Profile Picture
Illya Gerasymchuk
Entrepreneur / Engineer
User Illya Gerasymchuk -

2024-05-30 18:57

๐Ÿ” zkSNARKs/zkSTARKs can be used to create ZK proofs that attest to the correct execution of the camera's code ๐Ÿ“ธ ๐Ÿ‘ฎโ€โ™€๏ธ These proofs, representing an observation of a computation, ensure that non-suspicious video is discarded, thus preserving privacy ๐Ÿ‘‰ Do not trust, verify ๐Ÿ‘ˆ

User

๐Ÿงฉ Here's how a ZKP-powered surveillance system works: 1๏ธโƒฃ Cameras feed live video into a zkML model 2๏ธโƒฃ The model labels data as "suspicious" or "non-suspicious" 3๏ธโƒฃ Only "suspicious" footage is stored & reported 4๏ธโƒฃ The zkML model is public, ensuring transparency

๐Ÿ’ฌ