๐ zkSNARKs/zkSTARKs can be used to create ZK proofs that attest to the correct execution of the camera's code ๐ธ
๐ฎโโ๏ธ These proofs, representing an observation of a computation, ensure that non-suspicious video is discarded, thus preserving privacy
๐ Do not trust, verify ๐
๐งฉ Here's how a ZKP-powered surveillance system works:
1๏ธโฃ Cameras feed live video into a zkML model
2๏ธโฃ The model labels data as "suspicious" or "non-suspicious"
3๏ธโฃ Only "suspicious" footage is stored & reported
4๏ธโฃ The zkML model is public, ensuring transparency