Rachit (@privacy_prophet) 's Twitter Profile
Rachit

@privacy_prophet

Demon in disguise of a prophet | R&D @availproject - Deciphering complexity, one byte at a time | prev. @trylimitless @nethermindeth @harmonyprotocol

ID: 3156503185

linkhttps://linktr.ee/privacyprophet calendar_today14-04-2015 14:44:24

1,1K Tweet

940 Takipçi

517 Takip Edilen

Rachit (@privacy_prophet) 's Twitter Profile Photo

ZK Exploration is love ❣️ ZKVMs are nice to have, but arkworks is forever. ps. just a simple state machine execution proof system down here. Some bench markings underway 📷😉

ZK Exploration is love ❣️
ZKVMs are nice to have, but <a href="/arkworks_rs/">arkworks</a> is forever.

 ps. just a simple state machine execution proof system down here. Some bench markings underway 📷😉
Avail (@availproject) 's Twitter Profile Photo

𝐆𝐞𝐭 𝐫𝐞𝐚𝐝𝐲 𝐟𝐨𝐫 𝐄𝐧𝐢𝐠𝐦𝐚 𝐃𝐀 - the first encrypted DA layer by Avail & Encifher. This breakthrough upgrade to the Avail DA layer offers institutions privacy, verifiability and compliance with no trade-offs. Avail is the only solution that allows institutions to

Rachit (@privacy_prophet) 's Twitter Profile Photo

🚢🚢🚢🚢 To add on, multiple R&D pipelines ongoing solving a lot of critical deep technical problems. One of those that recently went on Devnet was a production working of Kate Multiproof verification. Rest, will share soon 😉

Rachit (@privacy_prophet) 's Twitter Profile Photo

Was looking into how Kademlia protocol works recently. Kademlia is a powerful distributed hash table (DHT) protocol designed for efficient and fault-tolerant peer-to-peer networks. At its core, it allows nodes to store and retrieve data without relying on a central server.

Was looking into how Kademlia protocol works recently.  

Kademlia is a powerful distributed hash table (DHT) protocol designed for efficient and fault-tolerant peer-to-peer networks. At its core, it allows nodes to store and retrieve data without relying on a central server.
Varun Mayya (@waitin4agi_) 's Twitter Profile Photo

So far you’ve trusted people/channels based on what everyone says about them or how famous they are. After the next few weeks you’ll have to make your own decisions on who to follow and trust and it can’t be the easy choice of whatever everyone else follows or believes. Have the

Rachit (@privacy_prophet) 's Twitter Profile Photo

The Indian Media is a big shame. These stupid outlets should be taken to court. Only few sources so far that are taking time to report but are actually putting effort in fact checking. Two of them seems be Firstpost , The DeshBhakt 🇮🇳 ( i follow these two and so far no nonsense

Rooch Network (@roochnetwork) 's Twitter Profile Photo

1/2 We’re excited to announce our partnership with Avail! Rooch has seamlessly integrated with Avail’s TurboDA, bringing us closer to our mainnet launch! With this integration, Rooch achieves near-instant pre-confirmations (~250ms) and supports up to 100,000 TPS through

1/2
We’re excited to announce our partnership with <a href="/AvailProject/">Avail</a>! Rooch has seamlessly integrated with Avail’s TurboDA, bringing us closer to our mainnet launch!

With this integration, Rooch achieves near-instant pre-confirmations (~250ms) and supports up to 100,000 TPS through
Avail (@availproject) 's Twitter Profile Photo

Rooch is now turbocharged ⚡️ By upgrading with Avail’s TurboDA, Rooch Network, the first MoveVM-based Bitcoin L2, unlocks 100,000+ TPS and sub-second pre-confirmations. Bringing high-performance execution to Bitcoin’s ecosystem, with cost-efficient DA.

Rooch is now turbocharged ⚡️

By upgrading with Avail’s TurboDA, <a href="/RoochNetwork/">Rooch Network</a>, the first MoveVM-based Bitcoin L2, unlocks 100,000+ TPS and sub-second pre-confirmations.

Bringing high-performance execution to Bitcoin’s ecosystem, with cost-efficient DA.
Rachit (@privacy_prophet) 's Twitter Profile Photo

Keccak256 is expensive to proof in a constraint system. Even so is there any known implementation of it in rust ( preferably compatible with arkworks ). I found one on circom github.com/vocdoni/keccak… and a few by polygon in there plonk system, but nothing particularly

Nitanshu (priv/acc) (@nitanshul) 's Twitter Profile Photo

There are largely two areas where you need privacy 1. Execution 2. Data For Execution privacy use Encifher coprocessor For DA privacy use Avail Enigma DA done