The analogy here is uh you know whether you spent so you have some statement of interest of computation okay and the way that it is represented in a snarks typically don't know not null snarks is you just unroll the computation. You literally lay out every gate and every wire and actually what happens during the trusted setup is that trusted party looks at this layout of the computation and kind of encodes it. This is basically assistant parameters that go in the sky for everybody to use to prove and verifyOkay but you don't have to do that necessarily right there are computations that are easily specified with much lessso think about the difference between the lines of machine code that it takes to specify a