secparam's profile picture. CS Prof. Security and applied cryptography. 
Some highlights: Zerocash (zcash, et al. ), Zexe (Aleo, Aztec, etc ),  zk-creds/zk-promises(...)

Ian Miers

@secparam

CS Prof. Security and applied cryptography. Some highlights: Zerocash (zcash, et al. ), Zexe (Aleo, Aztec, etc ), zk-creds/zk-promises(...)

So, for the price of a cup of coffee, can you actually figure out this compass coffee locations revenue from BTC? I'd guess the transaction likely doesn't go on chain or even on a permissionless l2 where you'd have to put up collateral to participate and maybe see it

Ever thought the day would come when you could buy a cup of coffee with bitcoin? We're showcasing btc payments in three cafes this week with the incredible teams at @CashApp and @Square ! Get $5 in free bitcoin from @CashApp when you come in. Spend it on your next cup of coffee…

CompassCoffeeDC's tweet image. Ever thought the day would come when you could buy a cup of coffee with bitcoin? We're showcasing btc payments in three cafes this week with the incredible teams at @CashApp and @Square ! 

Get $5 in free bitcoin from @CashApp when you come in. Spend it on your next cup of coffee…


Fun fact, the research that led to Zcash was designed to go into Bitcoin. 1) Bitcoin core devs said no (rightly, it wasn't battle tested yet) 2) BTC fees + TX size were hard 3) No one came with funding So no. BTC could add privacy now, OG Zcash folks would probably even help.

Zooko could have made a Bitcoin L2 without minting his own token.



Private relay, et al., are in essence Tor-light. They give you more bandwidth but require more trust for anonymity. For most users, that trade-off is likely worth it. Plus, it’s possible to run them for profit without the crazy attack vectors that add to volunteer schemes.

One of the most interesting recent privacy developments is the deployment of big two-hop IP blinding VPNs by companies like Apple and Google. These systems are designed to ensure that even those companies can’t link web requests to IP addresses.



Ian Miers reposted

One of the most interesting recent privacy developments is the deployment of big two-hop IP blinding VPNs by companies like Apple and Google. These systems are designed to ensure that even those companies can’t link web requests to IP addresses.


Long ago, when we were starting Zcash, I read the Cryptonomicon. Zcash is now getting stranger than that.

Privacy is the precondition for many of our freedoms. It’s the point at which government and corporate reach end and our individual freedoms and self-sovereignty begin. As our lives have moved online, privacy’s become a rare, vanishing commodity. That’s why we founded Cypherpunk…



Ian Miers reposted

The Tachyon concept/architecture is such an elegant solution to nullifier scalability: Evolve nullifiers over epochs Reveal/store nullifiers for the current epoch only Prove unspent in a past epoch Outsource proving to oblivious service via recursive proofs Infinity unlocked

New work with @ebfull on scaling Zcash and Zexe-derived protocols like Aleo and Aztec. zkSNARKs are now a (fantastic) commodity. They were always just one piece of the puzzle: building a secure protocol architecture for "shielded state" manipulation. eprint.iacr.org/2025/2031



Ian Miers reposted

Tachyon has many crucial components, but they're all centered around this new technique that allows Zcash's nullifiers (and everything else about a shielded transaction) to be *pruned* by validators for the first time *without* privacy issues. Huge unlock for scale.

New work with @ebfull on scaling Zcash and Zexe-derived protocols like Aleo and Aztec. zkSNARKs are now a (fantastic) commodity. They were always just one piece of the puzzle: building a secure protocol architecture for "shielded state" manipulation. eprint.iacr.org/2025/2031



Should we be calling things private or confidential, or something else? I'm not sure confidential is the right term, but I think Justin is right privacy is not the right term.

The more time I spend thinking about privacy as a product goal, the more convinced I am that the words "privacy" or "private" should be used sparingly. Trustworthy, confidential, encrypted, authenticated, vetted, proven. These are all much more meaningful.



Loading...

Something went wrong.


Something went wrong.