-
As a member of the IVC forms team, I want a service that can sub in for PEGA and pretend to be PEGA so that I can submit forms and see responses as if PEGA were sending status.
We have a bunch of stu…
-
### Description
The Stone Prover is a tool for generating STARK proofs of Cairo programs.
The Integrity Verifier enables the on-chain verification of proofs generated by the Stone Prover.
In …
-
https://us.metamath.org/ currently claims that there are "over 23,000 proofs" in the Metamath Proof Explorer. While technically true, there are in fact currently over 41,000 proofs in set.mm. This sho…
-
Fail earlier and provide better guidance on how to change the circuit or use another email for proof generation on the UI.
-
We still have some admits in the proofs.
Some of these are because of F* performance.
(The code verifies on some machines and not others).
Other admits are simply things we still need to look at and r…
-
The following questions came up in the review of PR #136. Let’s discuss and resolve them either by not adding them or adding a new PR.
- [ ] @brianorwhatever : I don't think we say anything about …
-
### Background
Additional context: https://github.com/lightninglabs/taproot-assets/pull/419#discussion_r1278175655
The current implementation of the proof file is not very efficient when it come…
-
-
@Kugelblitz360 Great job. Thank you for your great work. I started to proof-read today and will continue in the next few days. Here is a non prioritized list of thoughts. I will split it into multiple…
-
# Why
This is required for permissionless node participation and is considered table stakes for network security.
# How will we measure success
* Ledger PR submitted
* Announcing POP and explain wh…