknowledgefm (https://twitter.com/zeroknowledgefm) * Join us on Telegram (https://zeroknowledge.fm/telegram) * Catch us on YouTube (https://zeroknowledge.fm/)
In this week's episode, Anna (https://twitter.com/annarrose) takes a look back at the last 6 years of the Zero Knowledge Podcast, how it came to be and the journey the show has been on since that very first episode in 2017. Anna reviews the highs and lows of the show, touching on episodes which made a profound impact on her own journey in the ZK space, as well as episodes she wouldn't rush to listen to again! Discover key show learnings, how the zkSummit formed and take a trip down memory lane in the 300th episode of Zero Knowledge Podcast. To check out all the ZK Podcast episodes mentioned in this episode, visit the zeroknowledge.fm website here (https://zeroknowledge.fm/) Check out one of the earliest zkSummit talks on the very first event: Zero knowledge proofs intro with Str4d (Zcash) (https://www.youtube.com/watch?v=Y9YgRDJAFEE&list=PLj80z0cJm8QFnY6VLVa84nr-21DNvjWH7&index=198) The full zkSummit Playlist (https://www.youtube.com/playlist?list=PLj80z0cJm8QFnY6VLVa84nr-21DNvjWH7) Sign up here for ZK Hack IV Online updates (https://www.subscribepage.com/zkhackiv) If you like what we do: * Find all our links here! @ZeroKnowledge | Linktree (https://linktr.ee/zeroknowledge) * Subscribe to our podcast newsletter (https://zeroknowledge.substack.com) * Follow us on Twitter @zeroknowledgefm (https://twitter.com/zeroknowledgefm) * Join us on Telegram (https://zeroknowledge.fm/telegram) * Catch us on YouTube (https://zeroknowledge.fm/)
with @alive_eth @danboneh @smc90This week's all-new episode covers the convergence of two important, very top-of-mind trends: AI (artificial intelligence) & blockchains/ crypto. These domains together have major implications for how we all live our lives everyday; so this episode is for anyone just curious about, or already building in the space. The conversation covers topics ranging from deep fakes, bots, and the need for proof-of-humanity in a world of AI; to big data, large language models like ChatGPT, user control, governance, privacy and security, zero knowledge and zkML; to MEV, media, art, and much more. Our expert guests (in conversation with host Sonal Chokshi) include: Dan Boneh, Stanford Professor (and Senior Research Advisor at a16z crypto), a cryptographer who's been working on blockchains for over a decade and who specializes in cryptography, computer security, and machine learning -- all of which intersect in this episode;Ali Yahya, general partner at a16z crypto, who also previously worked at Google -- where he not only worked on a distributed system for a fleet of robots (a sort of "collective reinforcement learning") but also worked on Google Brain, where he was one of the core contributors to the machine learning library TensorFlow built at Google.The first half of the hallway-style conversation between Ali & Dan (who go back together as student and professor at Stanford) is all about how AI could benefit from crypto, and the second half on how crypto could benefit from AI... the thread throughout is the tension between centralization vs. decentralization. So we also discuss where the intersection of crypto and AI can bring about things that aren't possible by either one of them alone...pieces referenced in this episode/ related reading:The Next Cyber Reasoning System for Cyber Security (2023) by Mohamed Ferrag, Ammar Battah, Norbert Tihanyi, Merouane Debbah, Thierry Lestable, Lucas CordeiroA New Era in Software Security: Towards Self-Healing Software via Large Language Models and Formal Verification (2023) by Yiannis Charalambous, Norbert Tihanyi, Ridhi Jain, Youcheng Sun, Mohamed Ferrag, Lucas CordeiroFixing Hardware Security Bugs with Large Language Models (2023) by Baleegh Ahmad, Shailja Thakur, Benjamin Tan, Ramesh Karri, Hammond PearceDo Users Write More Insecure Code with AI Assistants? (2022) by Neil Perry, Megha Srivastava, Deepak Kumar, Dan BonehAsleep at the Keyboard? Assessing the Security of GitHub Copilot's Code Contributions (2021) by Hammond Pearce, Baleegh Ahmad, Benjamin Tan, Brendan Dolan-Gavitt, Ramesh KarriVoting, Security, and Governance in Blockchains (2019) with Ali Yahya and Phil Daian As a reminder: none of the following should be taken as investment, legal, business, or tax advice; please see a16z.com/disclosures for more important information -- including to a link to a list of our investments – especially since we are investors in companies mentioned in this episode. Stay Updated: Find a16z on Twitter: https://twitter.com/a16zFind a16z on LinkedIn: https://www.linkedin.com/company/a16zSubscribe on your favorite podcast app: https://a16z.simplecast.com/Follow our host: https://twitter.com/stephsmithioPlease note that the content here is for informational purposes only; should NOT be taken as legal, business, tax, or investment advice or be used to evaluate any investment or security; and is not directed at any investors or potential investors in any a16z fund. a16z and its affiliates may maintain investments in the companies discussed. For more details please see a16z.com/disclosures.
My guest today is Henri Stern, CEO of Privy. Privy is an authentication and embedded wallet SDK. With Privy, dapp developers can allow their users to sign in with their existing wallet, or generate an embedded wallet associated with an email, SMS, or SSO provider such as AppleID or Gmail. Privy's embedded wallet powers friend.tech, the breakout social dapp launched in August 2023. With Privy, friend.tech generates a new embedded wallet for each user that signs in, allowing the PWA dapp to sign transactions at the click of an HTML button element — no WalletConnect back-and-forth required. Privy's 2/3 Shamir wallet option allows dapp developers to create self-custody wallets for their users, while Privy provides a password-protected recovery services in case users should lose access to their account or device. On this episode we discuss Henri's experience studying under Dan Boneh, working on Filecoin at Protocol Labs with Juan Benet, and building Privy. We explore the ins-and-outs of Privy's embedded wallet architecture and discuss what's next in wallets. It was a pleasure diving into the emerging embedded wallet and account abstraction smart wallet stack with Henri, who is a clear thinker and humble decentralization minded builder. I hope you enjoy the show. As always, this show is provided as entertainment and does not constitute legal, financial, or tax advice or any form of endorsement or suggestion. Crypto has risks and you alone are responsible for doing your research and making your own decisions. Links @nnnnicholas on Twitter @henri_stern on Twitter Privy Architecture docs Henri's EthCC 2023 talk Courtyard.io Dan Boneh Shibuya POAP CabinDAO EIP-1193 Timestamps: (00:00:00) Introduction (00:05:01) Protocol labs, and how Privy started (00:09:38) Heterogeneous wallets cater to diverse user expectations. (00:12:13) Product decision made, focus on embedded wallets - Building stable wall connectors and library is difficult. (00:21:11) Wallet authentication process: SMS verification and key sharing. (00:25:14) Web tokens authenticate user and holder. Off share only accessible by user. Single device operations with iframe and key. Typical 90% usage scenario. (00:29:48) Privy uses hardware security module. It encrypts recovery shares and tracks devices for added security. (00:43:43) Fear of EOA, comparing Shamir and multi sig. (00:47:21) Account abstraction allows for smart wallets. (00:54:43) Main NetEase locked in app, no control. (01:00:48) Exciting fintech innovations cater to diverse users. (01:04:19) Balancing user control while empowering developers and users. (01:08:25) Enabling interoperable wallets in the Web3 space. (01:13:35) Few relevant DeFi apps; WalletConnect is problematic. (01:23:46) Apple offers secure self-custody wallets with social recovery. (01:26:01) Privy is a secure cross-platform custodian.
with @alive_eth @danboneh @smc90This week's all-new episode covers the convergence of two important, very top-of-mind trends: AI (artificial intelligence) & blockchains/ crypto. These domains together have major implications for how we all live our lives everyday; so this episode is for anyone just curious about, or already building in the space. The conversation covers topics ranging from deep fakes, bots, and the need for proof-of-humanity in a world of AI; to big data, large language models like ChatGPT, user control, governance, privacy and security, zero knowledge and zkML; to MEV, media, art, and much more. Our expert guests (in conversation with host Sonal Chokshi) include: Dan Boneh, Stanford Professor (and Senior Research Advisor at a16z crypto), a cryptographer who's been working on blockchains for over a decade and who specializes in cryptography, computer security, and machine learning -- all of which intersect in this episode;Ali Yahya, general partner at a16z crypto, who also previously worked at Google -- where he not only worked on a distributed system for a fleet of robots (a sort of "collective reinforcement learning") but also worked on Google Brain, where he was one of the core contributors to the machine learning library TensorFlow built at Google.The first half of the hallway-style conversation between Ali & Dan (who go back together as student and professor at Stanford) is all about how AI could benefit from crypto, and the second half on how crypto could benefit from AI... the thread throughout is the tension between centralization vs. decentralization. So we also discuss where the intersection of crypto and AI can bring about things that aren't possible by either one of them alone...pieces referenced in this episode/ related reading:The Next Cyber Reasoning System for Cyber Security (2023) by Mohamed Ferrag, Ammar Battah, Norbert Tihanyi, Merouane Debbah, Thierry Lestable, Lucas CordeiroA New Era in Software Security: Towards Self-Healing Software via Large Language Models and Formal Verification (2023) by Yiannis Charalambous, Norbert Tihanyi, Ridhi Jain, Youcheng Sun, Mohamed Ferrag, Lucas CordeiroFixing Hardware Security Bugs with Large Language Models (2023) by Baleegh Ahmad, Shailja Thakur, Benjamin Tan, Ramesh Karri, Hammond PearceDo Users Write More Insecure Code with AI Assistants? (2022) by Neil Perry, Megha Srivastava, Deepak Kumar, Dan BonehAsleep at the Keyboard? Assessing the Security of GitHub Copilot's Code Contributions (2021) by Hammond Pearce, Baleegh Ahmad, Benjamin Tan, Brendan Dolan-Gavitt, Ramesh KarriVoting, Security, and Governance in Blockchains (2019) with Ali Yahya and Phil Daian As a reminder: none of the following should be taken as investment, legal, business, or tax advice; please see a16z.com/disclosures for more important information -- including to a link to a list of our investments – especially since we are investors in companies mentioned in this episode.
In this week's episode, host Anna Rose (https://twitter.com/annarrose) chats with Chhi'mèd Künzang (https://research.protocol.ai/authors/chhimed-kunzang/) and François Garillot (https://www.garillot.net/) from Lurk Labs (https://lurk-lab.com/) about all things Lurk, Lisp and zk languages. They discuss the history of the Lurk project, from its beginnings with Protocol Labs (the team that built Filecoin), to its emergence as a Turing-complete programming language for recursive zkSNARKs. They discuss Lurk's relationship with Lisp, what Lisp is, and how developers familiar with that family of languages would be able to interact with Lurk. They then discuss how Lurk compares to other zkDSLs and the new innovations this Lisp-based language brings to the table. Here's some additional links for this episode: Programming Languages * Circom (https://iden3.io/circom) * Arkworks GitHub (https://github.com/arkworks-rs) * Leo by Aleo (https://www.aleo.org/post/leo-programming-language) * SnarkyJS (http://snarkyjs.o1labs.org/) * Noir (https://noir-lang.org/) Lurk Links * LURK: Lambda, the Ultimate Recursive Knowledge by Amin, Burnham, Garillot, Gennaro, Künzang, Rogozin and Wong (https://eprint.iacr.org/2023/369) * Lurk Lab (https://lurk-lab.com/) * Lurk Lab Twitter (https://twitter.com/LurkLab) * Lurk Language (https://lurk-lang.org/) * Lurk GitHub (https://github.com/lurk-lab) Additional Reading/Listening * A Sloth-based Verifiable Delay Function (VDF) evaluator and SNARK prover GitHub (https://github.com/protocol/vdf) * Recursive Functions of Symbolic Expressions and Their Computation by Machine, Part I by John McCarthy, April 1960 (http://www-formal.stanford.edu/jmc/recursive.pdf) * Using ZK Proofs to Fight Disinformation By Trisha Datta and Dan Boneh (https://medium.com/@boneh/using-zk-proofs-to-fight-disinformation-17e7d57fe52f) * Common Lisp (https://lisp-lang.org/) * Episode 172: ZK languages with Alex Ozdemir (https://zeroknowledge.fm/172-2/) * zkSessions: The ZK Languages Rundown (https://www.youtube.com/watch?v=ABjSn_6m4Ac&list=PLj80z0cJm8QEz6BotG4SkGSCupwkPonCZ&index=12) * zkSummit4 Videos (https://www.youtube.com/watch?v=sj5yY3wguIo&list=PLj80z0cJm8QFnY6VLVa84nr-21DNvjWH7) - check the playlist (https://www.youtube.com/watch?v=C-C1fHzApEQ) for individual talks! Ever feel like developing zero-knowledge proofs is a daunting task? The team at RISC Zero (https://www.risczero.com/) is here to remind you that it doesn't have to be that way. Their out-of-the-box tooling allows developers to access the magic of ZK proofs from any chain without needing to learn custom languages or building custom zk circuits. Bonsai (https://r0.link/ZKpodcast), RISC Zero's most anticipated product, is a proving marketplace that enables any protocol or application to leverage fast ZKProofs in languages like Rust, Go, C++. Visit https://r0.link/ZKpodcast (https://r0.link/ZKpodcast) to learn more and sign up today for the Bonsai waitlist. If you like what we do: * Find all our links here! @ZeroKnowledge | Linktree (https://linktr.ee/zeroknowledge) * Subscribe to our podcast newsletter (https://zeroknowledge.substack.com) * Follow us on Twitter @zeroknowledgefm (https://twitter.com/zeroknowledgefm) * Join us on Telegram (https://zeroknowledge.fm/telegram) * Catch us on YouTube (https://zeroknowledge.fm/)
In this week's episode, host Anna Rose (https://twitter.com/annarrose) and Kobi Gurkan (https://twitter.com/kobigurk) check in on the state of ZK today. They discuss recent ZK applications and tooling as well as developments from the last 6 months. They review new use cases such as ZK for off-chain computations and dive into research breakthroughs, trends, security and much more. Finally, they introduce the concept of zkpod.ai which will be covered fully in next week's episode. Additional links mentioned in this episode: Renegade.fi (https://renegade.fi/) Experimenting with Collaborative zk-SNARKs: Zero-Knowledge Proofs for Distributed Secrets (https://eprint.iacr.org/2021/1530) Episode 256: New ZK Use Cases with Dan Boneh (https://zeroknowledge.fm/256-2/) Episode 246: Adversarial Machine Learning Research with Florian Tramèr (https://zeroknowledge.fm/246-2/) Episode 276: Expanding Computation on Ethereum with Axiom (https://zeroknowledge.fm/276-2/) Episode 277: Nova and Beyond with Srinath Setty (https://zeroknowledge.fm/277-2/) ProtoStar: Generic Efficient Accumulation/Folding for Special Sound Protocols by Bünz and Chen (https://eprint.iacr.org/2023/620) ezkl GitHub (https://github.com/zkonduit/ezkl) Yohei Nakajima Twitter (https://twitter.com/yoheinakajima) LangChain Website (https://python.langchain.com/en/latest/) Anna Rose's zkpod.ai Blog Post (https://hackmd.io/@Arrose/H1uPQ78gn) zkpod.ai Twitter (https://twitter.com/zkpodai) zkpod.ai Website (https://zkpod.ai/) One Server for the Price of Two: Simple and Fast Single-Server Private Information Retrieval by Henzinger, Hong, Corrigan-Gibbs, Meiklejohn, Vaikuntanathan (https://eprint.iacr.org/2022/949) Piano: Extremely Simple, Single-Server PIR with Sublinear Server Computation by Zhou, Park, Shi, Zheng (https://eprint.iacr.org/2023/452) Blyss Website (https://blyss.dev/) Janmajayamall's GitHub (https://github.com/Janmajayamall) Check out the ZK Jobs Board here: ZK Jobs (https://jobsboard.zeroknowledge.fm/). Find your next job working in ZK! Ever feel like developing zero-knowledge proofs is a daunting task? The team at RISC Zero (https://www.risczero.com/) is here to remind you that it doesn't have to be that way. Their out-of-the-box tooling allows developers to access the magic of ZKProofs from any chain without needing to learn custom languages or building custom ZK circuits. Bonsai (https://r0.link/ZKpodcast), RISC Zero's most anticipated product, is a proving marketplace that enables any protocol or application to leverage fast ZKProofs in languages like Rust, Go, C++. Visit https://r0.link/ZKpodcast (https://r0.link/ZKpodcast) to learn more and sign up today for the Bonsai waitlist. Aleo (https://www.aleo.org/) is a new Layer-1 blockchain that achieves the programmability of Ethereum, the privacy of Zcash, and the scalability of a rollup. Interested in building private applications? Check out Aleo's programming language called Leo that enables non-cryptographers to harness the power of ZKPs to deploy decentralized exchanges, hidden information games, regulated stablecoins, and more. Visit http://developer.aleo.org (http://developer.aleo.org/). For questions, join their Discord at aleo.org/discord (http://aleo.org/discord). If you like what we do: * Find all our links here! @ZeroKnowledge | Linktree (https://linktr.ee/zeroknowledge) * Subscribe to our podcast newsletter (https://zeroknowledge.substack.com) * Follow us on Twitter @zeroknowledgefm (https://twitter.com/zeroknowledgefm) * Join us on Telegram (https://zeroknowledge.fm/telegram) * Catch us on YouTube (https://zeroknowledge.fm/)
In this episode, Stanford cryptography professor Dan Boneh and a16z General Partner Ali Yahya elevate our knowledge of zero-knowledge proofs and their applications in the blockchain world. Listen as they dive into the intricacies of succinct proof systems, the difference between SNARKs and STARKs, the magic of recursive SNARKs, and why zero-knowledge systems are essential to the evolution of Ethereum. Show highlights: how Ali became a general partner at a16z Crypto and why Dan started working on “the science of blockchains” what a succinct proof system is analogies for understanding zero-knowledge proofs the difference between SNARKs and STARKs and whether centralization can be fully avoided how zero-knowledge technology became so crucial for blockchains the reasons to push computations off-chain and the applications of this technology why zkEVMs are essential to help Ethereum scale why privacy is important not only in financial transactions but also in other areas like social networks and gaming the challenges that arise from trusted setups and whether it would be possible to create false proofs how to mitigate the trusted setup problem with different proof systems what is being built to make zero-knowledge proofs cheaper to create whether a privacy-focused technology can be pursued while staying compliant with regulations how zero-knowledge proofs can improve the security of blockchain bridges Thank you to our sponsors! Crypto.com Halborn Guests: Ali Yahya, general partner at a16z crypto Dan Boneh, professor of computer science and electrical engineering, Stanford University; and senior research advisor, a16z crypto Using ZK Proofs to Fight Disinformation Links Unchained: zkEVM: The Computing Overhaul to Help Scale Ethereum Previous coverage of Unchained on zero-knowledge: Can You Trace Monero? 'It's Hard - But Not Impossible,' Says Nick Bax a16z crypto: Privacy-Protecting Regulatory Solutions Using Zero-Knowledge Proofs: Full Paper zkDocs: Zero-knowledge Information Sharing How the Coming Privacy Layer Will Fix the Broken Web CoinDesk: Polygon Rolls Out Zero-Knowledge, Privacy-Enhanced Identification Product Learn more about your ad choices. Visit megaphone.fm/adchoices
In this episode, Stanford cryptography professor Dan Boneh and a16z General Partner Ali Yahya elevate our knowledge of zero-knowledge proofs and their applications in the blockchain world. Listen as they dive into the intricacies of succinct proof systems, the difference between SNARKs and STARKs, the magic of recursive SNARKs, and why zero-knowledge systems are essential to the evolution of Ethereum. Show highlights: how Ali became a general partner at a16z Crypto and why Dan started working on “the science of blockchains” what a succinct proof system is analogies for understanding zero-knowledge proofs the difference between SNARKs and STARKs and whether centralization can be fully avoided how zero-knowledge technology became so crucial for blockchains the reasons to push computations off-chain and the applications of this technology why zkEVMs are essential to help Ethereum scale why privacy is important not only in financial transactions but also in other areas like social networks and gaming the challenges that arise from trusted setups and whether it would be possible to create false proofs how to mitigate the trusted setup problem with different proof systems what is being built to make zero-knowledge proofs cheaper to create whether a privacy-focused technology can be pursued while staying compliant with regulations how zero-knowledge proofs can improve the security of blockchain bridges Thank you to our sponsors! Crypto.com Halborn Guests: Ali Yahya, general partner at a16z crypto Dan Boneh, professor of computer science and electrical engineering, Stanford University; and senior research advisor, a16z crypto Using ZK Proofs to Fight Disinformation Links Unchained: zkEVM: The Computing Overhaul to Help Scale Ethereum Previous coverage of Unchained on zero-knowledge: Can You Trace Monero? 'It's Hard - But Not Impossible,' Says Nick Bax a16z crypto: Privacy-Protecting Regulatory Solutions Using Zero-Knowledge Proofs: Full Paper zkDocs: Zero-knowledge Information Sharing How the Coming Privacy Layer Will Fix the Broken Web CoinDesk: Polygon Rolls Out Zero-Knowledge, Privacy-Enhanced Identification Product Learn more about your ad choices. Visit megaphone.fm/adchoices
In this week's episode, Anna Rose (https://twitter.com/annarrose) and Kobi Gurkan (https://twitter.com/kobigurk) chat with Carl (https://twitter.com/carlbeek) and Trent (https://twitter.com/trent_vanepps) from the Ethereum Foundation (https://ethereum.org/en/foundation/), covering many topics such as their work on the KZG Ceremony and how this is different from the previous trusted setups we have covered. The group takes a deep dive into trusted setups, discussing what they are for, how they have been run and how the setup is going so far. They also discuss Proto-Danksharding and EIP-4844 - a novel way to organize data logistics for Ethereum. Here are some additional links for this episode: KZG Ceremony (https://ceremony.ethereum.org/) Episode 76: Sean Bowe on SNARKs, Trusted Setups & Elliptic Curve Cryptography (https://zeroknowledge.fm/76-2/) Episode 133: Trusted Setup Ceremonies Explored (https://zeroknowledge.fm/133-2/) Episode 137: Trusted Setup Bonus: Tornado Cash (https://zeroknowledge.fm/137-2/) Proto-Danksharding EIP-4844 (https://www.eip4844.com/) Powers-of-Tau to the People: Decentralizing Setup Ceremonies by Nikolaenko, Ragsdale, Bonneau, Dan Boneh, 2022 (https://eprint.iacr.org/2022/1592) Apply for zkSummit9 here: zkSummit9 Ticket Application (https://9lcje6jbgv1.typeform.com/to/FCoktPh9?typeform-source=www.zksummit.com). Aztec Network (https://aztec.network/) is building a next-generation encrypted blockchain powered by Ethereum (https://ethereum.org/en/). Aztec is now hiring engineers and cryptographers to build an execution layer enabling scale and privacy for crypto applications. Join the team making encrypted Ethereum a reality. Learn more by visiting: aztec.network/careers (https://aztec.network/careers/) Anoma's (https://anoma.net/) first fractal instance, Namada (https://namada.net/), is launching soon! Namada is a proof-of-stake L1 for interchain asset-agnostic privacy. Namada natively interoperates with fast-finality chains via IBC and with Ethereum via a trustless two-way bridge. Visit namada.net (https://namada.net/) for more information and join the community on Discord discord.gg/namada (https://discord.com/invite/namada). If you like what we do: * Find all our links here! @ZeroKnowledge | Linktree (https://linktr.ee/zeroknowledge) * Subscribe to our podcast newsletter (https://zeroknowledge.substack.com) * Follow us on Twitter @zeroknowledgefm (https://twitter.com/zeroknowledgefm) * Join us on Telegram (https://zeroknowledge.fm/telegram) * Catch us on Youtube (https://zeroknowledge.fm/) * Head to the ZK Community Forum (https://community.zeroknowledge.fm/) * Support our Gitcoin Grant (https://zeroknowledge.fm/gitcoin-grant-329-zkp-2)
In this week's episode, Anna (https://twitter.com/annarrose) and part-time Zero Knowledge co-hosts Tarun (https://twitter.com/tarunchitra), Guillermo (https://twitter.com/guilleangeris), Josh (https://twitter.com/acityinohio) and Kobi (https://twitter.com/kobigurk), get together for a casual catch up and have a look back at 2022. They trace Jan to today in both the zk community and the larger ecosystem, discussing the highs and the lows, focusing on the major events which stood out to them. If you think the team missed anything, let us know by replying to our tweet announcing this episode of the Podcast. Find us at the Zero Knowledge FM Twitter (https://twitter.com/zeroknowledgefm). This is the final episode of 2022 and Anna and the Zero Knowledge Podcast team thanks you for your support this year! Happy Holidays and see you in 2023! Here are some additional links for this episode: * Wormhole Hack (https://www.theverge.com/2022/2/3/22916111/wormhole-hack-github-error-325-million-theft-ethereum-solana) * zkSummit 7 + 8 Playlist (https://www.youtube.com/playlist?list=PLj80z0cJm8QFnY6VLVa84nr-21DNvjWH7) * The aftermath of Axie Infinity's $650M Ronin Bridge hack (https://cointelegraph.com/news/the-aftermath-of-axie-infinity-s-650m-ronin-bridge-hack) * Collapse of Luna cryptocurrency leads to $11 million exploit on Venus Protocol (https://therecord.media/collapse-of-luna-cryptocurrency-leads-to-11-million-exploit-on-venus-protocol/) * The Big Three zkEVM Announcements (https://messari.vercel.app/article/the-big-three-zkevm-announcements-what-you-need-to-know-and-potential-implications) * Three Arrows Capital to become latest casualty of crypto crash (https://www.theguardian.com/technology/2022/jun/29/three-arrows-capital-to-become-latest-casualty-of-crypto-crash) * Nomad crypto bridge loses $200 million in ‘chaotic' hack (https://www.theverge.com/2022/8/2/23288785/nomad-bridge-200-million-chaotic-hack-smart-contract-cryptocurrency) * Understanding Tornado Cash by Chainalysis (https://blog.chainalysis.com/reports/tornado-cash-sanctions-challenges/) * Single Secret Leader Election by Dan Boneh, Saba Eskandarian, Lucjan Hanzlik, Nicola Greco (https://crypto.stanford.edu/~saba/slides/SSLE.pdf) * The Eth Merge (https://ethereum.org/en/upgrades/merge/) * Celsius Crypto Meltdown: A Crypto Lender In Crisis (https://www.forbes.com/advisor/investing/cryptocurrency/what-is-celsius/) * FTX Crash (https://www.nerdwallet.com/article/investing/ftx-crash) * ZK Hack playlist (https://www.youtube.com/watch?v=Vaz4a_Vhntk&list=PLj80z0cJm8QFGB6AsiAG3EB06L7xr5S1c) * Arbitrum: Scalable, private smart contracts by Harry Kalodner, Steven Goldfeder, Xiaoqi Chen, S. Matthew Weinberg, and Edward W. Felten, Princeton University (https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-kalodner.pdf) For the latest on Polygon's ZK solutions, visit Polygon.technology/blog (https://Polygon.technology/blog) Today's episode is sponsored by Mina Protocol (https://minaprotocol.com/) The need for private, trustless solutions is clear. A new era of ZK powered decentralized applications is coming – and Mina is the place to build them. Introducing Mina's zkIgnite Cohort 0, where developers complete tutorials and build zero knowledge apps, or zkApps, and get rewarded. There are a quarter-of-a-million MINA tokens up for grabs for zkIgnite Cohort 0 participants. If you are tuning in to this podcast later, no worries! Mina will be launching additional zkIgnite Cohorts, just head to minaprotocol.com/zkpodcast (https://minaprotocol.com/zkpodcast) to check out the best way to get involved. If you like what we do: * Find all our links here! @ZeroKnowledge | Linktree (https://linktr.ee/zeroknowledge) * Subscribe to our podcast newsletter (https://zeroknowledge.substack.com) * Follow us on Twitter @zeroknowledgefm (https://twitter.com/zeroknowledgefm) * Catch us on Youtube (https://zeroknowledge.fm/) * Support our Gitcoin Grant (https://zeroknowledge.fm/gitcoin-grant-329-zkp-2)
On this week's episode, Anna (https://twitter.com/annarrose) and Kobi Gurkan (https://twitter.com/kobigurk) chat with Dan Boneh (https://twitter.com/danboneh), Professor of Computer Science at Stanford (https://cs.stanford.edu/) and Director of the Stanford Center for Blockchain Research. They cover an expanse of topics: from how strides have been made within the development of zkEVMs to how trusted set ups could be integrated into the blockchain itself. This episode covers open problems in ZK such as how to generate ZK proofs on large amounts of data such as video and what solutions could be implemented when attempting to run a DAO with a private treasury. Here are some additional links for this episode: * Episode 100: Dan Boneh on the past, present & future of cryptography (https://zeroknowledge.fm/100-2/) * Experimenting with Collaborative zk-SNARKs: Zero-Knowledge Proofs for Distributed Secrets by Ozdemir and Boneh, 2021 (https://eprint.iacr.org/2021/1530) * Powers-of-Tau to the People: Decentralizing Setup Ceremonies (https://eprint.iacr.org/2022/1592) * ZK Whiteboard Sessions (https://zkhack.dev/whiteboard/) Join ZK HACK III - see the full schedule here (https://zkhack.dev/zkhackIII/) Join the ZK HACK Discord (https://discord.com/invite/tHXyEbEqVN) Follow the ZK Hack Twitter (https://twitter.com/__zkhack__) Today's episode is sponsored by Mina Protocol (https://minaprotocol.com/) The need for private, trustless solutions has never been more clear. Introducing Mina's zkSpark Cohort 0, where developers share tutorials and build zero knowledge apps, or zkApps, and get rewarded. There are a quarter-of-a-million Mina tokens up for grabs for zkSpark Cohort 0 participants. Mina's zkApps are written in Typescript, so developers can easily get started without learning a custom programming language like other zk protocols. To sign up for zkSpark Cohort 0 head to minaprotocol.com/zkpodcast (https://minaprotocol.com/zkpodcast). Mina will be launching additional zkSpark Cohorts, just visit minaprotocol.com (https://minaprotocol.com/) to check out the best way to get involved. If you like what we do: * Find all our links here! @ZeroKnowledge | Linktree (https://linktr.ee/zeroknowledge) * Subscribe to our podcast newsletter (https://zeroknowledge.substack.com) * Follow us on Twitter @zeroknowledgefm (https://twitter.com/zeroknowledgefm) * Join us on Telegram (https://zeroknowledge.fm/telegram) * Catch us on Youtube (https://zeroknowledge.fm/) * Head to the ZK Community Forum (https://community.zeroknowledge.fm/) * Support our Gitcoin Grant (https://zeroknowledge.fm/gitcoin-grant-329-zkp-2)
This week, Anna (https://twitter.com/annarrose) and Tarun (https://twitter.com/tarunchitra) chat with Florian Tramèr (https://twitter.com/florian_tramer), Assistant Professor at ETH Zurich (https://ethz.ch/en.html). They discuss his earlier work on side channel attacks on privacy blockchains, as well as his academic focus on Machine Learning (ML) and adversarial research. They define some key ML terms, tease out some of the nuances of ML training and models, chat zkML and other privacy environments where ML can be trained, and look at why the security around ML will be important as these models become increasingly used in production. Here are some additional links for this episode: * Episode 228: Catch-up at DevConnect AMS with Tarun, Guillermo and Brendan (https://zeroknowledge.fm/228a/) * Florian Tramèr's Github (https://github.com/ftramer) * Florian Tramèr's Publications & Papers (https://floriantramer.com/publications/) * ETH Zurich (https://ethz.ch/en.html) * DevConnect (https://devconnect.org/) * Tarun Chritra's Github (https://github.com/pluriholonomic) * Single Secret Leader Election by Dan Boneh, Saba Eskandarian, Lucjan Hanzlik, and Nicola Greco (https://eprint.iacr.org/2020/025) * GasToken: A Journey Through Blockchain Resource Arbitrage by Tramèr, Daian, Breidenbach and Juels (https://floriantramer.com/docs/slides/CESC18gastoken.pdf) * Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts by Tramèr, Daian, Breidenbach and Juels (https://eprint.iacr.org/2017/1090) * Ronin Bridge Hack – Community Alert: Ronin Validators Compromised (https://roninblockchain.substack.com/p/community-alert-ronin-validators?s=w) * InstaHide: Instance-hiding Schemes for Private Distributed Learning, Huang et al. 2020. (https://arxiv.org/abs/2010.02772) * Is Private Learning Possible with Instance Encoding? (https://arxiv.org/abs/2011.05315) * OpenAI's GPT-3 model (https://openai.com/api/) * OpenAI's GPT-2 model (https://openai.com/blog/tags/gpt-2/) * OpenAI's GPT-2 model (https://openai.com/blog/tags/gpt-2/) * The Part-Time Parliament, Lamport, 1998. (https://lamport.azurewebsites.net/pubs/lamport-paxos.pdf) * You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion (https://arxiv.org/abs/2007.02220) ZK Whiteboard Sessions (https://zkhack.dev/whiteboard/) – as part of ZK Hack and powered by Polygon – a new series of educational videos that will help you get onboarded into the concepts and terms that we talk about on the ZK front. ZK Jobs Board (https://jobsboard.zeroknowledge.fm/) – has a fresh batch of open roles from ZK-focused projects. Find your next opportunity working in ZK! Today's episode is sponsored by Mina Protocol (https://minaprotocol.com/). With Mina's zero knowledge smart contracts – or zkApps – developers can create apps that offer privacy, security, and verifiability for your users. Head to minaprotocol.com/zkpodcast (http://minaprotocol.com/zkpodcast) to learn about their developer bootcamps and open grants. If you like what we do: * Find all our links here! @ZeroKnowledge | Linktree (https://linktr.ee/zeroknowledge) * Subscribe to our podcast newsletter (https://zeroknowledge.substack.com) * Follow us on Twitter @zeroknowledgefm (https://twitter.com/zeroknowledgefm) * Join us on Telegram (https://zeroknowledge.fm/telegram) * Catch us on Youtube (https://zeroknowledge.fm/) * Head to the ZK Community Forum (https://community.zeroknowledge.fm/) * Support our Gitcoin Grant (https://zeroknowledge.fm/gitcoin-grant-329-zkp-2)
Welcome to The Nonlinear Library, where we use Text-to-Speech software to convert the best writing from the Rationalist and EA communities into audio. This is: An experiment eliciting relative estimates for Open Philanthropy's 2018 AI safety grants, published by NunoSempere on September 12, 2022 on The Effective Altruism Forum. Summary I present the design and results of an experiment eliciting relative values from six different researchers for the nine large AI safety grants Open Philanthropy made in 2018. The specific elicitation procedures I used might be usable for rapid evaluation setups, for going from zero to some evaluation, or for identifying disagreements. For weighty decisions, I would recommend more time-intensive approaches, like explicitly modelling the pathways to impact. Background and motivation This experiment follows up on past work around relative values (1, 2, 3) and more generally on work to better estimate values. The aim of this research direction is to explore a possibly scalable way of producing estimates and evaluations. If successful, this would bring utilitarianism and/or longtermism closer to producing practical guidance around more topics, which has been a recurring thread in my work in the last few years. Methodology My methodology was as follows: I selected a group of participants whose judgment I consider to be good. I selected a number of grants which I thought would be suitable for testing purposes. Participants familiarized themselves with the grants and with what exactly they ought to be estimating. Participants made their own initial estimates using two different methods: Method 1: Using a utility function extractor app. Method 2: Making a “hierarchical tree” of estimates. For each participant, I aggregated and/or showed their two estimates side by side, and asked them to make a best guess estimate. I took their best guess estimates, and held a discussion going through each grant, making participants discuss their viewpoints when they had some disagreements. After holding the discussion, I asked participants to make new estimates. Overall, the participants took about two to three hours each to complete this process, roughly divided as follows: 10 to 30 mins to familiarize themselves with the estimation target and to re-familiarize themselves with the grants 20 to 40 mins to do the two initial estimates 5 to 30 mins to give their first best guess estimate after seeing the result of the two different methods 1h to hold a discussion 5 to 30 mins to give their resulting best guess estimate The rest of this section goes through these steps individually. Selection of participants I selected participants by asking friends or colleagues whose judgment I trust, and who had some expertise or knowledge of AI safety. In particular, I selected participants who would be somewhat familiar with Open Philanthropy grants, because otherwise the time required for research would have been too onerous. The participants were Gavin Leech, Misha Yagudin, Ozzie Gooen, Jaime Sevilla, Daniel Filan and another participant who prefers to remain anonymous. Note that one participant didn't participate in all the rounds, which is why some summaries contain only five datapoints. Selection of grants The grants I selected were: AI Impacts — General Support (2018): $100,000 Machine Intelligence Research Institute — AI Safety Retraining Program: $150,000 Open Phil AI Fellowship — 2018 Class: $1,135,000 Ought — General Support (2018): $525,000 Oxford University — Research on the Global Politics of AI: $429,770 Stanford University — Machine Learning Security Research Led by Dan Boneh and Florian Tramer: $100,000 UC Berkeley — AI Safety Research (2018): $1,145,000 Wilson Center — AI Policy Seminar Series: $400,000 These are all the grants that Open Philanthropy made to reduce AI risk in 2018 above a threshold of $10k, according to their database. The year these grants were made is long enough ago that we have some information...
This is a special episode of the a16z podcast — it's an audio history, told through the voices of the a16z crypto team, about what crypto is, how it really works, and why it matters. This "innovation overview" is meant as a resource, and it features hallway-style conversations with the a16z team as well as outside experts.In brief segments, we’ll take you from the ground up — from the basics, to the most current developments, and beyond that to a look at what we might see in the future. Here are the topics and voices you'll hear:The BeginningIntroduction — Zoran Basich, a16z crypto editorBefore bitcoin: previous attempts to create digital money, 1:45 — Dan Boneh, computer science professor at Stanford and a16 advisor The core innovations of Satoshi’s white paper, 3:36 — Dan Boneh Proof of work, 5:36 — Alex Pruden, chief strategy officer at Aleo Systems and former a16z crypto partner Mining and why it’s important, 7:10 — Alex Pruden The history of mining, 8:20 — Alex Pruden Value in monetary systems, or why bitcoin is worth anything, 9:53 — Arianna Simpson, a16z crypto partner Bitcoin as store of value, 11:30 — Arianna Simpson Security in crypto, 12:45 — Alex Pruden ExpansionWhy is it called a blockchain? 14:00 — Eddy Lazzarin, a16z data scientist Why the blockchain matters and what you can do with it, 15:09 — Chris Dixon, a16z general partner Beyond bitcoin, 17:01 — Eddy Lazzarin Ethereum as logical extension of open source, 17:36 — Eddy Lazzarin Tokens: What are they? 19:04 — Eddy Lazzarin Tokens and the functions they serve, 19:53 — Scott Kupor, a16z managing partnerTokens and the ownership economy, 21:19 — Jesse Walden, Variant Fund founder, former a16z partner, and Mediachain founder What tokens enable for creators, 22:18 — Ali Yahya, a16z general partner Right NowWhat DeFi means, 23:58 — Eddy Lazzarin Yield farming: What is it? 25:16 — Eddy Lazzarin NFTs: What they are and why they matter, 27:15 — Linda Xie, Scalar Capital managing director, and Jesse Walden Developer ecosystems, crypto, and composability, 30:17 — Jesse Walden Decentralized networks, value capture, and what it means for builders, 33:05 — Ali Yahya The FutureThe big picture, web3, and DAOs, 35:38 — Chris Dixon For more crypto resources, please see our Crypto Startup School page, our documentary about the program, and our NFT Canon.###The views expressed here are those of the individual AH Capital Management, L.L.C. (“a16z”) personnel quoted and are not the views of a16z or its affiliates. Certain information contained in here has been obtained from third-party sources, including from portfolio companies of funds managed by a16z. While taken from sources believed to be reliable, a16z has not independently verified such information and makes no representations about the enduring accuracy of the information or its appropriateness for a given situation. In addition, this content may include third-party advertisements; a16z has not reviewed such advertisements and does not endorse any advertising content contained therein.This content is provided for informational purposes only, and should not be relied upon as legal, business, investment, or tax advice. You should consult your own advisers as to those matters. References to any securities or digital assets are for illustrative purposes only, and do not constitute an investment recommendation or offer to provide investment advisory services. Furthermore, this content is not directed at nor intended for use by any investors or prospective investors, and may not under any circumstances be relied upon when making a decision to invest in any fund managed by a16z. (An offering to invest in an a16z fund will be made only by the private placement memorandum, subscription agreement, and other relevant documentation of any such fund and should be read in their entirety.) Any investments or portfolio companies mentioned, referred to, or described are not representative of all investments in vehicles managed by a16z, and there can be no assurance that the investments will be profitable or that other investments made in the future will have similar characteristics or results. A list of investments made by funds managed by Andreessen Horowitz (excluding investments for which the issuer has not provided permission for a16z to disclose publicly as well as unannounced investments in publicly traded digital assets) is available at https://a16z.com/investments/.Charts and graphs provided within are for informational purposes solely and should not be relied upon when making any investment decision. Past performance is not indicative of future results. The content speaks only as of the date indicated. Any projections, estimates, forecasts, targets, prospects, and/or opinions expressed in these materials are subject to change without notice and may differ or be contrary to opinions expressed by others. Please see https://a16z.com/disclosures for additional important information.
In this week’s episode, Anna and Fredrik chat with Alin Tomescu (https://twitter.com/alinush407), a post-doc researcher at VMWare Research Group (https://research.vmware.com/reserchers/alin-tomescu), about the concept of stateless systems. Specifically, they explore his work on stateless validation, why this would be desirable and what is the state of the research around this topic. For more on the topic check out these links: The Stateless Client Concept - Sharding (https://ethresear.ch/t/the-stateless-client-concept/172) on Eth.research Stateless-Clients (https://docs.ethhub.io/ethereum-roadmap/ethereum-2.0/stateless-clients/) As well as Alin’s previous zkStudy Club episodes: zkStudyClub: Alin Tomescu on authenticated dictionaries and cross-incremental proof (dis)aggregation (https://www.youtube.com/watch?v=PrgeQJioCI8) & zkStudyClub: Aggregatable Subvector Commitments with Alin Tomescu (VMWare Research) (https://youtu.be/KGRnpjPjduI) This episode is packed full of info and Alin shared an amazing list of resources to help navigate this : RMCI17e, Improving Authenticated Dynamic Dictionaries, with Applications to Cryptocurrencies (https://eprint.iacr.org/2016/994), Leonid Reyzin and Dmitry Meshkov and Alexander Chepurnoy and Sasha Ivanov CPZ18, Edrax: A Cryptocurrency with Stateless Transaction Validation (https://eprint.iacr.org/2018/968), 2018, Alexander Chepurnoy and Charalampos Papamanthou and Yupeng Zhang BBF18, Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains (https://eprint.iacr.org/2018/1188), 2018, Dan Boneh and Benedikt Bünz and Ben Fisch Tome20, How to Keep a Secret and Share a Public Key (Using Polynomial Commitments) (https://alinush.github.io/papers/phd-thesis-mit2020.pdf), 2020, Tomescu, Alin, CFG+20, [Vector Commitment Techniques and Applications to Verifiable Decentralized Storage](https://eprint.iacr.org/2020/149], 2020, Matteo Campanelli and Dario Fiore and Nicola Greco and Dimitris Kolonelos and Luca Nizzardo GRWZ20, Pointproofs: Aggregating Proofs for Multiple Vector Commitments (https://eprint.iacr.org/2020/419), 2020, Sergey Gorbunov and Leonid Reyzin and Hoeteck Wee and Zhenfei Zhang TAB+20e, Aggregatable Subvector Commitments for Stateless Cryptocurrencies (https://eprint.iacr.org/2020/527), 2020, Alin Tomescu and Ittai Abraham and Vitalik Buterin and Justin Drake and Dankrad Feist and Dmitry Khovratovich LGG+20, Aardvark: A Concurrent Authenticated Dictionary with Short Proofs (https://eprint.iacr.org/2020/975), 2020, Derek Leung and Yossi Gilad and Sergey Gorbunov and Leonid Reyzin and Nickolai Zeldovich AR20, KVaC: Key-Value Commitments for Blockchains and Beyond (https://eprint.iacr.org/2020/1161), 2020, Shashank Agrawal and Srinivasan Raghuraman TXN20, Authenticated Dictionaries with Cross-Incremental Proof (Dis)aggregation (https://eprint.iacr.org/2020/1239), 2020, Alin Tomescu and Yu Xia and Zachary Newman zkSummit6 is happening on Nov 23-24 2020 - grab your spot: https://www.zksummit.com/ Thanks to this week's sponsor Parity Technologies (https://www.parity.io/). Check out Polkadot Decoded (https://decoded.polkadot.network/?utm_source=zeroknowledge.fm&utm_medium=referral&utm_campaign=decoded&utm_content=zk+podcast+info) happening on December 3rd. This free online event is the Polkadot community conference and the first Polkadot gathering since the multi-chain network’s launch and decentralization. Featuring a full program of talks on all aspects of Polkadot by the teams building the network’s core technology, as well as those building ecosystem parachains, applications, and cross-network bridges Whether you’re new to Polkadot or an experienced Polkadot community member, be sure to learn the latest and future developments in the Polkadot ecosystem and connect with the Polkadot community. Check out the full program for Polkadot Decoded and register for free at decoded.polkadot.network (https://decoded.polkadot.network/?utm_source=zeroknowledge.fm&utm_medium=referral&utm_campaign=decoded&utm_content=zk+podcast+info) Thanks again Parity Technologies! If you like what we do: Follow us on Twitter - @zeroknowledgefm -https://twitter.com/zeroknowledgefm Join us on Telegram -https://t.me/joinchat/B81tQ57-ThZg8yOSx5gjA Catch us on Youtube -https://www.youtube.com/channel/UCYWsYz5cKw4wZ9Mpe4kuMg Read up on the r/ZKPodcast subreddit -https://www.reddit.com/r/zkpodcast Give us feedback! -https://forms.gle/iKMSrVtcAn6BByH6A Support our Gitcoin Grant -https://gitcoin.co/grants/329/zero-knowledge-podcast-2 Support us on the ZKPatreon -https://www.patreon.com/zeroknowledge Or directly here: ETH: 0xC0FFEE1B5083230a5154F55f253B6b6ae8F29B1a BTC: 1cafekGa3podM4fBxPSQc6RCEXQNTK8Zz ZEC: t1R2bujRF3Hzte9ALHpMJvY8t5kb9ut9SpQ
- GooSig reference code https://github.com/kwantam/GooSig- Handshake's GooSig implementation https://github.com/handshake-org/goosig/- Systemization of Knowledge: Computer-Aided Cryptography https://eprint.iacr.org/2019/1393An overview of current efforts at provable cryptographic software.- Fiat Crypto https://github.com/mit-plv/fiat-cryptoWork out of Adam Chlipala's group at MIT on generating certifiedimplementations of crypto software. Now used in BoringSSL!- miTLS https://mitls.org/A certified implementation of TLS. There's also been plenty of worksince then by (some of) the authors on proving security of the TLS 1.3protocol, e.g., https://www.microsoft.com/en-us/research/publication/implementing-proving-tls-1-3-record-layer/- HACL* https://github.com/project-everest/hacl-starA formally verified cryptographic library, used in Mozilla's libNSS.
In this week’s episode, we sit down with Joseph Bonneau (http://jbonneau.com/), Assistant Professor at NYU and co-author on the Verifiable Delay Functions (VDFs) paper. We discuss VDFs, what they are, how they were developed and what they can be used for. Here are a few links that we reference: Blockchain 101: Randomness episode with Justin Drake (https://www.zeroknowledge.fm/74) Verifiable Delay Functions by Dan Boneh, Joseph Bonneau, Benedikt Bünz, and Ben Fisch (https://eprint.iacr.org/2018/601.pdf) vdfresearch.org (https://vdfresearch.org/) Numbers Game (https://en.wikipedia.org/wiki/Numbers_game) A Programmer Solved a 20-Year-Old, Forgotten Crypto Puzzle (https://www.wired.com/story/a-programmer-solved-a-20-year-old-forgotten-crypto-puzzle/) Bitcoin Book (http://bitcoinbook.cs.princeton.edu/) Thank you to this week's sponsor Trail of Bits (https://trailofbits.com) Trail of bit recently released a blog post that might be interesting for our listeners who are concerned about privacy. The post is about the concept of 'Safe browsing'. Safe browsing claims to protect users by providing them with something called k-anonymity. Recent security news suggests that the k-anonymity has failed at protecting user privacy in certain circumstances. This is the topic that Trail of Bits explores in the blog post. Find out more about how k-anonymity works and why it is insufficient here: https://blog.trailofbits.com/2019/10/30/how-safe-browsing-fails-to-protect-user-privacy/ If you like what we do: Follow us on Twitter - @zeroknowledgefm (https://twitter.com/zeroknowledgefm) Join us on Telegram (https://t.me/joinchat/B_81tQ57-ThZg8yOSx5gjA) Support our Gitcoin Grant (https://gitcoin.co/grants/38/zero-knowledge-podcast) Support us on the ZKPatreon (https://www.patreon.com/zeroknowledge) Or directly here: ETH: 0xC0FFEE1B5083230a5154F55f253B6b6ae8F29B1a BTC: 1cafekGa3podM4fBxPSQc6RCEXQNTK8Zz ZEC: t1R2bujRF3Hzte9ALHpMJvY8t5kb9ut9SpQ
In this, our special 100th episode of the Zero Knowledge Podcast, we caught up with Dan Boneh (https://twitter.com/danboneh), professor and researcher in applied cryptography and computer security at Stanford. In this far-reaching conversation, we talk about Dan's background in the field of cryptography, how the field has evolved over the years, his work on cryptography & blockchain education, where zero knowledge research and SNARKs in particular fits into the field, some exciting new research coming out of the Applied Cryptography Group at Stanford, what cryptographic and engineering problems he thinks we should be focused on solving, and more. This episode covered a lot of ground and even though we went overtime, there is still so much more to talk about. We hope to have Dan back on the show sometime soon! In the meantime, here are some resources that might help you explore some of the topics covered: Crypto Class MOOC Stanford (https://www.coursera.org/learn/crypto) zkRoll-up MatterLabs (https://github.com/matter-labs/rollup) Post-Devcon5 catch-up (https://www.zeroknowledge.fm/99) Linear PCP (Probabilitistic Checkable Proof) (https://en.wikipedia.org/wiki/Probabilistically_checkable_proof) Randomness episode with Justin Drake (https://www.zeroknowledge.fm/74) Applications of the Prio system at Mozilla (https://blog.mozilla.org/security/2019/06/06/next-steps-in-privacy-preserving-telemetry-with-prio/) True2F: Backdoor-resistant authentication tokens (https://arxiv.org/abs/1810.04660) Yubiko (https://www.yubico.com/) The supply chain attack we mentioned (https://www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies) MultiLinear Maps (https://en.wikipedia.org/wiki/Cryptographic_multilinear_map) Hellman Key Exchange (https://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange) Tripartite Diffie–Hellman (http://cgi.di.uoa.gr/~aggelos/crypto/page4/assets/joux-tripartite.pdf) Quantum Computing (https://en.wikipedia.org/wiki/Quantum_computing) Stanford blockchain conference (https://cbr.stanford.edu/sbc20/) BLS (Boneh–Lynn–Shacham) signature scheme (https://en.wikipedia.org/wiki/Boneh-Lynn-Shacham) If you like what we do: Follow us on Twitter - @zeroknowledgefm (https://twitter.com/zeroknowledgefm) Join us on Telegram (https://t.me/joinchat/B_81tQ57-ThZg8yOSx5gjA) Support our Gitcoin Grant (https://gitcoin.co/grants/38/zero-knowledge-podcast) Support us on the ZKPatreon (https://www.patreon.com/zeroknowledge) Or directly here: ETH: 0xC0FFEE1B5083230a5154F55f253B6b6ae8F29B1a BTC: 1cafekGa3podM4fBxPSQc6RCEXQNTK8Zz ZEC: t1R2bujRF3Hzte9ALHpMJvY8t5kb9ut9SpQ
Benedikt Bunz is the inventor of Bulletproofs — a next-generation form of Zero Knowledge Proof technology. After reading how it is proven to be more effective and secure than its predecessor, I invited the Stanford cryptography expert onto my daily tech podcast. I learn how Benedikt is employing his invention with his new project Findora, which is building distributed ledgers to decentralize the entire financial industry. Findora aims to unlock a new epoch of finance where users control their own data, identity, and financial assets. Using Bulletproofs to guarantee confidentiality, Findora will build an open banking platform, and peer-to-peer lending platform, and a smart asset ecosystem. Benedikt is also a researcher interested in applied cryptography especially as it relates to cryptocurrencies. His work focuses on enhancing the privacy, usability and security of protocols that are somehow related to blockchains. Currently, Benedikt is pursuing his Ph.D. in computer science at Stanford and advised by Dan Boneh. He is also a semi-professional runner and enjoys traveling, especially in inconvenient vehicles.
In this week’s episode, we chat with Ben Fisch, Stanford PhD student working in Dan Boneh's applied cryptography group. In our conversation, we dig into accumulators, Merkle trees & vector commitments. We also learn a bit about the RSA Accumulator Paper - entitled Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains (https://eprint.iacr.org/2018/1188.pdf) - that he co-authored with Benedikt Bünz and touch on some of the ways these RSA accumulators could potentially be used in a blockchain context. Here are a few previous episodes that might help you prep for this interview: Merkle Trees https://www.zeroknowledge.fm/57 MPCs https://www.zeroknowledge.fm/60 Here are a few concepts and links we mention: Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains (https://eprint.iacr.org/2018/1188.pdf) https://en.wikipedia.org/wiki/RSA_(cryptosystem) https://github.com/cambrian/accumulator https://medium.com/@chia.net/chia-vdf-competition-guide-5382e1f4bd39 Thank you to our sponsor this week StarkWare (https://starkware.co) StarkWare will be presenting the StarkWare Sessions (https://starkware.co/starkware-sessions/) - on Sept 16th in Tel Aviv. The event will bring together some of the brightest minds in zero knowledge research from both the academic and application spheres. Topics that will be discussed are self-custodial trading, STARKs for Layer 1, STARK-friendly hash functions and other cool things you can do with STARK proofs. Use the code Zkpodcast for 20% off the tickets - > https://starkware.co/starkware-sessions/ If you like what we do: Follow us on Twitter - @zeroknowledgefm (https://twitter.com/zeroknowledgefm) Join us on Telegram (https://t.me/joinchat/B_81tQ57-ThZg8yOSx5gjA) Support our Gitcoin Grant (https://gitcoin.co/grants/38/zero-knowledge-podcast) Support us on the ZKPatreon (https://www.patreon.com/zeroknowledge) Or directly here: ETH: 0xC0FFEE1B5083230a5154F55f253B6b6ae8F29B1a BTC: 1cafekGa3podM4fBxPSQc6RCEXQNTK8Zz ZEC: t1R2bujRF3Hzte9ALHpMJvY8t5kb9ut9SpQ
The Future of Everything with Russ Altman: "Dan Boneh: Still in early days, Blockchain is rich with possibility" Digital security expert Dan Boneh offers a primer on blockchain, the much-talked-about foundation for Bitcoin and other next-gen apps. Originally aired on SiriusXM on July 28, 2018. Recorded at Stanford Video.
While cryptocurrencies Bitcoin and Ethereum gather the lion's share of headlines, few know that these “killer apps” are just the first generation of products based on a relatively new ledger-like technology called blockchain. Founder of the Center for Blockchain Research at Stanford, Dan Boneh says that blockchain is generating a swell of excitement among coders and computer scientists not witnessed since the earliest days of the internet. While the true killer apps are still to come, Boneh says it is never too early to contemplate what blockchain is, where things might be headed and what the consequences might be on a personal, financial and societal level. From cryptokitties to mining bitcoin, host Russ Altman and guest cybersecurity expert Dan Boneh explore the state of blockchain as we know it. You can listen to the Future of Everything on Sirius XM Insight Channel 121, iTunes, SoundCloud and Stanford Engineering Magazine.
Cryptography is an indispensable tool for protecting information in computer systems. This week we speak with Dan Boneh who teaches a course, on applied cryptography and computer security at Stanford University, about learning the inner workings of cryptographic systems and how to correctly use them in real-world applications. The course begins with a detailed discussion of how two parties who have a shared secret key can communicate securely when a powerful adversary eavesdrops and tampers with traffic. We invite Dan on the air to examine many deployed protocols and analyze mistakes in existing systems. In addition, the boys chat about how crypto icons flooded Fortune’s 40 Under 40 list this year! We talk about how Coinbase and Ethereum make the list sandwiched between Rihanna. I refuse to refer to her as 'Riri'.
In Brief: From better signature schemes for blockchains, to quantum preparedness, to novel cryptography like zero knowledge proofs and threshold signatures, Dan Boneh takes us on a tour of cryptography in our age. Professor of Computer Science at Stanford University, Dan Boneh, has been working in the field of cryptography for over 25 years. During which time he has co-developed a signature scheme known as BLS Signatures. This was an opportunity to have some real questions answered, or more accurately, anticipated, by a master of the field. * Signature aggregation: http://crypto.stanford.edu/~dabo/pubs/abstracts/aggsurvey.html * Verifying Bitcoin exchange solvency: http://crypto.stanford.edu/~dabo/pubs/abstracts/provisions.html * Non-crypto applications of quantum computing: https://research.google.com/pubs/QuantumAI.html Post-quantum cryptography: https://www.amazon.com/Post-Quantum-Cryptography-Daniel-J-Bernstein/dp/3540887016/ Content: Dan Boneh, Arthur Falls https://medium.com/the-ether-review Subscribe on iTunes
with Fei-Fei Li (@drfeifei), Frank Chen (@withfries2), and Sonal Chokshi (@smc90) Who has the advantage in artificial intelligence — big companies, startups, or academia? Perhaps all three, especially as they work together when it comes to fields like this. One thing is clear though: A.I. and deep learning is where it's at. And that's why this year's newly anointed Andreessen Horowitz Distinguished Visiting Professor of Computer Science is Fei-Fei Li [who publishes under Li Fei-Fei], associate professor at Stanford University. Bridging entrepreneurs across academia and industry, we began the a16z Professor-in-Residence program just a couple years ago (most recently with Dan Boneh and beginning with Vijay Pande). Li is the Director of the Stanford Vision Lab, which focuses on connecting computer vision and human vision; is the Director of the Stanford Artificial Intelligence Lab (SAIL), which was founded in the early 1960s; and directs the new SAIL-Toyota Center for AI Research, which brings together researchers in visual computing, machine learning, robotics, human-computer interactions, intelligent systems, decision making, natural language processing, dynamic modeling, and design to develop “human-centered artificial intelligence” for intelligent vehicles. Li also co-created ImageNet, which forms the basis of the Large Scale Visual Recognition Challenge (ILSVRC) that continually demonstrates drastic advances in machine vision accuracy. So why now for A.I.? Is deep learning “it”… or what comes next? And what happens as A.I. moves from what Li calls its “in vitro phase” to its “in vivo phase”? Beyond ethical considerations — or celebrating only “geekiness” and “nerdiness” — Li argues we need to inject a stronger humanistic thinking element to design and develop algorithms and A.I. that can co-habitate with people and in social (including crowded) spaces. All this and more on this episode of the a16z Podcast.
Many of the most successful companies have their foundations in university labs -- from data science to the web browser itself. Yet the process of moving from research project to successful startup isn't always straightforward. With the goal of smoothing this process and continuing to bridge entrepreneurs across academia and industry, we began the a16z Professor-in-Residence program just last year. And this year's newly anointed Andreessen Horowitz Distinguished Visiting Professor of Computer Science is Dan Boneh, Professor of Computer Science and Electrical Engineering at Stanford University as well as Co-director of the Stanford Computer Security Lab. In this episode of the a16z Podcast, we sit down with Boneh to chat about applied vs. theoretical math and computer science; what's missing and what's next with "usable" security (including various authentication approaches); and current and future trends in cryptography, bitcoin, and more. Boneh also shares his thoughts on MOOCs (massive open online courses) as the "21st century version of the textbook". Oh, and on when quantum computing will finally happen... and why we should (and shouldn't!) freak out about it. Yet. The views expressed here are those of the individual AH Capital Management, L.L.C. (“a16z”) personnel quoted and are not the views of a16z or its affiliates. Certain information contained in here has been obtained from third-party sources, including from portfolio companies of funds managed by a16z. While taken from sources believed to be reliable, a16z has not independently verified such information and makes no representations about the enduring accuracy of the information or its appropriateness for a given situation. This content is provided for informational purposes only, and should not be relied upon as legal, business, investment, or tax advice. You should consult your own advisers as to those matters. References to any securities or digital assets are for illustrative purposes only, and do not constitute an investment recommendation or offer to provide investment advisory services. Furthermore, this content is not directed at nor intended for use by any investors or prospective investors, and may not under any circumstances be relied upon when making a decision to invest in any fund managed by a16z. (An offering to invest in an a16z fund will be made only by the private placement memorandum, subscription agreement, and other relevant documentation of any such fund and should be read in their entirety.) Any investments or portfolio companies mentioned, referred to, or described are not representative of all investments in vehicles managed by a16z, and there can be no assurance that the investments will be profitable or that other investments made in the future will have similar characteristics or results. A list of investments made by funds managed by Andreessen Horowitz (excluding investments and certain publicly traded cryptocurrencies/ digital assets for which the issuer has not provided permission for a16z to disclose publicly) is available at https://a16z.com/investments/. Charts and graphs provided within are for informational purposes solely and should not be relied upon when making any investment decision. Past performance is not indicative of future results. The content speaks only as of the date indicated. Any projections, estimates, forecasts, targets, prospects, and/or opinions expressed in these materials are subject to change without notice and may differ or be contrary to opinions expressed by others. Please see https://a16z.com/disclosures for additional important information.
Black Hat Briefings, USA 2007 [Video] Presentations from the security conference.
Design bugs are really difficult to fix -- nobody ever takes a dependency on a buffer overflow, after all. Few things have had their design stretched as far as the web; as such, I've been starting to take a look at some interesting aspects of the "Web 2.0" craze. Here's a few things I've been looking at: Slirpie: VPN'ing into Protected Networks With Nothing But A Lured Web Browser. Part of the design of the web is that browsers are able to collect and render resources across security boundaries. This has a number of issues, but they've historically been mitigated with what's known as the Same Origin Policy, which attempts to restrict scripting and other forms of enhanced access to sites with the same name. But scripts are not acquired from names; they come from addresses. As RSnake of ha.ckers.org and Dan Boneh of Stanford University have pointed out, so-called "DNS Rebinding" attacks can break the link between the names that are trusted, and the addresses that are connected to, allowing an attacker to proxy connectivity from a client. I will demonstrate an extension of RSnake and Boneh's work, that grants full IP connectivity, by design, to any attacker who can lure a web browser to render his page. I will also discuss how the existence of attacks such as Slirpie creates special requirements for anyone intending to design or deploy Web Single Sign On technologies. Slirpie falls to some of them, but slices through the rest handily. p0wf: Passing Fingerprinting of Web Content Frameworks. Traditional OS fingerprinting has looked to identify the OS Kernel that one is communicating with, based on the idea that if one can identify the kernel, one can target daemons that tend to be associated with it. But the web has become almost an entirely separate OS layer of its own, and especially with AJAX and Web 2.0, new forms of RPC and marshalling are showing up faster than anyone can identify. p0wf intends to analyze these streams and determine just which frameworks are being exposed on what sites. LudiVu: A number of web sites have resorted to mechanisms known as CAPTCHAs, which are intended to separate humans from automated submission scripts. For accessibility reasons, these CAPTCHAs need to be both visual and auditory. They are usually combined with a significant amount of noise, so as to make OCR and speech recognition impossible. I was in the process of porting last year's dotplot similarity analysis code to audio streams for non-security related purposes, when Zane Lackey of iSec Partners proposed using this to analyze CAPTCHAs. It turns out that, indeed, Audio CAPTCHAs exhibit significant self-similarity that visualizes well in dotplot form. This will probably be the first Black Hat talk to use WinAMP as an attack tool. A number of other projects are also being worked on -- I've been sending billions of packets for a reason, after all, and they haven't been coming from WinAMP :) There will be some updates on the analysis tools discussed during Black Ops 2006 as well.
Black Hat Briefings, USA 2007 [Audio] Presentations from the security conference.
Design bugs are really difficult to fix -- nobody ever takes a dependency on a buffer overflow, after all. Few things have had their design stretched as far as the web; as such, I've been starting to take a look at some interesting aspects of the "Web 2.0" craze. Here's a few things I've been looking at: Slirpie: VPN'ing into Protected Networks With Nothing But A Lured Web Browser. Part of the design of the web is that browsers are able to collect and render resources across security boundaries. This has a number of issues, but they've historically been mitigated with what's known as the Same Origin Policy, which attempts to restrict scripting and other forms of enhanced access to sites with the same name. But scripts are not acquired from names; they come from addresses. As RSnake of ha.ckers.org and Dan Boneh of Stanford University have pointed out, so-called "DNS Rebinding" attacks can break the link between the names that are trusted, and the addresses that are connected to, allowing an attacker to proxy connectivity from a client. I will demonstrate an extension of RSnake and Boneh's work, that grants full IP connectivity, by design, to any attacker who can lure a web browser to render his page. I will also discuss how the existence of attacks such as Slirpie creates special requirements for anyone intending to design or deploy Web Single Sign On technologies. Slirpie falls to some of them, but slices through the rest handily. p0wf: Passing Fingerprinting of Web Content Frameworks. Traditional OS fingerprinting has looked to identify the OS Kernel that one is communicating with, based on the idea that if one can identify the kernel, one can target daemons that tend to be associated with it. But the web has become almost an entirely separate OS layer of its own, and especially with AJAX and Web 2.0, new forms of RPC and marshalling are showing up faster than anyone can identify. p0wf intends to analyze these streams and determine just which frameworks are being exposed on what sites. LudiVu: A number of web sites have resorted to mechanisms known as CAPTCHAs, which are intended to separate humans from automated submission scripts. For accessibility reasons, these CAPTCHAs need to be both visual and auditory. They are usually combined with a significant amount of noise, so as to make OCR and speech recognition impossible. I was in the process of porting last year's dotplot similarity analysis code to audio streams for non-security related purposes, when Zane Lackey of iSec Partners proposed using this to analyze CAPTCHAs. It turns out that, indeed, Audio CAPTCHAs exhibit significant self-similarity that visualizes well in dotplot form. This will probably be the first Black Hat talk to use WinAMP as an attack tool. A number of other projects are also being worked on -- I've been sending billions of packets for a reason, after all, and they haven't been coming from WinAMP :) There will be some updates on the analysis tools discussed during Black Ops 2006 as well.