๐ zkSNARKs/zkSTARKs can be used to create ZK proofs that attest to the correct execution of the camera's code ๐ธ ๐ฎโโ๏ธ These proofs, representing an observation of a computation, ensure that non-suspicious video is discarded, thus preserving privacy ๐ Do not trust, verify ๐
๐งฉ Here's how a ZKP-powered surveillance system works: 1๏ธโฃ Cameras feed live video into a zkML model 2๏ธโฃ The model labels data as "suspicious" or "non-suspicious" 3๏ธโฃ Only "suspicious" footage is stored & reported 4๏ธโฃ The zkML model is public, ensuring transparency