#ZKP Achievement unlocked! We're using 100% of the crates providing Tom-256 curves (https://crates.io/search?q=t256, ignoring `uint256`):

Our

https://crates.io/crates/ark-tom256

based on arkworks, to make noir produce circuits based on the T-256 curve, and

https://crates.io/crates/halo2curves

in the MS Crescent implementation to use Spartan as a prover backend...

And Clément proved that `1 == 1`, and he cannot prove that `2 == 1`, because the circuit constraints are not met!

crates.io: Rust Package Registry

crates.io serves as a central registry for sharing crates, which are packages or libraries written in Rust that you can use to enhance your projects

I’ve been analyzing the current state of "secure" messaging, and my recent tests with Signal have highlighted some persistent vulnerabilities inherent to any stack relying on standard TCP/IP. Even with strong encryption, metadata leakage at the ISP/CDN level and the reliance on kernel-level interfaces like TUN/TAP remain significant privacy bottlenecks.

I’m curious to discuss the feasibility of a user-space only stack built in Rust that completely decouples identity, addressing, and transport to mitigate these leaks. My current architectural hypothesis involves an identity layer using hardware-backed Zero-Knowledge Proofs—via TEE or zkVM—to handle authentication without persistent identifiers or central registries. For addressing and routing, I'm thinking of a minimal RINA overlay where Distributed IPC Facilities (DIF) allow us to route between processes rather than nodes, effectively moving away from traditional IP-based addressing. This would all be wrapped in a "blind" transport, such as Ockam or shadowsocks-rust, to make the traffic indistinguishable from generic noise to any external observer.

I’m still weighing the practical hurdles, especially how to best bridge RINA's recursive logic with a user-space transport like Ockam without requiring root privileges. I'm open to suggestions on alternative technologies or implementations that might achieve this same level of isolation. If anyone has thoughts on the practical hurdles or existing foundations that could be leveraged here, I’d really value your perspective. Definitely feels like there's a lot to dig into.

#Rust #Rustlang #Infosec #Cryptography #Networking #Privacy #DistributedSystems #RINA #ZKP

I'm interested in learning about formal methods and zero-knowledge proofs, particularly for their use in verifying software. I know very, very little about this, but it would be very useful if I knew more.

What are some good basic introductions?

I'm going to poke around a bit with Lean and Dafny. What else might I look at to get, at least, what you might call a "dinner party level" of understanding -- enough so that I can follow and basically participate in a conversation about those in a not-so-formal situation?

#cs #formalmethods #zkp

A very clear and simple explanation of the selective disclosure and zero knowledge proof (#ZKP) in the digital-wallet world from @leifj https://siros.org/blog/zero-knowledge-proofs-selective-disclosure-and-the-future-of-scalable-wallets

Many people know a lot, but the skill of explaining things to mass is different skill set. I wish to write this clearly.

Zero Knowledge Proofs: shifting where the work happens - SIROS Foundation

The SIROS Foundation is a nonprofit organization founded in to support the development of open, secure, and interoperable digital identity infrastructure. Our mission is to ensure that the next generation of identity systems is grounded in open standards.

#e_id #ZKP

This just blew my head: we're looking at the latest and greatest ZKP frameworks before digging more into noir, and I saw this:

https://doc.rust-lang.org/rustc/platform-support/riscv32im-risc0-zkvm-elf.html

A freakin' RUST TARGET FOR ZERO KNOWLEDGE PROOF VIRTUAL MACHINES!

So: take your rust program (not all of std is supported), compile it to a zkvm, and run it there!

I found this on OpenVMs page:

https://github.com/openvm-org/openvm

riscv32im-risc0-zkvm-elf - The rustc book

Démonstrateur du mécanisme de vérification de l’âge respectueux de la vie privée | Linc

Un contexte politique et d’émergence de nouveaux acteurs L’actualité récente a relancé la question de la vérification de l’âge en ligne, qu’ils s’agissent d’un renouveau du contrôle parental ou de la mise en demeure de sites à caractère pornographique.

Phiên bản 0.7.0 “Soul Layer” của AgentAuth (mở nguồn) giới thiệu 3 tính năng: Persona System cho AI agent có “linh hồn số” ký tên HMAC, xác thực ẩn danh Zero‑Knowledge Proof, và Anti‑Drift Vault giám sát hành vi, tự động thu hồi khi lệch chuẩn. Thêm 16 API mới, SDK TypeScript/Python và dashboard chỉnh sửa persona. Mời góp ý! #AI #OpenSource #AgentAuth #ZKP #Security #CôngNghệ #MãNguồnMở

https://www.reddit.com/r/SideProject/comments/1qtmke1/agentauth_v070_soul_layer_we_gave_ai_agents_a/

📉 El mercado cripto se agita: #ZKP Crypto distribuye 190M de monedas en subasta diaria, mientras $AVAX ronda los $12 y #Ethereum lucha contra la presión vendedora. Movimientos clave más allá del precio. #Cripto.

Second layer do Bitcoin sem token — VTVM e saída unilateral

E se existisse uma second layer do Bitcoin onde você entra e sai só com BTC — sem token? 🤯

• O conceito:
- Second layer que permite entrar e sair com Bitcoin diretamente, sem criar ou usar tokens.

• Diferencial técnico:
- Saída unilateral: você pode sair da camada sem precisar coordenar com o parceiro de canal — menos dependências e mais segurança.

• Quem está...

#Bitcoin #VTVM #Layer2 #Lightning #zkp #crypto #MorningCrypto