IRLeaks
اسنپفود هک شد! به طور خلاصه موارد زیر در اختیار ما برای فروش میباشد: - اطلاعات بیش از ۲۰ میلیون کاربر شامل: نام کاربری، پسورد، ایمیل، نام و نام خانوادگی، شماره موبایل، تاریخ تولد و ... - اطلاعات بیش از ۵۱ میلیون آدرس کاربر شامل: موقعیت GPS، آدرس کامل،…
To address data leakage issues in central databases, three key technologies and approaches can be employed:
1. End-to-End Data Encryption: Encrypting sensitive data renders the information in the central database ineffective for unauthorized use, as unauthorized parties access only encrypted data in case of a breach.
2. Fully Homomorphic Encryption (FHE): Businesses can calculate on encrypted user data without decryption. For instance, users encrypt location data for delivery price estimates, ensuring privacy. Drivers interact with an FHE server using metadata for directions, keeping sensitive location details private until the final exchange between the user and the driver.
3. Federated Learning: This method allows the use of encrypted data in learning algorithms without compromising data security and privacy, useful for businesses requiring data for training purposes.
However, implementing these suggestions is challenging. For example, in a ride-sharing scenario like Snap Driver, prioritizing these approaches might affect user safety and operational functionality. These methods also require additional features to address inherent flaws.
Moreover, these approaches might not be considered or implemented as they conflict with the IRGC needs of collecting our locations data.
1. End-to-End Data Encryption: Encrypting sensitive data renders the information in the central database ineffective for unauthorized use, as unauthorized parties access only encrypted data in case of a breach.
2. Fully Homomorphic Encryption (FHE): Businesses can calculate on encrypted user data without decryption. For instance, users encrypt location data for delivery price estimates, ensuring privacy. Drivers interact with an FHE server using metadata for directions, keeping sensitive location details private until the final exchange between the user and the driver.
3. Federated Learning: This method allows the use of encrypted data in learning algorithms without compromising data security and privacy, useful for businesses requiring data for training purposes.
However, implementing these suggestions is challenging. For example, in a ride-sharing scenario like Snap Driver, prioritizing these approaches might affect user safety and operational functionality. These methods also require additional features to address inherent flaws.
Moreover, these approaches might not be considered or implemented as they conflict with the IRGC needs of collecting our locations data.
Hamid list
To address data leakage issues in central databases, three key technologies and approaches can be employed: 1. End-to-End Data Encryption: Encrypting sensitive data renders the information in the central database ineffective for unauthorized use, as unauthorized…
P2P and distributed dispatching system
“Transaction Fee Mechanism Design with Active Block Producers” (with Pranav Garimidi and Tim Roughgarden)
“When Bidders Are DAOs” (with Pranav Garimidi and Tim Roughgarden)
https://a16zcrypto.com/team/maryam-bahrani/
“When Bidders Are DAOs” (with Pranav Garimidi and Tim Roughgarden)
https://a16zcrypto.com/team/maryam-bahrani/
undefined
Maryam Bahrani - a16z crypto
a16z crypto is a venture capital fund that has been investing in crypto and web3 startups — across all stages — since 2013.
Forwarded from estammad II
ترجمه کل متن اگر کسی خواست
https://t.me/zanjire_fa/57
https://t.me/zanjire_fa/57
Telegram
زنجیره
مانیفست سایفرپانکها
در عصر ارتباطات، حریم خصوصی برای جامعهی باز یک نیاز است. حریم خصوصی محرمانهگی نیست. یک موضوع خصوصی چیزیست که فرد نمیخواهد همگان از آن با خبر باشند. اما یک موضوع محرمانه چیزیست که فرد نمیخواهد هیچکس از آن مطلع شود. حریم خصوصی یک توانایی…
در عصر ارتباطات، حریم خصوصی برای جامعهی باز یک نیاز است. حریم خصوصی محرمانهگی نیست. یک موضوع خصوصی چیزیست که فرد نمیخواهد همگان از آن با خبر باشند. اما یک موضوع محرمانه چیزیست که فرد نمیخواهد هیچکس از آن مطلع شود. حریم خصوصی یک توانایی…
👍1
Forwarded from Ali Sorena
بوسه یهودا
شعر و اجرا : سورنا
آهنگ : فرشاد
جلد : دژ
ساندکلاد :
https://soundcloud.com/alisorena/booseye-yahooda
یوتیوب:
https://youtu.be/afiZrN6ecuI
@officialsorenachannel
شعر و اجرا : سورنا
آهنگ : فرشاد
جلد : دژ
ساندکلاد :
https://soundcloud.com/alisorena/booseye-yahooda
یوتیوب:
https://youtu.be/afiZrN6ecuI
@officialsorenachannel
❤6
سود تولید صدور بسته بسته نور و شلاق استبداد که کور کرد کور سو رو
و نور خدا که بسته شد به میله و علمی که اثبات نکرد این شکست نور رو
من زوزه سیاه شب یه سوز حس عاصی از شکاف مرگ
روییدم از خون اختیار
بگو کجاست مرز رهایی ؟
منو اهلی نکن
عصر تراکتور های دو پای بی قلب با شخم امنیت و کشت مالکیت
و نور خدا که بسته شد به میله و علمی که اثبات نکرد این شکست نور رو
من زوزه سیاه شب یه سوز حس عاصی از شکاف مرگ
روییدم از خون اختیار
بگو کجاست مرز رهایی ؟
منو اهلی نکن
عصر تراکتور های دو پای بی قلب با شخم امنیت و کشت مالکیت
👍2
BLS Signature Aggregation for User-operation validation in the account abstraction
🔥3
https://medium.com/@ssanti/zero-knowledge-proof-hamiltonian-cycle-for-a-large-graph-5d423ddcc45d
This is a significantly cooler way to introduce ZKP to someone than using the color blind example.
This is a significantly cooler way to introduce ZKP to someone than using the color blind example.
Medium
Zero-Knowledge Proof: Hamiltonian Cycle for a Large Graph
Overview
Hamid list
BLS Signature Aggregation for User-operation validation in the account abstraction
https://www.youtube.com/watch?v=9TFEBuANioo
EC is Homomorphic under addition
If we have Homomorphic for addition and multiplication we call that protocol Fully Homomorphic
Paring on EC gave us Multiplication verification ability
EC is Homomorphic under addition
If we have Homomorphic for addition and multiplication we call that protocol Fully Homomorphic
Paring on EC gave us Multiplication verification ability
YouTube
Cryptography 101 for Blockchain Developers Part 3/3: Elliptic Curve Pairings
Cryptography Fundamentals for blockchain developers. The third and final video in a series to learn the building blocks of cryptography ultimately setting up the foundation for Zero-knowledge proofs. In this video, KoalateeCtrl (Blockchain Security Researcher…
👍2
Hamid list
https://www.youtube.com/watch?v=9TFEBuANioo EC is Homomorphic under addition If we have Homomorphic for addition and multiplication we call that protocol Fully Homomorphic Paring on EC gave us Multiplication verification ability
YouTube
Pairing-based Cryptography
https://asecuritysite.com/pairing/
I should have said BN254 and BL12-371 and BL12-381.
Here are examples:
https://asecuritysite.com/pairing
I should have said BN254 and BL12-371 and BL12-381.
Here are examples:
https://asecuritysite.com/pairing
❤2👍1
#research
1- ZkEmail and Zk login potential usage on the privacy for on-chain transfer ( alternative for stealth addresses )
2- Fraud proof over validity proofs
A) Reduce the gas consumption in the happy scenario
B) Supporting the proof from the proving system that they using the non supported curve in EVM by reducing their challenging step to a simple step with curve agnostic properties
This help us to be able have evm on-chain verifier for most of the curves
1- ZkEmail and Zk login potential usage on the privacy for on-chain transfer ( alternative for stealth addresses )
2- Fraud proof over validity proofs
A) Reduce the gas consumption in the happy scenario
B) Supporting the proof from the proving system that they using the non supported curve in EVM by reducing their challenging step to a simple step with curve agnostic properties
This help us to be able have evm on-chain verifier for most of the curves
👍1