Content pfp
Content
@
0 reply
0 recast
0 reaction

eric siu 🐈 pfp
eric siu 🐈
@randomishwalk
TLSNotary seems cool: https://tlsnotary.org/
2 replies
0 recast
10 reactions

Prasad  pfp
Prasad
@prasadclr
Check out MPC TLS by Pado labs, 7-15x faster- using garbled circuits and IZK https://ugc.production.linktr.ee/Pw4l2aAReSIzLbE8tEbP_964.pdf
2 replies
0 recast
1 reaction

EmpiricalLagrange - tevm/acc pfp
EmpiricalLagrange - tevm/acc
@eulerlagrange.eth
Still haven’t solved the collusion problem. What they’ll tell you is you need to generate the same proof from multiple MPC nodes to be sure.
1 reply
0 recast
1 reaction

Prasad  pfp
Prasad
@prasadclr
How does one solve collusion?
1 reply
0 recast
0 reaction

EmpiricalLagrange - tevm/acc pfp
EmpiricalLagrange - tevm/acc
@eulerlagrange.eth
Just started a company in this space, and there are a few competitors. I’m the only one with a good answer to this question is my claim. I don’t want to make it public until I’m far enough along. Hope you understand. It’s a simple solution IMO, and doesn’t rely on SGX.
1 reply
0 recast
2 reactions

eric siu 🐈 pfp
eric siu 🐈
@randomishwalk
ok i thought you were gonna say SGX or aws nitro or whatever the proprietary azure / gcp equivalent of that is (i think some AMD chip??)
2 replies
0 recast
0 reaction

EmpiricalLagrange - tevm/acc pfp
EmpiricalLagrange - tevm/acc
@eulerlagrange.eth
I should’ve said no TEE. No trusted hardware assumptions.
1 reply
0 recast
1 reaction

eric siu 🐈 pfp
eric siu 🐈
@randomishwalk
damn, no easy gotchas 🤭
1 reply
0 recast
0 reaction