w3tester pfp

w3tester

@w3tester

433 Following
300 Followers


w3tester pfp
w3tester
@w3tester
vly.money
0 reply
0 recast
0 reaction

w3tester pfp
w3tester
@w3tester
May I know how often is the merkle tree updated?
1 reply
0 recast
0 reaction

w3tester pfp
w3tester
@w3tester
Hi, i'd like to understand what kind of zk-computation is performed @anoncast? Anywhere I can find the doc for that? Thx!
1 reply
0 recast
0 reaction

w3tester pfp
w3tester
@w3tester
I'd like to understand what kind of zk-computation is performed in a zk-casting? Anywhere I can find the doc for that? @anoncast $ANON
0 reply
0 recast
0 reaction

w3tester pfp
w3tester
@w3tester
What about helping more people to know about your tokens?
0 reply
0 recast
0 reaction

w3tester pfp
w3tester
@w3tester
@aethernet How can I get some reward from you?
0 reply
3 recasts
3 reactions

w3tester pfp
w3tester
@w3tester
I am interested in how you can incentivize people to participate in discussions and maybe make contributions with token tipping.
0 reply
0 recast
0 reaction

w3tester pfp
w3tester
@w3tester
Love the way AI agent can interact with people in social media.
0 reply
0 recast
0 reaction

w3tester pfp
w3tester
@w3tester
The video you posted says nothing about the context problem I mentioned. Say there is a website that shows people's home address. It could be my own address or it could be other people's address. zkTLS can only prove that certain contents are displayed on the website, but without context it is useless. Sure address abc is shown in website xyz.com, but how do you know if it is my address or other people's address? You may argue that the URL can indicate something, but it is never a stable source of context. The company that runs the website normally gives zero assurance about the URL and the contents that is contained in that URL. A much better and concrete way to get some useful data from a website, is for the website owner to generate an attestation using the website's key (e.g. EAS has schema as data context). That way you know the data is attested and trustworthy.
0 reply
0 recast
0 reaction

w3tester pfp
w3tester
@w3tester
The video you posted says nothing about the context problem I mentioned. Say there is a website that shows people's home address. It could be my own address or it could be other people's address. zkTLS can only prove that certain contents are displayed on the website, but without context it is useless. Sure address abc is shown in website xyz.com, but how do you know if it is my address or other people's address? You may argue that the URL can indicate something, but it is never a stable source of context. The company that runs the website normally gives zero assurance about the URL and the contents that is contained in that URL. A much better and concrete way to get some useful data from a website, is for the website owner to generate an attestation using the website's key (e.g. EAS has schema as data context). That way you know the data is attested and trustworthy.
0 reply
0 recast
0 reaction

w3tester pfp
w3tester
@w3tester
zkTLS is hardly useful as it lacks the context for its contents. Saying "these texts are from that website" proves nothing.
1 reply
38 recasts
51 reactions

w3tester pfp
w3tester
@w3tester
zkTLS is hardly useful as it lacks the context for its contents. Saying "these texts are from that website" proves nothing.
1 reply
0 recast
0 reaction

w3tester pfp
w3tester
@w3tester
Value layer on all social networks?
1 reply
0 recast
0 reaction

w3tester pfp
w3tester
@w3tester
Testing cast in Farcaster channel.
0 reply
0 recast
0 reaction

w3tester pfp
w3tester
@w3tester
For project marketing, is there a need to airdrop token/NFT to users who have recast/liked some post?
0 reply
0 recast
0 reaction

w3tester pfp
w3tester
@w3tester
Congrats to the RISC0 team! The Cloaking Layer from zCloak Network is now fully ready to support the proof verification from the RISC0 zkVM in all blockchains. Let us know if you need it.
0 reply
1 recast
5 reactions

w3tester pfp
w3tester
@w3tester
Absolutely agree! This is exactly why we have built a STARK proof verification layer—Cloaking Layer—for all zkVMs on the market. Some of the most interesting use cases include the use of zkVM proofs for DePIN and AI-agents. https://zcloaknetwork.medium.com/cloaking-layer-a-zk-verification-infra-for-all-chains-1162d3fcc37b
0 reply
0 recast
5 reactions

w3tester pfp
w3tester
@w3tester
Absolutely agree! This is exactly why we have built a STARK proof verification layer for all zkVMs on the market. Some of the most interesting use cases include the use of zkVM proofs for DePIN and AI-agents. https://warpcast.com/w3tester/0xfc4d53ac
0 reply
0 recast
0 reaction

w3tester pfp
w3tester
@w3tester
A good writeup on the details of server side private compute from Apple. https://security.apple.com/blog/private-cloud-compute/
0 reply
0 recast
1 reaction

w3tester pfp
w3tester
@w3tester
The Permit2 design used by Uniswap is a failure regarding user fund security. Been seeing so many cases of fund loss lately because of it and we will see even more in the future. This feature should be reverted.
0 reply
0 recast
1 reaction