firo
risc0
firo | risc0 | |
---|---|---|
35 | 6 | |
706 | 1,421 | |
0.7% | 6.1% | |
9.0 | 9.7 | |
2 days ago | 7 days ago | |
C++ | C++ | |
MIT License | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
firo
-
Weekly Firo Development Meeting Minutes
Peter continues his work on walletdb refactoring (PR #1239), which optimizes performance by using a single instance of CWalletDB. It is about 90% done and is estimated to be done by the end of the week.
- Firo v0.14.12.1 Rab13s Fix Release
-
New Maintenance Release Firo v0.14.11.2
👉 https://github.com/firoorg/firo/releases/tag/v0.14.11.2
- Firo v0.14.11.1 mandatory release - Everyone must upgrade to this version regardless of your previous versions
-
In #FIRO we don't hide our faces.
Please check and track all FIRO's documentation: Academic Papers, Audits, and Guides. 👇🏻👇🏻👇🏻 🌐 https://firo.org/
- Firo v0.14.11.0 Mandatory Release
-
Hummingbot Campaign Spotlight on FIRO
FIRO, formerly known as Zcoin (XZC), is a privacy focused cryptocurrency that utilizes zero-knowledge proofs which allows users to destroy coins and then redeem them later for brand new ones with no transaction history. Its research created the Lelantus privacy protocol which supports high anonymity sets without requiring trusted setup and relying only on standard cryptographic assumptions. To learn more, please visit: Firo.org or follow on Twitter.
- New maintenance release Firo v0.14.10.1
- Why does it seem challenging for an American to trade Firo?
risc0
-
The Cairo Programming Language
You can actually write zkps in pure Rust, but there's not currently any blockchain integration: https://github.com/risc0/risc0
- Zero knowledge proofs in RISC-V
-
Zero-Knowledge Middleboxes: enforce network policies on encrypted traffic
The performance of ZK systems is improving rapidly, for example the startup I'm at has one which is likely already much faster than what the authors used (development is ongoing): https://github.com/risc0/risc0
The security implications of current decrypting MITM middleboxes are pretty bad so it's worth going to some lengths to find an alternative.
- r/crypto - Digital Signatures on Risc0 -- Sign a message with a zk-STARK
- Digital Signatures on Risc0
- Digital Signatures on Risc0 -- Sign a message with a zk-STARK
What are some alternatives?
monero - Monero: the secure, private, untraceable cryptocurrency
darkfi - Anonymous. Uncensored. Sovereign.
whitepaper - Whitepaper describing the Keep network
plonk - Pure Rust implementation of the PLONK ZKProof System done by the Dusk-Network team.
xmr - Monero node.
miden-vm - STARK-based virtual machine
dash - Dash - Reinventing Cryptocurrency
noir - Noir is a domain specific language for zero knowledge proofs
conceal-desktop - Conceal Desktop (GUI)
libzkchannels - zkChannels: Anonymous Payment Channels for Bitcoin, Zcash, Tezos and more
WaykiChain - Public Blockchain as a Decentralized Finance Infrastructure Service Platform
tock - A secure embedded operating system for microcontrollers