Building Privacy by Porter, Protocol Security Engineer

ZKsync
12 Jul 202323:21

Summary

TLDRIn this workshop from Beetle Iran Hackathon, Porter discusses the importance of privacy in blockchain, emphasizing it as a fundamental right. He explores various privacy primitives like front-running, mixers, and stealth addresses, and brainstorms innovative ideas for enhancing privacy, including private NFTs, DeFi, and gaming. The talk also touches on the significance of privacy for open societies and the potential of ZK technology in building a more private and decentralized future for blockchain applications.

Takeaways

  • ๐Ÿ”’ Privacy as a Fundamental Right: The script emphasizes that privacy is viewed as a fundamental right in the blockchain space, and it's a right that must be asserted and defended by building it into the technology.
  • ๐Ÿ’ก Inspiration for Developers: The presentation is aimed at inspiring hackathon participants to build applications with privacy in mind, or to incorporate privacy into their existing projects.
  • ๐Ÿ› ๏ธ ZK-Sync Era: The talk focuses on building privacy on ZK-Sync, suggesting that this is an era where privacy solutions are being actively developed and integrated into blockchain technology.
  • ๐Ÿ’ผ Vitalik's Three Transitions: The script mentions that one of the major transitions the Ethereum stack needs to undergo, as highlighted by Vitalik Buterin, is privacy.
  • ๐ŸŒ Privacy for an Open Society: It references the Cypherpunk Manifesto, emphasizing the importance of privacy in an open society in the electronic age and the need for individuals to empower themselves through privacy.
  • ๐Ÿค Privacy Primitives: The script introduces basic privacy applications like front running, mixers, private accounts, and stealth addresses, which are essential tools for maintaining privacy in blockchain transactions.
  • ๐Ÿ”„ General Themes in Privacy: It outlines general themes for building privacy, such as making transactions difficult to trace by mixing funds or keeping them separate, and using off-chain processes to enhance privacy.
  • ๐ŸŽฎ Privacy in Gaming: The talk suggests that privacy can enhance gaming experiences by keeping certain information hidden, making games more engaging and strategic.
  • ๐Ÿ›๏ธ Private DeFi and NFTs: The script explores the potential for privacy in DeFi and NFTs, discussing how privacy can be integrated into these areas to protect ownership and transaction details.
  • ๐Ÿ—ณ๏ธ Private Voting: It highlights the importance of developing private voting systems on the blockchain, which is crucial for maintaining freedom and decentralization.
  • ๐Ÿ”‘ Future of Privacy: The presenter envisions a future where all blockchain activities can be conducted privately, emphasizing the importance of privacy for the long-term success and freedom of blockchain technology.

Q & A

  • What is the main focus of Porter's presentation at the Beetle Iran hackathon?

    -The main focus of Porter's presentation is on building privacy on ZK Sync era, discussing various ideas and approaches for enhancing privacy in blockchain technology.

  • Why is privacy considered a fundamental right in the blockchain space according to ZK Credo?

    -Privacy is considered a fundamental right in the blockchain space because it is essential for individual freedom and empowerment. It should not be a gift but a right that must be asserted and defended collectively.

  • What are some of the major transitions that the Ethereum stack needs to undergo according to a recent post by Vitalik?

    -According to Vitalik, the Ethereum stack needs to undergo three major transitions: scaling, smart contract wallets, and privacy.

  • What is the significance of the Cypherpunk's Manifesto in the context of privacy?

    -The Cypherpunk's Manifesto emphasizes the importance of privacy in an open society in the electronic age, stating that privacy is vital for empowering individuals and ensuring freedom, and it is something that must be built and maintained by the community.

  • What are some of the basic privacy primitives mentioned in the presentation?

    -Some basic privacy primitives mentioned include front running, mixers like Tornado Cash for private payments, stealth addresses for anonymous transactions, and private accounts for hiding transaction amounts.

  • How does a mixer like Tornado Cash provide privacy for cryptocurrency transactions?

    -A mixer like Tornado Cash provides privacy by blending all the inputs together in a pot, making it difficult to trace the connection between the inputs and outputs, thus ensuring the privacy of the transaction outputs.

  • What is the concept of private NFTs and how can they enhance privacy in the context of digital collectibles?

    -Private NFTs can either hide the owner of the NFT or the metadata associated with it. This can be useful in scenarios such as gaming applications where the properties of a digital item might be kept hidden until certain conditions are met.

  • What are some challenges in building private NFTs that maintain the uniqueness of the tokens while ensuring privacy?

    -One challenge in building private NFTs is that, unlike fungible tokens, NFTs are unique and cannot be easily mixed in a pool like Tornado Cash. Maintaining privacy requires keeping the NFT within a private pool or finding other innovative ways to ensure the owner's privacy while allowing transfers.

  • What is the potential of private DeFi (Decentralized Finance) in terms of enhancing privacy in financial transactions?

    -Private DeFi could allow users to conduct financial transactions in a completely private manner, combining protocols like Tornado Cash with decentralized exchanges to enable privacy-preserving swaps and trades.

  • How can privacy be integrated into social recovery mechanisms to ensure that the process does not compromise the user's privacy?

    -Privacy can be integrated into social recovery mechanisms by using methods like stealth addresses, which could allow users to recover their accounts without revealing their identity or involving their friends in a privacy-compromising way.

  • What are some potential applications of privacy in gaming, and how can they enhance the user experience?

    -Privacy in gaming can be applied to hide information such as the properties of in-game items or the strategies used by players. This can make games more engaging by introducing elements of mystery and preventing the easy replication of successful strategies.

  • What is the importance of private voting applications in ensuring the integrity and freedom of the voting process?

    -Private voting applications are crucial for ensuring that votes remain anonymous while still being verifiable and secure. This is essential for maintaining trust in the voting process and preventing manipulation or coercion.

  • How can private reputation systems work in a privacy-focused blockchain ecosystem?

    -Private reputation systems could allow users to build and demonstrate their credibility without revealing sensitive personal information. This can be achieved through cryptographic techniques that prove attributes or behaviors without disclosing underlying data.

  • What are some of the infrastructure-level privacy solutions discussed in the presentation?

    -Infrastructure-level privacy solutions include private block proposing, network layer privacy enhancements, and privacy at the protocol level. These solutions aim to make the entire blockchain ecosystem more private and resistant to censorship.

  • What is the potential impact of private block proposing on the MEV (Miner Extractable Value) issue in blockchain?

    -Private block proposing could be a significant solution to the MEV issue by obscuring the contents of a block until it is confirmed on-chain. This would prevent miners from selectively including or excluding transactions based on their content, promoting a more fair and decentralized blockchain.

Outlines

00:00

๐ŸŽค Introduction to Privacy in Blockchain

The script opens with a welcome to a workshop on privacy within the context of the ZK Sync era hackathon. The presenter, Porter, is set to discuss the importance of privacy and brainstorm ideas for the hackathon participants to explore. The central theme is the necessity of privacy as a fundamental right in the blockchain space, as outlined in the ZK Credo. The talk aims to inspire participants to incorporate privacy into their projects and to highlight the importance of privacy for open societies in the digital age, referencing the Cypherpunk's Manifesto.

05:02

๐Ÿ›ก๏ธ Privacy Primitives and Technical Discussion

This paragraph delves into the technical aspects of privacy in blockchain, introducing privacy primitives such as front-running, mixers like Tornado Cash, and the concept of privacy pools. It discusses the challenges of maintaining privacy, such as the need for uniform transaction sizes in mixers and the use of stealth addresses for enhanced privacy. The speaker also touches on the simplicity of some privacy solutions, suggesting that complex cryptography is not always necessary and that privacy can be achieved through smart design principles.

10:03

๐Ÿฆ Privacy Applications Beyond Basic Transactions

The speaker expands on privacy beyond the basics of transaction privacy, exploring applications such as private NFTs, where ownership or metadata can be hidden, and private DeFi, which could integrate with protocols like Tornado Cash for privacy in financial transactions. The paragraph also introduces the concept of hidden information games, which could enhance the gaming experience by keeping certain aspects of the game hidden from players, and the potential for private social recovery mechanisms that maintain privacy while recovering lost access to accounts.

15:04

๐Ÿ—ณ๏ธ Advanced Privacy Concepts and Use Cases

This section discusses advanced privacy concepts such as private voting, which would allow for secure and anonymous voting on the blockchain, and private reputation systems that could be used for obtaining loans or other services without revealing transaction details. The speaker also considers the potential for private identity verification, where individuals can selectively reveal information to third parties, and the challenges of maintaining privacy in social recovery and account abstraction.

20:07

๐ŸŒ Future of Privacy and Closing Remarks

In the final paragraph, the speaker envisions a future where all blockchain activities can be conducted privately and emphasizes the importance of privacy for maintaining decentralization and censorship resistance. They encourage builders to explore privacy solutions and offer assistance for those interested in developing privacy-focused applications. The speaker concludes by inviting questions and providing contact information for further discussion, highlighting the ongoing conversation around privacy in the blockchain community.

๐Ÿค” Q&A and Further Exploration of Privacy Solutions

The script concludes with a Q&A session where the audience shows interest in privacy solutions similar to Aztec's ZK money. The speaker acknowledges the work of Aztec and the importance of compliant versus non-compliant privacy protocols. They invite further discussion and exploration of privacy solutions, emphasizing the need for privacy in various blockchain applications and the potential for builders to contribute to this space.

Mindmap

Keywords

๐Ÿ’กPrivacy

Privacy in the context of this video refers to the ability to keep certain information or transactions hidden from public view, especially within the blockchain space. It is a fundamental right that the speaker believes must be asserted and defended. The video discusses various ways to achieve privacy on the blockchain, such as through ZK-Sync, a scaling solution developed by Matter Labs.

๐Ÿ’กZK-Sync

ZK-Sync is a technology that enables privacy on the blockchain by allowing transactions to be verified without revealing their contents. It is a part of the Ethereum stack and is mentioned in the video as a platform where participants can build privacy-focused applications.

๐Ÿ’กZK Credo

The ZK Credo is a set of principles written by the team at Matter Labs, which emphasizes the importance of privacy as a fundamental right in the blockchain space. It is mentioned in the video as a motivational foundation for building privacy solutions.

๐Ÿ’กEthereum Stack

The Ethereum Stack refers to the layers of technologies built on top of the Ethereum blockchain. The video mentions that Ethereum needs to undergo several transitions, one of which is privacy, to enhance its capabilities.

๐Ÿ’กCypherpunk Manifesto

The Cypherpunk Manifesto is a document that advocates for strong cryptography and privacy-enhancing technologies. It is cited in the video as a source of inspiration for the importance of privacy and the need for individuals to take action to protect it.

๐Ÿ’กFront Running

Front running in the context of the video refers to the practice of using privacy techniques to obscure the owner of a cryptocurrency to prevent others from tracing transactions. It is one of the privacy primitives discussed, where privacy is achieved by mixing funds to hide the source and destination of transactions.

๐Ÿ’กMixer

A mixer, as mentioned in the video, is a service that mixes funds from multiple sources to obscure the trail of transactions. Tornado Cash is an example of a mixer that provides privacy by blending transactions together so that it's difficult to link inputs to outputs.

๐Ÿ’กStealth Addresses

Stealth addresses are a privacy feature that allows users to generate a new address for each transaction without interaction, providing the same privacy as using a fresh address every time. They are highlighted in the video as a method to enhance privacy on the blockchain.

๐Ÿ’กPrivate NFTs

Private NFTs, as discussed in the video, are non-fungible tokens that have privacy features. They could either hide the owner of the NFT or the metadata associated with it, providing a way to maintain privacy in digital collectibles and gaming.

๐Ÿ’กDeFi

DeFi, or Decentralized Finance, refers to financial services that are built on blockchain technology and operate without traditional intermediaries. The video suggests the potential for combining privacy techniques with DeFi to enable private transactions within this space.

๐Ÿ’กSocial Recovery

Social recovery is a method of regaining access to a cryptocurrency wallet by involving a group of trusted individuals. The video discusses the potential for privacy to be integrated into social recovery mechanisms to ensure that the process does not compromise the user's privacy.

๐Ÿ’กPrivate Voting

Private voting is a concept where individuals can cast votes on the blockchain without revealing their vote or identity. The video emphasizes the importance of developing private voting applications to ensure freedom and privacy in future democratic processes.

๐Ÿ’กHomomorphic Encryption

Homomorphic encryption is a form of encryption that allows computations to be performed on ciphertexts, producing an encrypted result which, when decrypted, matches the result of operations performed on the plaintext. The video suggests that this technology could be used to build privacy applications on the blockchain.

Highlights

Introduction to a workshop focusing on privacy in the context of the ZK Sync era and brainstorming ideas for hackathon participants.

The ZK Credo emphasizes privacy as a fundamental right in the blockchain space, needing to be asserted and defended collectively.

Vitalik Buterin's perspective on privacy as one of the three major transitions the Ethereum stack needs to undergo.

The Cypherpunk's Manifesto advocating for privacy as essential for an open society in the electronic age.

Privacy primitives such as front running, mixers like Tornado Cash, and the concept of privacy pools.

The introduction of stealth addresses for enhanced transaction privacy without additional interaction from the user.

The potential of simple design principles in achieving privacy, alongside complex cryptographic methods.

General themes in building privacy, such as making transactions untraceable and keeping processes separate.

The idea of private NFTs, including hiding ownership and metadata for unique digital assets.

Private DeFi and the potential for combining privacy with various tokens and decentralized finance protocols.

The concept of hidden information games and how they can enhance the gaming experience in blockchain applications.

The importance of privacy in social recovery mechanisms to avoid compromising user privacy during recovery processes.

Selective revelation of information to third parties as a method of private identity verification.

The challenges and potential solutions for private voting, ensuring the integrity and privacy of the voting process.

The concept of private reputation and how it can be built and utilized in a privacy-centric blockchain environment.

Network layer privacy and its role in obscuring transaction origins, potentially combating censorship.

The future of privacy envisioning a blockchain ecosystem where all current functionalities are available in a more private manner.

Encouragement for builders to create privacy-focused applications, emphasizing the importance of privacy for blockchain's future.

Invitation for participants to engage with the presenter on Twitter for further discussions on privacy building.

Transcripts

play00:03

well hello everyone welcome to another

play00:05

Workshop from Beetle Iran hackathon

play00:08

today we have Porter who will give a

play00:10

presentation around privacy as it is in

play00:13

Kira so welcome further and yeah feel

play00:16

free to share the screen

play00:18

and we're good to go

play00:22

all right thank you

play00:25

here we go

play00:27

um so yeah this talk is about building

play00:29

privacy on ZK sync era it's mostly just

play00:32

brainstorming ideas of things that

play00:35

hackathon participants could build and a

play00:37

few approaches and then yeah we'll get

play00:41

towards what I think the future of

play00:42

privacy will look like at the end so

play00:45

yeah just starting with a little

play00:46

motivation though and the meat of the

play00:49

talk is just a bunch of different ideas

play00:50

and just some goals are that I hope that

play00:53

one you get inspired to maybe build

play00:55

something with privacy and then two

play00:58

maybe if you already have something that

play01:00

you're working on

play01:01

um you might be like excited to maybe

play01:03

incorporate some privacy into whatever

play01:06

you're building and

play01:08

great so starting with the motivation

play01:13

um at CK sync we wrote the ZK Credo it

play01:17

says in the blockchain space

play01:19

privacy viewed as a fundamental right

play01:21

part of this challenge is uniquely

play01:23

addressed by ZK privacy shouldn't be a

play01:25

gift given to us it's fundamental right

play01:26

that we must assert and defend together

play01:29

um so that privacy doesn't happen unless

play01:33

we build it so

play01:35

like let's go build it uh just a few

play01:39

different perspectives on like why

play01:40

privacy also vitalik has recently posted

play01:43

about the three major transitions that

play01:45

ethereum stack needs to undergo one of

play01:48

them is I'll do scaling which obviously

play01:50

we're working on here at matter Labs

play01:52

um smart contract wallets I think

play01:54

there's been several other like talks

play01:56

and ideas about that and I'm going to

play01:58

focus on the third filler which is

play02:00

privacy

play02:02

and one last motivation is that privacy

play02:05

is necessary for an open Society in the

play02:07

electronic age from the cypherpunk's

play02:09

manifesto I know not everyone knows

play02:12

their cyberpunk history but if you

play02:13

haven't read The Cypher Puck Manifesto

play02:15

now's a good time it's only one page

play02:17

long and basically talks about how no

play02:20

one's going to build this stuff for us

play02:21

if we really want to protect each other

play02:24

and there's a lot of crazy stuff

play02:26

happening in the world right now privacy

play02:28

is very important for empowering

play02:30

individuals and freedom and so I believe

play02:32

in it a lot and it's very important that

play02:35

we build this because no one else will

play02:37

build it for us

play02:39

all right kicking off with that's enough

play02:41

fluffy stuff we'll get to the technical

play02:43

things now some privacy Primitives so

play02:46

these are kind of the basic privacy

play02:48

applications that I think most people

play02:50

will know ahead of time

play02:52

um front wine is you just hide the owner

play02:54

of oh this is all blockchain related you

play02:57

hide the owner of the crypto whichever

play03:01

token that someone has uh you can throw

play03:04

it through a mixer like tornado cache

play03:06

and the idea of a mixer is sort of all

play03:08

the money Blends together in a pot and

play03:10

the inputs aren't connected to the

play03:12

outputs and so you can get privacy of

play03:16

the outputs because you can't tie who

play03:20

paid and to who received together so you

play03:23

can kind of get private payments this

play03:25

way one challenge of this though is that

play03:28

you need sort of all the payment sizes

play03:30

to be the same so if everyone's paying

play03:33

in like one ether you need to also take

play03:36

out one ether you can't do payments of

play03:38

size like

play03:39

0.3 ether

play03:42

um although you can kind of break it up

play03:45

into same size transactions but

play03:48

um

play03:48

it's not perfect there's there's some

play03:50

disadvantages too anyways you can also

play03:53

hide the amount stuff like private

play03:55

accounts and Nocturne which is real

play03:57

estate in ethereum recently this is like

play04:00

kind of a different form of privacy

play04:01

where you're not hiding maybe who's

play04:03

transacting to who but instead you're

play04:05

hiding the amount of money that was sent

play04:07

and this can be very nice for stuff like

play04:09

if you're receiving your salary or

play04:12

paycheck on the blockchain you might not

play04:14

want everyone in the world to know

play04:16

exactly how much money it was received

play04:18

but you might want it to be open that

play04:22

you know matter Labs paid Porter his

play04:24

paycheck this week

play04:27

just if you haven't seen stealth

play04:29

addresses before vitalik has another

play04:31

really good blog post on them basically

play04:33

self addresses give the same privacy

play04:35

properties as Bob generating a fresh

play04:37

address for each transaction but without

play04:39

requiring any interaction from Bob and

play04:41

on the right is like a big diagram you

play04:44

don't have to go through the whole thing

play04:45

right now

play04:47

um but just at a high level basically

play04:49

Bob creates this like extra address it

play04:52

could be like an ANS the name domain

play04:55

name or just another ethereum address

play04:58

and Alice can send things to the stealth

play05:02

address and it will be controlled by Bob

play05:04

and but no one else can really tell that

play05:07

it's controlled by Bob or who owns it

play05:10

they're they're kind of two reasons I

play05:11

wanted to bring this up one is like

play05:13

stealth addresses are cool and if you do

play05:15

want to go build stuff with it like

play05:16

actual stealth addresses you can

play05:18

the other thing to think about is that

play05:20

using all of this complicated stuff on

play05:22

the right you get the same property as

play05:24

if Bob just used a fresh address every

play05:27

single time and so another way to make

play05:31

this happen is like you can skip all of

play05:33

the cryptography and just make a wallet

play05:35

that's like way more friendly for using

play05:37

a fresh address every single transaction

play05:40

uh requires a little extra work and

play05:42

Alice has to know like where to send the

play05:44

money but

play05:45

um

play05:46

a lot of these privacy applications can

play05:48

be built with ZK and homomorphic

play05:51

encryption on all this fancy

play05:53

cryptography but they can also be built

play05:55

with just some sort of simple design

play05:57

principles which I think is pretty cool

play05:59

that you could do either way

play06:03

so all right one quick slide on just

play06:07

some general themes they see when

play06:08

building privacy and things

play06:10

um the the goal is usually just to make

play06:13

it difficult to trace between stuff and

play06:16

you can mix everything together like in

play06:19

tornado cash all the money ends up in

play06:21

one pot and so you can't tell which

play06:24

withdrawals are tied to a which

play06:26

depositors

play06:27

another thing is just keep everything

play06:30

separate so like I just talked about you

play06:32

could keep like every single transaction

play06:35

separate every single input output

play06:37

separate

play06:39

um it actually ends up looking quite

play06:40

similar to the utxo model

play06:43

um as opposed to the account model and

play06:45

if you just keep everything completely

play06:47

separate then like

play06:49

there's no sort of like account history

play06:51

there's no way to tell who owns what

play06:53

this is actually satoshi's idea of how

play06:55

privacy would work on bitcoin but turns

play06:58

out maybe because of the wallet

play07:00

challenges right now almost everyone

play07:02

uses the same address all the time which

play07:05

builds up like account history and

play07:07

people can tell like all kinds of things

play07:09

about you but if you always were using a

play07:12

different address then

play07:14

uh they wouldn't be able to know one

play07:16

other way to get privacy is to isolate

play07:18

processes to relay stuff off chain and

play07:21

then back on this can be quite nice if

play07:24

like maybe you don't want to post a

play07:26

certain transaction yourself but you

play07:28

need something to happen you could have

play07:31

a relay where you bounce it through some

play07:33

off-chain Network and then it can pop

play07:36

back on

play07:38

um oh I have a comment it's also like

play07:41

with an encryption where every next

play07:44

message is encrypted with the new key as

play07:46

long as it's sending a receiver and sync

play07:47

exactly yeah that's a great way to think

play07:50

about this good comment

play07:53

cool all right privacy beyond the basics

play07:55

I think most of the things so far kind

play07:58

of

play07:58

things that are very common in the

play08:00

blockchain space are talked about some

play08:03

other things that I would be excited to

play08:04

see built or played with more are things

play08:07

like private nfts I'm just going to run

play08:10

through a bunch of examples now uh where

play08:12

you could you could hide the owner

play08:13

similar to like hiding who's the owner

play08:16

of a token uh it's a little challenging

play08:19

because the nfts are like unique and so

play08:22

there's only one of them and so like if

play08:25

you

play08:26

just like naively tried to do a tornado

play08:28

cache with an NFD like the nft goes in

play08:31

one side and like it's it can't really

play08:35

get mixed up because there's only one of

play08:36

it and then it comes out the other side

play08:38

and slowly everyone can tell which

play08:41

transaction was made directly

play08:43

so you kind of need to like keep the nft

play08:46

within the private pool or something to

play08:49

continuously hide the owner but still

play08:51

allow transfers there's some interesting

play08:54

probably ways to make that happen the

play08:57

other completely separate way thing you

play09:00

could do with private nfts is hide the

play09:02

metadata this can be very interesting

play09:04

especially as we get towards like gaming

play09:06

applications where you might want to

play09:09

have like a hidden item in game and it

play09:12

should be an nft but maybe no one knows

play09:14

like you know what the stats are on this

play09:17

item maybe it's very rare maybe it's not

play09:20

but you can kind of hide the metadata

play09:22

and maybe it gets revealed if certain

play09:25

other things happen

play09:28

private defy like I mentioned could you

play09:31

combine say tornado cash with the decks

play09:33

so you're not stuck just with maybe

play09:36

ether maybe you can switch to different

play09:38

tokens and basically

play09:41

the like dream state is you can do all

play09:43

of DFI in a completely private way and

play09:48

um that there are lots of cool ways of

play09:51

sort of like mixing combining some of

play09:53

these protocols together

play09:54

next we'll talk more about private

play09:57

gaming

play09:58

um yeah hidden information games is one

play10:00

of the first things that was kind of

play10:02

alluding to earlier where most video

play10:05

games and games in general are fun

play10:08

because you don't know everything that's

play10:10

happening there's some information

play10:11

that's like hidden from some of the

play10:14

players not everyone knows like all of

play10:17

the stuff and so I think that's actually

play10:21

hot take one of the reasons why

play10:23

blockchain gaming kind of hasn't been

play10:26

too successful yet is if you kind of

play10:29

know absolutely everything a lot of

play10:31

times the optimal strategy is very

play10:34

obvious and then there's kind of not

play10:37

much in the game to do besides just like

play10:40

routinely do the optimal strategy so

play10:44

anyways unknown stuff makes it way more

play10:46

fun a lot more things going on

play10:48

especially like I talked about the items

play10:51

that maybe you don't know what their

play10:53

properties are

play10:55

um having hidden information makes games

play10:57

more fun and then separately hidden

play11:00

strategy games

play11:02

um can be very cool if you remember

play11:04

there was a um it was like a racing game

play11:07

recently I forget who hosted it but it

play11:09

was like a CTF Style game and

play11:13

contestants are all basically writing an

play11:16

algorithm and then competing against

play11:17

each other

play11:18

now if your algorithm is

play11:21

sorry excuse me

play11:23

I'm at Starbucks

play11:24

if your algorithm is public knowledge

play11:27

and public information then everyone can

play11:29

just copy the best person's algorithm

play11:31

and they'll start winning too this

play11:33

actually applies outside of gaming to

play11:36

Mev Mev strategies where if you have

play11:40

some like Arbitrage or like yeah some

play11:44

thing that you're searching for

play11:47

if your strategy is public then other

play11:51

people will start catching on and

play11:53

mimicking it if you can keep your

play11:55

strategy private then

play11:58

um

play11:58

basically you can be successful much

play12:01

longer which is very interesting a lot

play12:04

of these privacy ideas like the same

play12:06

idea applies in gaming and Meb and like

play12:08

you can kind of take

play12:10

it and take stuff and apply it in a new

play12:12

way which is fun

play12:14

all right private social here's

play12:16

something that I'd really like to see

play12:18

Bill is social recovery uh maybe with

play12:20

stealth addresses so if I need to

play12:22

socially my recover my address do I lose

play12:24

my privacy because I'm probably just

play12:26

asking like my five best friends to help

play12:29

me like social recover my address and

play12:32

like even if I'm super secret and super

play12:36

safe my five friends probably aren't

play12:38

everyone's like not not everyone's like

play12:41

as big on privacy and so if you can do

play12:45

some form of like social recovery or

play12:47

like account abstraction like and just

play12:50

keep things private along the way as

play12:53

much as possible that would be very very

play12:55

cool and if you are building this let me

play12:58

know I would love to test it out

play13:01

uh private identity how can I

play13:03

selectively reveal information to third

play13:05

parties is actually everyone talks about

play13:07

like the the passport use case or like

play13:10

your ID at a bar and you're proving that

play13:12

you're over a certain age

play13:15

um I think more and more stuff will

play13:20

start to be like on chain

play13:22

um one problem that I've thought about

play13:25

for a long time is digital credentials I

play13:27

would love to prove say for example that

play13:30

I graduated from college and but maybe I

play13:32

don't specify which college I went to uh

play13:35

being able to have some facts about

play13:38

myself and then prove them to a third

play13:39

party uh would be cool and it's not very

play13:43

like I don't know of an easy way to do

play13:46

this yet even though everyone seems to

play13:49

talk about this idea it hasn't been

play13:51

built out too much

play13:53

private voting how can I vote without

play13:56

revealing my vote or giving away my

play13:58

address I think this is like almost

play14:00

mandatory for the future like someone

play14:03

needs to build this there have been a

play14:06

few tries on ethereum but some of the

play14:10

schemes get a little complicated or it's

play14:12

expensive maybe you have to move off

play14:13

chain

play14:15

um

play14:16

I don't think like it's really like a

play14:19

solved thing yet I think there's lots of

play14:21

room to build uh Better Private voting

play14:23

applications

play14:24

and yeah this is like absolutely crucial

play14:28

to like if you want freedom in the

play14:30

future and like us to vote on anything

play14:32

that's important ever like we need

play14:36

um

play14:37

do I know specific projects that tried

play14:39

to build private voting applications the

play14:42

main one is from nounsdale if you're

play14:44

familiar with nouns they hosted a

play14:49

um like they've funded some people to

play14:52

build some private voting applications I

play14:55

think Aztec and Poseidon and some other

play14:59

group are are drafting up some

play15:01

candidates right now and it's

play15:03

interesting to just scroll through the

play15:05

list of proposals for nounsdale it's on

play15:07

their website of everyone who was like

play15:10

posting different ideas on how to build

play15:12

this

play15:13

so yeah check out the nounsdale private

play15:16

voting application if all right contest

play15:18

if that's your um

play15:20

if you're interested in this one

play15:22

private reputation uh how can we build

play15:25

reputation if everything is private I

play15:28

would love for for example like all of

play15:30

my money transfers to be private on

play15:32

chain but then if I want a loan maybe I

play15:35

need some form of reputation or a proof

play15:37

that I'm like have some facts about me

play15:40

and so it's kind of interesting because

play15:43

reputation is more of like a public

play15:44

social thing and then privacy is like

play15:47

more of like an individual like hiding

play15:49

from the public thing and so fitting

play15:52

these two together

play15:54

is kind of tricky this this one does

play15:57

seem like a little more far out because

play15:58

most people don't have too much

play16:01

information on chain yet and so like

play16:04

reputation schemes by themselves I feel

play16:06

like haven't taken off very much

play16:09

um but eventually I don't know it'd be

play16:12

cool to have private reputation

play16:14

some combination of this stuff a few

play16:17

more topics

play16:18

um obviously an entire like private L3

play16:21

would be really cool to see

play16:23

um that'd be a lot of work but if you're

play16:26

interested let me know I would love to

play16:28

help or talk with you

play16:29

Network layer privacy I mentioned

play16:32

briefly sort of relaying things off

play16:34

chain especially with things like fee

play16:38

pairs

play16:40

um you can sort of relay your

play16:42

transaction through someone else and

play16:44

that can help obscure for example maybe

play16:49

you can't like

play16:50

say there comes a time where one country

play16:52

tries to like block all transactions to

play16:55

the blockchain you might be able to send

play16:58

your transaction to someone else in

play17:00

another country and then they can post

play17:01

it on the blockchain for you and

play17:04

basically there are all kinds of like

play17:06

Network layers

play17:07

situations where having privacies lead

play17:10

very useful very important

play17:13

and then private block proposing

play17:15

building this is around like you know

play17:18

who gets to create the next part of the

play17:20

chain and if

play17:24

if it stays private then like it ends up

play17:27

kind of being more decentralized a lot

play17:29

of times when it's public that's when

play17:32

you get more censorship and picking and

play17:34

choosing of transactions but if things

play17:37

are private like you don't really know

play17:39

whether you should censor it or not like

play17:41

if you're a government you're trying to

play17:43

censor things but everything's private

play17:45

like and if you can't really you won't

play17:48

succeed so

play17:49

these are more like

play17:51

slightly off-chain or like they're not

play17:54

applications they're more like

play17:56

infrastructure and outside stuff

play17:58

um so that you can apply privacy at

play18:01

pretty much any level of the stack

play18:04

um

play18:05

can private block proposing be a

play18:07

solution to Mev issues yes yes that's

play18:10

one of the big Solutions being

play18:12

considered is

play18:14

they have private block proposing and

play18:17

only once a block is confirmed on chain

play18:20

then it gets revealed what was inside

play18:23

the block later

play18:25

it's a little challenging because you

play18:27

need to like make sure that you can

play18:29

prove that all the transactions are

play18:31

valid but because things are moving on

play18:33

the blockchain the transaction that's

play18:35

valid right now might not be valid later

play18:38

say if the fees go up too much and now

play18:40

you can't pay for something

play18:41

so it's a little tricky to do in

play18:44

practice but there's a lot of good ideas

play18:45

around it and I think now is like a good

play18:48

time to really start trying to like

play18:50

build this or test build this

play18:52

and if everyone especially has ideas of

play18:55

this like on an L2 or L3 that'd be

play18:58

really cool to see

play19:02

cool so yeah building privacy on zq sync

play19:05

check out our docs we have several

play19:08

tutorials and things lots of ways to

play19:12

build there have been some other really

play19:13

good talks on building I just want to

play19:15

see privacy things the most and so yeah

play19:19

if you're building like please talk to

play19:21

me let me know message me on Twitter

play19:24

the last thing that I'll end with is

play19:26

what do I think privacy will look like

play19:28

in the future

play19:30

one simple thing is just that everything

play19:33

we can do on blockchain today it would

play19:35

be amazing if we could do all the same

play19:38

stuff but in a more private way

play19:40

uh I think it's all technically possible

play19:44

it just takes Builders like you guys to

play19:48

make it happen and

play19:50

long-term yeah I think this is super

play19:54

important for like if you want

play19:57

blockchain to stay decentralized and

play19:59

censorship resistant and have a lot of

play20:01

those properties and a lot of freedom

play20:03

then we absolutely need this like we're

play20:07

ever going to vote for anything

play20:08

important on chain if we're ever going

play20:10

to do like have a lot of financial

play20:12

transactions on chain even for like the

play20:16

companies and the countries to move on

play20:18

chain even they want to keep some stuff

play20:20

private so I think no matter what

play20:22

privacy is meant pretty mandatory for

play20:24

the future and so now is a great time to

play20:26

build something

play20:28

any questions

play20:31

no we kind of answered some as we went

play20:33

but yeah thank you all if you do have

play20:35

questions later if you're watching the

play20:37

recording message me on Twitter's best

play20:39

place to find me or contact any of our

play20:42

team at matter labs

play20:45

thanks thank you Porter thank you

play20:47

everyone for joining well see you in the

play20:50

next workshop and yes Reach Out reach us

play20:52

out at CJ Singh wherever in any channel

play20:55

we are there so yeah thank you a lot

play20:59

um sorry

play21:00

um I have a question yes

play21:03

um I'm quite new to that please privacy

play21:07

is something I'm um I'm very curious

play21:09

about and um I'm a big fan of Aztec and

play21:13

um and what they have done with the ZK

play21:15

money I was using it just just for the

play21:18

sake of playing around do you know any

play21:20

other

play21:22

um I think you mentioned some other

play21:23

companies but do you know any specific

play21:25

apps which are kind of doing similar

play21:29

things just to explore and and so on I

play21:32

mean like not not just um not just for

play21:36

the sake of example you know but

play21:37

something which is really useful uh on

play21:40

the same level as the city money

play21:43

I'm not too familiar with everything

play21:45

that's happening in Aztec I I think they

play21:47

do really cool work

play21:49

um I read a lot of their papers and

play21:50

stuff from their cryptography team

play21:52

specific applications I don't know too

play21:56

many like privacy focused ones yet

play22:00

um if

play22:01

yeah if you have like if you narrow it

play22:03

down to like a specific topic there's so

play22:05

many areas for privacy but just on ZK

play22:08

money yeah I think Nocturne is probably

play22:11

one oh one thing I didn't bring up is

play22:13

just the whole like compliant versus

play22:16

non-compliant privacy uh it's possible

play22:19

to build compliance into your privacy

play22:21

protocol it's also possible to choose

play22:24

not to build compliance in

play22:26

um

play22:27

but so

play22:28

yeah I think like basic money transfers

play22:31

is kind of the most common and it's a

play22:34

lot of like tornado cash followed by its

play22:36

version two is called privacy pools and

play22:38

then knock turn on ethereum and and yeah

play22:43

stick out some good stuff too if I think

play22:45

of any more

play22:46

um if you want to like send me your

play22:48

contact information they can I can talk

play22:50

to you later more

play22:52

okay sure thanks

play22:57

yes and for questions to make it like a

play22:59

one source of truth if you are part of

play23:01

our telegram group uh us in our join us

play23:05

there or you will see the telegram group

play23:07

on bitterbox but yes thank you so much

play23:10

Porter for the presentation I loved it

play23:13

and have a great day everyone

Rate This
โ˜…
โ˜…
โ˜…
โ˜…
โ˜…

5.0 / 5 (0 votes)

Related Tags
Blockchain PrivacyZK SyncHackathonCyberpunkDeFiNFTsPrivacy PrimitivesStealth AddressesSocial RecoveryPrivate VotingMatter Labs