Zero Knowledge cover image

Through the Wormhole with Jump Crypto

Zero Knowledge

00:00

The Threshold Cryptography

There's two components to this. One is the threshold component, and one is the signature component. Iit truly is like a primitive er, you know, sir be used anywhere. For you, at what point is it safe? There's no fixed amount of time after which you would call a paper r a mechanism mature. Like some mechanisms, a like frost, are considerably straightforward and how they function. Other protocols, am, are significantly more complex. So with them, we'd rather want to wait out a little bit more, or see a bunch more of auditad implementations.

Play episode from 32:35
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app