Lukas Helminger (@luhelminger) 's Twitter Profile
Lukas Helminger

@luhelminger

CEO @TACEO_IO // Prev. cryptography researcher @tugraz

ID: 1247139653595140096

calendar_today06-04-2020 12:31:37

1,1K Tweet

1,1K Followers

722 Following

Lukas Helminger (@luhelminger) 's Twitter Profile Photo

For too long, people acted like anything other than client-side proving was a privacy disaster. That belief has held the zk app space back for years. I'm all in for client-side proving if you can make it seamless. That means no noticeable latency, no massive downloads, and no

Lukas Helminger (@luhelminger) 's Twitter Profile Photo

Privacy pragmatism is what the space lacked for too long. A lot of builders were discouraged by not being able to deliver the holy grail for onchain privacy. Take MPC. It’s needed for private shared state (if you don’t want to rely solely on TEEs). But because MPC has a trust

Lukas Helminger (@luhelminger) 's Twitter Profile Photo

Lookup tables are such an important building block in zk today. They can also be used in MPC and especially at the intersection of zk and mpc (coSNARKs)

Lukas Helminger (@luhelminger) 's Twitter Profile Photo

honoured to speak at NoirCon 2 in Berlin there’s no better place to share our vision for private shared state, the missing layer for Ethereum apps and how we’re building it with coSNARKs and Noir

Lukas Helminger (@luhelminger) 's Twitter Profile Photo

The recent a16z crypto podcast on World runs over two hours. And it’s worth it (congrats to Adrian, Remco, and Eddy). It’s probably the most in-depth conversation yet on what it takes to build a global proof-of-human system in a world shaped by AI. A central theme is

Lukas Helminger (@luhelminger) 's Twitter Profile Photo

MPC networks are the best known way to store, access, and compute on sensitive data when local only isn’t an option. If know a better way, I’m all ears

Lukas Helminger (@luhelminger) 's Twitter Profile Photo

coSNARKs research papers are not plentiful but they nearly always hit top tier academic conferences. Congrats to the authors eprint.iacr.org/2025/1026

Lukas Helminger (@luhelminger) 's Twitter Profile Photo

This number are getting insane. Scalability of the infra here has another meaning here. Remember all of the new users are using zk an mpc system in addition to public chains

Lukas Helminger (@luhelminger) 's Twitter Profile Photo

There’s a missing layer on the internet: confidential compute. We’re looking for people who want to architect it or tell its story. Your work would touch 10M+ users from day one. If that sounds like your thing, reach out. DMs open.

Lukas Helminger (@luhelminger) 's Twitter Profile Photo

Fully agree with the conclusion. Hard disagree with the premise. If blockchains do not give you strong verifiability, why bother using them? Verifiable (encrypted) compute is not a nice to have. It is what would let blockchains actually improve the networks we rely on today.

Lukas Helminger (@luhelminger) 's Twitter Profile Photo

I keep coming back to this question about AI privacy and memory. The current answers don’t add up. Many people say AI should run locally for privacy. Makes sense — until you think about memory and context. If long-term memory becomes key (and I think it will), how would “local

Lukas Helminger (@luhelminger) 's Twitter Profile Photo

DEX. Poker. Dating apps. What do they have in common? You have to share your data. Often with an operator or even with the public. MPC and ZK can change that. We built coNoir on Noir to help. IRL workshop below

ais (@aisconnolly) 's Twitter Profile Photo

Some people are asking what I mean by special. Leading marketing in deep-tech is a broad and technical role, and special is a broad term. They can mean almost anything, but in brief, being successful here probably means that you're really really ~into something. Suppose your

Ingonyama (@ingo_zk) 's Twitter Profile Photo

What are Co-SNARKs, and why do they matter? Lukas G of TACEO breaks down the concept of Co-SNARKs—generating SNARKs collaboratively inside an MPC protocol. This approach preserves privacy, improves performance, and unlocks powerful new architectures like private proof