Binance Square

AA__A

image
Creador verificado
ARPA Network (ARPA) is a decentralized secure computation network built to improve the fairness, security, and privacy of blockchains.
0 Siguiendo
1.7K+ Seguidores
6.4K+ Me gusta
502 Compartido
Publicaciones
·
--
Ver traducción
A Glance At ZKML What are ZK-SNARKs? You may have come across the term “ZK-SNARK” in discussions about blockchain, web3, and other emerging technologies. But what exactly are they? Let’s break it down in simple terms. ZK-SNARK stands for “Zero-Knowledge Succinct Non-Interactive Argument of Knowledge.” It’s a type of cryptographic proof that allows someone to prove they have certain information or knowledge, without actually revealing that information. Here’s how it works: Zero-Knowledge: The person making the proof (the “prover”) can convince the person verifying the proof (the “verifier”) that a statement is true, without revealing any additional details about the statement. For example, the prover could prove they know a secret password, without telling the verifier what the password is. Succinct: The proof itself is very compact, usually just a few hundred bytes long. This means it can be verified quickly, even for complex statements. Non-Interactive: The prover can generate the proof on their own, without any back-and-forth communication with the verifier. The verifier can then check the proof at any time, without needing the prover to be present. Argument of Knowledge: If the statement being proven is true, the verifier is guaranteed to accept the proof. If the statement is false, the verifier will reject the proof. This ensures the prover actually has the knowledge they claim to have. In practical terms, ZK-SNARKs allow for all kinds of powerful applications, like privacy-preserving transactions, verifiable computations, and more. They’re a key building block for many blockchain and web3 technologies. The ability to prove things without revealing sensitive information has a lot of potential uses in the digital world. How are ZK-SNARKs Constructed? Building a ZK-SNARK system involves three main components: 1. Arithmetization: The first step is to represent the problem or computation that the prover wants to prove in a way that’s suitable for the ZK-SNARK system. This involves converting the problem into a set of polynomial equations. The idea is that any program or algorithm, no matter how complex, can ultimately be broken down into a series of simple arithmetic operations, like addition and multiplication. In a ZK-SNARK system, these arithmetic operations are represented using “gates” — similar to how a computer’s CPU uses logic gates to execute instructions. By representing the problem as a circuit of these arithmetic gates, it can be translated into a set of polynomial equations that must be satisfied. 2. Proof System: Once the problem has been arithmetized, the prover needs to generate a cryptographic proof that they know a valid solution to the polynomial equations, without revealing the actual solution. This is done using a special type of proof system called an “Interactive Oracle Proof” (IOP). The prover and verifier engage in a interactive protocol where the prover demonstrates knowledge of the solution, but the verifier never learns the actual solution. This interactive proof can then be converted into a non-interactive proof using a technique called the Fiat-Shamir transformation. 3. Commitment Scheme: The final component is a commitment scheme, which allows the prover to “commit” to their solution in a way that is both binding (the prover can’t change it later) and hiding (the verifier can’t see the actual solution). Conceptually, you can think of this like the prover writing their solution on a piece of paper, locking it in a box, and sending the box to the verifier. The verifier can’t see the contents, but the prover can’t change it either. When the prover is ready, they provide the key to open the box, allowing the verifier to check the solution. In practice, the commitment is implemented using cryptographic techniques like encryption, rather than a literal physical box. By combining these three components — arithmetization, a proof system, and a commitment scheme — ZK-SNARK systems are able to construct succinct, non-interactive proofs that demonstrate knowledge of a solution, without revealing the solution itself. This is the core innovation that makes ZK-SNARKs so powerful and useful in a wide range of applications. Putting ZK-SNARKs to Use Now that we understand the core components of a ZK-SNARK system, the next question is: How can we actually use this technology to prove our own ideas or claims? The process looks something like this: Idea: Start with the idea or problem you want to prove. Program: Translate that idea into a computer program that can be executed to solve the problem. Circuit: Convert the program into a “circuit” — a network of simple arithmetic operations that can be represented as polynomial equations. Parameters: Generate the cryptographic parameters needed for the ZK-SNARK proof system. Proof: Using the circuit and parameters, the prover can generate a succinct, non-interactive proof that they know a valid solution. Verification: The verifier can then check the proof to confirm the validity of the prover’s claim, without learning the actual solution. An anatomy of a typical ZK-SNARK system So how do we bridge the gap between a regular computer program and the circuit representation required for ZK-SNARKs? There are a few different approaches: Hardware Description Languages (HDLs): Tools like Circom allow you to directly program the circuit using a language similar to how integrated circuits are designed. This gives you fine-grained control over the circuit, but requires learning a new domain-specific language. Libraries: Frameworks like Bellman (Rust) and Gadgetlib (C++) provide programming libraries that let you build circuits using familiar programming languages. This is more accessible for developers, but you still need to understand the circuit-level constraints. Compilers: Some new programming languages, like Zinc, are designed specifically for ZK-SNARK applications. They allow you to write high-level code that gets automatically compiled down to the required circuit representation. This is the most user-friendly approach, but may have performance trade-offs compared to the other methods. Ultimately, the choice of approach depends on your specific needs and the level of control you require over the circuit representation. Developers with a strong background in hardware design may prefer the HDL route, while those more comfortable with general-purpose programming languages may find the library or compiler options more accessible. Regardless of the approach, the key is being able to translate your idea or problem into a form that can be efficiently represented as a ZK-SNARK circuit. This unlocks the power of ZK-SNARKs to prove the validity of your claims without revealing sensitive information. Verifying Machine Learning with ZK-SNARKs As machine learning (ML) models have become more complex and powerful, a new challenge has emerged: how can we verify that the predictions made by these models are correct, especially when the models are being served by a third-party provider in an “ML-as-a-Service” (MLaaS) scenario? This is where verifiable machine learning (VML) comes into play. The idea is to use ZK-SNARKs to allow an ML model provider to prove to a consumer that the model is behaving correctly, without revealing the sensitive details of the model itself. So how do we go about generating a ZK-SNARK proof for a machine learning model? There are a few different approaches: Direct Circuit Representation: The most straightforward way is to use the tools we discussed earlier, like Circom, to translate the ML model into a circuit representation that can be used to generate a ZK-SNARK proof. However, this approach can be quite inefficient, as the size of the circuit and the time required to generate the proof can grow quickly as the model complexity increases. Specialized ZK-SNARK Protocols: To address the performance challenges of the direct approach, researchers have developed ZK-SNARK protocols that are specifically optimized for machine learning use cases. One example is Halo2, used in the Zcash cryptocurrency. Halo2 includes features like lookup tables and custom gates that make it much more efficient for handling the non-linear operations common in ML models. ML-Focused Frameworks: Building on these specialized ZK-SNARK protocols, there are now frameworks like EZKL and ZKML that provide higher-level tools for constructing ZK-SNARK proofs for ML models. These frameworks allow developers to work directly with common ML model formats like PyTorch and TensorFlow Lite, without needing to worry about the low-level circuit representation. Hybrid Approaches: Another option is to combine the strengths of different approaches. For example, the Circom HDL language, while not as optimized as Halo2 for ML, provides very fast verification times and short proofs. The Circomlib-ML library provides some pre-built circuit templates for common ML operations that can be used as a starting point. Ultimately, the choice of approach will depend on the specific requirements of the application, the complexity of the ML model, and the trade-offs between proof generation time, proof size, and verification performance. The key takeaway is that ZK-SNARKs provide a powerful tool for verifying the behavior of machine learning models, especially in scenarios where the models are being served by a third-party provider. By generating succinct, non-interactive proofs, the model consumer can have confidence in the correctness of the predictions, without needing to reveal the sensitive details of the model itself. References For further information on ZK-SNARKs and their applications in machine learning, here are some helpful resources: Zero Knowledge Proofs MOOC: https://zk-learning.org/ A comprehensive online course on zero knowledge proofs and their construction. ZKCNN Paper: https://eprint.iacr.org/2021/673 A research paper introducing a specialized ZK-SNARK protocol for verifying convolutional neural network (CNN) models. ZKML Community: https://github.com/zkml-community/awesome-zkml A curated list of resources, tools, and projects related to verifiable machine learning using ZK-SNARKs. Daniel Kang’s Medium: https://medium.com/@danieldkang A collection of articles by Daniel Kang, a researcher in the field of ZK-SNARKs and their applications. Daniel Kang’s Paper: https://arxiv.org/abs/2210.08674 A research paper by Daniel Kang on using ZK-SNARKs for verifiable machine learning.

A Glance At ZKML

What are ZK-SNARKs?

You may have come across the term “ZK-SNARK” in discussions about blockchain, web3, and other emerging technologies. But what exactly are they? Let’s break it down in simple terms.

ZK-SNARK stands for “Zero-Knowledge Succinct Non-Interactive Argument of Knowledge.” It’s a type of cryptographic proof that allows someone to prove they have certain information or knowledge, without actually revealing that information.

Here’s how it works:

Zero-Knowledge: The person making the proof (the “prover”) can convince the person verifying the proof (the “verifier”) that a statement is true, without revealing any additional details about the statement. For example, the prover could prove they know a secret password, without telling the verifier what the password is.

Succinct: The proof itself is very compact, usually just a few hundred bytes long. This means it can be verified quickly, even for complex statements.

Non-Interactive: The prover can generate the proof on their own, without any back-and-forth communication with the verifier. The verifier can then check the proof at any time, without needing the prover to be present.

Argument of Knowledge: If the statement being proven is true, the verifier is guaranteed to accept the proof. If the statement is false, the verifier will reject the proof. This ensures the prover actually has the knowledge they claim to have.

In practical terms, ZK-SNARKs allow for all kinds of powerful applications, like privacy-preserving transactions, verifiable computations, and more. They’re a key building block for many blockchain and web3 technologies. The ability to prove things without revealing sensitive information has a lot of potential uses in the digital world.

How are ZK-SNARKs Constructed?

Building a ZK-SNARK system involves three main components:

1. Arithmetization: The first step is to represent the problem or computation that the prover wants to prove in a way that’s suitable for the ZK-SNARK system. This involves converting the problem into a set of polynomial equations.

The idea is that any program or algorithm, no matter how complex, can ultimately be broken down into a series of simple arithmetic operations, like addition and multiplication. In a ZK-SNARK system, these arithmetic operations are represented using “gates” — similar to how a computer’s CPU uses logic gates to execute instructions. By representing the problem as a circuit of these arithmetic gates, it can be translated into a set of polynomial equations that must be satisfied.

2. Proof System: Once the problem has been arithmetized, the prover needs to generate a cryptographic proof that they know a valid solution to the polynomial equations, without revealing the actual solution.

This is done using a special type of proof system called an “Interactive Oracle Proof” (IOP). The prover and verifier engage in a interactive protocol where the prover demonstrates knowledge of the solution, but the verifier never learns the actual solution. This interactive proof can then be converted into a non-interactive proof using a technique called the Fiat-Shamir transformation.

3. Commitment Scheme: The final component is a commitment scheme, which allows the prover to “commit” to their solution in a way that is both binding (the prover can’t change it later) and hiding (the verifier can’t see the actual solution).

Conceptually, you can think of this like the prover writing their solution on a piece of paper, locking it in a box, and sending the box to the verifier. The verifier can’t see the contents, but the prover can’t change it either. When the prover is ready, they provide the key to open the box, allowing the verifier to check the solution.

In practice, the commitment is implemented using cryptographic techniques like encryption, rather than a literal physical box.

By combining these three components — arithmetization, a proof system, and a commitment scheme — ZK-SNARK systems are able to construct succinct, non-interactive proofs that demonstrate knowledge of a solution, without revealing the solution itself. This is the core innovation that makes ZK-SNARKs so powerful and useful in a wide range of applications.

Putting ZK-SNARKs to Use

Now that we understand the core components of a ZK-SNARK system, the next question is: How can we actually use this technology to prove our own ideas or claims?

The process looks something like this:

Idea: Start with the idea or problem you want to prove.

Program: Translate that idea into a computer program that can be executed to solve the problem.

Circuit: Convert the program into a “circuit” — a network of simple arithmetic operations that can be represented as polynomial equations.

Parameters: Generate the cryptographic parameters needed for the ZK-SNARK proof system.

Proof: Using the circuit and parameters, the prover can generate a succinct, non-interactive proof that they know a valid solution.

Verification: The verifier can then check the proof to confirm the validity of the prover’s claim, without learning the actual solution.

An anatomy of a typical ZK-SNARK system

So how do we bridge the gap between a regular computer program and the circuit representation required for ZK-SNARKs? There are a few different approaches:

Hardware Description Languages (HDLs): Tools like Circom allow you to directly program the circuit using a language similar to how integrated circuits are designed. This gives you fine-grained control over the circuit, but requires learning a new domain-specific language.

Libraries: Frameworks like Bellman (Rust) and Gadgetlib (C++) provide programming libraries that let you build circuits using familiar programming languages. This is more accessible for developers, but you still need to understand the circuit-level constraints.

Compilers: Some new programming languages, like Zinc, are designed specifically for ZK-SNARK applications. They allow you to write high-level code that gets automatically compiled down to the required circuit representation. This is the most user-friendly approach, but may have performance trade-offs compared to the other methods.

Ultimately, the choice of approach depends on your specific needs and the level of control you require over the circuit representation. Developers with a strong background in hardware design may prefer the HDL route, while those more comfortable with general-purpose programming languages may find the library or compiler options more accessible.

Regardless of the approach, the key is being able to translate your idea or problem into a form that can be efficiently represented as a ZK-SNARK circuit. This unlocks the power of ZK-SNARKs to prove the validity of your claims without revealing sensitive information.

Verifying Machine Learning with ZK-SNARKs

As machine learning (ML) models have become more complex and powerful, a new challenge has emerged: how can we verify that the predictions made by these models are correct, especially when the models are being served by a third-party provider in an “ML-as-a-Service” (MLaaS) scenario?

This is where verifiable machine learning (VML) comes into play. The idea is to use ZK-SNARKs to allow an ML model provider to prove to a consumer that the model is behaving correctly, without revealing the sensitive details of the model itself.

So how do we go about generating a ZK-SNARK proof for a machine learning model? There are a few different approaches:

Direct Circuit Representation: The most straightforward way is to use the tools we discussed earlier, like Circom, to translate the ML model into a circuit representation that can be used to generate a ZK-SNARK proof. However, this approach can be quite inefficient, as the size of the circuit and the time required to generate the proof can grow quickly as the model complexity increases.

Specialized ZK-SNARK Protocols: To address the performance challenges of the direct approach, researchers have developed ZK-SNARK protocols that are specifically optimized for machine learning use cases. One example is Halo2, used in the Zcash cryptocurrency. Halo2 includes features like lookup tables and custom gates that make it much more efficient for handling the non-linear operations common in ML models.

ML-Focused Frameworks: Building on these specialized ZK-SNARK protocols, there are now frameworks like EZKL and ZKML that provide higher-level tools for constructing ZK-SNARK proofs for ML models. These frameworks allow developers to work directly with common ML model formats like PyTorch and TensorFlow Lite, without needing to worry about the low-level circuit representation.

Hybrid Approaches: Another option is to combine the strengths of different approaches. For example, the Circom HDL language, while not as optimized as Halo2 for ML, provides very fast verification times and short proofs. The Circomlib-ML library provides some pre-built circuit templates for common ML operations that can be used as a starting point.

Ultimately, the choice of approach will depend on the specific requirements of the application, the complexity of the ML model, and the trade-offs between proof generation time, proof size, and verification performance.

The key takeaway is that ZK-SNARKs provide a powerful tool for verifying the behavior of machine learning models, especially in scenarios where the models are being served by a third-party provider. By generating succinct, non-interactive proofs, the model consumer can have confidence in the correctness of the predictions, without needing to reveal the sensitive details of the model itself.

References

For further information on ZK-SNARKs and their applications in machine learning, here are some helpful resources:

Zero Knowledge Proofs MOOC: https://zk-learning.org/

A comprehensive online course on zero knowledge proofs and their construction.

ZKCNN Paper: https://eprint.iacr.org/2021/673

A research paper introducing a specialized ZK-SNARK protocol for verifying convolutional neural network (CNN) models.

ZKML Community: https://github.com/zkml-community/awesome-zkml

A curated list of resources, tools, and projects related to verifiable machine learning using ZK-SNARKs.

Daniel Kang’s Medium: https://medium.com/@danieldkang

A collection of articles by Daniel Kang, a researcher in the field of ZK-SNARKs and their applications.

Daniel Kang’s Paper: https://arxiv.org/abs/2210.08674

A research paper by Daniel Kang on using ZK-SNARKs for verifiable machine learning.
·
--
De Modelos de Caja Negra a Predicciones Confiables: una Guía para Principiantes sobre ZK-SNARKs para...De Modelos de Caja Negra a Predicciones Confiables: Una Guía para Principiantes sobre ZK-SNARKs para IA que Preserva la Privacidad La inteligencia artificial se ha convertido en la columna vertebral de la tecnología moderna, tomando decisiones críticas en áreas como la atención médica, las finanzas e incluso la conducción autónoma. Sin embargo, la mayoría de los usuarios nunca ven cómo funcionan estos modelos; simplemente recibimos una predicción o clasificación de lo que a menudo se llama un modelo de caja negra. Si bien este arreglo es conveniente, plantea una pregunta importante: ¿Cómo sabemos que estas predicciones son precisas si no podemos ver dentro de la caja?

De Modelos de Caja Negra a Predicciones Confiables: una Guía para Principiantes sobre ZK-SNARKs para...

De Modelos de Caja Negra a Predicciones Confiables: Una Guía para Principiantes sobre ZK-SNARKs para IA que Preserva la Privacidad

La inteligencia artificial se ha convertido en la columna vertebral de la tecnología moderna, tomando decisiones críticas en áreas como la atención médica, las finanzas e incluso la conducción autónoma. Sin embargo, la mayoría de los usuarios nunca ven cómo funcionan estos modelos; simplemente recibimos una predicción o clasificación de lo que a menudo se llama un modelo de caja negra. Si bien este arreglo es conveniente, plantea una pregunta importante: ¿Cómo sabemos que estas predicciones son precisas si no podemos ver dentro de la caja?
·
--
La aleatoriedad no significa caos, pero representa responsabilidad. ARPA hace que la aleatoriedad sea verificable, no adivinable. 🎲🔐 https://t.co/xYbH3oUC17 https://t.co/Opq6ZTrJbc https://twitter.com/arpaofficial/status/2021016765703110950
La aleatoriedad no significa caos, pero representa responsabilidad.

ARPA hace que la aleatoriedad sea verificable, no adivinable. 🎲🔐

https://t.co/xYbH3oUC17 https://t.co/Opq6ZTrJbc https://twitter.com/arpaofficial/status/2021016765703110950
·
--
Cómo las Pruebas de Conocimiento Cero están Haciendo que los Agentes de IA sean Más Inteligentes y Eficientes: el Futuro de...Cómo las Pruebas de Conocimiento Cero están Haciendo que los Agentes de IA sean Más Inteligentes y Eficientes: El Futuro de la Computación Colaborativa La tecnología de Inteligencia Artificial (IA) está cada vez más presente en todas partes. Aparece en la parte superior de los resultados de los motores de búsqueda, se utiliza para escribir líneas menores de código, puede realizar investigaciones y citar fuentes, y algunas personas incluso están tratando de averiguar cómo ponerla en su lavavajillas. Aunque se puede debatir la necesidad de tener IA en su lavavajillas, una cosa que no se puede debatir es que usar este poder de computación tiene costos definitivos.

Cómo las Pruebas de Conocimiento Cero están Haciendo que los Agentes de IA sean Más Inteligentes y Eficientes: el Futuro de...

Cómo las Pruebas de Conocimiento Cero están Haciendo que los Agentes de IA sean Más Inteligentes y Eficientes: El Futuro de la Computación Colaborativa

La tecnología de Inteligencia Artificial (IA) está cada vez más presente en todas partes. Aparece en la parte superior de los resultados de los motores de búsqueda, se utiliza para escribir líneas menores de código, puede realizar investigaciones y citar fuentes, y algunas personas incluso están tratando de averiguar cómo ponerla en su lavavajillas. Aunque se puede debatir la necesidad de tener IA en su lavavajillas, una cosa que no se puede debatir es que usar este poder de computación tiene costos definitivos.
·
--
Haz lo que quieras con esta información https://t.co/gpzGSiSNsD https://twitter.com/arpaofficial/status/2020649344857424153
Haz lo que quieras con esta información https://t.co/gpzGSiSNsD https://twitter.com/arpaofficial/status/2020649344857424153
·
--
🔐 ¡Nuevo PR está en vivo en @InnoTechToday! Destaca por qué la próxima era de la privacidad no se trata solo de ocultar datos, sino también de demostrar la corrección sin exponer secretos. En ARPA Network, hemos estado trabajando hacia ese futuro con computación que preserva la privacidad + verificable para https://twitter.com/arpaofficial/status/2019782634071605662
🔐 ¡Nuevo PR está en vivo en @InnoTechToday! Destaca por qué la próxima era de la privacidad no se trata solo de ocultar datos, sino también de demostrar la corrección sin exponer secretos.

En ARPA Network, hemos estado trabajando hacia ese futuro con computación que preserva la privacidad + verificable para https://twitter.com/arpaofficial/status/2019782634071605662
·
--
La privacidad es un propósito central de OG en crypto Es lo que permite que crypto escale más allá de la especulación ARPA está construyendo para ese mundo 🌐 https://t.co/NcUnvizBF9 https://twitter.com/arpaofficial/status/2019567214073127316
La privacidad es un propósito central de OG en crypto

Es lo que permite que crypto escale más allá de la especulación

ARPA está construyendo para ese mundo 🌐 https://t.co/NcUnvizBF9 https://twitter.com/arpaofficial/status/2019567214073127316
·
--
Escalando el futuro de la computación descentralizada con @Eigenpiexyz_io! 🏗️🛡️ A medida que el AVS de ARPA se prepara para su próxima ronda de actualizaciones técnicas, nos enorgullece tener a Eigenpie como un operador dedicado. Juntos, estamos fortaleciendo la seguridad de la red y explorando sinergias más profundas. https://t.co/Dm4Pt3r1Ae https://twitter.com/arpaofficial/status/2019201303424221550
Escalando el futuro de la computación descentralizada con @Eigenpiexyz_io! 🏗️🛡️

A medida que el AVS de ARPA se prepara para su próxima ronda de actualizaciones técnicas, nos enorgullece tener a Eigenpie como un operador dedicado. Juntos, estamos fortaleciendo la seguridad de la red y explorando sinergias más profundas. https://t.co/Dm4Pt3r1Ae https://twitter.com/arpaofficial/status/2019201303424221550
·
--
En un mundo sin confianza, la privacidad y la aleatoriedad deben ser demostrables. ARPA está construyendo las matemáticas que hacen que Web3 sea honesto. 🧮✨ https://t.co/xYbH3oUC17 https://t.co/vnBvOUplMO https://twitter.com/arpaofficial/status/2018847723085086735
En un mundo sin confianza, la privacidad y la aleatoriedad deben ser demostrables.

ARPA está construyendo las matemáticas que hacen que Web3 sea honesto. 🧮✨

https://t.co/xYbH3oUC17 https://t.co/vnBvOUplMO https://twitter.com/arpaofficial/status/2018847723085086735
·
--
Estamos emocionados de explorar la posibilidad de trabajar con @TermMaxFi - un protocolo DeFi que ofrece tasas fijas y estructuras de plazo en la cadena para RWA. 🤝 Juntos, estamos buscando formas en que ARPA pueda ayudar a mejorar la seguridad, la confianza y la innovación en el DeFi apalancado. Desbloqueando oportunidades para un https://t.co/bLUepbPddC https://twitter.com/arpaofficial/status/2018504461493186853
Estamos emocionados de explorar la posibilidad de trabajar con @TermMaxFi - un protocolo DeFi que ofrece tasas fijas y estructuras de plazo en la cadena para RWA. 🤝

Juntos, estamos buscando formas en que ARPA pueda ayudar a mejorar la seguridad, la confianza y la innovación en el DeFi apalancado.

Desbloqueando oportunidades para un https://t.co/bLUepbPddC https://twitter.com/arpaofficial/status/2018504461493186853
·
--
La privacidad sin verificación es secreto La verificación sin privacidad es vigilancia ARPA construye el equilibrio. ⚖️ https://t.co/Krsu2IVmUh https://twitter.com/arpaofficial/status/2018113887564923298
La privacidad sin verificación es secreto

La verificación sin privacidad es vigilancia

ARPA construye el equilibrio. ⚖️ https://t.co/Krsu2IVmUh https://twitter.com/arpaofficial/status/2018113887564923298
·
--
La suerte es divertida, pero la suerte demostrable es justa Por eso los juegos de Web3, los proyectos de NFT y las dApps eligen ARPA Randcast 🎲 https://t.co/xYbH3oV9QF https://t.co/un2A11ffhj https://twitter.com/arpaofficial/status/2017025969308258529
La suerte es divertida, pero la suerte demostrable es justa

Por eso los juegos de Web3, los proyectos de NFT y las dApps eligen ARPA Randcast 🎲

https://t.co/xYbH3oV9QF https://t.co/un2A11ffhj https://twitter.com/arpaofficial/status/2017025969308258529
·
--
RT @cedranetwork: Cedra × @arpaofficial Cedra se está asociando con ARPA Network, un protocolo de computación segura descentralizado enfocado en imp… https://twitter.com/arpaofficial/status/2017021829458907212
RT @cedranetwork: Cedra × @arpaofficial

Cedra se está asociando con ARPA Network, un protocolo de computación segura descentralizado enfocado en imp… https://twitter.com/arpaofficial/status/2017021829458907212
·
--
La privacidad en redes abiertas no es un oxímoron De hecho, una genera la otra https://t.co/PTpSlgWV8K https://twitter.com/arpaofficial/status/2016665846001913957
La privacidad en redes abiertas no es un oxímoron

De hecho, una genera la otra https://t.co/PTpSlgWV8K https://twitter.com/arpaofficial/status/2016665846001913957
·
--
Actualización de Asociación: ARPA × @cedranetwork 🚀 Estamos emocionados de colaborar con Cedra - una red Move rápida, abierta y gobernada por la comunidad. Juntos, estamos explorando llevar ARPA Randcast a la Red Cedra. Potenciando la aleatoriedad segura para juegos, DeFi, NFTs y aplicaciones en cadena a través de https://t.co/GQ2CEG0R89 https://twitter.com/arpaofficial/status/2016692778613494061
Actualización de Asociación: ARPA × @cedranetwork 🚀

Estamos emocionados de colaborar con Cedra - una red Move rápida, abierta y gobernada por la comunidad. Juntos, estamos explorando llevar ARPA Randcast a la Red Cedra.

Potenciando la aleatoriedad segura para juegos, DeFi, NFTs y aplicaciones en cadena a través de https://t.co/GQ2CEG0R89 https://twitter.com/arpaofficial/status/2016692778613494061
·
--
Estamos felices de seguir trabajando con @InfStones, un operador de confianza que apoya a ARPA AVS. A medida que ARPA AVS implemente las próximas actualizaciones técnicas, @InfStones seguirá ofreciendo infraestructura segura y confiable mientras busca oportunidades de colaboración más profundas. Juntos somos https://t.co/UUsBb4iLT8 https://twitter.com/arpaofficial/status/2016326922633150667
Estamos felices de seguir trabajando con @InfStones, un operador de confianza que apoya a ARPA AVS.

A medida que ARPA AVS implemente las próximas actualizaciones técnicas, @InfStones seguirá ofreciendo infraestructura segura y confiable mientras busca oportunidades de colaboración más profundas.

Juntos somos https://t.co/UUsBb4iLT8 https://twitter.com/arpaofficial/status/2016326922633150667
·
--
Es impactante cuán omnipresente es el RNG en cualquier aplicación digital Asegúrate de que tu aleatoriedad sea verdaderamente aleatoria https://t.co/xYbH3oUC17 https://t.co/17r818fZol https://twitter.com/arpaofficial/status/2016303710029095208
Es impactante cuán omnipresente es el RNG en cualquier aplicación digital

Asegúrate de que tu aleatoriedad sea verdaderamente aleatoria

https://t.co/xYbH3oUC17 https://t.co/17r818fZol https://twitter.com/arpaofficial/status/2016303710029095208
·
--
Tus datos no deberían ser el costo de la inteligencia.] La IA que preserva la privacidad y es verificable en la que ARPA está trabajando asegura que te mantengas inteligente y soberano. 🛡️ https://t.co/IdsFn8itxm https://twitter.com/arpaofficial/status/2015939812084351323
Tus datos no deberían ser el costo de la inteligencia.]

La IA que preserva la privacidad y es verificable en la que ARPA está trabajando asegura que te mantengas inteligente y soberano. 🛡️ https://t.co/IdsFn8itxm https://twitter.com/arpaofficial/status/2015939812084351323
·
--
Pruebas de Conocimiento Cero se encuentran con Aprendizaje Automático. El resultado es IA que sabe sin mostrar. 🧠💡 https://t.co/15hsywZy82 https://twitter.com/arpaofficial/status/2015562576264925261
Pruebas de Conocimiento Cero se encuentran con Aprendizaje Automático.

El resultado es IA que sabe sin mostrar. 🧠💡 https://t.co/15hsywZy82 https://twitter.com/arpaofficial/status/2015562576264925261
·
--
"Porque la privacidad es esencial para la mayoría de los casos de uso en el mundo real, un puñado de cadenas de privacidad podría poseer la mayor parte de las criptomonedas." - De @a16zcrypto https://t.co/Sc39aaZVbz https://twitter.com/arpaofficial/status/2014854410195587229
"Porque la privacidad es esencial para la mayoría de los casos de uso en el mundo real, un puñado de cadenas de privacidad podría poseer la mayor parte de las criptomonedas."

- De @a16zcrypto https://t.co/Sc39aaZVbz https://twitter.com/arpaofficial/status/2014854410195587229
Inicia sesión para explorar más contenidos
Descubre las últimas noticias sobre criptomonedas
⚡️ Participa en los debates más recientes sobre criptomonedas
💬 Interactúa con tus creadores favoritos
👍 Disfruta del contenido que te interesa
Correo electrónico/número de teléfono
Mapa del sitio
Preferencias de cookies
Términos y condiciones de la plataforma