Profile Picture
Illya Gerasymchuk
Entrepreneur / Engineer

โฌ‡๏ธ My Thoughts โฌ‡๏ธ

User Illya Gerasymchuk -

2024-06-01 11:27

๐Ÿ” The challenge with e-commerce privacy lies in two main areas:

1๏ธโƒฃ Keeping search queries private ๐Ÿ”’
2๏ธโƒฃ Protecting personal info like name and address ๐Ÿ™…โ€โ™‚๏ธ

Traditional platforms require us to trust them with this data

User

๐Ÿ›’ E-commerce & Privacy - Myth or Reality? ๐Ÿ”

๐Ÿ’ป Online shopping without revealing your personal data?

๐Ÿš€ Zero-Knowledge Proofs (ZKP), zkLocus and Mina Protocol blockchain enable just that

https://illya.sh/blog/posts/privacy-is-a-myth-without-zero-knowledge-proofs/

Here's how ๐Ÿงต๐Ÿ‘‡

User Illya Gerasymchuk -

2024-06-01 11:26

๐Ÿ›’ E-commerce & Privacy - Myth or Reality? ๐Ÿ”

๐Ÿ’ป Online shopping without revealing your personal data?

๐Ÿš€ Zero-Knowledge Proofs (ZKP), zkLocus and Mina Protocol blockchain enable just that

https://illya.sh/blog/posts/privacy-is-a-myth-without-zero-knowledge-proofs/

Here's how ๐Ÿงต๐Ÿ‘‡

User Illya Gerasymchuk -

2024-05-30 18:57

๐Ÿ˜ณ ZKP will redefine what you know about computation and privacy

๐Ÿ“ This is what we are doing at zkLocus, by turning geolocation into a RWA

๐Ÿ”— To learn more, visit https://zklocus.dev/

User

๐Ÿช„ This is just one example of what is possible with ZeroKnowledge Proofs

๐Ÿ“š It was taken from my article "Privacy Is A Myth. Unless You're Using Zero-Knowledge Proofs" ๐Ÿ‘‡

https://illya.sh/blog/posts/privacy-is-a-myth-without-zero-knowledge-proofs/

User Illya Gerasymchuk -

2024-05-30 18:57

๐Ÿช„ This is just one example of what is possible with ZeroKnowledge Proofs

๐Ÿ“š It was taken from my article "Privacy Is A Myth. Unless You're Using Zero-Knowledge Proofs" ๐Ÿ‘‡

https://illya.sh/blog/posts/privacy-is-a-myth-without-zero-knowledge-proofs/

User

๐Ÿšจ By using Mina Protocol as a public layer for computation proofs, we create an auditable & transparent system ๐Ÿ•ต๏ธโ€โ™€๏ธ

Anyone can verify that the cameras are operating as promised, without misusing the video data ๐Ÿ”

User Illya Gerasymchuk -

2024-05-30 18:57

๐Ÿšจ By using Mina Protocol as a public layer for computation proofs, we create an auditable & transparent system ๐Ÿ•ต๏ธโ€โ™€๏ธ

Anyone can verify that the cameras are operating as promised, without misusing the video data ๐Ÿ”

User

๐Ÿ“‹ Here's how Mina Protocol blockchain fits into the picture:

1๏ธโƒฃ zkSNARK circuits verifying camera code execution are stored on Mina
2๏ธโƒฃ Commitments & ZKP circuits to the zkML model are also stored on the blockchain
3๏ธโƒฃ All proofs from cameras are submitted & verified against them

User Illya Gerasymchuk -

2024-05-30 18:57

๐Ÿ“‹ Here's how Mina Protocol blockchain fits into the picture:

1๏ธโƒฃ zkSNARK circuits verifying camera code execution are stored on Mina
2๏ธโƒฃ Commitments & ZKP circuits to the zkML model are also stored on the blockchain
3๏ธโƒฃ All proofs from cameras are submitted & verified against them

User

๐ŸŸฃ Mina Protocol can implement the foundational layer ๐Ÿš€

Verification keys that attest to the correct execution of the camera's code can be stored on $MINA ๐Ÿ”‘

In practice, this involves commitments and ZKP circuits to the zkML model, thus ensuring the right one is used ๐Ÿง 

User Illya Gerasymchuk -

2024-05-30 18:57

๐ŸŸฃ Mina Protocol can implement the foundational layer ๐Ÿš€

Verification keys that attest to the correct execution of the camera's code can be stored on $MINA ๐Ÿ”‘

In practice, this involves commitments and ZKP circuits to the zkML model, thus ensuring the right one is used ๐Ÿง 

User

๐Ÿ” zkSNARKs/zkSTARKs can be used to create ZK proofs that attest to the correct execution of the camera's code ๐Ÿ“ธ

๐Ÿ‘ฎโ€โ™€๏ธ These proofs, representing an observation of a computation, ensure that non-suspicious video is discarded, thus preserving privacy

๐Ÿ‘‰ Do not trust, verify ๐Ÿ‘ˆ

User Illya Gerasymchuk -

2024-05-30 18:57

๐Ÿ” zkSNARKs/zkSTARKs can be used to create ZK proofs that attest to the correct execution of the camera's code ๐Ÿ“ธ

๐Ÿ‘ฎโ€โ™€๏ธ These proofs, representing an observation of a computation, ensure that non-suspicious video is discarded, thus preserving privacy

๐Ÿ‘‰ Do not trust, verify ๐Ÿ‘ˆ

User

๐Ÿงฉ Here's how a ZKP-powered surveillance system works:

1๏ธโƒฃ Cameras feed live video into a zkML model
2๏ธโƒฃ The model labels data as "suspicious" or "non-suspicious"
3๏ธโƒฃ Only "suspicious" footage is stored & reported
4๏ธโƒฃ The zkML model is public, ensuring transparency

User Illya Gerasymchuk -

2024-05-30 18:57

๐Ÿงฉ Here's how a ZKP-powered surveillance system works:

1๏ธโƒฃ Cameras feed live video into a zkML model
2๏ธโƒฃ The model labels data as "suspicious" or "non-suspicious"
3๏ธโƒฃ Only "suspicious" footage is stored & reported
4๏ธโƒฃ The zkML model is public, ensuring transparency

User

๐Ÿ” The key lies in the verifiable computation model of Zero-Knowledge Proofs ๐Ÿ”‘

Instead of trusting third-parties not to misuse data, we rely on cryptographic proofs to ensure privacy ๐Ÿ’ช

It's not about faith, but rather mathematical certainty ๐Ÿงฎ

๐Ÿ”— https://illya.sh/blog/posts/zksnark-zkstark-verifiable-computation-model-blockchain/

User Illya Gerasymchuk -

2024-05-30 18:57

๐Ÿ” The key lies in the verifiable computation model of Zero-Knowledge Proofs ๐Ÿ”‘

Instead of trusting third-parties not to misuse data, we rely on cryptographic proofs to ensure privacy ๐Ÿ’ช

It's not about faith, but rather mathematical certainty ๐Ÿงฎ

๐Ÿ”— https://illya.sh/blog/posts/zksnark-zkstark-verifiable-computation-model-blockchain/

User

๐Ÿ“น Imagine a global network of video cameras, monitoring every corner, every alley, even inside your home ๐Ÿ 

Sounds like a privacy nightmare, right? ๐Ÿ˜จ

Not necessarily! ๐Ÿ˜ฎ

With ZKP, we can mathematically guarantee that private data is never stored or shared! ๐Ÿ”

User Illya Gerasymchuk -

2024-05-30 18:57

๐Ÿ“น Imagine a global network of video cameras, monitoring every corner, every alley, even inside your home ๐Ÿ 

Sounds like a privacy nightmare, right? ๐Ÿ˜จ

Not necessarily! ๐Ÿ˜ฎ

With ZKP, we can mathematically guarantee that private data is never stored or shared! ๐Ÿ”

User

๐ŸŒ Imagine 24/7 global video surveillance that doesn't compromise privacy

๐Ÿคฏ Sounds impossible?

๐Ÿ˜Ž Zero-Knowledge Proofs disagree

Here's why ๐Ÿงต๐Ÿ‘‡

Quoted Thought Image
User Illya Gerasymchuk -

2024-05-30 18:57

๐ŸŒ Imagine 24/7 global video surveillance that doesn't compromise privacy

๐Ÿคฏ Sounds impossible?

๐Ÿ˜Ž Zero-Knowledge Proofs disagree

Here's why ๐Ÿงต๐Ÿ‘‡

Thought Image
User Illya Gerasymchuk -

2024-05-27 14:13

Linguistic vocal communication is such a wild concept ๐Ÿคฏ

Like, I can take an abstract concept that I have in my mind, transform it into vibrations, transmit it wirelessly over air and have another individual parse it back into a similar abstract concept, now in their mind

๐Ÿ’ฌ
User Illya Gerasymchuk -

2024-05-26 13:02

๐Ÿ‘‰ Learn more about ZKPs & privacy:

- zkLocus: https://zklocus.dev/
- zkSafeZones: https://zklocus.dev/zkSafeZones/
- Full article: https://illya.sh/blog/posts/privacy-is-a-myth-without-zero-knowledge-proofs/

Let's make privacy the default, not an afterthought ๐ŸŒŸ

User

๐Ÿ—ฃ๏ธ Privacy is a fundamental human right, and digital privacy is not an exception ๐Ÿ“œ

With Mina Protocol blockchain and ZKP solutions like zkLocus, we can build a future where privacy is the default ๐Ÿ™Œ

As the Web3 community, this is our mission & responsibility ๐Ÿ’ช

Quoted Thought Image
User Illya Gerasymchuk -

2024-05-26 13:01

๐Ÿ—ฃ๏ธ Privacy is a fundamental human right, and digital privacy is not an exception ๐Ÿ“œ

With Mina Protocol blockchain and ZKP solutions like zkLocus, we can build a future where privacy is the default ๐Ÿ™Œ

As the Web3 community, this is our mission & responsibility ๐Ÿ’ช

Thought Image
User

๐Ÿ“น Even 24/7 global video surveillance can be privacy-preserving with ZKP! ๐ŸŒ

By combining zkML and verifiable computation, cameras can detect suspicious activity without storing private data ๐Ÿ•ต๏ธโ€โ™€๏ธ

No, it's not magic. It's mathematics ๐Ÿ”

User Illya Gerasymchuk -

2024-05-26 13:01

๐Ÿ“น Even 24/7 global video surveillance can be privacy-preserving with ZKP! ๐ŸŒ

By combining zkML and verifiable computation, cameras can detect suspicious activity without storing private data ๐Ÿ•ต๏ธโ€โ™€๏ธ

No, it's not magic. It's mathematics ๐Ÿ”

User

๐Ÿ” Imagine a search engine that never sees your raw queries, or a social network that keeps your connections hidden ๐Ÿ˜ฒ

With ZKP, it's not just possible, but practical! ๐ŸŽ‰

zkLocus, powered by Mina Protocol blockchain, is turning private geolocation into reality ๐Ÿ“

Quoted Thought Image
User Illya Gerasymchuk -

2024-05-26 13:01

๐Ÿ” Imagine a search engine that never sees your raw queries, or a social network that keeps your connections hidden ๐Ÿ˜ฒ

With ZKP, it's not just possible, but practical! ๐ŸŽ‰

zkLocus, powered by Mina Protocol blockchain, is turning private geolocation into reality ๐Ÿ“

Thought Image
User

๐ŸŒ With ZKPs, we can build privacy-preserving: ๐Ÿ—๏ธ

- Search engines ๐Ÿ”
- Social networks ๐Ÿ‘ฅ
- E-commerce platforms ๐Ÿ›’
- Even 24/7 global video surveillance! ๐Ÿ“น

All without compromising functionality, business or individual privacy ๐Ÿ’ช

User Illya Gerasymchuk -

2024-05-26 13:01

๐ŸŒ With ZKPs, we can build privacy-preserving: ๐Ÿ—๏ธ

- Search engines ๐Ÿ”
- Social networks ๐Ÿ‘ฅ
- E-commerce platforms ๐Ÿ›’
- Even 24/7 global video surveillance! ๐Ÿ“น

All without compromising functionality, business or individual privacy ๐Ÿ’ช

User

๐Ÿ” ZKPs remove the need to trust third parties for privacy. ๐Ÿ™…โ€โ™‚๏ธ

Instead, we rely on mathematical guarantees ๐Ÿงฎ

This allows us to retain full custody & control over our data while enjoying digital services ๐Ÿ˜Œ

User Illya Gerasymchuk -

2024-05-26 13:01

๐Ÿ” ZKPs remove the need to trust third parties for privacy. ๐Ÿ™…โ€โ™‚๏ธ

Instead, we rely on mathematical guarantees ๐Ÿงฎ

This allows us to retain full custody & control over our data while enjoying digital services ๐Ÿ˜Œ

User

๐ŸŒฟ Merkle Trees, MPC, and homomorphic encryption complement ZKPs. ๐Ÿƒ

- Merkle Trees: Efficient & private data storage ๐Ÿ“š
- MPC: Secure multi-party computation ๐Ÿค
- Homomorphic Encryption: Computation on encrypted data ๐Ÿ”’

User Illya Gerasymchuk -

2024-05-26 13:01

๐ŸŒฟ Merkle Trees, MPC, and homomorphic encryption complement ZKPs. ๐Ÿƒ

- Merkle Trees: Efficient & private data storage ๐Ÿ“š
- MPC: Secure multi-party computation ๐Ÿค
- Homomorphic Encryption: Computation on encrypted data ๐Ÿ”’

User

๐Ÿ” How does Mina Protocol blockchain fit into this? ๐Ÿค”

$MINA serves as the foundation for ZKP apps, thanks to its programmable zkApps ๐Ÿš€

It uses recursive zkSNARKs to create proofs of arbitrary computations, thus serving as the foundation of privacy solutions ๐Ÿ’ช

It's proof of everything

User Illya Gerasymchuk -

2024-05-26 13:01

๐Ÿ” How does Mina Protocol blockchain fit into this? ๐Ÿค”

$MINA serves as the foundation for ZKP apps, thanks to its programmable zkApps ๐Ÿš€

It uses recursive zkSNARKs to create proofs of arbitrary computations, thus serving as the foundation of privacy solutions ๐Ÿ’ช

It's proof of everything

User

๐Ÿ” Solutions like zkLocus, zkSafeZones, zkML, and zkVM leverage ZKPs for privacy๐Ÿ›ก๏ธ

- zkLocus: Private geolocation sharing on Mina Protocol blockchain ๐Ÿ“
- zkSafeZones: Civilian protection in warzones ๐Ÿฅ
- zkML: Private machine learning ๐Ÿค–
- zkVM: Verifiable computation ๐Ÿ’ป

User Illya Gerasymchuk -

2024-05-26 13:01

๐Ÿ” Solutions like zkLocus, zkSafeZones, zkML, and zkVM leverage ZKPs for privacy๐Ÿ›ก๏ธ

- zkLocus: Private geolocation sharing on Mina Protocol blockchain ๐Ÿ“
- zkSafeZones: Civilian protection in warzones ๐Ÿฅ
- zkML: Private machine learning ๐Ÿค–
- zkVM: Verifiable computation ๐Ÿ’ป

User

๐Ÿ’ก Zero-Knowledge Proofs fix digital privacy ๐ŸŒ…

Instead of protecting sensitive data after sharing, ZKPs enable sharing data in an inherently private manner ๐Ÿ”

By turning data into computation, ZKPs abstract it to preserve privacy ๐Ÿงฉ

Quoted Thought Image
User Illya Gerasymchuk -

2024-05-26 13:01

๐Ÿ’ก Zero-Knowledge Proofs fix digital privacy ๐ŸŒ…

Instead of protecting sensitive data after sharing, ZKPs enable sharing data in an inherently private manner ๐Ÿ”

By turning data into computation, ZKPs abstract it to preserve privacy ๐Ÿงฉ

Thought Image
User

๐Ÿ’ก The problem with digital privacy lies not in how data is stored & shared, but what data is shared ๐Ÿค”

Even with encryption, once sensitive data leaves your device, it's compromised ๐Ÿ˜ฑ

But what if we could share data in an inherently private manner? ๐Ÿคฏ

Quoted Thought Image
User Illya Gerasymchuk -

2024-05-26 13:01

๐Ÿ’ก The problem with digital privacy lies not in how data is stored & shared, but what data is shared ๐Ÿค”

Even with encryption, once sensitive data leaves your device, it's compromised ๐Ÿ˜ฑ

But what if we could share data in an inherently private manner? ๐Ÿคฏ

Thought Image
User

๐Ÿšจ PRIVACY IS A MYTH! ๐Ÿ•ต๏ธโ€โ™‚๏ธ

Digital privacy is fundamentally unfeasible, unless we rely on verifiable computation constructs like Zero-Knowledge Proofs (ZKP) ๐Ÿ”

A thread ๐Ÿงต on why ZKPs are the key to true digital privacy ๐Ÿ‘‡

https://illya.sh/blog/posts/privacy-is-a-myth-without-zero-knowledge-proofs/

Privacy ZeroKnowledge Web3

User Illya Gerasymchuk -

2024-05-26 13:01

๐Ÿšจ PRIVACY IS A MYTH! ๐Ÿ•ต๏ธโ€โ™‚๏ธ

Digital privacy is fundamentally unfeasible, unless we rely on verifiable computation constructs like Zero-Knowledge Proofs (ZKP) ๐Ÿ”

A thread ๐Ÿงต on why ZKPs are the key to true digital privacy ๐Ÿ‘‡

https://illya.sh/blog/posts/privacy-is-a-myth-without-zero-knowledge-proofs/

Privacy ZeroKnowledge Web3