Profile Picture
Illya Gerasymchuk
Entrepreneur / Engineer
User Illya Gerasymchuk -

2024-05-30 18:57

๐Ÿ” zkSNARKs/zkSTARKs can be used to create ZK proofs that attest to the correct execution of the camera's code ๐Ÿ“ธ

๐Ÿ‘ฎโ€โ™€๏ธ These proofs, representing an observation of a computation, ensure that non-suspicious video is discarded, thus preserving privacy

๐Ÿ‘‰ Do not trust, verify ๐Ÿ‘ˆ

User

๐Ÿงฉ Here's how a ZKP-powered surveillance system works:

1๏ธโƒฃ Cameras feed live video into a zkML model
2๏ธโƒฃ The model labels data as "suspicious" or "non-suspicious"
3๏ธโƒฃ Only "suspicious" footage is stored & reported
4๏ธโƒฃ The zkML model is public, ensuring transparency