# Сопутствующие статьи по теме ZK

Новостной центр HTX предлагает последние статьи и углубленный анализ по "ZK", охватывающие рыночные тренды, новости проектов, развитие технологий и политику регулирования в криптоиндустрии.

Ethereum's "New Cypherpunk" Manifesto: A Return to the Narrative of Privacy

Ethereum's "New Cypherpunk" Manifesto: A Return to Privacy-Centric Narratives In recent years, the crypto industry has been largely dominated by financialization, with narratives centered on asset prices, liquidity, and institutional capital inflows. However, Ethereum's recent emphasis on a "privacy renaissance" and the "new cypherpunk" ethos signals a return to core values. The movement traces back to the 1990s cypherpunk culture, which advocated using cryptography to protect individual privacy, freedom, and censorship resistance in the digital realm. Bitcoin and Ethereum emerged from this ideology, but over time, financial speculation overshadowed these foundational principles. Ethereum’s "new cypherpunk" framework modernizes this ethos with the CROPS principles: Censorship Resistance, Open Source, Privacy, and Security. It also emphasizes permissionless access, trust minimization, and decentralized collaboration. Several factors make this shift timely: advances in zero-knowledge proofs (ZK) and Layer-2 networks enable practical privacy solutions; public blockchain transparency has raised concerns about data exposure; and the rise of on-chain identities necessitates privacy-preserving systems. Ethereum’s call reflects a broader potential shift in industry narrative—from financialization to privacy, digital sovereignty, and user-controlled data. This could redefine Web3 as a infrastructure that balances transparency with selective privacy, fulfilling the cypherpunk vision of a freer, more secure digital future.

marsbit03/16 04:26

Ethereum's "New Cypherpunk" Manifesto: A Return to the Narrative of Privacy

marsbit03/16 04:26

Stop Saying ‘We Need Privacy’

Title: Stop Saying ‘We Need Privacy’ The article argues that "privacy" is not a single concept but rather five distinct problems in the context of blockchain and cryptocurrency. When people demand privacy, they are often referring to one of the following: 1. **Intent Privacy:** Hiding transaction details from observers before execution to prevent front-running by MEV bots. Solutions include private transaction delivery (e.g., Flashbots Protect) and encrypted mempools (e.g., Shutter Network). 2. **Value Privacy:** Concealing the amounts transferred. This is achieved through shielded systems (e.g., Zcash, Penumbra) that use cryptographic proofs to verify transactions without revealing values. Privacy can still be compromised by user behavior patterns. 3. **Graph Privacy:** Protecting the relationships and patterns of who transacts with whom. Techniques include pooled unlinkability (e.g., Tornado Cash mixers) and stealth addresses (e.g., ERC-5564) to break direct on-chain links between transactions. 4. **State Privacy:** Keeping DeFi positions, balances, and liquidation thresholds hidden. This requires storing state as private records and using zero-knowledge proofs (ZK-proofs) to validate state changes without revealing underlying data (e.g., Aztec). Composability and edge interactions remain challenges. 5. **Execution Privacy:** Hiding the computation logic itself, crucial for strategies like auctions or liquidations. Methods include using Trusted Execution Environments (TEEs) (e.g., Secret Network) or ZK-proofs for private execution. The article concludes that privacy often fails at the edges, such as at the RPC (Remote Procedure Call) layer, where providers can collect IP addresses and wallet information. The key is to ask which surface is being protected and where information might leak when users interact with the real world, rather than seeking a single winning privacy model.

比推02/13 00:39

Stop Saying ‘We Need Privacy’

比推02/13 00:39

活动图片