Taking ZK IRL with Cursive

Taking ZK IRL with Cursive

Released Wednesday, 12th February 2025
Good episode? Give it some love!
Taking ZK IRL with Cursive

Taking ZK IRL with Cursive

Taking ZK IRL with Cursive

Taking ZK IRL with Cursive

Wednesday, 12th February 2025
Good episode? Give it some love!
Rate Episode

Episode Transcript

Transcripts are displayed as originally observed. Some content, including advertisements may have changed.

Use Ctrl + F to search

0:01

Welcome to Zero Knowledge,

0:04

I'm your host Anna

0:06

Rose. In this podcast

0:09

we will be exploring

0:11

the latest in Zero

0:14

Knowledge Research and the

0:16

decentralized web, as well

0:19

as new paradigms that

0:21

promise to change the

0:24

way we interact and

0:27

transact online. Nico and

0:29

I chat with Andrew and Vivic from

0:31

Cursive. We catch up with them about

0:33

what led them to start working

0:35

on a series of activations and

0:38

experiments using programmable cryptography.

0:40

We map out the timeline of these

0:42

activations. Often they were part of in-person

0:44

events, including events like ZK Summit 11

0:46

and ZK Summit 12 last year. They

0:49

walk us through some of the challenges

0:51

and also insights they had. as they

0:53

speed ran the deployment of

0:55

experimental applications using experimental libraries

0:58

with real users. cursive is one

1:00

of the teams I feel are on the

1:02

edge of the application development front in ZK

1:04

and in the adjacent fields like MPC and

1:07

FHE and they've been working on some

1:09

concepts that I think could be quite powerful

1:11

in the future. Concepts like passively sharing digital

1:13

signals from private user devices or what they

1:15

call digital pheromones as well as the idea

1:18

of narrow casting. Nico and I have actually

1:20

mentioned these concepts before on the show, so

1:22

it's great to get a chance to catch

1:25

up with the team who invented them.

1:27

Now before we kick off this episode, I

1:29

want to share a few things from our

1:31

ecosystem. First, if you haven't seen it yet,

1:33

ZK Summit 13 is happening in Toronto on

1:36

May 12th. Applications to attend just opened. Space

1:38

is more limited than usual this time around,

1:40

as our venue caps out at around 400,

1:42

so we are encouraging people who really want

1:44

to join to get their spots secured early.

1:47

It is invite only and we do prioritize

1:49

previous attendees and long-term members of the ZK

1:51

community. So if you're newer and you really

1:53

want to join, just aim to apply early

1:55

for a better chance of getting a spot.

1:58

The application to speak can be found. the

2:00

same form. The deadline to apply to

2:02

speak is March 15th. Next up on

2:04

the ZK Hack front, if you don't

2:06

know ZK Hack as a hub for

2:08

learning about ZK, if you're just getting

2:11

into the space, this would be a

2:13

really good place to check out. One

2:15

of our projects there, the ZK Whiteboard

2:17

sessions, just wrapped up. We released our

2:19

final two modules in the past month.

2:21

These were hosted by Dan Bonet. They

2:23

were focused on Fry and Proximity Proximity.

2:25

We also completed our first study group

2:27

that went through these videos kind of

2:30

in detail, but we are looking to

2:32

launch a new one in the coming

2:34

months focused just on these Frye modules.

2:36

So if that's interesting for you, be

2:38

sure to head over to the ZKHAC

2:40

Discord. I'll add the link to that

2:42

and show notes. That's where we organized

2:44

the study groups. I also just want

2:46

to mention that ZKHAC Soul has been

2:49

unfortunately postponed. We weren't able to secure

2:51

the venue that we needed, and so

2:53

we've decided not to do the event

2:55

this year. In the meantime, though, we

2:57

are hosting ZKHAC meetups in Sophia around

2:59

the ZK Proof's event and in Denver,

3:01

right around the East Denver event. We

3:03

are also developing our next hackathon. It

3:05

will probably be in Berlin in June,

3:08

around the Protocolburg and DAPCon events. We'll

3:10

be sharing more over on the ZKHAC

3:12

channels in the lead up to that.

3:14

So I think that wraps up all

3:16

the upcoming events. Hope to see you

3:18

at some of these. Now, here's our

3:20

episode with Andrew and Vivic from cursive.

3:25

Today, Nico and I are here with

3:27

Vivic and Andrew from Cursive. Welcome both

3:29

of you to the show. Excited to

3:32

be here. A longtime ZK podcast fan

3:34

boy. Oh, I'm so glad. Nico, thanks

3:36

for joining. Hello. Hello. This episode is

3:39

a long time coming. We have actually

3:41

been trying to schedule it for the

3:43

last two months or so. Niko, you

3:45

and I, we did an episode back

3:48

in October where we talked a little

3:50

bit about some of the cursive activations

3:52

and experiments. And then in our end

3:55

of year episode, we also mentioned what

3:57

you guys had been up to. So

3:59

yeah, it's so good to have you

4:02

on so we can act. dig into

4:04

all of these events that you've been

4:06

present at and what you're thinking in

4:08

terms of using programable cryptography in the

4:11

real world. So let's kick off with

4:13

a little backstory on the two of

4:15

you. Where did you get your start?

4:18

What got you excited about this? And

4:20

maybe at what point did your path

4:22

start to merge? Vivic, let's start with

4:25

you. Yeah, so back in 2016 was

4:27

the first time I started doing cryptography

4:29

work. I was part of this like

4:32

a research program at MIT where I

4:34

was paired with some grad students to

4:36

work on computer science projects and they

4:38

just like randomly slotted me into cryptography.

4:41

And yeah, I like started out doing

4:43

some stuff with consensus alternatives like proof

4:45

of space, so very crypto economic, but

4:48

involved cryptography, mercal trees. And then I

4:50

did some authenticated dictionary work with Olean

4:52

Tamasku, who I think has actually been

4:55

a guest on the show as well.

4:57

Oh yeah. Yep. So we worked together

4:59

for two, three years using KZG commitments

5:01

for like authenticated dictionaries and then kind

5:04

of just dropped off cryptography for a

5:06

while because I kind of thought, I

5:08

don't want to be an academic and

5:11

everything in industry seems like it's weird

5:13

crypto scams or something. Like it was

5:15

like during like an FT craze. And

5:18

I like briefly interned at like a

5:20

crypto trading firm and I was like,

5:22

this is degeneracy, I don't want to

5:25

do this. Crypto is scary and weird.

5:27

That is true. Absolutely. And that has

5:29

like the exact same process when I...

5:31

Yeah, studied cryptography and then it was

5:34

like, I can't get into all this

5:36

crypto scam nonsense. Yeah. Like I have

5:38

to work somewhere else. No, exactly. And

5:41

then I did like machine learning research

5:43

for a few years at MIT and

5:45

then near the end of graduation. One

5:48

of my best friends at Yish who's

5:50

also been a guest on the show,

5:52

he's like good friends with Brian Gu,

5:54

the founder of Xerox Park. I think

5:57

they go back to like high school.

5:59

Okay. And he told me they were

6:01

spinning up this new. They're doing this

6:04

weird ZK thing and I was like,

6:06

what is this? Like, you know, it's

6:08

probably another crypto scam. And then I

6:11

started reading the Vitalic blog posts and

6:13

I was like, oh my God, this

6:15

is like KZG commitments. Like, this is

6:18

the same stuff I was doing. It's

6:20

just like applied in a different way.

6:22

And so yeah, I basically started with

6:24

them in like late 2021, early 2022

6:27

doing some initial experiments around anonymous speech.

6:29

Nice. So that was Xerox park. What

6:31

were you, I mean, were you helping

6:34

out? as an employee or were you

6:36

just kind of learning along, were you

6:38

kind of a resident? I actually don't

6:41

know how it was structured back then.

6:43

Early on I think it was structured

6:45

very similar to PSC in that it

6:47

was essentially like giving out a bunch

6:50

of grants. A lot of them were

6:52

like Bryan's ideas for various projects he

6:54

wanted to see, including the stuff that

6:57

I was working on, like anonymous speech

6:59

was something that he was championing for

7:01

a while. Okay. So I was just

7:04

a grantee there for. About a year,

7:06

and then I was briefly a full-time

7:08

employee working on SU pass. Were you

7:11

there during like the Dark Forest era

7:13

or did you join after that? No,

7:15

I was not. I like knew it

7:17

was happening. I'd like known Brian from

7:20

some other programs and I knew they

7:22

were working on it, but I was

7:24

not involved with Dark Forest. Okay. And

7:27

what about you Andrew? How did you

7:29

get your start? I guess I had

7:31

a less involved past with cryptography with

7:34

cryptography. I never studied cryptographyography. in college,

7:36

but one of my friends from doing

7:38

math together kind of reminded me that

7:40

programmable cryptography existed. He's basically like, oh,

7:43

this ZK thing is really cool. You

7:45

should go check it out. And I

7:47

was completely fascinated. This was maybe in

7:50

2023. Okay. In the springtime. Yeah. So

7:52

quite recent, actually. And I got into

7:54

it purely from the math side. I

7:57

was like, this is completely magical. the

7:59

idea that you can prove things with

8:01

revealing any extra information is completely absurd

8:04

and it makes no sense and the

8:06

fact that it's just built on algebraic

8:08

objects and numbers is incredible so that's

8:10

kind of what drew me in at

8:13

the beginning and after a little while

8:15

I was like okay this is really

8:17

cool I want to work on this

8:20

for a little while let me go

8:22

meet some people in the space

8:24

first I joined a PSE project for

8:26

a few months. It's working on

8:29

identity wallets for a bit, based on

8:31

zero knowledge proofs. And then afterwards,

8:33

I went to meet a bunch of

8:35

people who were working in ZK. I met

8:37

Lockshman from Persone. I don't know

8:40

if he's been on the show,

8:42

but Lockshman and I had a

8:44

conversation where we were talking about

8:46

how... ZK enables people to express themselves

8:48

differently, how it can be connected

8:50

to identity in the physical world.

8:53

One cool concept we toyed around

8:55

with was the idea of being

8:57

able to change an outfit or

8:59

wear different pieces of clothing and

9:01

basically become a different person, have

9:03

different identity personas. And from

9:05

that, Lachshman was like... Okay, I

9:08

know someone else who has similar

9:10

thoughts or is thinking in similar

9:12

directions and that's when he introduced

9:14

me to Vivik and we've been

9:16

working together since then. Oh, cool.

9:18

Vivik, you were doing Zu Pass. You sort

9:21

of just mentioned that. This is Zuzalo Zu

9:23

Pass? Yep, same one. So I guess, did

9:25

you guys meet after that? Yeah, so I

9:27

was, yeah, working on the Zu

9:29

Pass team. And actually I think

9:31

we're cursive, like, like, like, properly

9:33

started Zuzalu Zuzulu. There I met

9:36

Rachel who's like currently like one

9:38

of the co-founders and like our

9:40

head of design. She had been

9:42

working at PSC for a few

9:44

years like helping with design for

9:46

a bunch of projects there and

9:48

I also met Althea who was like

9:50

a core member of our team during

9:52

the early stages like also kind

9:55

of a design and like Com's

9:57

background and so like it was near the

9:59

end of Zuzalu where we all kind

10:01

of met and built out kind of

10:03

an initial NFC experiment using like signatures

10:06

and NFC cards which we can get

10:08

more into in a bit and then

10:10

I think that was like May 2023

10:12

and I met Andrew like July 2023

10:14

over video call. I actually when I

10:17

first called Andrew I first called Andrew

10:19

I thought he like thought what we

10:21

were doing was really boring like I

10:23

was like oh I don't think I'm

10:26

ever got to talk to him again

10:28

that's unfortunate. Did you find it boring

10:30

Andrew? No, no, I thought it was

10:32

awesome. Otherwise I probably would not have

10:34

reached out again. That's hilarious. I didn't

10:37

know that. Cool. You also had long

10:39

hair. I never actually saw a long

10:41

hair Andrew in person. I just saw

10:43

it over that morning. I did have

10:46

really long hair and video. There's very

10:48

few people in the ZK space who

10:50

have seen that rare version. Before we

10:52

dive into cursive, because that's kind of

10:55

what I want to cover primarily in

10:57

this. episode cursive in the experiments you've

10:59

run. I don't know if we've ever

11:01

talked about zoo pass on the show

11:03

and it might be worth it to

11:06

talk a little bit about what that

11:08

was because yeah this is like at

11:10

Zuzalu that two-month pop-up city kind of

11:12

the first one that prompted I mean

11:15

since then there's been lots of variations

11:17

and and I think there's news Zuzalu's

11:19

in different places but yeah there was

11:21

this zoo pass so maybe tell us

11:23

a little bit about what that was.

11:26

Yeah, definitely. So I was one of

11:28

the first two devs on the team

11:30

and I was there for sort of

11:32

like roughly the founding of it. I

11:35

would not call myself a founder, but

11:37

like I was basically just like hanging

11:39

out with Brian around the time when

11:41

he was coming up with the concept

11:43

for Zupas and he was like, do

11:46

you want to work on this? And

11:48

I was like, yeah, let's do it.

11:50

And yeah, I mean, I would say

11:52

it's basically an identity wallet that I

11:55

think it's innovation as far as I

11:57

can understand is like. they targeted a

11:59

specific in-person event and also one that

12:01

was very friendly to trying out new

12:03

technologies. Yeah, we're able to sort of

12:06

like digitize a bunch. various like tickets

12:08

that were involved with events and like

12:10

other kind of like data for citizens

12:12

of Zuzalu or other sort of like

12:15

pop-up cities. Yeah and I think in

12:17

in the past year and a half

12:19

I haven't followed their work super closely

12:21

so I'm probably missing some details but

12:24

I think there's been a bunch of

12:26

innovations on like data format and like

12:28

ways of using Zupas more easily as

12:30

a developer so they're just continuing to

12:32

like I think. make it easier to

12:35

use ZK, kind of friendly data, and

12:37

develop with it. Yeah, I think I

12:39

had it. I mean, it was kind

12:41

of used as, I think you actually

12:44

needed to get it for your initial

12:46

ticket to like get in or something.

12:48

I think there's maybe ways around it,

12:50

but it was pretty integrated into the

12:52

experience. I also know that I like,

12:55

I lost it at some point. And

12:57

then for Dev Connect, you needed it

12:59

again. There was a way to do

13:01

that. So I was able to get

13:04

it back, which I, yeah, I don't

13:06

actually know how that worked under the

13:08

hood. But it's actually something that we

13:10

would love to talk about more, but

13:12

with a lot of this stuff that

13:15

you have like true ownership over, it's

13:17

actually like a very fragile system. In

13:19

the case of ZK data, it's less

13:21

of like a signature private key, but

13:24

more of like an encryption private key,

13:26

which is usually derived from a master

13:28

password. And if you forget that, you're

13:30

kind of just screwed. Like you just

13:33

like cannot recover your data. And so

13:35

yeah, it's pretty interesting, like these systems

13:37

can be a lot more fragile because

13:39

there isn't really easy data recovery. So

13:41

I guess, is this a good time

13:44

to ask what is cursive? Yeah. discover

13:46

and deepen their connections. So we want

13:48

to make experiences that align with user

13:50

empowerment. We believe that users should have

13:53

control of their experience. And we think

13:55

programmable cryptography is a really cool toolkit

13:57

for enabling this, giving users ownership of

13:59

their data. giving a lot more choice

14:01

over what types of front ends and

14:04

applications that they might actually be able

14:06

to use, enabling new ways for them

14:08

to express their identity, and ultimately this

14:10

is all in the aim of connecting

14:13

people and bringing them together. Is

14:15

cursive like a lab? Is it a

14:17

company? Do you have a product? I

14:19

feel like this is something you've actually

14:21

probably heard a couple people ask. I

14:23

think I might have asked you this

14:25

a couple times too, but yeah. What

14:27

is cursive exactly. I think we're

14:29

currently transitioning from closer to an

14:31

R&D lab to more of

14:33

just like a product team. I

14:36

think like we have a lot of good

14:38

lessons on the research front and

14:40

like what is kind of possible

14:43

and you know more difficult with

14:45

cryptography. So I think 2025 will

14:47

definitely be a very like product

14:50

driven year for us. We

14:52

were in a very interesting position

14:54

to begin with because I think

14:57

we had a lot of product-oriented

14:59

thinking in our team, but at the same

15:01

time a lot of the technologies

15:03

that we wanted to explore and

15:05

use simply we're not ready or

15:07

we're not packaged into user-facing form

15:10

and so we had to spend a lot

15:12

of time not only iterating on the

15:14

product side but also just fundamentally seeing

15:16

what is possible, what can be done

15:19

with these tools. So in a way

15:21

we were forced to do both, but

15:23

I think we took a lot of

15:25

really good learnings from that. Nice. I

15:27

want to ask, what's your approach

15:29

to designing these products? Right? I've seen

15:32

a lot of teams who fall in love with

15:34

the technology and say, like, this is

15:36

great, I want to use it. And I get

15:38

a sense that you guys do it the

15:40

other way around, right? I mean, I

15:42

think there's a healthy amount of that

15:44

as well. Like, I think Andrew and

15:46

I definitely get nerd sniped and like

15:48

just want to figure out new ways

15:50

of using stuff. We think a lot

15:52

about... constraints in our process and a

15:54

lot of this is spearheaded by like

15:56

our head of design ritual like just

15:58

creativity really I think easier to access

16:00

when you give yourself a box to

16:03

work with them instead of being like

16:05

you know the sky's the limit. I

16:07

think one of those constraints is like

16:09

around like human connection and data ownership

16:12

like what are sort of the existing

16:14

problems with with systems that we have

16:16

right now and in what ways does

16:18

cryptography help in what ways does it

16:21

make the UX bad? Like I think

16:23

we're also very honest as a team

16:25

and very pragmatic. I think we understand

16:27

that like it would be lovely to

16:29

have the purest system with like you

16:32

know like a trustless or something close

16:34

to that. I think often that just

16:36

needs to be balanced with like what

16:38

users care about and like how good

16:41

the experience can be. So yeah I

16:43

think that's been the kind of the

16:45

process in the past I think moving

16:47

forward we're looking to be a lot

16:49

more user-centric just like focusing on a

16:52

specific persona like kind of more traditional

16:54

startup stuff given all the knowledge we've

16:56

acquired on different cryptographic tech and progressed

16:58

that way but that's a little bit

17:01

more new. I think is going to

17:03

be like a 2025 focus. Yeah, I

17:05

think in the early stages of any

17:07

new technology, if you want to be

17:10

both on the cutting edge and also

17:12

for consumers, there is sort of this

17:14

dialectic between product and technology. Right, you

17:16

build some things, you give it to

17:18

users, you see how they feel, but

17:21

at the same time you have to

17:23

turn to the technology and say, oh,

17:25

can we build this? And also, what

17:27

else can we build? And this new

17:30

thing, like, do people want that? So

17:32

I think it's difficult in the early

17:34

stages to be too much in one

17:36

or the other, but slowly, that'll change.

17:39

Let's do a rundown of the experiments

17:41

that you did in the last year

17:43

and a half or so. And then,

17:45

yeah, because I'm really curious to see

17:47

kind of like what you learned maybe

17:50

with each one. Did you do something

17:52

after Zuzalu once cursive was founded before

17:54

Dev Connect or was Dev Connect sort

17:56

of the first time that you guys

17:59

went out as cursive? Actually, I think

18:01

a Dev Connect, we weren't even properly

18:03

called cursive, but it was the same

18:05

kind of team. I think cursive. itself

18:08

was launched at Denver. Okay. But there

18:10

was some experiments in between there. We'll

18:12

just quickly run through 2023 stuff. Yep.

18:14

And then pass off to Andrew for

18:16

2024. So at Zuzalu, basically we did

18:19

a really simple experiment with NFC cards

18:21

where there wasn't even an EasyK involved,

18:23

but you could basically collect like kind

18:25

of like a private Po-up where an

18:28

NFC card had its own private key.

18:30

and it would produce like unique signatures

18:32

upon every tap. And so you could

18:34

basically assign an FC card to a

18:36

specific event at Suzalu, like let's say

18:39

attending a town hall, and people who

18:41

tapped that would essentially get this unique

18:43

signature. It would be stored privately in

18:45

their zoo pass. And then theoretically they

18:48

could use it later, you know, to

18:50

prove they attended, either just with the

18:52

signature itself or using a ZK wrapper.

18:54

We didn't actually get around to doing

18:57

the ZK step, it was mostly just

18:59

like, kind of maybe more on the

19:01

side of like verifiable credentials than like

19:03

zero knowledge proofs, but yeah, I think

19:05

we just wanted to create more data

19:08

for people to make ZKPs with. That

19:10

was kind of the problem we identified

19:12

during different workshops with Rachel and Althea

19:14

of like, yeah, this tech is cool,

19:17

but like no one can use it

19:19

because like there was like ZK email

19:21

and TLS notary vaguely existed, but. it

19:23

was too hard to use those so

19:26

you couldn't make proofs about anything. I

19:28

guess it's also on your side laying

19:30

the groundworks for what's to come next

19:32

right? Like all the infrastructure that you

19:34

guys are gonna reuse? Absolutely yeah like

19:37

once people have a you know a

19:39

little supply of signatures you can start

19:41

to you know do a lot more

19:43

fun stuff with that. Yeah so that

19:46

was that and I think like the

19:48

next step was basically adding these signatures

19:50

and so this came around yeah like

19:52

late 2023 this also when Andrew joined

19:54

the team. which was an amazing level

19:57

up for us. Oh my God. We

19:59

were just suddenly able to do so

20:01

much more because Andrew is a force

20:03

of nature. Yeah, basically we experimented with

20:06

this concept called quests, which is basically

20:08

like a user-friendly wrapper of CK proofs.

20:10

So essentially, like, we create a quest,

20:12

which was, I think the best example

20:15

was like, oh, to attend this event,

20:17

you need to meet like three out

20:19

of five of the organizers. So the

20:21

idea here being like, instead of there

20:23

being like a fixed invite list, it

20:26

was just sort of proof of knowing

20:28

the people involved. And instead of calling

20:30

it a ZK proof, we wanted to

20:32

experiment with different terminology and wrap it

20:35

better, just so you didn't need to

20:37

be a ZK person to like get

20:39

it. And I think that was like

20:41

a really fun experiment. I think we

20:44

did a lot of interesting things like

20:46

event invites and scavenger hunts. And we

20:48

also iterated this at East Denver, just

20:50

a much larger version of this in

20:52

collaboration with IYK, like another NFC team.

20:55

Main takeaway from that though is that

20:57

CK felt like a little bit of

20:59

a limiting toolkit in order to build

21:01

like full user facing applications around in

21:04

that like a lot of what you

21:06

can do is roughly like privacy preserving

21:08

access control. You can basically prove you

21:10

meet some threshold and then get access

21:13

to something. And it turns out like

21:15

this often kind of just looks like

21:17

tickets or like gating some like online

21:19

content. And I think we felt a

21:21

little bit limited by having that be

21:24

our only kind of cryptographic tool which

21:26

led to like a lot of future-facing

21:28

experiments at like CK 11 and onwards.

21:30

Cool. At Dev Connect it was that

21:33

where you were actually doing those like

21:35

you must know three out of five

21:37

of the organizer type experiments? Yep. We

21:39

ran a few of them for different

21:41

like parties and events. I was not

21:44

aware and sadly didn't go to any

21:46

of these. I did not know three

21:48

out of five of these organizers clearly.

21:50

I guess so. Yeah, we had like

21:53

200 cards produced. It was actually quite

21:55

a fun sprint. Like we basically were

21:57

able to add baby job job curves

21:59

into these. cards like so basically their

22:02

Java cards you code them with like

22:04

kind of jank Java like not

22:06

full Java like Parfield Java and

22:08

we were able to get some

22:10

valid signatures going and so we were

22:12

able to build a full ZK experience around

22:15

it and yeah there are only 200 of

22:17

them so I think it was like kind

22:19

of hard to to get it to everybody.

22:21

It's okay. I forgive. It was

22:23

a big event. No worries. But it

22:26

sounds cool. I'm kind of sad.

22:28

I missed that part. Let's fast

22:30

forward then to East Denver, 2024. Because

22:33

I mean, I really got to

22:35

know what you guys were doing

22:37

at CK11, which was April. So

22:39

just like a month or two

22:41

after East Denver. What had you

22:43

actually done at East Denver? Yeah,

22:45

I think. Two different things, I

22:47

would say the main experience

22:49

that was available to every

22:52

attendee was related to completing

22:54

these ZK quests, proving that

22:56

you met certain people, that

22:58

you went to certain events

23:00

or had certain experiences, and

23:02

being able to claim prizes

23:04

as a result of that.

23:06

But at the same time,

23:09

we were also working on

23:11

new experiments specifically related

23:13

to private set

23:15

intersection. And this was using

23:17

a BFV library in collaboration

23:20

with John Ojaya, who's a

23:22

long-time collaborator of ours. And

23:24

I think what we've noticed

23:27

is from all these activations

23:29

and all these experiments, it

23:31

takes a while to take

23:33

a new technology in programmable

23:36

cryptography and actually be

23:38

able to productionize it

23:40

successfully. At Denver, we

23:42

first played around with

23:45

this BFV PSI toolkit

23:47

and Vivic spent multiple

23:49

all-nighters trying to get

23:52

it to work. While

23:54

we were building out

23:56

the main app experience

23:58

as well. And I think

24:01

we were able to make a

24:03

proof of concept, but there were

24:05

still some discontinuities in the experience.

24:07

And fast forward to ZK11. That's

24:09

when we actually were able to

24:11

deploy it successfully, and it basically

24:13

worked perfectly during the event. And

24:15

we've noticed like- Yeah, it really

24:17

did. the lessons we learned from

24:19

trying to get it to work

24:21

and it struggling to work those

24:23

carried over and eventually we did

24:25

actually like do it successfully but

24:27

at the same time at ZK11

24:30

we wanted to also experiment with

24:32

with folding, specifically regards to being

24:34

able to prove you met multiple

24:36

people, each one of those being

24:38

an individual proof, but being able

24:40

to fold that together into some

24:42

sort of Spotify wrapped like experience

24:44

for your whole ZK11 journey. These

24:46

were all the people I met,

24:48

these were all the speakers I

24:50

met, and kind of generate one

24:52

big folding proof related to that.

24:54

And we didn't. learn our lesson

24:56

at all. Deploying technology for the

24:58

first time still is a huge

25:01

trouble. Specifically with regards to folding,

25:03

we ran into issues with key

25:05

sizes, basically having to download very

25:07

large keys and you can imagine

25:09

like trying to get, I don't

25:11

know, what was it, like 300

25:13

attendees, 400? Maybe more. There's 550.

25:15

Okay. Right. Okay. 11. Yeah. 550

25:17

attendees to download like tens of

25:19

megabytes of like keys on conference.

25:21

Everyone on the same Wi-Fi. Yeah.

25:23

I don't know if everyone did

25:25

it in CK-11. I feel like

25:27

it was the first time we

25:30

worked together and we did announce

25:32

it at the beginning of the

25:34

event, but a lot of the

25:36

community weren't used to it. By

25:38

ZK-12, I think the percentage of

25:40

attendees using it was actually up.

25:42

Yeah. But yeah. But I do

25:44

want to touch more on the...

25:46

PSI or private set intersection experience

25:48

because I think this was something

25:50

that we learned that was actually

25:52

quite successful. So specifically what this

25:54

allowed you to do is you

25:56

have a list of all the

25:58

people that you've met at the

26:01

conference. These are represented by their

26:03

signatures, signatures from their public keys

26:05

rather. You have a list of

26:07

interests or things that you're interested

26:09

in and when you meet someone

26:11

you can basically privately figure out

26:13

what you have in common. And

26:15

at ZK11, we found that a

26:17

lot of people were really interested

26:19

in trying this out. It got

26:21

received pretty well at the event.

26:23

And people were like, oh my

26:25

God, like I could actually meet

26:27

someone new, connect with them instantly,

26:29

and all my data stays on

26:32

my device, and it's all private.

26:34

So I think that was a

26:36

really good learning from that event

26:38

that even something pretty small, like

26:40

PSI, it seems like a very

26:42

simple primitive. can be quite expressive

26:44

and contrast that with heavier things

26:46

like full-on FHE, like let's say

26:48

you want to do FHEML or

26:50

something. This is quite complicated to

26:52

run. This takes a lot of

26:54

computation and a lot of memory

26:56

and it's quite impractical for a

26:58

lot of day-to-day consumer experiences. In

27:01

contrast, something like PSI is already

27:03

practical today. It works, it works

27:05

on your mobile browser and it

27:07

can actually create new social dynamics.

27:09

So I think that was a

27:11

very important learning for us. I

27:13

think like one other meta point

27:15

here is like this is our

27:17

first time trying like multi-party stuff

27:19

where you took data from like

27:21

multiple people and did some computation.

27:23

ZK is inherently a very single

27:25

player endeavor. There's like a verifier

27:27

obviously so it's kind of a

27:29

multi-party computation. I think some people

27:32

would get angry at that. The

27:34

person with private data is only,

27:36

there's only one of them. The

27:38

Z811 experience opened a lot of

27:40

new doors in terms of like,

27:42

okay, cool, like, what are the

27:44

new social dynamics? we can explore

27:46

when multiple people have private data

27:48

involved. And it's a much less

27:50

explored design space than CK. So

27:52

that's one meta point. And just

27:54

building off the other thing that

27:56

Andrew said, like, yeah, I think

27:58

like a repeated lesson, or like

28:01

kind of a repeated pattern for

28:03

us is like, we very ambitiously

28:05

try to do some new technology

28:07

at event, like X. We like

28:09

completely fail. It like blows up.

28:11

Like Andrew did mention, like for

28:13

Denver, like we tried putting in

28:15

like the private center section, it

28:17

literally like broke the entire app.

28:19

Mind you, we have like 12,000

28:21

NFC cards that we're giving out,

28:23

like in five hours. Oh my

28:25

God. Yeah, the night before. There's

28:27

two a.m. We were doing some

28:29

last minute tests before we went

28:32

to bed. And then it just

28:34

totally broke everything. And so we

28:36

had to like revert the commit,

28:38

clean up a bunch of stuff,

28:40

test another few hours. for me

28:42

tonight. I love the term programmable

28:44

cryptography because it's it makes you

28:46

forget how hard it is to

28:48

program this stuff. That's yeah honestly

28:50

it's true it makes it seem

28:52

a little too easy but I

28:54

think now we have a good

28:56

awareness of like push to try

28:58

to get it for an event

29:01

but like don't be too sad

29:03

if it doesn't work out it'll

29:05

probably work out for the next

29:07

one and just a word of

29:09

advice that like this stuff always

29:11

takes longer than you think it

29:13

will, especially if you're the first

29:15

person, like actually getting into the

29:17

weeds of this stuff and trying

29:19

to put it on like a

29:21

mobile phone or a consumer device.

29:23

Yeah. It's great to see like

29:25

your cryptographic like palette sort of

29:27

expanding, but at the same time

29:29

you're helping everyone else, right? Because

29:32

now that you guys have tried

29:34

this, someone else can come in

29:36

and try like more PSI stuff.

29:38

Yeah, totally. That's definitely, I think

29:40

one of my favorite parts of

29:42

my favorite parts of the field

29:44

of the field is how open

29:46

source friendly it is, like how

29:48

much of a collaboration it all

29:50

feels like. Well, just kind of

29:52

like one big happy family, like,

29:54

you know, at least some corners.

29:56

Some siblings bigger, but it's a

29:58

big family. It's a big family,

30:01

like everyone's building off each other.

30:03

And I really like that, like it comes

30:05

in contrast to like ML, for example, which

30:07

is like a lot of close source work

30:09

happening. And then you see like Deep's Heek

30:11

come out and everyone's like, this is

30:13

such a gift to mankind. And it's

30:16

like, well, yeah, we've just been doing

30:18

that in cryptography land. Yeah, I think

30:20

in program book cryptography, a lot of

30:22

people understand that siblings might fight,

30:24

but we're all fighting a much bigger

30:26

battle. the grand scheme of things like

30:28

people are either going to adopt this

30:31

stuff or they're not and it's going

30:33

to take a lot of effort to

30:35

make it happen. There's a lot of

30:37

inertia and so I think it really

30:39

is important for teams to collaborate and

30:41

understand that either everyone wins or no

30:44

one wins. There is one thing I

30:46

wanted to bring back about the way

30:48

you did PSI. So PSI has sort

30:50

of a history and literature of being

30:52

a pure like two-party thing like you

30:55

have two parties. finding an intersection.

30:57

And I think in your case you

30:59

guys did something quite interesting where you

31:01

had like a server helping users

31:03

compute their PSI. Could you tell us a bit

31:05

more about how that worked? Yeah, for sure.

31:08

Essentially what we did was probably a

31:10

little bit too overpowered of a technique,

31:12

but it like works pretty nicely for

31:14

our use case, which is a multi-party

31:16

FHE or like threshold FHE. So what

31:18

goes on here is like, in this case

31:20

it's two parties. So let's say like

31:22

me and Andrew doing a private set

31:24

intersection. We essentially, like, together, perform

31:27

an initial NPC where we create,

31:29

like, a shared public key. So,

31:31

between us, we can see the public

31:33

key, but neither of us knows

31:35

the corresponding private key. It's kind

31:37

of like a split between us.

31:39

And so with this public key,

31:41

what we can do is we

31:43

can encrypt our data fully homomorphically

31:45

to the shared public key. So now

31:47

me and Andrew have like encrypted

31:50

versions of our two sets of

31:52

contacts, interests, interests, whatever. And

31:54

so now what we can do

31:56

is we can run a comparison

31:58

in FHE and... Like usually this

32:01

is actually a very costly operation,

32:03

so the nice thing here is

32:05

you can like offload it to

32:07

a server in a way that

32:09

doesn't actually leak any privacy. The

32:11

server is essentially just doing a

32:13

bunch of like FFTs for you

32:15

and then gives you back the

32:17

encrypted result. And then at the

32:19

end, me and Andrew come together

32:22

and we do a decryption MPC,

32:24

where essentially we decrypt the result

32:26

of this computation. without ever actually

32:28

surfacing the kind of shared private

32:30

key. We just just decrypt it

32:32

and thus only get the result

32:34

to the computation. And this technique

32:36

works for stuff past private center

32:38

sections. You can like do any

32:41

computation with this method. But you

32:43

relieved the user devices from the

32:45

heavy workload. Exactly. Yeah. And that's

32:47

what I found super interesting. Yeah,

32:49

like essentially the user is just

32:51

responsible for encrypting and creating the

32:53

shared public key. which tend to

32:55

be very light operations in general.

32:57

And so, yeah, you basically do

32:59

the setup and then a server

33:02

just handles all the heavy lifting.

33:04

And also when we started exploring

33:06

PSI, we didn't have a good

33:08

sense of whether or not PSI

33:10

was going to be the main

33:12

thing that provided a lot of

33:14

application facing value. So I believe

33:16

that a lot of the... Taylormade

33:18

PSI schemes are specifically useful for

33:20

private set intersection, but using multi-party

33:23

FHE gave us the flexibility to

33:25

say, oh, maybe we can play

33:27

around with different types of primitives

33:29

here as well, maybe we can

33:31

expand this to different things if

33:33

they prove to be valuable. Yeah,

33:35

I think another shout out here

33:37

to John Magaya, again, like without

33:39

him, like none of this would

33:42

be possible. Specifically, he has a

33:44

really great toolkit called Phantom Zone.

33:46

It's like an MIT licensed FHG

33:48

VM, a different licensing to other

33:50

sort of FHG tooling, and it

33:52

basically is focused. on this multi-party

33:54

FHE techniques. So I would highly

33:56

recommend in Devs to check that

33:58

out. Really cool library can definitely

34:00

build some fun stuff with it.

34:03

I remember when you first approached

34:05

me for ZK11, I want to

34:07

say, like, I was really excited

34:09

about the ZK, the fact that

34:11

there'd be kind of like a

34:13

tool on site, but I was

34:15

also a little bit wary because

34:17

in my, like, in the past,

34:19

long before I met you. had

34:21

sort of seen a lot of

34:24

these experiments go very, very wrong

34:26

at events. And when you're running

34:28

an event, obviously you're under a

34:30

lot of pressure in general, you

34:32

want to make sure that anything

34:34

that you're bringing will add to

34:36

the experience of the participants. So

34:38

I already knew you, Vivic, and

34:40

I guess that maybe is why

34:43

I took that chance, but I

34:45

remember after the event being so

34:47

happy that we had. But it

34:49

really was unlike, you know, I

34:51

really didn't know what to expect

34:53

going into it. And so obviously

34:55

when we started speaking again about

34:57

CK 12, I was like very,

34:59

very excited to work together again.

35:01

I know that between CK11 and

35:04

CK12, there was another experiment that

35:06

you ran though. So let's talk

35:08

a little bit about that frontiers.

35:10

Yeah, I'll step in real quick

35:12

and not assuage any of your

35:14

fears. Maybe you didn't know this,

35:16

but so. Quick shout out, we

35:18

also worked with Jack and Ian

35:20

from Mock 34. They work on

35:22

a bunch of CK programmable cryptography

35:25

tools as well. They helped us

35:27

integrate folding into the ZK 11

35:29

experience. And at the end of

35:31

the day, like folding worked intend.

35:33

It just was like very poorly

35:35

performing due to key sizes during

35:37

the actual event. We got it

35:39

working. in production 20 minutes before

35:41

the event started. That totally does

35:44

terrifying. You never told me that.

35:46

I probably should not have told

35:48

you that, but now you know.

35:50

Amazing. Things come down to the

35:52

wire. Wow. One last ZK-11 anecdote

35:54

for me is how one hour

35:56

before the end Anna realizes that

35:58

not only is there like all

36:00

this cool ZK and PSI functionality,

36:02

there's a leaderboard. Yeah, that's true.

36:05

So it's only a nice like,

36:07

I cannot lose my own event.

36:09

So she's running around tapping everyone's

36:11

cards. Right. And I think you

36:13

won, right? I did win in

36:15

Z-K-11. I wasn't just that I

36:17

cannot lose my own event. I

36:19

think it was just that I,

36:21

yeah, I realized that. No one

36:23

was ranking, no one was competing,

36:26

and so I started to get

36:28

into it. For ZK12, we did

36:30

fix that by actually offering incentives

36:32

and bringing back the concept of

36:34

prizes, which you had had at

36:36

East Denver and we didn't think

36:38

of for ZK11. But I know,

36:40

yeah, let's talk about that in-between

36:42

experiment with frontiers and this hiring

36:45

experiment, because I thought of that

36:47

as, like, when we started talking

36:49

about ZK12, you were telling me

36:51

about this, it was so... of

36:53

exactly these tools that you're working

36:55

with. So let's talk about that.

36:57

Yeah, there's actually a really nice

36:59

tie in here with CK11, which

37:01

is that. Frontiers is like a

37:03

paradigm-sponsored event. It's like focused on

37:06

open-source rust and Ethereum applications, and

37:08

Georgeos is like the main curator

37:10

of that event, and he actually

37:12

first saw our technology at CK11.

37:14

And that's why he reached out.

37:16

He reached out in our public

37:18

channel. He was like, let's do

37:20

something. And then we were like,

37:22

sure, not really expecting it to

37:24

go anywhere. But yeah, it ended

37:27

up being a really good collaboration.

37:29

And so also appreciate UNICO, like

37:31

digging a bit deeper into multi-party

37:33

FHE, because that comes into a

37:35

play, actually a lot more in

37:37

this activation. So specifically we wanted

37:39

to take that toolkit we were

37:41

using for just private set intersection

37:43

and we wanted to expand it

37:46

to like a more general purpose

37:48

function. And this is right around

37:50

the time where John Magaya opened

37:52

up Phantom Zone as like a

37:54

full, I guess not a full

37:56

VM, it's closer to a circuit

37:58

builder, where you could just write

38:00

more. general purpose multi-party FHE code.

38:02

And so we basically were looking

38:04

into matching as like a core

38:07

verb or core action of like

38:09

how can we match people together

38:11

based on private information in a

38:13

way that like is more efficient

38:15

or gets to use kind of

38:17

like more data about people. And

38:19

in the context of like a

38:21

professional event like frontiers we kind

38:23

of stumbled into hiring as

38:26

an interesting example. I think

38:28

there's two main... interesting

38:30

private information like pieces here. The first

38:32

is like salary. So as a recruiter

38:34

there's some like usually like upper bound

38:36

of salary or like ideally want to

38:38

pay somebody and as an employee there's

38:40

some lower bound that you're like willing

38:43

to work for and you'd be excited

38:45

to work for. And so like discovering

38:47

overlap there without having to give

38:49

up that information we thought could

38:51

be really interesting. So instead of

38:53

there being like a lengthy negotiation

38:55

and potentially even just figuring out

38:57

later in the process that. this

38:59

isn't going to pay the... Yeah, it just

39:02

like is not enough basically. You can

39:04

sort of like front load that without

39:06

actually giving up the information. And the

39:08

second bit of privacy that I think

39:11

is useful is like, as a job

39:13

candidate, if you are already employed somewhere, but

39:15

maybe like, you know, are trying to

39:17

figure out what else is out there,

39:19

or maybe are unhappy with your job

39:21

and like want to, you know, start

39:23

applying other places, you can just post

39:25

on LinkedIn. Like, I hate my

39:27

job, get me out of here.

39:29

And so we were thinking, yeah,

39:31

like it could be interesting to

39:33

basically like privately attest to the

39:35

fact that you're looking for new

39:37

jobs, but you only get notified

39:40

of jobs that kind of match

39:42

your ideal circumstances. So you can

39:44

kind of like, it's almost like

39:46

manifesting in a way, you're like

39:48

kind of like manifesting your ideal

39:50

job, like the salary you want,

39:52

the people you want to work

39:54

with, and you're just putting it out

39:56

to end. using the same exact scheme

39:58

where the sort of like heavy lifting

40:00

of this computation is done on a

40:02

server, the users are just responsible for

40:05

encrypting their data. And yeah, it was,

40:07

it was like successful. I think like,

40:09

I got a few, like, okay, I

40:12

put in a fake application, because, you

40:14

know, I'm happy, bad cursive, but I

40:16

wanted to test out the feature, so...

40:19

Like the job market catfish. I think...

40:21

Exactly. Which actually raises an interesting point

40:23

around verifiability that we can get into,

40:26

but... For now I basically put myself

40:28

as like the like ideal candidate like

40:30

willing to work for like 10,000 a

40:32

year like willing to work like 60

40:35

hours a week you know like just

40:37

the most ridiculous ends of each of

40:39

these spectrum so I could ensure some

40:42

matches. Yeah I got some job offers

40:44

you know or like not offers but

40:46

like some things that matched and so

40:49

yeah that was a really fun experiment

40:51

I think exploring yeah what you could

40:53

do with a bit more than jest

40:56

like. This like you're really replacing the

40:58

recruiter here too. Like usually you have

41:00

a quote unquote trusted third party who

41:03

has all of this information that recruiter

41:05

will know that you're looking but your

41:07

employer doesn't know they'll know often your

41:09

salary bounds but like the potential hiring

41:12

company won't really know exactly what your

41:14

your your range is and this is

41:16

sort of like directly bringing the two

41:19

parties together in that private way where

41:21

they can find each other. That's so

41:23

cool. Yeah, absolutely. Like I think this

41:26

comes up a lot in our explorations

41:28

as like a lot of this stuff

41:30

just tends to be much more direct

41:33

with the consumer and you can cut

41:35

out the middleman. And it's interesting, like

41:37

there's attention here where we talk to

41:39

some of the recruiters at the event

41:42

about like what they thought about it.

41:44

And in some ways it's like, in

41:46

some ways, it's like kind of, yeah,

41:49

not synergistic, but I think one positive

41:51

framing that one of the recruiters found

41:53

is like... Actually, it's nice because someone

41:56

like Georgeos can just put out a

41:58

private job description and he himself can

42:00

match with really good people. instead of

42:03

their needing to be kind of like

42:05

a middleman. And I think you can

42:07

actually create an experience that's like a

42:09

little bit less kind of extractive or

42:12

kind of, I don't know, like clearly

42:14

there's a bunch of recruiter sharks coming

42:16

around trying to hire people. It's less

42:19

of head hunting and more just like

42:21

peer-to-peer discovery of good overlap. And it

42:23

can just be done directly between engineers.

42:26

Yeah, it's interesting. There's like positive and

42:28

like negative framings for recruiters. In this

42:30

experience, was there also like a communication

42:33

feature or people could actually send something

42:35

through this? Or was it just to

42:37

the matching and then they had to

42:39

kind of find each other elsewhere? I

42:42

think we just like, once you match

42:44

you just got their telegram or their

42:46

email, like you could just choose how

42:49

you wanted to be contacted and then

42:51

you could just reach out on those

42:53

platforms. Okay. But is this still like

42:56

you're going up to somebody and like

42:58

tapping a card? Are you connecting? Are

43:00

you standing in front of the person

43:03

when you realize it's a match? Or

43:05

is it like there's a pool of

43:07

people and you're getting matched kind of

43:09

willy-nilly? Yeah, in this experiment, you actually

43:12

had to go up and tap people

43:14

and build your own social graph. And

43:16

I think the idea there was that

43:19

if you met. people in person you

43:21

would be able to talk with them

43:23

have sort of a deeper relationship and

43:26

it would be more of a warm

43:28

referral. I think this relates to the

43:30

question of data import which is a

43:33

big question we spend a lot of

43:35

time thinking about in our work because

43:37

a lot of these matching experiments work

43:40

well when there's really rich data available

43:42

about the people who are getting matched.

43:44

And so in this case, the data

43:46

here is the social graph, as well

43:49

as the form inputs for your hiring

43:51

preferences. And you could imagine that in

43:53

an experiment outside of a conference, you

43:56

could get the social graph through other

43:58

means, be it maybe like ZK email

44:00

from your calendar invites, ZKTLS from maybe

44:03

your LinkedIn connections. could find other ways

44:05

to import this data. And you could

44:07

also perhaps do that with job searches.

44:10

You could import data about where you

44:12

worked in the past, for example, and

44:14

have that be filled in automatically. And

44:16

so I think being able to easily

44:19

import data is a question that's very

44:21

relevant to making this experience richer for

44:23

matching. And it's something that we have

44:26

to spend a lot of time getting

44:28

the UX right because people filling out

44:30

forms and having to manually meet people

44:33

in person to build that social graph

44:35

that's not going to be the long-term

44:37

solution and so still an open question.

44:40

And it kind of addresses the catfishing

44:42

concerns right like if you have verifiable

44:44

sources of data? Yeah definitely. I was

44:46

this whole experiment still built on PSI

44:49

only or did you need other primitives

44:51

in there? Yeah so we actually basically

44:53

just wrote a full Boolean circuit. Specifically

44:56

under the hood, it's using few F-H-E-W,

44:58

which kind of takes like Boolean circuits

45:00

as input. The main kind of new

45:03

functionality we needed was a comparator, like

45:05

a greater than, because we wanted to

45:07

compare the recruiter salary upper bound with

45:10

like the candidate's lower bound. And everything

45:12

else ended up just being like a

45:14

bunch of aunts and oars and stuff.

45:16

Like, you know, is there overlap on

45:19

an experience level? Like, I only want

45:21

to hire people with like a bachelor's

45:23

or higher. and just making sure that

45:26

that like take the end of that

45:28

bit vector and the candidate's bit vector

45:30

is there like overlap basically. Cool. So

45:33

I just remember when we were planning,

45:35

when we were talking about the ZK12

45:37

activation, we had actually thought a bit

45:40

about this hiring experiment as maybe also

45:42

something we could run there. We decided

45:44

against it. I remember us kind of

45:46

going over a few iterations of what

45:49

Like what could we get out of

45:51

this moment with these people? What can

45:53

they get out of that as well?

45:56

Like where would they get a kick

45:58

out of this? I think what we

46:00

ended... up landing on was having sort

46:03

of preferences again because in ZK11

46:05

I just remember it being like

46:07

number of talks and number of

46:09

contacts. at CK 12 we actually

46:11

had something more like what are

46:14

you into what are you like

46:16

what are you not like or

46:18

I think the question was which

46:20

of these are overrated but people

46:22

got confused on the scale was

46:25

like was three overrated or was

46:27

one overrated yes I got a

46:29

little bit confused how to vote

46:31

for it which led to some

46:33

great conversations I thought That's on

46:35

me. But yeah, but maybe you

46:37

share a little bit about how

46:40

this differed. What were you using

46:42

for this? I think ZK-12 for us

46:44

was more of an ideological

46:46

progression. I think during

46:48

the actual app experience, we

46:50

did do more of these

46:53

hot takes finding more rich

46:55

ways for people to actually

46:57

connect with each other based on

46:59

more meaningful data. I think what

47:01

we realize is the questions you

47:03

ask people and what they're responding

47:05

to really matters. You want two

47:07

people to be able to meet

47:09

each other and when they learn

47:11

each other's preferences, actually be like,

47:13

oh, that's cool. This is a

47:15

conversation now, or I'm really excited.

47:17

Why do you think this? So

47:20

I think we learn a lot

47:22

in that direction. But more specifically,

47:24

we... kind of had two new

47:27

concepts that we were playing

47:29

around with, which were just

47:31

framings of things we had already

47:33

done, specifically digital pheromones

47:36

and narrow casting, and narrow casting

47:38

also being relevant to Trinity, which

47:41

was a new MP scheme that

47:43

we were looking into at the

47:45

time. Maybe I can talk a

47:48

little bit about digital pheromones and

47:50

Vivic you can take narrowcasting with

47:52

Trinity. For us we were thinking

47:55

about, okay, like what is actually

47:57

going on here? We have this

48:00

to match multiple people on private

48:02

information, sort of build more meaningful

48:04

connection through these interactions, how can

48:06

we describe what is happening here?

48:08

And I think what we ended

48:10

up on is this idea called

48:12

digital pheromones, specifically pheromones being these

48:14

discrete. chemical signals that you're constantly

48:17

sending out in search of human

48:19

compatibility or a mate or whatever

48:21

it might be and digital pheromones

48:23

are the digital equivalent. So they

48:25

can be applied to many different

48:27

settings. It could be online dating,

48:29

could be private hiring, but crucially

48:32

what ties this all together is

48:34

the idea that they are private

48:36

and safe. So when I have

48:38

like my physical pheromones, like this

48:40

is not something that I'm just

48:42

yelling out or screaming into public

48:44

space, these are much more discreet

48:46

and these are things where, okay,

48:49

when you actually interact with me,

48:51

then they get surfaced in passive

48:53

ways. And I think digital pheromones

48:55

is kind of a similar concept

48:57

where These are all private signals.

48:59

They're all based on potentially sensitive

49:01

data that remains private to you.

49:04

But the only time you actually

49:06

realize something is going on is

49:08

if you are connected with someone

49:10

or if you do meet someone

49:12

that matches your signals. And so

49:14

I think we thought this was

49:16

really cool because now there's this

49:19

way. for people to just be

49:21

walking around going about their daily

49:23

life, potentially walking around a conference

49:25

or event, just doing what they

49:27

are normally planning on doing, but

49:29

behind the scenes, all this matching

49:31

is going on and all this

49:33

compatibility and connection is being found,

49:36

but none of it is being

49:38

done. on a big server that

49:40

sees everything, for example. Yeah, this

49:42

reminds me of contact tracing. Yeah.

49:44

When so the pandemic broke out,

49:46

you know, there was sort of

49:48

two worlds. There was this dystopian

49:51

world where one government would put

49:53

out an app that tracks everyone

49:55

and knows all the interactions of

49:57

every people. And there was sort

49:59

of the utopian version of that

50:01

a lot of economics were pushing

50:03

for. And it's something like this,

50:05

where you would disperse your scent.

50:08

If you were positive, you could

50:10

send out a signal and those

50:12

who picked up your scent would

50:14

be alerted, but privately, only they

50:16

would know. So I'm curious to

50:18

see where this goes, like what

50:20

other sort of use cases we

50:23

can find for this. Yeah, I

50:25

think probably was the first kind

50:27

of wide scale deployment of something

50:29

like this. And then the hiring

50:31

thing we just talked about is

50:33

very much kind of like also

50:35

a proto version of the pheromone

50:38

here literally just being like, like,

50:40

I want this job. a private

50:42

manifestation kind of. It's like you

50:44

kind of put out what you

50:46

want for yourself or like who

50:48

you are and where you want

50:50

to be and you can sort

50:52

of just discover matches and overlap.

50:55

You know, if this is to

50:57

be something that is like fully

50:59

akin to like natural pheromones, like

51:01

chemical pheromones, I do think cryptography

51:03

is the right substrate for it

51:05

in that it is like very

51:07

neutral, it's very peer-to-peer, there's no

51:10

dependence on a centralized server. Like

51:12

I think this is like one

51:14

of the rare things where a

51:16

TEE does not kind of fully

51:18

subsume it because it I think

51:20

does fundamentally change the nature of

51:22

something like this where it's you

51:24

do have to go through some

51:27

service that is like providing this

51:29

matching versus it being like yeah

51:31

literally my phone is letting out

51:33

signals to the people around me

51:35

or like on an online platform

51:37

and they can just parse it.

51:39

So yeah I think this was

51:42

a really fun kind of framing

51:44

and wrapping for a lot of

51:46

our technology that made it easier

51:48

to explain and think about. And

51:50

we actually picked it up at

51:52

D-Web, a decentralized web camp in

51:54

California, just from some conversations. with

51:57

kind of things that just need

51:59

to be happening in the background.

52:01

Oh, another concept that you've been

52:03

very excited about is this idea

52:05

of local first hardware. So I

52:07

think this is a great fit

52:09

for digital pheromones because these are

52:11

kind of things that just need

52:14

to be happening in the background.

52:16

And you could run it on

52:18

your phone, but the problem is

52:20

Apple is very restrictive. about the

52:22

things you can do on a

52:24

phone. That is just their philosophy.

52:26

I think everyone who has developed

52:29

on iPhone knows this and they

52:31

are one of the most fun

52:33

products to use as a user

52:35

and one of the worst companies

52:37

to deal with as a developer,

52:39

as many people know. Yep, exactly.

52:41

So there's limits to what you

52:43

can do with an iPhone with

52:46

existing devices, but I think a

52:48

really cool concept is having open

52:50

hardware. that like somehow is connected

52:52

to your sensitive data but keeps

52:54

it securely on that hardware and

52:56

you can actually walk around maybe

52:58

wearing a pendant or something that's

53:01

just constantly sending out these signals

53:03

to other people and finding compatibility

53:05

that way just in your normal

53:07

day-to-day life. And so I think

53:09

that's a very like interesting area

53:11

of exploration. If anyone is very

53:13

knowledgeable about hardware and wants to

53:16

work on this stuff, please let

53:18

us know. So I think another

53:20

concept that we introduced at CK

53:22

12 was narrowcasting, which essentially is

53:24

like the opposite of broadcasting. You

53:26

can basically pick like specific criteria

53:28

that you want your message to

53:30

be received by and kind of

53:33

the cryptographic version of this is

53:35

that like literally it could only

53:37

be decrypted by people that fit

53:39

this criteria. So like witness encryption

53:41

is kind of like the purest

53:43

version of this, but you can

53:45

build something with similar affordances using

53:48

a mix of like ZK and

53:50

MPC. Another related result to this

53:52

that we published for the first

53:54

time at CK-12 was a new

53:56

scheme called Trinity, which was developed

53:58

in-house, basically mixing like garbled circuits,

54:00

plunk, and then a very recent

54:03

result using KZG witness encryption, really

54:05

beautiful paper, would recommend people to

54:07

check it out. And yeah, like

54:09

one really nice affordance is that

54:11

you can build something like narrowcasting

54:13

really easily because it has... Really

54:15

low rounds of interaction between in

54:17

this case the two parties? This

54:20

is like a general flaw of

54:22

MPC if you want to build

54:24

apps with it There's like usually

54:26

a lot of back and forth

54:28

and it's pretty annoying for an

54:30

app developer to deal with if

54:32

you're trying to make a consumer

54:35

app Just for the reason that

54:37

people put their phones away like

54:39

literally just like once the phone

54:41

goes away just like no longer

54:43

can respond to requests as easily

54:45

like Apple exposes some things was

54:47

this part of the motivation for

54:49

your server-aited MPC model? Yes, absolutely.

54:52

Like that's another place where multi-party

54:54

FHG shines is you can delegate

54:56

a bunch of stuff to the

54:58

server and so you don't need

55:00

to be online for those phases.

55:02

But ultimately it still has like

55:04

about four rounds of back and

55:07

forth interaction because now I need

55:09

to send something to the server,

55:11

server needs to get back to

55:13

you, you need to then do

55:15

this decryption. Whereas Trinity is basically

55:17

just one round of interaction. Like

55:19

I basically just send like an

55:22

encrypted email to somebody. and they

55:24

can decrypt it if they match

55:26

some criteria. And the other nice

55:28

thing that Trinity adds in is

55:30

actually verifiability of input. So this

55:32

relates to Nico, what you're talking

55:34

about with catfishing. Like, this is

55:36

kind of a general problem with

55:39

MPC is like, you know, if

55:41

the inputs aren't like verified or

55:43

signed in some way, then you

55:45

can basically say whatever you want,

55:47

right? You can sort of like,

55:49

discover the other person's private information's

55:51

private information by just like repeatedly

55:54

querying them. And so... Trinity also

55:56

basically adds a really like clean

55:58

tie between like zero knowledge proofs

56:00

which can prove various properties of

56:02

your input data, and like a

56:04

multi-party computation, which in this case

56:06

is done with garbled circuits. Cool.

56:09

Moving on to your next events, Andrew,

56:11

you and I jumped on a call

56:13

after ZK-12 and you were at Edge

56:15

City. Were you running something similar to

56:17

like Zoo Pass in Edge City? What

56:19

was, what were you working on there?

56:21

I think, first off, shout out

56:24

to Janine and to Moore

56:26

and the rest of the

56:28

Edge City team for... letting

56:30

us do something throughout the

56:32

whole month at their event.

56:34

I think they were very

56:36

gracious and kind in supporting

56:38

all of the hitches along

56:40

the way as we were

56:42

developing this. At Edge City

56:44

Lana we built an app

56:46

called Accursive Connections and the

56:48

idea was to better connect

56:50

people within this specific sphere

56:52

of Edge City Lana. And

56:54

so some things were similar

56:56

related to people being able

56:58

to form their own social

57:01

graphs from NFC tapping where

57:03

everyone had a wristband, but

57:05

some things were also different

57:07

in that we had matching

57:09

that was more specific to

57:11

the Edge City community. So

57:13

one big thing at Edge

57:16

City was the Tensions game,

57:18

I think timber ran that,

57:20

and the Tensions game was

57:22

hot takes where you could

57:24

fill out your opinion on these

57:26

hot takes and when you

57:28

actually met someone you would

57:30

figure out whether or not

57:33

you agreed on some of

57:35

them but more importantly which

57:37

ones you disagreed on and

57:39

within the Edge City community

57:41

this was a big topic

57:43

of conversation and another interesting

57:45

experiment we tried out at

57:47

Edge City was we wanted

57:49

to see if we could

57:51

match people within a specific

57:53

event. So we chose the Halloween

57:55

party that they were throwing and

57:58

we wanted people to be able

58:00

to walk into a room, kind

58:02

of upload their their preferences here,

58:04

and within the event to basically

58:06

find who else who is there

58:08

that they might be compatible with

58:10

or might want to spend more

58:13

time with after the party. Like

58:15

a dating app? We framed it

58:17

more as a friendship finding, but

58:19

I think this could easily be.

58:21

But really, it was dating. Dating

58:23

up in certain contexts. Yeah. We're

58:25

just surfacing the connection, however far

58:27

that takes you. Cool. And I

58:29

think there are a few interesting

58:32

takeaways here. Number one is just

58:34

a very practical lesson of... people

58:36

don't want to take out their

58:38

phones at events. Oh, yeah. And

58:40

I think this is actually what

58:42

inspired some of the hardware directions

58:44

as well. The idea that you

58:46

can just have hardware that's just

58:48

like passively there that maybe lights

58:51

up when you find connection, that

58:53

would make much more sense at

58:55

this kind of event as opposed

58:57

to people needing to check out

58:59

their phones. And another. related learning,

59:01

which I guess we'll talk about

59:03

more, is specifically we wanted a

59:05

lot of the computation to be

59:08

non-interactive. So we wanted to be

59:10

able to surface the matches directly

59:12

within the event without people having

59:14

to check their phones. And so

59:16

this naturally surfaced the idea of

59:18

using T's. because the problem with

59:20

multi-party FHE is you do have

59:22

this interactive decryption step. So we

59:24

thought of this example as one

59:27

where you could enter room and

59:29

you understand that the data you

59:31

share within that room or within

59:33

that ephemeral context will go to

59:35

secure hardware because it needs to

59:37

match you non-interactively. cryptographic, purely like

59:39

software, mathematics. We have these hardware

59:41

tools, some trust them, some don't.

59:43

They kind of fulfill a lot

59:46

of the functionality we want to

59:48

use cryptography for. And so my

59:50

question is, as a design team,

59:52

where do you draw the line

59:54

between staying in pure cryptography or

59:56

reaching out for the T's? Yeah,

59:58

it's actually a question that we've

1:00:00

grappled with a lot this past

1:00:02

year, and there's a lot of

1:00:05

different angles to look at it

1:00:07

from. One angle is like funding,

1:00:09

so we... So far I've been

1:00:11

funded by privacy and scaling expirations

1:00:13

at the Ethereum Foundation with grants

1:00:15

and so like they support programal

1:00:17

cryptography research so a lot of

1:00:19

our focus has been in that

1:00:21

direction because that's the community and

1:00:24

ecosystem we've been a part of

1:00:26

and it's been very synergistic in

1:00:28

that way in that we're able

1:00:30

to take technology that's developed in-house

1:00:32

and then find you know like

1:00:34

product facing uses of it. And

1:00:36

I think yeah as long as

1:00:38

we're funded that way it will

1:00:41

always be a priority to explore

1:00:43

the stuff. Another angle here is

1:00:45

like user first and I think

1:00:47

like something that we have yet

1:00:49

to identify internally and as far

1:00:51

as I can tell also externally

1:00:53

is like when people care about

1:00:55

using the full cryptographic version of

1:00:57

something versus something like secure hardware

1:01:00

ultimately it doesn't really matter what

1:01:02

like purest cryptographers think is correct

1:01:04

if you're trying to build stuff

1:01:06

for people it just matters what

1:01:08

they think. At least if you

1:01:10

want people to use your stuff,

1:01:12

if you don't care, then I

1:01:14

guess, you know, make your perfect

1:01:16

utopia, I guess. And I think

1:01:19

like, ultimately there's tradeoffs to using

1:01:21

this stuff. And I think, I

1:01:23

think there's like a common phrase

1:01:25

that comes up in cryptography. So

1:01:27

girls like, oh, it's just dependent

1:01:29

on math. And like, for some

1:01:31

reason in this world, that's cool

1:01:33

and makes sense. But I think

1:01:35

for a lot of people, this

1:01:38

is just intuition, like, like, like,

1:01:40

like, that can't see your things.

1:01:42

Like I feel like that just

1:01:44

clicks a bit better. Or like

1:01:46

at least I could see it

1:01:48

clicking better. And so yeah, like

1:01:50

one thing we definitely want to

1:01:52

clarify. more in 2025, both for

1:01:55

ourselves and for the external community,

1:01:57

is like, yeah, when do people

1:01:59

care? So running some experiments with

1:02:01

TE is running some stuff with

1:02:03

pure MPC, and just getting some

1:02:05

user data on like, how do

1:02:07

you respond to the copy around

1:02:09

this stuff? Because ultimately. You know,

1:02:11

an average person is not going

1:02:14

to verify a TE attestation or

1:02:16

like look at the verification key

1:02:18

for this proof. They're completely trusting

1:02:20

you and the sort of copy

1:02:22

and explanation that you give them

1:02:24

and like the sort of feeling

1:02:26

the app elicits. So basically, like

1:02:28

my answer is like to be

1:02:30

determined what balance we're going to

1:02:33

use for this and we want

1:02:35

it to just be very user-driven

1:02:37

versus like what we think is

1:02:39

right. And yeah, excited to share

1:02:41

with the community, the findings we

1:02:43

get there. Yeah, super curious to

1:02:45

see results. Like I think a

1:02:47

lot of people are either committing

1:02:49

to one because they believe in

1:02:52

it But I think I've seen

1:02:54

less of a kind of like

1:02:56

Let's try them both and see

1:02:58

what happens Yeah, one way I've

1:03:00

been thinking about this is in

1:03:02

terms of the hierarchy of trust

1:03:04

when it comes to data privacy

1:03:06

and ownership So you can think

1:03:09

about the lowest level of trust

1:03:11

a user has in an application

1:03:13

is one where the application just

1:03:15

like makes no claims to keep

1:03:17

your data private and just like

1:03:19

blatantly will sell your data and

1:03:21

everyone knows about it. The level

1:03:23

that comes above that is one

1:03:25

where the application is just like

1:03:28

trust me bro I know what

1:03:30

I'm doing I'm not gonna like

1:03:32

sell your data or anything. After

1:03:34

that comes regulatory trust. An example

1:03:36

here in a different topic is

1:03:38

like licenses. Like people trust licenses

1:03:40

because you can like eventually bring

1:03:42

someone to a court of law

1:03:44

if they violate the license. And

1:03:47

at the end of day you

1:03:49

like have trust in that system

1:03:51

because of the regulatory mechanism that

1:03:53

underlays it. And then one above

1:03:55

that I would put secure hardware

1:03:57

hardware. where you maybe don't have

1:03:59

to trust the application developer as

1:04:01

much. if they do remote attestation,

1:04:03

if they open source their code

1:04:06

and everything, but now you're trusting

1:04:08

Intel, you're trusting like state actors

1:04:10

to not break into this, maybe

1:04:12

you're trusting a $150,000 microscope or

1:04:14

whatever the cost is for that.

1:04:16

But then the top of that,

1:04:18

or rather the second from the

1:04:20

highest, is cryptography. This is like.

1:04:23

trust in math and the real

1:04:25

beauty of cryptography in the trust

1:04:27

hierarchy is that you can verify

1:04:30

it from first principles like Intel

1:04:32

is is closed source like or

1:04:34

SDX TDX like you know you

1:04:36

can't go into every single layer

1:04:39

of depth and check it yourself

1:04:41

but theoretically you could do the

1:04:43

same with MPC with Fache and

1:04:45

actually go in and make sure

1:04:48

everything checks out and that your

1:04:50

data is safe. But I do.

1:04:52

But yes, yes, yes. Yeah, the more

1:04:54

practical framing is that you trust a

1:04:56

bunch of smart people with a lot

1:04:58

of degrees to actually go in there

1:05:01

and verify this and tell you like,

1:05:03

hey, it's good. Which is also why

1:05:05

cryptography really just has to be paired

1:05:07

with open source if you can't go

1:05:09

in and verify it. It kind of

1:05:11

makes no sense to be going with.

1:05:13

But there is like a sneaky, like,

1:05:16

I don't know, it technically belongs in

1:05:18

the top of the hierarchy, but it's

1:05:20

like somewhat... restricted to a certain design

1:05:22

space, which is just local first. You

1:05:24

can think about this in terms of

1:05:26

LLLM's processing your data. If an LML

1:05:29

wants to process your data and it's

1:05:31

running entirely on your machine, that is

1:05:33

arguably like the highest level of trust.

1:05:36

You know, you can just turn your

1:05:38

computer offline and you can just run

1:05:40

everything locally and that's great. But that's

1:05:42

restricted to single player applications. Like once

1:05:45

you want to get into multi-party computation,

1:05:47

then you have to do either cryptographyography

1:05:49

or secure hardware. So I do think

1:05:51

like the big open question from

1:05:54

a user first perspective is

1:05:56

what applications are best fit

1:05:59

for which level of trust and

1:06:01

how do users actually perceive these things?

1:06:03

And I think to answer your question,

1:06:05

cryptography is really important for very sensitive

1:06:08

data. Anything that might involve like medical

1:06:10

data, anything that people really might not

1:06:12

want to share with the server, I

1:06:15

think that's where cryptography can really shine.

1:06:17

I want to talk about the last

1:06:19

event of the year, I think, for

1:06:22

you. I mean, if we just go

1:06:24

back, this is, I mean, 2024 sounds

1:06:26

like it was just a marathon of

1:06:28

events and activations for the two of

1:06:31

you or for the group. But let's

1:06:33

talk a little bit about DevCon and

1:06:35

what you did there. There's like an

1:06:38

art gallery. I remember you telling me

1:06:40

about this before you did it. How

1:06:42

did it go? Yeah. main new technical

1:06:45

thing we did was a collaboration with

1:06:47

yet another guest on this show, the

1:06:49

folks from Tetsaio, to essentially do a

1:06:51

co-snark experiment. It's actually kind of a

1:06:54

iteration of the ZK-Rapped kind of in

1:06:56

a way where essentially we wanted people

1:06:58

to be able to like prove to

1:07:01

us that they'd hit some number of

1:07:03

taps or connections at the event, again

1:07:05

using NFC cards and this sort of

1:07:08

thing to produce signatures. And we had

1:07:10

a little prize store again. It was

1:07:12

like NFC rings, we had like NFC

1:07:14

bucket hats, we had bracelets, we had

1:07:17

the whole like the whole lineup. NFC

1:07:19

bucket hats, I've never heard that. NFC

1:07:21

bucket hats, yeah, yeah, I think I

1:07:24

have one somewhere. I got one of

1:07:26

the last ones. It's just an NFC,

1:07:28

like a cloth, resistant NFC tag behind

1:07:31

a label. It's actually really nice. And

1:07:33

also setting up that clothing line was

1:07:35

super fun. That was a collaboration with

1:07:38

myself and... Tesla, who is a contractor

1:07:40

on our team. Anyway, we basically want

1:07:42

people to make proofs for us that

1:07:44

they hit some number of connections, and

1:07:47

we want to experiment with delegating that.

1:07:49

Again, actually in the same vein as

1:07:51

like multi-party FHE, where you would love

1:07:54

for, you know, less of the computation

1:07:56

to happen on your own device and

1:07:58

for more of it to be kind

1:08:01

of done somewhere else. And so, yeah,

1:08:03

what people would do is they would

1:08:05

take the signatures they collected, they would

1:08:07

seek or share it into three. three

1:08:10

parts and we did a fun thing

1:08:12

where three different teams hosted the co-snark

1:08:14

servers. PSC hosted one of them, the

1:08:17

PSC Infor team, shout out to them,

1:08:19

cursive hosted one of them. I am

1:08:21

terrible at AWS. I like messed up

1:08:24

the deployment once or twice so I

1:08:26

was the weakest link in the chain,

1:08:28

but we hosted one and then to

1:08:30

say I hosted one. And yeah, like

1:08:33

together, you know, there's some sort of

1:08:35

like... you know theoretically we could all

1:08:37

collude and see your signatures but there's

1:08:40

kind of a reputation level thing which

1:08:42

i think is really interesting of like

1:08:44

we're all privacy focused teams the chance

1:08:47

that we do this is low or

1:08:49

at least it would kind of hurt

1:08:51

our reputations if we did and so

1:08:54

yeah we basically did this whole delegated

1:08:56

proving experiment and it actually like was

1:08:58

like oversubscribed like i think we had

1:09:00

a few tens of thousands of proofs

1:09:03

overall and there's one point where I

1:09:05

think almost almost 20,000 yeah across the

1:09:07

whole event and yeah basically again like

1:09:10

this is my fault where we were

1:09:12

supposed to like replicate the nodes so

1:09:14

that there could be more servers making

1:09:17

proofs And then not only did I

1:09:19

not do this, but also like two

1:09:21

of our nodes broke. So there's only

1:09:23

one node on the cursive side and

1:09:26

then eight for PSC and Tatsayo. And

1:09:28

so we're completely bottlenecked by cursive and

1:09:30

then eventually we fixed it and it

1:09:33

was fine. It cleared out the cue

1:09:35

of proofs that was waiting. But yeah,

1:09:37

one of the coolest things about deploying

1:09:40

things in the real world is that

1:09:42

you get very direct feedback loops. And

1:09:44

the way we had set it up

1:09:46

was that you would make these proofs

1:09:49

to show how many people you've met

1:09:51

and you could get some of this

1:09:53

NFC merch by showing these proofs. And

1:09:56

so we realized that the infrastructure for

1:09:58

generating Coast Narks was not working when

1:10:00

there were tens, if not a hundred,

1:10:03

of angry people standing in front of

1:10:05

our booth asking us. why their number

1:10:07

wasn't going up. Oh no. That was

1:10:09

a fun day. I love that you

1:10:12

you put yourselves in this sort of

1:10:14

line of fire. But it's just so

1:10:16

it's I mean it's also you get

1:10:19

like the visceral feeling I feel like

1:10:21

after that you go back building and

1:10:23

you really you take it in you're

1:10:26

not ignoring that feedback. I feel like

1:10:28

it sticks with you. No I think

1:10:30

we're really motivated by that as a

1:10:33

team like collecting it and also acting

1:10:35

on it. I mean, we do a

1:10:37

lot of just like ivory tower stuff

1:10:39

as well. It's hard not to when

1:10:42

you're trying to figure out what to

1:10:44

do with this technology. But we try

1:10:46

to like be on the ground as

1:10:49

much as we can. Yeah. And we

1:10:51

really like every opportunity we get, we

1:10:53

try to like make the most of

1:10:56

it reflect on it heavily and just

1:10:58

like move forward. I mean, that's a

1:11:00

huge number of events just there that

1:11:02

we covered testified to what you're saying

1:11:05

now. Yeah, again, huge shout out to

1:11:07

Tato folks. Ash, Ash, Lucas. Lucas. The

1:11:09

other Lucas Daniel Roman a bunch of

1:11:12

bunch of amazing folks helped both with

1:11:14

the activation But also they just came

1:11:16

to the booth and like helped volunteer

1:11:19

and stuff. So such lovely folks. Yeah

1:11:21

I Guess that ties into the the

1:11:23

final part of our DevCon experience which

1:11:25

was the cryptographic connections museum that we

1:11:28

launched in collaboration with a bunch of

1:11:30

artists and collaborators And the idea behind

1:11:32

the museum was just to showcase all

1:11:35

the work that has gone into cryptography,

1:11:37

help educate a lot of attendees who

1:11:39

might not know much about cryptography and

1:11:42

its history, and also tell people what's

1:11:44

going on in the future and what

1:11:46

to get excited about. And we basically

1:11:48

got a bunch of artists and cryptographers

1:11:51

and everything in between to showcase different

1:11:53

pieces of work. And I think... the

1:11:55

most exciting part of the whole experience

1:11:58

for me was that But Ash had

1:12:00

set up a display about the history

1:12:02

of MPC. So she had all of

1:12:04

these different fundamental

1:12:06

papers. I remember like the

1:12:08

day before I had gone

1:12:10

to a print shop in

1:12:13

Thailand and gotten like literally

1:12:15

like five, six hundred pages

1:12:17

of papers printed of just

1:12:19

math. And they were so

1:12:21

confused. Like, what is going

1:12:23

on here? And the whole

1:12:25

display was just these papers

1:12:27

and this like history of

1:12:29

MPC and a bunch of

1:12:31

like golden frames Set up

1:12:33

like an academics desk like

1:12:35

a coffee mug pen paper

1:12:37

all that stuff And

1:12:39

throughout the event like

1:12:41

this was Super attractive

1:12:44

to a lot of the museum

1:12:46

I guess and two people and they

1:12:48

both had their own papers, Grott

1:12:51

16 and Beaver Triples, on the

1:12:53

table. And so that was so

1:12:55

exciting seeing them walk over and

1:12:57

get to pick up their own

1:12:59

paper and be like, oh my

1:13:01

God, this is so cool. That's

1:13:03

definitely the highlight of DevCon for

1:13:05

me. Amazing. Nico actually was

1:13:07

also a featured artist. Do

1:13:09

you want to talk about the

1:13:11

thing that you did together? Oh, yeah.

1:13:14

You guys printed out the ZK

1:13:16

jargon decoder. It was supposed to just

1:13:18

be a museum piece and a

1:13:20

prize, but we actually had like

1:13:22

three or four robberies. That was

1:13:24

actually like... Oh, they all got

1:13:26

stolen. Okay, wonderful. Yeah. Pretty much

1:13:28

all of them. I think we

1:13:31

saved one for you, right? I

1:13:33

hope you have yours. Yes. Okay,

1:13:35

great. It's right here. Oh, cool.

1:13:37

Wonderful. Wonderful. The rest got stolen.

1:13:39

So, uh... If you're out there

1:13:41

listening to this, we will find

1:13:43

you. You weren't supposed to take

1:13:45

them. Wild. Okay, so that wrapped

1:13:47

up, I guess, 2024 for you.

1:13:49

When I spoke to you, end

1:13:51

of the year, you did sound.

1:13:53

You were like, I don't want

1:13:56

to travel anymore. Although I think

1:13:58

actually Andrew, you kept traveling. But

1:14:00

we're now, 2025, beginning of the year,

1:14:02

what's the plan? Are we going to

1:14:04

see you doing more activations at events?

1:14:07

Are you actually planning on doing something

1:14:09

else? You were talking about maybe a

1:14:11

shift more towards product. So yeah, tell

1:14:14

us what you're thinking. Yeah, I think

1:14:16

like, specifically technical directions are still being

1:14:18

figured out, but like, definitely, I think

1:14:20

just in terms of like process of

1:14:23

building, I think trying to shift more

1:14:25

to marathon mode, I think last year

1:14:27

was definitely a lot of sprints. of

1:14:29

like something comes up it aligns enough

1:14:32

with our directions and I think we

1:14:34

were just really in deep need of

1:14:36

like data like we just needed to

1:14:39

like try things with people who weren't

1:14:41

already billed sometimes like at a conference

1:14:43

like CK Summit it's actually good to

1:14:45

try it with people who are billed

1:14:48

just to educate more than like necessarily

1:14:50

get user data but something like DevCon

1:14:52

leans much more in the other direction.

1:14:55

And I think this year, probably still

1:14:57

we'll do some events and conferences just

1:14:59

because they're convenient and we have good

1:15:01

connections with them, but I think building

1:15:04

products for specific personas and just trying

1:15:06

to like grow within the cities that

1:15:08

we live in and like just try

1:15:10

to get like further and further away

1:15:13

from like ZK, Ethereum land. Because I

1:15:15

think the sort of confounding factor in

1:15:17

our space, which is both a blessing

1:15:20

and a curse, is that like... People

1:15:22

are down to try technology for technology

1:15:24

sake. Like they're like, oh, cool thing,

1:15:26

in the tech, let me try it.

1:15:29

Versus like, this does something good for

1:15:31

me. And most people operate entirely in

1:15:33

the latter camp of like, oh my

1:15:36

God, I don't want to have another

1:15:38

app on my phone. I just only

1:15:40

wanted if it's going to like add

1:15:42

to my life. So it's a little

1:15:45

bit like high level, but just I

1:15:47

think trying to get more feedback loops

1:15:49

from people, very outside of the space,

1:15:52

very hard. One example that comes to

1:15:54

mind is like professional apps entirely. So

1:15:56

at people, you know, who are like

1:15:58

LinkedIn power users or something, like how

1:16:01

can we make their kind of hiring

1:16:03

job search experience even better and just

1:16:05

trying to build a very like focused

1:16:07

application around that is like one example.

1:16:10

I don't know. and of doing that,

1:16:12

but. Cool. Are you looking for the

1:16:14

product, like the singular product that you

1:16:17

do end up building? Is that sort

1:16:19

of what a lot of this was

1:16:21

headed towards? Or do you actually see

1:16:23

yourself having a suite of different, just

1:16:26

more built-out products? We'll see. I'm excited

1:16:28

to check back in like six months

1:16:30

and let you know, but because we

1:16:33

are in more of a like consumer

1:16:35

and social area, like I think what

1:16:37

tends to be the right process in

1:16:39

this space is. like lots of shots

1:16:42

on goal and you see what sticks

1:16:44

and then go deeper with that. So

1:16:46

I have a sense that that's going

1:16:49

to be at least like the short-term

1:16:51

strategy is just building out lots of

1:16:53

stuff giving it an earnest experiment and

1:16:55

then trying to have a conclusive yes

1:16:58

or no and just continue and understanding

1:17:00

that most of them will be no's

1:17:02

and that is just kind of how

1:17:04

it is. Percursive actually I really liked

1:17:07

the approach like from the start and

1:17:09

Yeah, I want to see what next

1:17:11

year brings. Yeah, totally and on the

1:17:14

flip side We're also always looking to

1:17:16

collaborate with other teams on NBC FHE

1:17:18

research Any sort of technical research that

1:17:20

might align with these directions. We've had

1:17:23

many successful collaborations in the past with

1:17:25

different teams work in the space. So

1:17:27

if you are doing any technical explorations

1:17:30

and you want to maybe see it

1:17:32

integrated into applications, user-facing products, please do

1:17:34

reach out to us. Are you worried

1:17:36

at all about like some of the

1:17:39

patent stuff in the FAG world? Like

1:17:41

does that stress you out because you're

1:17:43

touching FAG a lot? And I'm just

1:17:46

wondering like, are any of the libraries

1:17:48

you're actually using potentially at risk because

1:17:50

of the more extreme patenting and less

1:17:52

open source nature of at least the

1:17:55

way FHA seems to be developing? I

1:17:57

think for the time being actually like.

1:17:59

Multi-party FHE is no longer a key

1:18:01

part of our toolkit. Just like right

1:18:04

now, there's a little bit of, there's

1:18:06

a few bottlenecks, like in particular, like

1:18:08

public key sizes are very large, it's

1:18:10

a little bit slow, it's like a

1:18:12

little bit hard to use, and I

1:18:14

don't foresee that changing in the near

1:18:16

future, or at least we have a lot

1:18:18

of other options that we have to

1:18:20

explore more fully before we come back

1:18:22

to it. So it isn't directly affecting

1:18:24

us. we were talking earlier about how

1:18:26

lovely it is that we're a big

1:18:28

family and this feels like a certain

1:18:30

like you know warring faction just like

1:18:32

decided to leave and make things harder.

1:18:34

And I hope they turn that around

1:18:36

like you know as Andrew said there's

1:18:38

an understanding that we're not fighting each

1:18:40

other we're fighting like the rapidly encroaching

1:18:42

like centralized zero privacy based world and

1:18:44

that's who we need to be focused

1:18:46

against and not against each other so it's

1:18:49

easy to say that in theory but I

1:18:51

understand if you're trying to run a business

1:18:53

it can be easier to be like zero

1:18:55

sum, I don't know. Yeah, I do think

1:18:57

this is a question of

1:18:59

long-term trajectory. If you want developers

1:19:02

to come to your ecosystem,

1:19:04

if you want people to

1:19:06

build upon the crypto systems

1:19:08

you are building, I think

1:19:10

open source is pretty imperative to

1:19:12

that. Now I don't claim to

1:19:14

know the specifics about the licenses

1:19:16

and the tradeoffs there and what

1:19:19

it means for business, but I

1:19:21

do think Generally speaking, the

1:19:23

more open, the better, at least

1:19:26

in this early stage of development.

1:19:28

Because the question is not which

1:19:30

FHE system is going to win.

1:19:33

It's whether FHE even stands a

1:19:35

chance in the first place. Yeah,

1:19:37

good call. Well, thank you both

1:19:39

for coming on the show,

1:19:42

sharing with us the journey

1:19:44

of cursive, all of the

1:19:46

activations and experiments, and the

1:19:48

direction you see yourselves going.

1:19:50

Thanks for being here. the two spotlights at

1:19:52

CK 11 and 12, like that's been so

1:19:54

great for us. And also just, you know,

1:19:57

to I think build awareness and education for

1:19:59

this type. has has been inspiring for

1:20:01

us us. It's really to see what

1:20:03

cryptographers think of this. think

1:20:05

of Thanks, Cool. for joining this one. for

1:20:07

Thanks for having me on. one. I

1:20:10

want to say a big thank

1:20:12

you to the podcast team, to say a big

1:20:14

thank you to the And to our listeners, thanks

1:20:16

for listening. and Tanya, and

1:20:19

to our listeners. Thanks for listening.

Unlock more with Podchaser Pro

  • Audience Insights
  • Contact Information
  • Demographics
  • Charts
  • Sponsor History
  • and More!
Pro Features