Profile Picture
Illya Gerasymchuk
Entrepreneur / Engineer

โฌ‡๏ธ My Thoughts โฌ‡๏ธ

User Illya Gerasymchuk -

2024-06-01 11:27

๐Ÿ” The challenge with e-commerce privacy lies in two main areas: 1๏ธโƒฃ Keeping search queries private ๐Ÿ”’ 2๏ธโƒฃ Protecting personal info like name and address ๐Ÿ™…โ€โ™‚๏ธ Traditional platforms require us to trust them with this data

User

๐Ÿ›’ E-commerce & Privacy - Myth or Reality? ๐Ÿ” ๐Ÿ’ป Online shopping without revealing your personal data? ๐Ÿš€ Zero-Knowledge Proofs (ZKP), zkLocus and Mina Protocol blockchain enable just that https://illya.sh/blog/posts/privacy-is-a-myth-without-zero-knowledge-proofs/ Here's how ๐Ÿงต๐Ÿ‘‡

๐Ÿ’ฌ
User Illya Gerasymchuk -

2024-06-01 11:26

๐Ÿ›’ E-commerce & Privacy - Myth or Reality? ๐Ÿ” ๐Ÿ’ป Online shopping without revealing your personal data? ๐Ÿš€ Zero-Knowledge Proofs (ZKP), zkLocus and Mina Protocol blockchain enable just that https://illya.sh/blog/posts/privacy-is-a-myth-without-zero-knowledge-proofs/ Here's how ๐Ÿงต๐Ÿ‘‡

๐Ÿ’ฌ
User Illya Gerasymchuk -

2024-05-30 18:57

๐Ÿ˜ณ ZKP will redefine what you know about computation and privacy ๐Ÿ“ This is what we are doing at zkLocus, by turning geolocation into a RWA ๐Ÿ”— To learn more, visit https://zklocus.dev/

User

๐Ÿช„ This is just one example of what is possible with ZeroKnowledge Proofs ๐Ÿ“š It was taken from my article "Privacy Is A Myth. Unless You're Using Zero-Knowledge Proofs" ๐Ÿ‘‡ https://illya.sh/blog/posts/privacy-is-a-myth-without-zero-knowledge-proofs/

๐Ÿ’ฌ
User Illya Gerasymchuk -

2024-05-30 18:57

๐Ÿช„ This is just one example of what is possible with ZeroKnowledge Proofs ๐Ÿ“š It was taken from my article "Privacy Is A Myth. Unless You're Using Zero-Knowledge Proofs" ๐Ÿ‘‡ https://illya.sh/blog/posts/privacy-is-a-myth-without-zero-knowledge-proofs/

User

๐Ÿšจ By using Mina Protocol as a public layer for computation proofs, we create an auditable & transparent system ๐Ÿ•ต๏ธโ€โ™€๏ธ Anyone can verify that the cameras are operating as promised, without misusing the video data ๐Ÿ”

๐Ÿ’ฌ
User Illya Gerasymchuk -

2024-05-30 18:57

๐Ÿšจ By using Mina Protocol as a public layer for computation proofs, we create an auditable & transparent system ๐Ÿ•ต๏ธโ€โ™€๏ธ Anyone can verify that the cameras are operating as promised, without misusing the video data ๐Ÿ”

User

๐Ÿ“‹ Here's how Mina Protocol blockchain fits into the picture: 1๏ธโƒฃ zkSNARK circuits verifying camera code execution are stored on Mina 2๏ธโƒฃ Commitments & ZKP circuits to the zkML model are also stored on the blockchain 3๏ธโƒฃ All proofs from cameras are submitted & verified against them

๐Ÿ’ฌ
User Illya Gerasymchuk -

2024-05-30 18:57

๐Ÿ“‹ Here's how Mina Protocol blockchain fits into the picture: 1๏ธโƒฃ zkSNARK circuits verifying camera code execution are stored on Mina 2๏ธโƒฃ Commitments & ZKP circuits to the zkML model are also stored on the blockchain 3๏ธโƒฃ All proofs from cameras are submitted & verified against them

User

๐ŸŸฃ Mina Protocol can implement the foundational layer ๐Ÿš€ Verification keys that attest to the correct execution of the camera's code can be stored on $MINA ๐Ÿ”‘ In practice, this involves commitments and ZKP circuits to the zkML model, thus ensuring the right one is used ๐Ÿง 

๐Ÿ’ฌ
User Illya Gerasymchuk -

2024-05-30 18:57

๐ŸŸฃ Mina Protocol can implement the foundational layer ๐Ÿš€ Verification keys that attest to the correct execution of the camera's code can be stored on $MINA ๐Ÿ”‘ In practice, this involves commitments and ZKP circuits to the zkML model, thus ensuring the right one is used ๐Ÿง 

User

๐Ÿ” zkSNARKs/zkSTARKs can be used to create ZK proofs that attest to the correct execution of the camera's code ๐Ÿ“ธ ๐Ÿ‘ฎโ€โ™€๏ธ These proofs, representing an observation of a computation, ensure that non-suspicious video is discarded, thus preserving privacy ๐Ÿ‘‰ Do not trust, verify ๐Ÿ‘ˆ

๐Ÿ’ฌ
User Illya Gerasymchuk -

2024-05-30 18:57

๐Ÿ” zkSNARKs/zkSTARKs can be used to create ZK proofs that attest to the correct execution of the camera's code ๐Ÿ“ธ ๐Ÿ‘ฎโ€โ™€๏ธ These proofs, representing an observation of a computation, ensure that non-suspicious video is discarded, thus preserving privacy ๐Ÿ‘‰ Do not trust, verify ๐Ÿ‘ˆ

User

๐Ÿงฉ Here's how a ZKP-powered surveillance system works: 1๏ธโƒฃ Cameras feed live video into a zkML model 2๏ธโƒฃ The model labels data as "suspicious" or "non-suspicious" 3๏ธโƒฃ Only "suspicious" footage is stored & reported 4๏ธโƒฃ The zkML model is public, ensuring transparency

๐Ÿ’ฌ
User Illya Gerasymchuk -

2024-05-30 18:57

๐Ÿงฉ Here's how a ZKP-powered surveillance system works: 1๏ธโƒฃ Cameras feed live video into a zkML model 2๏ธโƒฃ The model labels data as "suspicious" or "non-suspicious" 3๏ธโƒฃ Only "suspicious" footage is stored & reported 4๏ธโƒฃ The zkML model is public, ensuring transparency

User

๐Ÿ” The key lies in the verifiable computation model of Zero-Knowledge Proofs ๐Ÿ”‘ Instead of trusting third-parties not to misuse data, we rely on cryptographic proofs to ensure privacy ๐Ÿ’ช It's not about faith, but rather mathematical certainty ๐Ÿงฎ ๐Ÿ”— https://illya.sh/blog/posts/zksnark-zkstark-verifiable-computation-model-blockchain/

๐Ÿ’ฌ
User Illya Gerasymchuk -

2024-05-30 18:57

๐Ÿ” The key lies in the verifiable computation model of Zero-Knowledge Proofs ๐Ÿ”‘ Instead of trusting third-parties not to misuse data, we rely on cryptographic proofs to ensure privacy ๐Ÿ’ช It's not about faith, but rather mathematical certainty ๐Ÿงฎ ๐Ÿ”— https://illya.sh/blog/posts/zksnark-zkstark-verifiable-computation-model-blockchain/

User

๐Ÿ“น Imagine a global network of video cameras, monitoring every corner, every alley, even inside your home ๐Ÿ  Sounds like a privacy nightmare, right? ๐Ÿ˜จ Not necessarily! ๐Ÿ˜ฎ With ZKP, we can mathematically guarantee that private data is never stored or shared! ๐Ÿ”

๐Ÿ’ฌ
User Illya Gerasymchuk -

2024-05-30 18:57

๐Ÿ“น Imagine a global network of video cameras, monitoring every corner, every alley, even inside your home ๐Ÿ  Sounds like a privacy nightmare, right? ๐Ÿ˜จ Not necessarily! ๐Ÿ˜ฎ With ZKP, we can mathematically guarantee that private data is never stored or shared! ๐Ÿ”

User

๐ŸŒ Imagine 24/7 global video surveillance that doesn't compromise privacy ๐Ÿคฏ Sounds impossible? ๐Ÿ˜Ž Zero-Knowledge Proofs disagree Here's why ๐Ÿงต๐Ÿ‘‡

Quoted Thought Image
๐Ÿ’ฌ
User Illya Gerasymchuk -

2024-05-30 18:57

๐ŸŒ Imagine 24/7 global video surveillance that doesn't compromise privacy ๐Ÿคฏ Sounds impossible? ๐Ÿ˜Ž Zero-Knowledge Proofs disagree Here's why ๐Ÿงต๐Ÿ‘‡

Thought Image
๐Ÿ’ฌ
User Illya Gerasymchuk -

2024-05-27 14:13

Linguistic vocal communication is such a wild concept ๐Ÿคฏ Like, I can take an abstract concept that I have in my mind, transform it into vibrations, transmit it wirelessly over air and have another individual parse it back into a similar abstract concept, now in their mind

๐Ÿ’ฌ
User Illya Gerasymchuk -

2024-05-26 13:02

๐Ÿ‘‰ Learn more about ZKPs & privacy: - zkLocus: https://zklocus.dev/ - zkSafeZones: https://zklocus.dev/zkSafeZones/ - Full article: https://illya.sh/blog/posts/privacy-is-a-myth-without-zero-knowledge-proofs/ Let's make privacy the default, not an afterthought ๐ŸŒŸ

User

๐Ÿ—ฃ๏ธ Privacy is a fundamental human right, and digital privacy is not an exception ๐Ÿ“œ With Mina Protocol blockchain and ZKP solutions like zkLocus, we can build a future where privacy is the default ๐Ÿ™Œ As the Web3 community, this is our mission & responsibility ๐Ÿ’ช

Quoted Thought Image
๐Ÿ’ฌ
User Illya Gerasymchuk -

2024-05-26 13:01

๐Ÿ—ฃ๏ธ Privacy is a fundamental human right, and digital privacy is not an exception ๐Ÿ“œ With Mina Protocol blockchain and ZKP solutions like zkLocus, we can build a future where privacy is the default ๐Ÿ™Œ As the Web3 community, this is our mission & responsibility ๐Ÿ’ช

Thought Image
User

๐Ÿ“น Even 24/7 global video surveillance can be privacy-preserving with ZKP! ๐ŸŒ By combining zkML and verifiable computation, cameras can detect suspicious activity without storing private data ๐Ÿ•ต๏ธโ€โ™€๏ธ No, it's not magic. It's mathematics ๐Ÿ”

๐Ÿ’ฌ
User Illya Gerasymchuk -

2024-05-26 13:01

๐Ÿ“น Even 24/7 global video surveillance can be privacy-preserving with ZKP! ๐ŸŒ By combining zkML and verifiable computation, cameras can detect suspicious activity without storing private data ๐Ÿ•ต๏ธโ€โ™€๏ธ No, it's not magic. It's mathematics ๐Ÿ”

User

๐Ÿ” Imagine a search engine that never sees your raw queries, or a social network that keeps your connections hidden ๐Ÿ˜ฒ With ZKP, it's not just possible, but practical! ๐ŸŽ‰ zkLocus, powered by Mina Protocol blockchain, is turning private geolocation into reality ๐Ÿ“

Quoted Thought Image
๐Ÿ’ฌ
User Illya Gerasymchuk -

2024-05-26 13:01

๐Ÿ” Imagine a search engine that never sees your raw queries, or a social network that keeps your connections hidden ๐Ÿ˜ฒ With ZKP, it's not just possible, but practical! ๐ŸŽ‰ zkLocus, powered by Mina Protocol blockchain, is turning private geolocation into reality ๐Ÿ“

Thought Image
User

๐ŸŒ With ZKPs, we can build privacy-preserving: ๐Ÿ—๏ธ - Search engines ๐Ÿ” - Social networks ๐Ÿ‘ฅ - E-commerce platforms ๐Ÿ›’ - Even 24/7 global video surveillance! ๐Ÿ“น All without compromising functionality, business or individual privacy ๐Ÿ’ช

๐Ÿ’ฌ
User Illya Gerasymchuk -

2024-05-26 13:01

๐ŸŒ With ZKPs, we can build privacy-preserving: ๐Ÿ—๏ธ - Search engines ๐Ÿ” - Social networks ๐Ÿ‘ฅ - E-commerce platforms ๐Ÿ›’ - Even 24/7 global video surveillance! ๐Ÿ“น All without compromising functionality, business or individual privacy ๐Ÿ’ช

User

๐Ÿ” ZKPs remove the need to trust third parties for privacy. ๐Ÿ™…โ€โ™‚๏ธ Instead, we rely on mathematical guarantees ๐Ÿงฎ This allows us to retain full custody & control over our data while enjoying digital services ๐Ÿ˜Œ

๐Ÿ’ฌ
User Illya Gerasymchuk -

2024-05-26 13:01

๐Ÿ” ZKPs remove the need to trust third parties for privacy. ๐Ÿ™…โ€โ™‚๏ธ Instead, we rely on mathematical guarantees ๐Ÿงฎ This allows us to retain full custody & control over our data while enjoying digital services ๐Ÿ˜Œ

User

๐ŸŒฟ Merkle Trees, MPC, and homomorphic encryption complement ZKPs. ๐Ÿƒ - Merkle Trees: Efficient & private data storage ๐Ÿ“š - MPC: Secure multi-party computation ๐Ÿค - Homomorphic Encryption: Computation on encrypted data ๐Ÿ”’

๐Ÿ’ฌ
User Illya Gerasymchuk -

2024-05-26 13:01

๐ŸŒฟ Merkle Trees, MPC, and homomorphic encryption complement ZKPs. ๐Ÿƒ - Merkle Trees: Efficient & private data storage ๐Ÿ“š - MPC: Secure multi-party computation ๐Ÿค - Homomorphic Encryption: Computation on encrypted data ๐Ÿ”’

User

๐Ÿ” How does Mina Protocol blockchain fit into this? ๐Ÿค” $MINA serves as the foundation for ZKP apps, thanks to its programmable zkApps ๐Ÿš€ It uses recursive zkSNARKs to create proofs of arbitrary computations, thus serving as the foundation of privacy solutions ๐Ÿ’ช It's proof of everything

๐Ÿ’ฌ
User Illya Gerasymchuk -

2024-05-26 13:01

๐Ÿ” How does Mina Protocol blockchain fit into this? ๐Ÿค” $MINA serves as the foundation for ZKP apps, thanks to its programmable zkApps ๐Ÿš€ It uses recursive zkSNARKs to create proofs of arbitrary computations, thus serving as the foundation of privacy solutions ๐Ÿ’ช It's proof of everything

User

๐Ÿ” Solutions like zkLocus, zkSafeZones, zkML, and zkVM leverage ZKPs for privacy๐Ÿ›ก๏ธ - zkLocus: Private geolocation sharing on Mina Protocol blockchain ๐Ÿ“ - zkSafeZones: Civilian protection in warzones ๐Ÿฅ - zkML: Private machine learning ๐Ÿค– - zkVM: Verifiable computation ๐Ÿ’ป

๐Ÿ’ฌ
User Illya Gerasymchuk -

2024-05-26 13:01

๐Ÿ” Solutions like zkLocus, zkSafeZones, zkML, and zkVM leverage ZKPs for privacy๐Ÿ›ก๏ธ - zkLocus: Private geolocation sharing on Mina Protocol blockchain ๐Ÿ“ - zkSafeZones: Civilian protection in warzones ๐Ÿฅ - zkML: Private machine learning ๐Ÿค– - zkVM: Verifiable computation ๐Ÿ’ป

User

๐Ÿ’ก Zero-Knowledge Proofs fix digital privacy ๐ŸŒ… Instead of protecting sensitive data after sharing, ZKPs enable sharing data in an inherently private manner ๐Ÿ” By turning data into computation, ZKPs abstract it to preserve privacy ๐Ÿงฉ

Quoted Thought Image
๐Ÿ’ฌ
User Illya Gerasymchuk -

2024-05-26 13:01

๐Ÿ’ก Zero-Knowledge Proofs fix digital privacy ๐ŸŒ… Instead of protecting sensitive data after sharing, ZKPs enable sharing data in an inherently private manner ๐Ÿ” By turning data into computation, ZKPs abstract it to preserve privacy ๐Ÿงฉ

Thought Image
User

๐Ÿ’ก The problem with digital privacy lies not in how data is stored & shared, but what data is shared ๐Ÿค” Even with encryption, once sensitive data leaves your device, it's compromised ๐Ÿ˜ฑ But what if we could share data in an inherently private manner? ๐Ÿคฏ

Quoted Thought Image
๐Ÿ’ฌ
User Illya Gerasymchuk -

2024-05-26 13:01

๐Ÿ’ก The problem with digital privacy lies not in how data is stored & shared, but what data is shared ๐Ÿค” Even with encryption, once sensitive data leaves your device, it's compromised ๐Ÿ˜ฑ But what if we could share data in an inherently private manner? ๐Ÿคฏ

Thought Image
User

๐Ÿšจ PRIVACY IS A MYTH! ๐Ÿ•ต๏ธโ€โ™‚๏ธ Digital privacy is fundamentally unfeasible, unless we rely on verifiable computation constructs like Zero-Knowledge Proofs (ZKP) ๐Ÿ” A thread ๐Ÿงต on why ZKPs are the key to true digital privacy ๐Ÿ‘‡ https://illya.sh/blog/posts/privacy-is-a-myth-without-zero-knowledge-proofs/ Privacy ZeroKnowledge Web3

๐Ÿ’ฌ
User Illya Gerasymchuk -

2024-05-26 13:01

๐Ÿšจ PRIVACY IS A MYTH! ๐Ÿ•ต๏ธโ€โ™‚๏ธ Digital privacy is fundamentally unfeasible, unless we rely on verifiable computation constructs like Zero-Knowledge Proofs (ZKP) ๐Ÿ” A thread ๐Ÿงต on why ZKPs are the key to true digital privacy ๐Ÿ‘‡ https://illya.sh/blog/posts/privacy-is-a-myth-without-zero-knowledge-proofs/ Privacy ZeroKnowledge Web3

๐Ÿ’ฌ