{"@attributes":{"version":"2.0"},"channel":{"title":"Privacy Stewards of Ethereum","link":"https:\/\/pse.dev","description":"PSE is a research and development lab with a mission of making cryptography useful for human collaboration. We build open source tooling with things like zero-knowledge proofs, multiparty computation, homomorphic encryption, Ethereum, and more.","lastBuildDate":"Fri, 17 Apr 2026 23:13:28 GMT","docs":"https:\/\/validator.w3.org\/feed\/docs\/rss2.html","generator":"https:\/\/github.com\/jpmonette\/feed","language":"en","image":{"title":"Privacy Stewards of Ethereum","url":"https:\/\/pse.dev\/favicon.ico","link":"https:\/\/pse.dev"},"copyright":"All rights reserved 2026, Privacy Stewards of Ethereum","item":[{"title":{},"link":"https:\/\/pse.dev\/blog\/README","guid":"https:\/\/pse.dev\/blog\/README","pubDate":"Fri, 17 Apr 2026 23:13:29 GMT"},{"title":{},"link":"https:\/\/pse.dev\/blog\/post-quantum-signature-aggregation-with-falcon-and-LaBRADOR","guid":"https:\/\/pse.dev\/blog\/post-quantum-signature-aggregation-with-falcon-and-LaBRADOR","pubDate":"Fri, 17 Apr 2026 23:13:29 GMT","enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/post-quantum-signature-aggregation-with-falcon-and-LaBRADOR\/cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/summon-major-update","guid":"https:\/\/pse.dev\/blog\/summon-major-update","pubDate":"Fri, 17 Apr 2026 23:13:29 GMT","description":{},"category":["summon","mpc","typescript","privacy","developer-tools","release-notes","circuits","cryptography","compiler"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/summon-major-update\/cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/social-recovery-sdk","guid":"https:\/\/pse.dev\/blog\/social-recovery-sdk","pubDate":"Mon, 02 Mar 2026 00:00:00 GMT","description":{},"category":["social recovery","zkp","privacy"]},{"title":{},"link":"https:\/\/pse.dev\/blog\/pretty-good-payments","guid":"https:\/\/pse.dev\/blog\/pretty-good-payments","pubDate":"Thu, 26 Feb 2026 00:00:00 GMT","description":{},"category":["privacy","rollups","zero-knowledge proofs","Ethereum","payments"]},{"title":{},"link":"https:\/\/pse.dev\/blog\/pse-february-2026","guid":"https:\/\/pse.dev\/blog\/pse-february-2026","pubDate":"Thu, 19 Feb 2026 00:00:00 GMT","description":{},"category":"newsletter","enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/pse-february-2026\/feb-cover-image.jpg","length":"0","type":"image\/jpg"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/revocation-in-zkid-merkle-tree-based-approaches","guid":"https:\/\/pse.dev\/blog\/revocation-in-zkid-merkle-tree-based-approaches","pubDate":"Tue, 03 Feb 2026 00:00:00 GMT","description":{},"category":["zero-knowledge","zkID","ZK-Kit"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/revocation-in-zkid-merkle-tree-based-approaches\/cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/client-side-gpu-everyday-ef-privacy","guid":"https:\/\/pse.dev\/blog\/client-side-gpu-everyday-ef-privacy","pubDate":"Mon, 26 Jan 2026 00:00:00 GMT","description":{},"category":["client-side proving","gpu","post-quantum","privacy","zkp","metal","webgpu"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/mopro-client-side-gpu-everyday-ef-privacy\/cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/px-user-survey-2025","guid":"https:\/\/pse.dev\/blog\/px-user-survey-2025","pubDate":"Thu, 08 Jan 2026 00:00:00 GMT","category":["privacy","user experience","privacy experience"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/privacy-experience-report\/privacy-experience-report.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/tlsnotary-do-not-pass-go","guid":"https:\/\/pse.dev\/blog\/tlsnotary-do-not-pass-go","pubDate":"Thu, 01 Jan 2026 00:00:00 GMT","description":{},"category":"tlsn","enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/tlsnotary-do-not-pass-go\/institutions.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/pse-december-2025","guid":"https:\/\/pse.dev\/blog\/pse-december-2025","pubDate":"Thu, 18 Dec 2025 00:00:00 GMT","description":{},"category":"newsletter","enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/pse-december-2025\/cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/pse-november-2025","guid":"https:\/\/pse.dev\/blog\/pse-november-2025","pubDate":"Thu, 11 Dec 2025 00:00:00 GMT","description":{},"category":"newsletter","enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/pse-november-2025\/cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/privacy-experience-report","guid":"https:\/\/pse.dev\/blog\/privacy-experience-report","pubDate":"Tue, 02 Dec 2025 00:00:00 GMT","category":["privacy","user experience","privacy experience"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/privacy-experience-report\/privacy-experience-report.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/state-of-private-voting-2026","guid":"https:\/\/pse.dev\/blog\/state-of-private-voting-2026","pubDate":"Wed, 12 Nov 2025 00:00:00 GMT","description":{},"category":["privacy","governance","voting","DAOs","MACI"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/state-of-private-voting-2026\/cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/pse-retreat-synthesis-report","guid":"https:\/\/pse.dev\/blog\/pse-retreat-synthesis-report","pubDate":"Wed, 08 Oct 2025 00:00:00 GMT","description":{},"category":["retreat","privacy","ethereum"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/pse-retreat-synthesis-report\/cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/a-thank-you","guid":"https:\/\/pse.dev\/blog\/a-thank-you","pubDate":"Wed, 01 Oct 2025 00:00:00 GMT","description":{},"category":["PSE","privacy","Ethereum","leadership"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/a-thank-you\/cover.png","length":"0","type":"image\/png"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/const-depth-ntt-for-fhe-based-ppd","guid":"https:\/\/pse.dev\/blog\/const-depth-ntt-for-fhe-based-ppd","pubDate":"Thu, 25 Sep 2025 00:00:00 GMT","description":{},"category":["FHE","ZKP"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/const-depth-ntt-for-fhe-based-ppd\/cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/zk-kit-cultivating-the-garden-of-progcrypto","guid":"https:\/\/pse.dev\/blog\/zk-kit-cultivating-the-garden-of-progcrypto","pubDate":"Tue, 23 Sep 2025 00:00:00 GMT","description":{},"category":["zero-knowledge","ZK-Kit"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/zk-kit-cultivating-the-garden-of-progcrypto\/cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/pse-september-2025-newsletter","guid":"https:\/\/pse.dev\/blog\/pse-september-2025-newsletter","pubDate":"Tue, 16 Sep 2025 00:00:00 GMT","description":{},"category":"newsletter","enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/pse-september-2025-newsletter\/cover.png","length":"0","type":"image\/png"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/pse-roadmap-2025","guid":"https:\/\/pse.dev\/blog\/pse-roadmap-2025","pubDate":"Fri, 12 Sep 2025 00:00:00 GMT","description":{},"category":["Ethereum","Privacy","Roadmap","Zero-Knowledge","Decentralization","FHE","MPC","TEE"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/pse-roadmap-2025\/cover.png","length":"0","type":"image\/png"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/pse-august-2025-newsletter","guid":"https:\/\/pse.dev\/blog\/pse-august-2025-newsletter","pubDate":"Fri, 08 Aug 2025 00:00:00 GMT","description":{},"category":["zero-knowledge","cryptography","client-side-proving","fully-homomorphic-encryption","decentralized-identity","zk-governance","privacy","TLSNotary","MACI","Semaphore","ZK-Kit","zkid","PlasmaFold","vOPRF","mpc","pod2","mopro","research","development"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/pse-aug-2025\/cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/the-case-for-privacy-in-dao-voting","guid":"https:\/\/pse.dev\/blog\/the-case-for-privacy-in-dao-voting","pubDate":"Thu, 07 Aug 2025 00:00:00 GMT","description":{},"category":["privacy","governance","DAOs","MACI","zkSNARKs"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/the-case-for-privacy-in-dao-voting\/cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/mopro-metal-msm-v2","guid":"https:\/\/pse.dev\/blog\/mopro-metal-msm-v2","pubDate":"Mon, 28 Jul 2025 00:00:00 GMT","description":{},"category":["metal","msm","gpu","client-side proving","zkp"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/mopro-metal-msm-v2\/cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/a-trustless-and-simple-14k-tps-payment-l2-from-plasma-and-client-side-proving","guid":"https:\/\/pse.dev\/blog\/a-trustless-and-simple-14k-tps-payment-l2-from-plasma-and-client-side-proving","pubDate":"Fri, 18 Jul 2025 00:00:00 GMT","category":["intmax","plasma","l2","scaling","zero-knowledge proofs","validity proofs","data availability"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/a-trustless-and-simple-14k-tps-payment-l2-from-plasma-and-client-side-proving\/cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/pse-july-2025-newsletter","guid":"https:\/\/pse.dev\/blog\/pse-july-2025-newsletter","pubDate":"Wed, 16 Jul 2025 00:00:00 GMT","description":{},"category":["zk","cryptography","ethereum","privacy","scaling","folding","voprf"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/pse-july-2025\/cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/unboxing-io-building-from-familar-crypto-blocks","guid":"https:\/\/pse.dev\/blog\/unboxing-io-building-from-familar-crypto-blocks","pubDate":"Fri, 11 Jul 2025 00:00:00 GMT","enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/unboxing-io-building-from-familar-crypto-blocks\/cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/pse-june-2025-newsletter","guid":"https:\/\/pse.dev\/blog\/pse-june-2025-newsletter","pubDate":"Tue, 08 Jul 2025 00:00:00 GMT","description":{},"category":["newsletter","post quantum cryptography","private proof delegation","client side proving","machina io","voprf","tlsnotary","maci","zk-kit","mpc framework","mopro","semaphore"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/pse-june-2025\/cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/under-constrained-bug-in-binary-merkle-root-circuit-fixed-in-v200","guid":"https:\/\/pse.dev\/blog\/under-constrained-bug-in-binary-merkle-root-circuit-fixed-in-v200","pubDate":"Tue, 01 Jul 2025 00:00:00 GMT","description":{},"category":["zero-knowledge","ZK-Kit","circom","Semaphore","MACI"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/under-constrained-bug-in-binary-merkle-root-circuit-fixed-in-v200\/cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/ethereum-privacy-pir","guid":"https:\/\/pse.dev\/blog\/ethereum-privacy-pir","pubDate":"Wed, 18 Jun 2025 00:00:00 GMT","description":{},"category":["ethereum","privacy","pir"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/ethereum-privacy-pir\/cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/zkpdf-unlocking-verifiable-data","guid":"https:\/\/pse.dev\/blog\/zkpdf-unlocking-verifiable-data","pubDate":"Fri, 13 Jun 2025 00:00:00 GMT","description":{},"category":["zkpdf","zero-knowledge proofs","privacy","pdf","zkid","digilocker pdfs"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/zkpdf-unlocking-verifiable-data\/cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/efficient-client-side-proving-for-zkid","guid":"https:\/\/pse.dev\/blog\/efficient-client-side-proving-for-zkid","pubDate":"Wed, 11 Jun 2025 00:00:00 GMT","description":{},"category":["client-side proving","zkp","zero-knowledge proofs","zkid","post-quantum","benchmarks"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/efficient-client-side-proving-for-zkid\/cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/pse-may-2025-newsletter","guid":"https:\/\/pse.dev\/blog\/pse-may-2025-newsletter","pubDate":"Fri, 30 May 2025 00:00:00 GMT","description":{},"category":["newsletter","post quantum cryptography","private proof delegation","client side proving","machina io","voprf","tlsnotary","maci","zk-kit","mpc framework","mopro","semaphore"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/pse-may-2025\/cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/mpc-retrospective","guid":"https:\/\/pse.dev\/blog\/mpc-retrospective","pubDate":"Fri, 23 May 2025 00:00:00 GMT","description":{},"category":["MPC","privacy","data analysis","Devcon","TLSNotary"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/mpcstats-retrospective\/cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/mopro-native-packages","guid":"https:\/\/pse.dev\/blog\/mopro-native-packages","pubDate":"Thu, 22 May 2025 00:00:00 GMT","description":{},"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/mopro-native-packages\/cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/are-elliptic-curves-going-to-survive-the-quantum-apocalypse","guid":"https:\/\/pse.dev\/blog\/are-elliptic-curves-going-to-survive-the-quantum-apocalypse","pubDate":"Tue, 20 May 2025 00:00:00 GMT","description":{},"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/are-elliptic-curves-going-to-survive-the-quantum-apocalypse\/cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/tee-based-ppd","guid":"https:\/\/pse.dev\/blog\/tee-based-ppd","pubDate":"Tue, 20 May 2025 00:00:00 GMT","description":{},"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/tee-based-ppd\/cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/hello-world-the-first-signs-of-practical-io","guid":"https:\/\/pse.dev\/blog\/hello-world-the-first-signs-of-practical-io","pubDate":"Mon, 12 May 2025 00:00:00 GMT","description":{},"category":["indistinguishability obfuscation","cryptography","Diamond iO","lattice"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/hello-world-the-first-signs-of-practical-io\/cover-practical-io.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/reflecting-on-maci-platform","guid":"https:\/\/pse.dev\/blog\/reflecting-on-maci-platform","pubDate":"Thu, 01 May 2025 00:00:00 GMT","description":{},"category":["MACI","Privacy","Public Goods","RetroPGF","Zero Knowledge","Governance"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/reflecting-on-maci-platform\/reflecting-on-maci-platform.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/introducing-trinity","guid":"https:\/\/pse.dev\/blog\/introducing-trinity","pubDate":"Mon, 28 Apr 2025 00:00:00 GMT","description":{},"category":["mpc","zero-knowledge proofs","privacy","cryptography","kzg","halo2","garbled circuit","zero knowledge","2pc","plonk","computational integrity","private transactions","security","infrastructure\/protocol"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/introducing-trinity\/trinity.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/towards_a_quantum-safe_p2p_for_ethereum","guid":"https:\/\/pse.dev\/blog\/towards_a_quantum-safe_p2p_for_ethereum","pubDate":"Tue, 22 Apr 2025 00:00:00 GMT","description":{},"category":["quantum computing","p2p","ethereum","cryptography","networking","post-quantum","security","infrastructure\/protocol"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/towards_a_quantum-safe_p2p_for_ethereum\/towards_a_quantum-safe_p2p_for_ethereum-cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/code-optimizations-in-the-landscape-of-post-quantum-cryptography","guid":"https:\/\/pse.dev\/blog\/code-optimizations-in-the-landscape-of-post-quantum-cryptography","pubDate":"Mon, 07 Apr 2025 00:00:00 GMT","description":{},"category":["post-quantum cryptography","pqc","cryptography","optimization","security","algorithms","zero-knowledge proofs","elliptic curves","research","infrastructure\/protocol"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/code-optimizations-in-the-landscape-of-post-quantum-cryptography\/code-optimizations-in-the-landscape-of-post-quantum-cryptography-cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/circom-mpc-tldr-and-retrospective","guid":"https:\/\/pse.dev\/blog\/circom-mpc-tldr-and-retrospective","pubDate":"Thu, 06 Mar 2025 00:00:00 GMT","description":{},"category":["circom","mpc","secure multi-party computation","privacy","cryptography","zero-knowledge proofs","machine learning","mp-spdz","computational integrity","research"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/circom-mpc-tldr-and-retrospective\/circom-mpc-tldr-and-retrospective-cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/intmax-a-scalable-payment-l2-from-plasma-and-validity-proofs","guid":"https:\/\/pse.dev\/blog\/intmax-a-scalable-payment-l2-from-plasma-and-validity-proofs","pubDate":"Tue, 04 Mar 2025 00:00:00 GMT","description":{},"category":["intmax","plasma","l2","scaling","zero-knowledge proofs","validity proofs","plonky2","data availability"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/intmax-a-scalable-payment-l2-from-plasma-and-validity-proofs\/intmax-a-scalable-payment-l2-from-plasma-and-validity-proofs-cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/lattice-based-proof-systems","guid":"https:\/\/pse.dev\/blog\/lattice-based-proof-systems","pubDate":"Tue, 18 Feb 2025 00:00:00 GMT","description":{},"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/lattice-based-proof-systems\/lattice-based-proof-systems-cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/retrospective-summa","guid":"https:\/\/pse.dev\/blog\/retrospective-summa","pubDate":"Mon, 10 Feb 2025 00:00:00 GMT","description":{},"category":["summa","proof of reserves","zero-knowledge proofs","cryptography","privacy","security","centralized exchange","halo2","ethereum","infrastructure\/protocol"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/retrospective-summa\/retrospective-summa-cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/web2-nullifiers-using-voprf","guid":"https:\/\/pse.dev\/blog\/web2-nullifiers-using-voprf","pubDate":"Thu, 30 Jan 2025 00:00:00 GMT","description":{},"category":["voprf","nullifiers","zero-knowledge proofs","privacy","web2","identity","cryptography","mpc","anonymity\/privacy","infrastructure\/protocol"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/web2-nullifiers-using-voprf\/web2-nullifiers-using-voprf-cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/certificate-transparency-using-newtonpir","guid":"https:\/\/pse.dev\/blog\/certificate-transparency-using-newtonpir","pubDate":"Tue, 28 Jan 2025 00:00:00 GMT","description":{},"category":["certificate transparency","newtonpir","privacy","security","private information retrieval","fhe","cryptography","web security","tls","zero-knowledge"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/certificate-transparency-using-newtonpir\/certificate-transparency-using-newtonpir-cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/self-sovereign-identity-programmable-cryptography-challenges-ahead","guid":"https:\/\/pse.dev\/blog\/self-sovereign-identity-programmable-cryptography-challenges-ahead","pubDate":"Thu, 23 Jan 2025 00:00:00 GMT","description":{},"category":["self-sovereign identity","ssi","privacy","cryptography","zero-knowledge proofs","verifiable credentials","digital identity","identity","standards","ethereum"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/self-sovereign-identity-programmable-cryptography-challenges-ahead\/self-sovereign-identity-programmable-cryptography-challenges-ahead-cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/mopro-comparison-of-circom-provers","guid":"https:\/\/pse.dev\/blog\/mopro-comparison-of-circom-provers","pubDate":"Tue, 21 Jan 2025 00:00:00 GMT","description":{},"category":["mopro","circom","zero-knowledge proofs","witness generation","proof generation","snarkjs","rapidsnark","mobile","performance","toolkits"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/mopro-comparison-of-circom-provers\/mopro-comparison-of-circom-provers-cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/retrospective-trusted-setups-and-p0tion-project","guid":"https:\/\/pse.dev\/blog\/retrospective-trusted-setups-and-p0tion-project","pubDate":"Wed, 15 Jan 2025 00:00:00 GMT","description":{},"category":["trusted setups","p0tion","powers of tau","kzg","zero-knowledge proofs","cryptography","ethereum","groth16","security","infrastructure\/protocol"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/retrospective-trusted-setups-and-p0tion-project\/retrospective-trusted-setups-and-p0tion-project-cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/why-we-cant-build-perfectly-secure-multi-party-applications-yet","guid":"https:\/\/pse.dev\/blog\/why-we-cant-build-perfectly-secure-multi-party-applications-yet","pubDate":"Tue, 14 Jan 2025 00:00:00 GMT","description":{},"category":["mpc","secure multi-party computation","fhe","fully homomorphic encryption"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/why-we-cant-build-perfectly-secure-multi-party-applications-yet\/why-we-cant-build-perfectly-secure-multi-party-applications-yet-cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/anonklub-reflections-on-our-journey-in-privacy-preserving-solutions","guid":"https:\/\/pse.dev\/blog\/anonklub-reflections-on-our-journey-in-privacy-preserving-solutions","pubDate":"Tue, 01 Oct 2024 00:00:00 GMT","description":{},"category":["zk-ecdsa","privacy","ethereum","zero-knowledge proofs","circom","halo2","spartan","anonymity","identity","cryptography"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/anonklub-reflections-on-our-journey-in-privacy-preserving-solutions\/anonklub-reflections-on-our-journey-in-privacy-preserving-solutions-cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/secure-multi-party-computation","guid":"https:\/\/pse.dev\/blog\/secure-multi-party-computation","pubDate":"Tue, 06 Aug 2024 00:00:00 GMT","description":{},"category":["mpc","secure multi-party computation","privacy","cryptography","garbled circuit","secret sharing","oblivious transfer","security","circuits","threshold cryptography"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/secure-multi-party-computation\/secure-multi-party-computation-cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/the-next-chapter-for-zkevm-community-edition","guid":"https:\/\/pse.dev\/blog\/the-next-chapter-for-zkevm-community-edition","pubDate":"Wed, 05 Jun 2024 00:00:00 GMT","category":["zkevm","zero-knowledge proofs","ethereum","scaling","cryptography","rollups","zkvm","research","infrastructure\/protocol","proof systems"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/the-next-chapter-for-zkevm-community-edition\/the-next-chapter-for-zkevm-community-edition-cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/unleashing-potential-introducing-the-pse-core-program","guid":"https:\/\/pse.dev\/blog\/unleashing-potential-introducing-the-pse-core-program","pubDate":"Wed, 24 Apr 2024 00:00:00 GMT","description":{},"category":["education","zero-knowledge proofs","privacy","cryptography","proof systems","open-source","security","public goods"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/unleashing-potential-introducing-the-pse-core-program\/unleashing-potential-introducing-the-pse-core-program-cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/advancing-anon-aadhaar-whats-new-in-v100","guid":"https:\/\/pse.dev\/blog\/advancing-anon-aadhaar-whats-new-in-v100","pubDate":"Wed, 14 Feb 2024 00:00:00 GMT","description":{},"category":["anonaadhaar","privacy","zero-knowledge proofs","digital identity","identity","circom","ethereum","cryptography"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/advancing-anon-aadhaar-whats-new-in-v100\/advancing-anon-aadhaar-whats-new-in-v100-cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/zero-to-start-applied-fully-homomorphic-encryption-fhe-part-1","guid":"https:\/\/pse.dev\/blog\/zero-to-start-applied-fully-homomorphic-encryption-fhe-part-1","pubDate":"Thu, 21 Dec 2023 00:00:00 GMT","description":{},"category":["fhe","cryptography","privacy","security","ethereum","education","post-quantum cryptography","zero-knowledge proofs"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/zero-to-start-applied-fully-homomorphic-encryption-fhe-part-1\/zero-to-start-applied-fully-homomorphic-encryption-fhe-part-1-cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/zero-to-start-applied-fully-homomorphic-encryption-fhe-part-2","guid":"https:\/\/pse.dev\/blog\/zero-to-start-applied-fully-homomorphic-encryption-fhe-part-2","pubDate":"Thu, 21 Dec 2023 00:00:00 GMT","description":{},"category":["fhe","cryptography","privacy","lattice-based cryptography","threshold cryptography","mpc","security","ethereum","private transactions","education"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/zero-to-start-applied-fully-homomorphic-encryption-fhe-part-2\/zero-to-start-applied-fully-homomorphic-encryption-fhe-part-2-cover-1.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/beyond-zero-knowledge-whats-next-in-programmable-cryptography","guid":"https:\/\/pse.dev\/blog\/beyond-zero-knowledge-whats-next-in-programmable-cryptography","pubDate":"Thu, 09 Nov 2023 00:00:00 GMT","description":{},"category":["cryptography","programmable cryptography","zero-knowledge proofs","mpc","secure multi-party computation","fhe","fully homomorphic encryption","io","privacy","security"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/beyond-zero-knowledge-whats-next-in-programmable-cryptography\/beyond-zero-knowledge-whats-next-in-programmable-cryptography-cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/unirep-ceremony-an-invitation-to-the-celestial-call-and-unirep-v2","guid":"https:\/\/pse.dev\/blog\/unirep-ceremony-an-invitation-to-the-celestial-call-and-unirep-v2","pubDate":"Tue, 24 Oct 2023 00:00:00 GMT","description":{},"category":["unirep","trusted setup","ceremony","privacy","zero-knowledge proofs","identity","reputation","anonymity\/privacy","cryptography","infrastructure\/protocol"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/unirep-ceremony-an-invitation-to-the-celestial-call-and-unirep-v2\/unirep-ceremony-an-invitation-to-the-celestial-call-and-unirep-v2-cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/continuing-the-zero-gravity-journey","guid":"https:\/\/pse.dev\/blog\/continuing-the-zero-gravity-journey","pubDate":"Thu, 19 Oct 2023 00:00:00 GMT","description":{},"category":["zkml","zero-knowledge proofs","weightless neural networks","halo2","lookup compression","folding schemes","feature selection","machine learning","research","zero gravity"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/continuing-the-zero-gravity-journey\/continuing-the-zero-gravity-journey-cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/announcing-anon-aadhaar","guid":"https:\/\/pse.dev\/blog\/announcing-anon-aadhaar","pubDate":"Thu, 21 Sep 2023 00:00:00 GMT","description":{},"category":["anonaadhaar","privacy","zero-knowledge proofs","digital identity","identity","ethereum","proof of personhood","credentials"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/announcing-anon-aadhaar\/announcing-anon-aadhaar-cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/tlsnotary-updates","guid":"https:\/\/pse.dev\/blog\/tlsnotary-updates","pubDate":"Tue, 19 Sep 2023 00:00:00 GMT","description":{},"category":["tlsn","mpc","secure multi-party computation","privacy","data portability","cryptography","selective disclosure","security","zero-knowledge proofs","infrastructure\/protocol"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/tlsnotary-updates\/tlsnotary-updates-cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/from-cex-to-ccex-with-summa-part-1","guid":"https:\/\/pse.dev\/blog\/from-cex-to-ccex-with-summa-part-1","pubDate":"Thu, 14 Sep 2023 00:00:00 GMT","description":{},"category":["summa","proof of solvency","zero-knowledge proofs","merkle tree","cryptography","privacy","security","centralized exchange","computational integrity","infrastructure\/protocol"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/from-cex-to-ccex-with-summa-part-1\/from-cex-to-ccex-with-summa-part-1-cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/from-cex-to-ccex-with-summa-part-2","guid":"https:\/\/pse.dev\/blog\/from-cex-to-ccex-with-summa-part-2","pubDate":"Thu, 14 Sep 2023 00:00:00 GMT","description":{},"category":["summa","proof of solvency","zero-knowledge proofs","merkle sum tree","cryptography","privacy","security","centralized exchange","proof of inclusion","infrastructure\/protocol"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/from-cex-to-ccex-with-summa-part-2\/from-cex-to-ccex-with-summa-part-2-cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/bandada-is-live","guid":"https:\/\/pse.dev\/blog\/bandada-is-live","pubDate":"Wed, 23 Aug 2023 00:00:00 GMT","description":{},"category":["bandada","semaphore","privacy","zero-knowledge proofs","identity","credentials","security","infrastructure\/protocol"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/bandada-is-live\/bandada-is-live-cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/p0tion-v10-release","guid":"https:\/\/pse.dev\/blog\/p0tion-v10-release","pubDate":"Tue, 08 Aug 2023 00:00:00 GMT","description":{},"category":["p0tion","trusted setups","zero-knowledge proofs","groth16","ceremony","maci","rln","cryptography","security","toolkits"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/p0tion-v10-release\/cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/rate-limiting-nullifier-rln","guid":"https:\/\/pse.dev\/blog\/rate-limiting-nullifier-rln","pubDate":"Tue, 01 Aug 2023 00:00:00 GMT","description":{},"category":["rln","rate-limiting nullifier","nullifiers","zero-knowledge proofs","spam protection","privacy","anonymity\/privacy","cryptography","security","infrastructure\/protocol"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/rate-limiting-nullifier-rln\/rate-limiting-nullifier-rln-cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/the-power-of-crowdsourcing-smart-contract-security-for-l2-scaling-solutions","guid":"https:\/\/pse.dev\/blog\/the-power-of-crowdsourcing-smart-contract-security-for-l2-scaling-solutions","pubDate":"Tue, 18 Jul 2023 00:00:00 GMT","description":{}},{"title":{},"link":"https:\/\/pse.dev\/blog\/learnings-from-the-kzg-ceremony","guid":"https:\/\/pse.dev\/blog\/learnings-from-the-kzg-ceremony","pubDate":"Tue, 11 Jul 2023 00:00:00 GMT","description":{},"category":["kzg","ceremony","trusted setups","ethereum","cryptography","scaling","web development","security","infrastructure\/protocol","wasm"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/learnings-from-the-kzg-ceremony\/learnings-from-the-kzg-ceremony-cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/zkevm-community-edition-part-1-introduction","guid":"https:\/\/pse.dev\/blog\/zkevm-community-edition-part-1-introduction","pubDate":"Tue, 23 May 2023 00:00:00 GMT","category":["zkevm","zero-knowledge proofs","ethereum","scaling","l2","rollup","infrastructure\/protocol","proof systems","virtual machine","computational integrity"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/zkevm-community-edition-part-1-introduction\/zkevm-community-edition-part-1-introduction-cover-1.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/zkevm-community-edition-part-2-components","guid":"https:\/\/pse.dev\/blog\/zkevm-community-edition-part-2-components","pubDate":"Tue, 23 May 2023 00:00:00 GMT","description":{},"category":["zkevm","zero-knowledge proofs","ethereum","scaling","snarks","circuits","computational integrity","cryptography","proof systems","education"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/zkevm-community-edition-part-2-components\/zkevm-community-edition-part-2-components-cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/zkevm-community-edition-part-3-logic-and-structure","guid":"https:\/\/pse.dev\/blog\/zkevm-community-edition-part-3-logic-and-structure","pubDate":"Tue, 23 May 2023 00:00:00 GMT","description":{},"category":["zkevm","zero-knowledge proofs","ethereum","scaling","circuits","cryptography","computational integrity","halo2","lookup tables","proof systems"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/zkevm-community-edition-part-3-logic-and-structure\/zkevm-community-edition-part-3-logic-and-structure-cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/zkml-bridging-aiml-and-web3-with-zero-knowledge-proofs","guid":"https:\/\/pse.dev\/blog\/zkml-bridging-aiml-and-web3-with-zero-knowledge-proofs","pubDate":"Tue, 02 May 2023 00:00:00 GMT","description":{},"category":["zero-knowledge proofs","machine learning","privacy","circom","computational integrity","ethereum","web3","cryptography","research","toolkits"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/zkml-bridging-aiml-and-web3-with-zero-knowledge-proofs\/zkml-bridging-aiml-and-web3-with-zero-knowledge-proofs-cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/pse-security-what-is-new","guid":"https:\/\/pse.dev\/blog\/pse-security-what-is-new","pubDate":"Tue, 25 Apr 2023 00:00:00 GMT","description":{},"category":["zk","security","l2","formal-verification","circom","audits"]},{"title":{},"link":"https:\/\/pse.dev\/blog\/the-zk-ecdsa-landscape","guid":"https:\/\/pse.dev\/blog\/the-zk-ecdsa-landscape","pubDate":"Tue, 18 Apr 2023 00:00:00 GMT","description":{},"category":["zk-ecdsa","privacy","zero-knowledge proofs","ethereum","circom","cryptography","nullifiers","PLUME","identity","signature verification"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/the-zk-ecdsa-landscape\/the-zk-ecdsa-landscape-cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/semaphore-v3-announcement","guid":"https:\/\/pse.dev\/blog\/semaphore-v3-announcement","pubDate":"Thu, 09 Feb 2023 00:00:00 GMT","category":["semaphore","privacy","zero-knowledge proofs","anonymity\/privacy","identity","voting\/governance","ethereum","security","toolkits","infrastructure\/protocol"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/semaphore-v3-announcement\/cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/semaphore-community-grants-awarded-projects","guid":"https:\/\/pse.dev\/blog\/semaphore-community-grants-awarded-projects","pubDate":"Tue, 24 Jan 2023 00:00:00 GMT","category":["semaphore","grants","privacy","zero-knowledge proofs","anonymity\/privacy","identity","sybil resistance","social","ethereum","public goods"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/semaphore-community-grants-awarded-projects\/cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/announcing-maci-v111","guid":"https:\/\/pse.dev\/blog\/announcing-maci-v111","pubDate":"Wed, 18 Jan 2023 00:00:00 GMT","description":{},"category":["maci","zero-knowledge proofs","privacy","voting\/governance","collusion resistance","ethereum","security","quadratic funding","public goods","infrastructure\/protocol"]},{"title":{},"link":"https:\/\/pse.dev\/blog\/zkitter-an-anon-friendly-social-network","guid":"https:\/\/pse.dev\/blog\/zkitter-an-anon-friendly-social-network","pubDate":"Wed, 11 Jan 2023 00:00:00 GMT","category":["zkitter","semaphore","interep","rln","privacy","anonymity\/privacy","social","identity","zero-knowledge proofs","sybil"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/zkitter-an-anon-friendly-social-network\/cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/unirep-protocol","guid":"https:\/\/pse.dev\/blog\/unirep-protocol","pubDate":"Wed, 04 Jan 2023 00:00:00 GMT","category":["unirep","semaphore","privacy","reputation","zero-knowledge proofs","anonymity\/privacy","identity","ethereum","social","infrastructure\/protocol"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/unirep-protocol\/cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/devcon-vi-recap","guid":"https:\/\/pse.dev\/blog\/devcon-vi-recap","pubDate":"Wed, 16 Nov 2022 00:00:00 GMT","category":["zero-knowledge proofs","semaphore","privacy","ethereum","pse","zkevm","zkopru","interep","identity","public goods"]},{"title":{},"link":"https:\/\/pse.dev\/blog\/rsa-verification-circuit-in-halo2-and-its-applications","guid":"https:\/\/pse.dev\/blog\/rsa-verification-circuit-in-halo2-and-its-applications","pubDate":"Mon, 14 Nov 2022 00:00:00 GMT","description":{},"category":["rsa","halo2","zero-knowledge proofs","cryptography","circuits","security","zkp","modular exponentiation","digital signatures"]},{"title":{},"link":"https:\/\/pse.dev\/blog\/semaphore-community-grants","guid":"https:\/\/pse.dev\/blog\/semaphore-community-grants","pubDate":"Wed, 21 Sep 2022 00:00:00 GMT","category":["semaphore","privacy","zero-knowledge proofs","grants","anonymity\/privacy","identity","ethereum","public goods","social","toolkits"],"enclosure":{"@attributes":{"url":"https:\/\/pse.dev\/articles\/semaphore-community-grants\/cover.webp","length":"0","type":"image\/webp"}}},{"title":{},"link":"https:\/\/pse.dev\/blog\/interep-on-ramp-for-reputaion","guid":"https:\/\/pse.dev\/blog\/interep-on-ramp-for-reputaion","pubDate":"Tue, 13 Sep 2022 00:00:00 GMT","category":["interep","reputation","privacy","identity","ethereum","semaphore","sybil resistance","zero-knowledge proofs","web3","social networks"]},{"title":{},"link":"https:\/\/pse.dev\/blog\/a-technical-introduction-to-arbitrums-optimistic-rollup","guid":"https:\/\/pse.dev\/blog\/a-technical-introduction-to-arbitrums-optimistic-rollup","pubDate":"Mon, 29 Aug 2022 00:00:00 GMT","category":["arbitrum","optimistic rollup","l2","scaling","ethereum","rollup","infrastructure\/protocol","education"]},{"title":{},"link":"https:\/\/pse.dev\/blog\/a-technical-introduction-to-maci-10-privacy-scaling-explorations","guid":"https:\/\/pse.dev\/blog\/a-technical-introduction-to-maci-10-privacy-scaling-explorations","pubDate":"Mon, 29 Aug 2022 00:00:00 GMT","category":["maci","zero-knowledge proofs","privacy","voting\/governance","ethereum","collusion resistance","smart contracts","cryptography"]},{"title":{},"link":"https:\/\/pse.dev\/blog\/meet-coco-privacy-scaling-explorations","guid":"https:\/\/pse.dev\/blog\/meet-coco-privacy-scaling-explorations","pubDate":"Mon, 29 Aug 2022 00:00:00 GMT","description":{},"category":["prediction market","social","ethereum","web3","user experience","public goods","community","curation","moderation","infrastructure\/protocol"]},{"title":{},"link":"https:\/\/pse.dev\/blog\/rate-limiting-nullifier-a-spam-protection-mechanism-for-anonymous-environments","guid":"https:\/\/pse.dev\/blog\/rate-limiting-nullifier-a-spam-protection-mechanism-for-anonymous-environments","pubDate":"Mon, 29 Aug 2022 00:00:00 GMT","description":{},"category":["rln","nullifiers","zero-knowledge proofs","privacy","anonymity\/privacy","security","cryptography","merkle tree","infrastructure\/protocol","ethereum"]},{"title":{},"link":"https:\/\/pse.dev\/blog\/release-announcement-maci-10-privacy-scaling-explorations","guid":"https:\/\/pse.dev\/blog\/release-announcement-maci-10-privacy-scaling-explorations","pubDate":"Mon, 29 Aug 2022 00:00:00 GMT","category":["maci","privacy","zero-knowledge proofs","collusion resistance","voting","quadratic funding","ethereum","zk-snarks","governance","infrastructure\/protocol"]},{"title":{},"link":"https:\/\/pse.dev\/blog\/unirep-a-private-and-non-repudiable-reputation-system","guid":"https:\/\/pse.dev\/blog\/unirep-a-private-and-non-repudiable-reputation-system","pubDate":"Mon, 29 Aug 2022 00:00:00 GMT","description":{},"category":["unirep","privacy","reputation","zero-knowledge proofs","identity","semaphore","ethereum","social","anonymity\/privacy","infrastructure\/protocol"]},{"title":{},"link":"https:\/\/pse.dev\/blog\/bls-wallet-bundling-up-data-privacy-scaling-explorations","guid":"https:\/\/pse.dev\/blog\/bls-wallet-bundling-up-data-privacy-scaling-explorations","pubDate":"Fri, 26 Aug 2022 00:00:00 GMT","description":{},"category":["bls","wallet","scaling","rollups","ethereum","l2","account abstraction","cryptography","infrastructure\/protocol","security"]},{"title":{},"link":"https:\/\/pse.dev\/blog\/semaphore-v2-is-live-privacy-scaling-explorations","guid":"https:\/\/pse.dev\/blog\/semaphore-v2-is-live-privacy-scaling-explorations","pubDate":"Fri, 26 Aug 2022 00:00:00 GMT","description":{},"category":["semaphore","privacy","zero-knowledge proofs","anonymity\/privacy","identity","ethereum","cryptography","infrastructure\/protocol","security","toolkits"]},{"title":{},"link":"https:\/\/pse.dev\/blog\/zkopru-ceremony-final-call-and-failed-contributions","guid":"https:\/\/pse.dev\/blog\/zkopru-ceremony-final-call-and-failed-contributions","pubDate":"Fri, 26 Aug 2022 00:00:00 GMT","description":{},"category":["zkopru","trusted setup","ceremony","zero-knowledge proofs","privacy","cryptography","ethereum","security"]},{"title":{},"link":"https:\/\/pse.dev\/blog\/zkopru-on-testnet-privacy-scaling-explorations","guid":"https:\/\/pse.dev\/blog\/zkopru-on-testnet-privacy-scaling-explorations","pubDate":"Fri, 26 Aug 2022 00:00:00 GMT","description":{},"category":["zkopru","privacy","scaling","zero-knowledge proofs","l2","optimistic rollup","transaction privacy","ethereum","wallets","infrastructure\/protocol"]},{"title":{},"link":"https:\/\/pse.dev\/blog\/zkopru-trusted-setup-ceremony","guid":"https:\/\/pse.dev\/blog\/zkopru-trusted-setup-ceremony","pubDate":"Fri, 26 Aug 2022 00:00:00 GMT","description":{},"category":["zkopru","trusted setup","ceremony","zero-knowledge proofs","privacy","scaling","optimistic rollup","ethereum","security","cryptography"]},{"title":{},"link":"https:\/\/pse.dev\/blog\/zkopru-trusted-setup-completed-privacy-scaling-explorations","guid":"https:\/\/pse.dev\/blog\/zkopru-trusted-setup-completed-privacy-scaling-explorations","pubDate":"Fri, 26 Aug 2022 00:00:00 GMT","description":{},"category":["zkopru","trusted setup","ceremony","zero-knowledge proofs","privacy","scaling","ethereum","security"]},{"title":{},"link":"https:\/\/pse.dev\/blog\/zkopru-wat-y-wen-privacy-scaling-explorations","guid":"https:\/\/pse.dev\/blog\/zkopru-wat-y-wen-privacy-scaling-explorations","pubDate":"Fri, 26 Aug 2022 00:00:00 GMT","description":{},"category":["zkopru","optimistic rollup","zero-knowledge proofs","privacy","scaling","ethereum","l2","transaction privacy","utxo","infrastructure\/protocol"]}]}}