Discover and read the best of Twitter Threads about #cryptographic

Most recents (14)

Final day of the Training at #hardwear_io USA & the sessions are turning super exciting!

Here is a glimpse from @reivilo_t 's Training

🔬Extracting bits from Scanning Electron Microscope pictures using Fiji and python scripting +

💽Getting the binary of ROMs

#hw_ioUSA2023 Image
Day 3 at #TEEPwn Training by Cristofaro @pulsoid !

⌨️Students performing exciting hands-on exercises with TEE-specific exploitation techniques + a solid understanding of #ARM TrustZone-based TEEs

#hw_ioUSA2023 #hardwaresecurity Image
Read 3 tweets
🔒 Understanding Zero Knowledge Proofs: A thread

🤔 Have you ever wondered how you can prove you know something without revealing any information about it? This is where zero-knowledge proofs come into play!

Continue reading👇👇👇 Zero knowledge proofs
1️⃣ Zero-knowledge proofs are a type of #cryptographic protocol that allows you to prove knowledge of something without actually revealing the info itself.

This is done by using complex mathematical #algorithms to check the validity of a claim without learning about its info.
2️⃣ One common use case for zero-knowledge proofs is in password authentication.

Instead of sending your actual #password to a server, which could be intercepted by an attacker, a zero-knowledge proof can be used to prove that you know your password without revealing what it is.
Read 7 tweets
The future of the #Ethereum network is looking bright with @StarkWareLtd's cutting-edge layer-2 solutions.

Get ready to experience a more streamlined #scaling process and faster, more efficient transactions.

What is Starkware?

@StarkWareLtd is a tech company developing #cryptographic proof systems known as Zk-STARKs. They aim to be #scalable and #transparent while ensuring data integrity through hash functions.

@StarkWareLtd offers two main products: @Starknet & #StarkEx.
Introducing @Starknet - a #decentralized, permissionless layer-2 solution for the #Ethereum mainnet. It reduces load on the mainnet and improves #scalability while retaining its security features.
Read 9 tweets
Threαd of threαds α.k.α. ₿ook of αlphα 🧙‍♂️✨

- Scaling Ξthereum on rollups
- Modulαr αrchitecture (Celestiα, Eigenlαyer, +)
- Privacy tech (Aleo, Aztec, +)
- zk tech (zkSync, Stαrknet, Scroll, +)
- DotSαmα / Cosmos
- DeFi αnαlysis
- AI & Big Dαtα

Bookmark this (NFA) 📈 🚀
Cryptography - #Privacy-preserving technologies 🥷

Read 56 tweets
A #Bitcoin bed-time story 🧵😴

In a distant corner of the universe, a small group of enterprising beings had discovered the power of #cryptography & used it to create #Bitcoin, a new type of currency that could revolutionize their society.

👇 Image
As word of this new currency spread, more and more people began to adopt it. It was fast, secure, and could be used to buy and sell almost anything. And because it was based on #cryptography, it was virtually impossible to counterfeit or steal.
But with great power comes great responsibility. The creators of #bitcoin knew that they had to be careful about how they managed the currency. They created a #decentralized network of "miners" who worked to verify and validate every transaction that occurred. Image
Read 7 tweets
0/ What are Non-Interactive Zero-Knowledge Proofs (NIZKPs)? 🧙‍♂️✨

(0/10) 🧵👇
1/ First of all, what are zero knowledge proofs (ZKPs) in general?

ZKPs are a #cryptographic technique that allow individuals or entities to prove to another that a statement is true, without revealing any information beyond the validity of the statement.
2/ One variant of ZKPs are non-interactive zero-knowledge proofs (NIZKPs), which don't require interaction between the certifier and verifier.
Read 11 tweets
0/ What is the Elliptic Curve Digital Signature Algorithm (ECDSA)? 🧙‍♂️✨

(0/21) 🧵👇
1/ The Elliptic Curve Digital Signature Algorithm (ECDSA) is a digital signature scheme that is based on the algebraic structure of elliptic curves. It is widely used in many #cryptographic systems, including $ETH, $BTC, and other blockchains.
2/ In the #Ethereum blockchain, ECDSA is used to sign transactions and messages to prove the authenticity of the sender.
Read 22 tweets
#NFTs are everywhere. They are set to revolutionise industries from music to gaming and from fashion to banking.

But, WTF actually are NFTs? 🤷 Image
👨‍💻The concept of digital #cryptographic assets isn't actually that new and can be traced all the way back to 1993.

The first "modern" NFT, called Quantum, was created on the Namecoin blockchain in 2014. Image
🪨 The actual explosion in popularity came in 2017 with the release of now iconic #CryptoKitties, #EtherRocks and Punks.

These + other collections paved the way for the NFTs as we know them, but they lacked one thing - a common standard.

(EtherRocks were selling upwards of $1m) Image
Read 10 tweets

When #cryptocurrency projects distribute their native #tokens straight to their customers' wallets.

[#web3 glossary thread]

Important or insider knowledge, notably about the value of #digital assets such as #cryptocurrencies and #NFTs; a measure of an investment's return over and above that of the market or other benchmark.

[#web3 glossary thread]

Formerly used to describe any #cryptocurrency that wasn't #Bitcoin; however, #altcoin is now used to describe any new cryptocurrency with a low market valuation.

[#web3 glossary thread]
Read 102 tweets
What is Proof of Stake (PoS) ?

Our last 🧵 looked at the original Nakamoto #consensus method that uses #ProofofWork - a trusted & robust method - but very time & energy consuming.

Enter #ProofofStake
1/ With #ProofofStake validators don’t race to solve #cryptographic puzzles (also known as #mining and the main reason #ProofofWork is so energy intensive).

Instead validators #stake their own #crypto assets in order to participate in consensus.
2/ This uses much less energy and is faster - which is important for the #environment and for #applications that require speed and scalability.
Read 9 tweets
What is Proof of Work (PoW)?

Our last thread introduced the topic of #consensus mechanisms which determine how #data is added to the #blockchain

In this 🧵 we look at consensus mechanisms that use Proof of Work:
1/ A group of owls is called a Parliament.

And just as there are different ways to participate in a democracy (eg voting in a referendum vs electing a representative to decide on your behalf) - there are also different ways of participating in decision making on a #blockchain
2/ The first #blockchain developed for #bitcoin by Satoshi Nakamoto uses Nakamoto #consensus
Read 9 tweets
1/ With recent $OP #airdrop, we present #visualguide for #Ethereum Layer 2 #Rollups Solutions. Why it's needed? How does it work? and the future of #scaling in Ethereum

#DeFi #Crypto #Bitcoin #Ethereum #Arbitrum #Optimism #L222 #ZKSync $ETH Image
2/ L2 rollups work by executing transactions outside of Layer 1, #Rollups #solution has two methods, Optimistic and Zero-Knowledge.

#DeFi #Crypto #Bitcoin #Ethereum #Arbitrum #Optimism #L222 #ZKSync $OP $ETH #Airdrop Image
3/ Optimistic rollups don't do any computation by default, all transactions are legitimate. #Fraud-proof #mechanism is set as a preventive measure.

#DeFi #Crypto #Bitcoin #Ethereum #Arbitrum #Optimism #L222 #ZKSync $OP $ETH #Airdrop Image
Read 12 tweets
#Layer2 Scaling is a concept that is used in the #Ethereum communities with some believing it represents $ETH future.

What does this truly imply? 🤌🏼

How does it operate and why do we need it? 🧐

Today we will deep dive into non-custodial solutions ⬇️
1/ Over the past years, #Ethereum popularity has resulted in a massive rise in transactions and, therefore, #network traffic.

With several users competing for faster #transaction processing, a bidding war occurs, resulting in very expensive gas fees for each user.
Once new scaling solutions arise in the #blockchain space, it is always necessary to consider:

- how much they inherit #Layer1 #security and network characteristics

- if they impose stricter user requirements compared to the underlying #Layer1
Read 15 tweets
It's time for some educational fun. It is important to always keep your wallet recovery phrase secret. If anyone gets access to it they have access to your coins. With that in mind, let's have some fun!
For this first-of-its-kind global treasure hunt, the rules are simple. Guess all 12 of our riddles and recover the metamask wallet. Anyone can send it coins so keep checking to see what is inside!
Wallet address 0x1d593097Ea77d546389fbfe73c3b59cff1f84873
Day one:
"A $Pussy likes catnip, a $DOGE likes a ____"
The first answer will be confirmed in our discord once someone guesses it. Good luck! 😉

#Crypto #cryptogivaway #treasurehunt #erc20 #education #Cryptoeducation #doge #thefutureiscrypto #Pussywallet
Read 14 tweets

Related hashtags

Did Thread Reader help you today?

Support us! We are indie developers!

This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!