Tayyab - d/acc
@tayyab
As always the great @dabit3 with a fantastic explanation of zkTLS: https://x.com/dabit3/status/1849789118802215323?s=46&t=35-PVao8ZGgO54RWjlFoZg
2 replies
0 recast
4 reactions
Nader Dabit
@dabit3
thank you 🙏
1 reply
0 recast
2 reactions
Tayyab - d/acc
@tayyab
Checkout how we’re using zkTLS at icebreaker! cc @web3pm https://warpcast.com/web3pm/0x6a8ff4cf
1 reply
0 recast
1 reaction
Dan | Icebreaker
@web3pm
zkTLS is actually more powerful than @dabit3 's video, and there are other lighterweight mechanisms for proving stuff privately than zkTLS. The way Icebreaker uses zkTLS enables users to verifiably extract data that previously was impossible for them to extract. Once it's been extracted, we or another provider could create derivative proofs to reveal subsets of that data (as in the video), but the verifiable extraction step is actually the most important and innovative.
0 reply
0 recast
0 reaction