brechy.eth (@brechy_) 's Twitter Profile
brechy.eth

@brechy_

Learning

ID: 1569114062834864130

linkhttps://linktr.ee/brechy calendar_today12-09-2022 00:02:19

255 Tweet

468 Followers

656 Following

Justin.eth Drake (@drakefjustin) 's Twitter Profile Photo

David Hoffman Bankless Here's my stance :) We can scale the canonical L1 EVM by 1,000x—from 10 TPS to 10K TPS—using zkVMs. The core idea: validators verify a SNARK for every EVM block, instead of re-executing it. I'll discuss this on Ethproofs call #1, Fri Apr 25 at 2pm UTC. The founders of 17

Cursive (@cursive_team) 's Twitter Profile Photo

Exciting news: an implementation of our novel 2PC scheme Trinity is now open sourced! The development is being led by Sinaxyz, and supported by Privacy & Scaling Explorations as part of their mpc-framework team. Links to repo & description in 🧵

brechy.eth (@brechy_) 's Twitter Profile Photo

I understand the complaints regarding DevX taking a more important place in some research/protocol updates I just can't see which real world application can't be built due to this. Imo the lack of applications is a sign that people is just comfortable with trusted third parties

ZKP2P (@zkp2p) 's Twitter Profile Photo

El soporte para Argentina ya está disponible en ZKP2P 🇦🇷 Comprá y vendé USDT, USDC, ETH y más directamente desde tu cuenta de Mercado Pago, con las comisiones más bajas y la mayor velocidad.

Privacy & Scaling Explorations (@privacyscaling) 's Twitter Profile Photo

Rasul Ibragimov just shipped the first PoC implementation of vOPRF-ID for generating secure nullifiers from Web2 identities — includes zk circuits, a registry contract, and testing infra. 🔗 github.com/privacy-scalin… 🧠 Learn more: pse.dev/en/projects/vO… 📖 Blog post:

brechy.eth (@brechy_) 's Twitter Profile Photo

This is not something "imposed" it's just what's going to happen. L1 will scale but apps will still choose L2s since they'll scale more and have: - Higher performance - Lower fees - Better dev stack/support

soispoke.eth (@soispoke) 's Twitter Profile Photo

Tomorrow for FOCIL breakout #9, we will have a presentation by CPerezz.eth ⟠ 🦀 on Stateless FOCIL, focusing on the scalability and the compatibilities between CR and statelessness proposals 🔥 It's a hot topic right now, excited to dive deeper into it!

Tomorrow for FOCIL breakout #9, we will have a presentation by <a href="/CPerezz19/">CPerezz.eth ⟠ 🦀</a> on Stateless FOCIL, focusing on the scalability and the compatibilities between CR and statelessness proposals 🔥

It's a hot topic right now, excited to dive deeper into it!
Giacomo Fenzi (@giacomofenzi) 's Twitter Profile Photo

🪄✨ And for our next trick, choose a code, any code! Introducing WARP 🌀, the first linear-time accumulation scheme. Brought to you by Benedikt Bünz ☕️, Alessandro Chiesa, William and myself. 📚: ia.cr/2025/753 🧑‍💻: (soon)

🪄✨ And for our next trick, choose a code, any code!
Introducing WARP 🌀, the first linear-time accumulation scheme.
Brought to you by <a href="/benediktbuenz/">Benedikt Bünz ☕️</a>, Alessandro Chiesa, <a href="/kleptographic/">William</a> and myself.

📚: ia.cr/2025/753
🧑‍💻: (soon)
ethresearchbot (@ethresearchbot) 's Twitter Profile Photo

New post on EthResear.ch! Lattice-based signature aggregation By: - David Nevado - Dohoon Kim - Miha Stopar 🔗 ethresear.ch/t/22282 Highlights: - LaBRADOR can aggregate 10,000 Falcon signatures into a proof size of approximately 74 KB. - The proof generation

brechy.eth (@brechy_) 's Twitter Profile Photo

I agree on privacy = security, but proof of reserves can be done privately (yes, on bitcoin too). See: arxiv.org/abs/2310.13900

tcoratger (@tcoratger) 's Twitter Profile Photo

1/ 🧵 Ethereum is moving toward integrating zkEVM proofs directly into L1 consensus. A 3-phase roadmap was presented during Berlin interop by George Kadianakis, tackling proof requirements, verifier upgrades, and formal verification — all while avoiding recursive Groth16 ↓

Privacy & Scaling Explorations (@privacyscaling) 's Twitter Profile Photo

Requesting Ethereum state through third-parties can expose sensitive data and put users at risk of profiling Users should not have to choose between privacy and practicality. We believe it is important to bridge this gap Here are two recent write-ups that seek to actively help