Starks go back to what's called PCP techniques and both Elisang and I have been working on them actually even prior to working on Snarks. Starks make parsimonious use of cryptography and we will discuss this later how it relates to post quantum security and other advantages. In ZKASH there's a need for a trusted party to conduct an operation at the beginning of time to generate system parameters to be used for proving and verifying. This trusted party if corrupted could generate valid looking proofs for false statements. But in Starks you can just agree on a hash function which is the only cryptography that it uses and deploy the system.