AI-powered
podcast player
Listen to all your favourite podcasts with AI-powered features
The Counterpoint to Security Reactions
There could be reasons why an under constrained value might not actually be exploitable. For example in one of the disclosures that we made to a team about an under constrained circuit they took it very seriously and particularly because they were hoping to run their trusted setup soon. And so in that case they were able to remove constraints which is typically great for proving time but the circuit itself more importantly was not under constrained.