Blockchain at Berkeley Profile picture
Student-run organization at UC Berkeley focused on blockchain innovation via education, research, and consulting. Established 2016.
Mar 8, 2025 6 tweets 6 min read
1/ One of the topics I kept hearing about in #ETHDenver was #zkTLS– and as a zk enthusiast, I (@alydotxyz) decided to do some digging to share with the rest of the world.

Transport layer security (TLS) is a cryptographic protocol used in secure communications over a computer network (i.e., credit card details, login credentials, email messaging, etc.). Before encrypted communication begins, a TLS handshake is performed between a client (a web browser) and a server. This handshake will then establish the encryption keys and security settings for the session. The protocol then requires verification of client and server identities in order to access the data.

Essentially, TLS is used to securely encrypt data across networks.

zkTLS involves zero-knowledge proofs and TLS. In its simplest form, zk proofs are used to prove something is true without revealing the sensitive data (inputs). I won't be excessively covering zkp's, but feel free to check out the resources I’ll link at the end of the thread!

@DeFiMinty has an amazing diagram which offers a comprehensive overview of zkTLS:https://x.com/DeFiMinty/status/1895892027243409519 2/ zkTLS will be quintessential in bridging off-chain Web2 data and bringing it on-chain. Combining these two technologies allows their privacy preserving properties to complement each other.

While TLS ensures secure data transmission between a client and a server, it does not provide cryptographic proof of authentication and data integrity to third parties. One common workaround is to have the client send data to an authenticated third-party website, but this approach requires sharing more data than necessary.

However, this is exactly where we can leverage zk proofs to preserve the integrity of this data. When we generate a proof, we can verify the data's integrity without revealing any additional information, which is exactly what makes zkTLS an ideal solution for securely bringing off-chain data on-chain.

Here’s a paper that i found was super helpful: eprint.iacr.org/2024/447.pdf
May 20, 2022 8 tweets 2 min read
Regulatory interest in "taming" DeFi, NFTs & crypto has exploded in the last 2 years🏇

Below we provide an overview for enthusiasts of all knowledge levels to learn about past crypto regulation + its future implications.

To learn more, see 🧵 or 👇

calblockchain.mirror.xyz/2jApCnHJElssho… 1/ Proper & consistent communication with regulators can make the crypto industry safer for users + protocols, while not stifling creativity and enabling reasonable space for crypto and DeFi to innovate 📖
Jan 12, 2022 7 tweets 5 min read
1/ Introducing Blockchain at Berkeley Grants, designed to bridge the gap between students’ unbridled potential and the resources they need to manifest their vision. 🐻

Who better to enable the next generation of builders than their own peers? 🧵⤵️

calblockchain.mirror.xyz/O6sX6CZu5R-9o_… 2/ Eliminating prominent entry-level obstacles arms student creators with the agency to translate vision into reality: Removing financial barriers, connecting projects to the ecosystem, & cultivating an innovative community empowers students to push the space forward.
Dec 21, 2021 7 tweets 2 min read
Introducing the 0 to 1 Guide for MEV by @0xmebius

MEV, (Miner/Maximal Extractable Value) can be best described as any automated interaction you can do on the blockchain that has positive expected value.

calblockchain.mirror.xyz/c56CHOu-Wow_50… 1/ MEV is one of the few corners of the blockchain with relatively fewer guides and open source information available due to its inherently competitive and technical nature. Why would you share valuable technical strategies to potential competitors who’ll eat into your profits?