Benjamin Sepanski (@bensepanski) 's Twitter Profile
Benjamin Sepanski

@bensepanski

CSO at Veridise. UTCS MSCS 2022. DOE CSGF 2020 Fellow. BU Math 2020.

ID: 607752143

linkhttps://bensepanski.github.io calendar_today14-06-2012 02:39:22

1,1K Tweet

171 Followers

120 Following

Nathan Taylor (@ntalyour) 's Twitter Profile Photo

Because clearly I haven't been given enough work to do, this past weekend I blogged about formally-verifying a Fizzbuzz cs.utexas.edu/~ntaylor/blog/…

Veridise (@veridiseinc) 's Twitter Profile Photo

ZKPs can be *very* tricky! Read on to learn more about a subtle bug in Circom-pairing and how a Veridise audit managed to catch it: medium.com/veridise/circo…

andyguzman.eth 🦇🔊 (@andyguzmaneth) 's Twitter Profile Photo

📢Semaphore just completed its security audit and formal verification! We wanted to thank our friends at Veridise for the amazing work. Expect a blog post next week with the release of v3. You can read the full report he github.com/semaphore-prot…

Veridise (@veridiseinc) 's Twitter Profile Photo

Are you curious to know how audits can go beyond patterns and checklists? Check out our recent blog post about violating invariants in Semaphore: medium.com/veridise/break… @PrivacyScaling

Veridise (@veridiseinc) 's Twitter Profile Photo

(1/5) At Veridise, we are passionate about building security analysis tools in a data-driven way. We recently performed a study of vulnerabilities in ZK circuits and built a tool to detect them: eprint.iacr.org/2023/190 Ethereum.org @privacyscaling

Veridise (@veridiseinc) 's Twitter Profile Photo

Our CTO Jon Stephens speaking about three of our tools (Picus, zkVanguard, and zkOrca) for proving and finding bugs in ZK circuits. Thanks to IOSG Venturesc 🔜 KBW & Token2049 for a wonderful and informative event :)

Our CTO <a href="/FormallyJon/">Jon Stephens</a> speaking about three of our tools (Picus, zkVanguard, and zkOrca) for proving and finding bugs in ZK circuits. Thanks to <a href="/IOSGVC/">IOSG Venturesc 🔜 KBW & Token2049</a>  for a wonderful and informative event :)
SΞCURΞUM (@thesecureum) 's Twitter Profile Photo

Secureum RACEs are smart contract security quizzes. Participation is free & requires one-time registering at forms.gle/iL2uQvGZrDq5Uu…. RACE-16 is designed by Secureum mentor Jon Stephens & Veridise. Top-16 performers will be invited to Veridise Workshop. Details on Discord.

Catalyst (@catalystsystem) 's Twitter Profile Photo

1/ Today we publish our Unit of Liquidity whitepaper: whitepaper.catalyst.exchange In this, we describe how Catalyst further generalises both the Uniswap and Balancer AMM equation. Let's go over how and why this will be a catalyst for cross-chain applications 🧵

1/ Today we publish our Unit of Liquidity whitepaper: whitepaper.catalyst.exchange

In this, we describe how Catalyst further generalises both the Uniswap and Balancer AMM equation.

Let's go over how and why this will be a catalyst for cross-chain applications 🧵
Veridise (@veridiseinc) 's Twitter Profile Photo

We had a blast at Prague DeFi Summit & ETHPrague! A few awesome days of networking, hacking and fantastic talks on #DeFi, #interoperability, #zk, and more. 10 out of 10, will be back next year.

Veridise (@veridiseinc) 's Twitter Profile Photo

New blog post live! Dive into Intermediate Representations! This is the sixth part of the "ZK fundamentals" series. The article is written by Alp Bassa, our Research Scientist. Here's a summary 🧵 1/

New blog post live!

Dive into Intermediate Representations! This is the sixth part of the "ZK fundamentals" series.

The article is written by Alp Bassa, our Research Scientist.

Here's a summary 🧵

1/
Benjamin Sepanski (@bensepanski) 's Twitter Profile Photo

We really enjoyed working with Edgeless! They were extremely responsive and clearly invested in taking the security of their smart contracts seriously

RISC Zero (@risczero) 's Twitter Profile Photo

RISC Zero is building the first formally verified RISC-V zkVM. Using Veridise's Picus tool, we're mathematically proving determinism in our circuits. Our goal: A zkVM that’s both incredibly fast and provably secure, so developers never have to compromise.