Blockchain

14 Articles
EthSafari Discussion on ZK-Based KYC

EthSafari Discussion on ZK-Based KYC

At EthSafari 2025, I joined the Zero-Knowledge panel to discuss how ZK proofs can transform KYC. Beyond blockchain scalability, ZK can bridge the gap between privacy and compliance—verifying identity without exposing sensitive data. This article explores the difference between data integrity and computational integrity, why ZK proofs thrive in blockchain systems, and how we might design effective, privacy-preserving KYC protocols for the future.

Bringing Trust to the Edge: Secure Execution Without Consensus

Bringing Trust to the Edge: Secure Execution Without Consensus

Trust on the edge is becoming as crucial as confidentiality—a right increasingly seen as fundamental. While blockchains rely on consensus for trust, what if execution could be securely verified at the edge, without needing external validation? The challenge lies in ensuring state integrity: malicious users could roll back transactions, enabling double-spending. Solutions like hardware-backed trusted execution (TEEs), programmable secure enclaves (e.g., Trusty OS), and blockchain-like ‘trusted mobile apps’ could redefine edge security. The key? Enabling arbitrary, tamper-proof computation on personal devices—without sacrificing user control or scalability.

My Thoughts on the Shielded CSV Protocol

My Thoughts on the Shielded CSV Protocol

As we are working on the future of offline payments, the Shielded CSV protocol introduces Client-Side Validation (CSV), allowing transactions without global blockchain verification—perfect for scaling beyond Bitcoin’s limits. With nullifiers preventing double-spending and PCD schemes compressing transaction history, it’s a game-changer for projects like SoloSafe, which aims to bring trust to the edge. Excited to see how this shapes offline finance!

Commitment Schemes + Secure Enclave: A Powerful Combination

Commitment Schemes + Secure Enclave: A Powerful Combination

A Secure Enclave or TEE can enable code or protocols to exert control over user interactions in a way that mirrors how blockchains maintain control over their users. The key advantage here is trust: just as we trust the code running on a blockchain, we can also trust the code executed within a Secure Enclave. This combination opens up exciting possibilities for enhancing security and reliability in standalone devices.

Unreplicable Device IDs

Unreplicable Device IDs

Unreplicable device IDs, a concept I’ve been exploring, could revolutionize finance and identity systems by enabling secure offline transactions and robust identity verification. While blockchain has transformed asset transfers, its reliance on internet connectivity excludes millions in regions with limited access. Unreplicable device IDs, with properties like immunity to copying and cloning, could solve this by preventing double-spending and ensuring secure offline payments. Technologies like Physical Unclonable Functions (PUFs) and fingerprinting sensors show promise, though challenges remain in implementation and reliability. I’m also investigating Trusted Execution Environments (TEEs) to enhance security. This is a collaborative journey—I welcome your insights to help build a more inclusive and secure future.

AI to be the fuel for ZK : massive adoption coming soon

AI to be the fuel for ZK : massive adoption coming soon

Artificial intelligence (AI) adoption is surging globally, with governments and organizations rushing to integrate AI into their strategies. Meanwhile, a silent revolution is happening in cryptographic technology: Zero-Knowledge Proofs (ZKP). AI and ZK are on a converging path, where AI’s rapid advancements create an urgent need for privacy, security, and proof of authenticity—domains where ZK technology excels.

From blockchain scalability to identity verification, ZK is poised to become an essential tool in a world increasingly driven by AI-generated content and interactions. The rise of deepfakes, identity fraud, and misinformation underscores the necessity of cryptographic proofs for digital interactions. Tools like Orb by Worldcoin, leveraging ZK Machine Learning (ZKML), offer glimpses of how we can ensure trust in an AI-dominated world.

However, current computational limitations hinder mass adoption. Generating cryptographic proofs still requires high processing power, but with the advent of next-generation processors, NPU chips, and quantum computing, the convergence of AI, ZK, and Fully Homomorphic Encryption (FHE) is inevitable. These innovations will redefine digital security, enabling verifiable AI interactions while preserving privacy.

As we stand on the brink of an AI-driven era, ZK will not just be a tool—it will be the backbone of trust in digital systems. The question is not if, but when this transformation will unfold.

CRDTs – simple yet powerful tools for managing state update

CRDTs – simple yet powerful tools for managing state update

Conflict-Free Replicated Data Types (CRDTs) are powerful data structures that ensure consistency across distributed systems, even when updates come from multiple sources. This article delves into three common types of CRDTs: Grow-Only CRDTs, Last-Write-Wins Registers (LWWR) and Two-Phase Sets (2P-Set).
Each CRDT type is explained with examples and implementations in JavaScript, offering practical insights for distributed systems design. Whether you’re building real-time collaborative apps or distributed databases, CRDTs provide robust tools for maintaining eventual consistency.