Content pfp
Content
@
0 reply
0 recast
0 reaction

eric siu 🐈 pfp
eric siu 🐈
@randomishwalk
TLSNotary seems cool: https://tlsnotary.org/
2 replies
0 recast
10 reactions

Prasad  pfp
Prasad
@prasadclr
Check out MPC TLS by Pado labs, 7-15x faster- using garbled circuits and IZK https://ugc.production.linktr.ee/Pw4l2aAReSIzLbE8tEbP_964.pdf
2 replies
0 recast
1 reaction

EmpiricalLagrange - tevm/acc pfp
EmpiricalLagrange - tevm/acc
@eulerlagrange.eth
Still haven’t solved the collusion problem. What they’ll tell you is you need to generate the same proof from multiple MPC nodes to be sure.
1 reply
0 recast
1 reaction

Prasad  pfp
Prasad
@prasadclr
How does one solve collusion?
1 reply
0 recast
0 reaction

EmpiricalLagrange - tevm/acc pfp
EmpiricalLagrange - tevm/acc
@eulerlagrange.eth
Just started a company in this space, and there are a few competitors. I’m the only one with a good answer to this question is my claim. I don’t want to make it public until I’m far enough along. Hope you understand. It’s a simple solution IMO, and doesn’t rely on SGX.
1 reply
0 recast
2 reactions

eric siu 🐈 pfp
eric siu 🐈
@randomishwalk
ok i thought you were gonna say SGX or aws nitro or whatever the proprietary azure / gcp equivalent of that is (i think some AMD chip??)
2 replies
0 recast
0 reaction

eric siu 🐈 pfp
eric siu 🐈
@randomishwalk
fixated now on this coordination and “gate keeping” question you raised which is to say, idk how hard it would be to get these diff actors to cooperate and agree if you wanted to go down the semi-permissioned route and in collusion scenario, could you have some way of detecting and enforcing independent action?
0 reply
0 recast
0 reaction

EmpiricalLagrange - tevm/acc pfp
EmpiricalLagrange - tevm/acc
@eulerlagrange.eth
I should’ve said no TEE. No trusted hardware assumptions.
1 reply
0 recast
1 reaction