Zero Knowledge cover image

Using Formal Verification on ZK Systems with Jon Stephens

Zero Knowledge

00:00

The Counterpoint to Security Reactions

There could be reasons why an under constrained value might not actually be exploitable. For example in one of the disclosures that we made to a team about an under constrained circuit they took it very seriously and particularly because they were hoping to run their trusted setup soon. And so in that case they were able to remove constraints which is typically great for proving time but the circuit itself more importantly was not under constrained.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app