Gonçalo Pestana

Results 89 issues of Gonçalo Pestana

The idea here is to define a comprehensive privacy threat model for distributed hash tables and similar P2P overlay networks. Focusing on privacy attack surface and metadata leaks of networks...

research
doing now

One thing that is interesting about P2P and decentralised networks is that they tend to the "property extreme" (!lacking of a better name..). Consider, for example, scalability. P2P networks have...

When privacy is not built in by default, it opens opportunities for participants in the network to passively gather data points of what is happening in the network. The type...

**PaperJam** is a process for quickly acquire context on any research topic. The process consists of first selecting 4 papers which are seemingly related and read the abstract, introduction and...

research

- Passive attacks on low latency anonymous networks. - Active attacks on low latency anonymous networks.

Maintaining and running a secure P2P privacy preserving network requires computational resources and has potentially high costs. Peers who reliably offer resources to the commons should be rewarded for it....

Zokrates is a toolbox for creation of zk-SNARK proofs, verification keys and Ethereum smart contract for verification of transactions in Ethereum blockchain with zk-SNARKs. The process is the following: 1)...

[Codaprotocol](https://codaprotocol.com) uses recursive composition of zk-SNARKs to securely represent a state of a linked-list. A linked-list is represented by a set of states and links between those states. The recursive...

research

How can zero proof knowledge protocols help building metadata resistant and decentralised communication protocols?

question
research

- the best thing you can do is to create value. bringing people together is huge value creation. - a community is made of givers and takers, and that's fine....