-
ZK Vuln – Zcash Hash Collision
Read more: ZK Vuln – Zcash Hash CollisionSources: The Impact Double spending, while creating money out of thin air Someone with enough computing power to find 128-bit hash collisions would have been able to double-spend money to themselves, creating Zcash out of thin air. For every 128-bit hash collision the attacker finds, they can effectively double their wealth by combining all of…
-
ZK Vuln – Frozen Heart
Read more: ZK Vuln – Frozen HeartPodcast on the backstory of this vulnerability Outline TL;DR If you don’t want to read the detailed posts, I recommend reading the intro post, which provides an intuitive understanding of the issue. Frozen Heart Frozen Heart exploits one main issue. That’s the incorrect implementation of Fiat-Shamir. Trail of Bits quotes sums it up well. the…
-
Common ZK Vulnerabilities
Read more: Common ZK VulnerabilitiesShout out to Kyle and Gubsheep for creating this resource! Resources – Source here Bug 1 and 2 – Under-constrained Circuits + Nondeterministic Circuits This specific section of vulns is the 80/20 rule. 20% of the vulns impact 80% of the projects – at least today, from this list. When programming in Circom, Ciaro, and…
-
eBPF Introduction
Read more: eBPF IntroductionWhat is it? “eBPF does to Linux Kernels what Javascript does to HTML” – Brendan Gregg, Netflix. 👆I.e. Makes the kernel programmable, without needing to create completely new kernel modules. We’re now able to wedge a program (eBPF) in between the user world (user space) and kernel world (kernel space) to observe and act on…
-
D-Squared Musings Week 8
Read more: D-Squared Musings Week 8D-Squared Musings – Week 8 Security ⛅ Practical Cloud Security Education 🎤 The Network State Podcast with Balaji #1 (Vitalik) 🇨🇳 Why China is Losing the microchip war Miscellaneous 🤖 Open Assistant an attempt (with traction) to open source ChatGPT – Video, Website, GitHub. 🔕 Microsoft’s New AI Clones Your Voice In 3 Seconds!
Subscribe