-
It should be possible in some situations to use Zero Knowledge Proofs to anonymize the credential subject while still proving some facts about them (e.g. you don’t know their name but you know that th…
-
This text addition proposal results from the split of section 10.1:
> 10.2. End-User intrackability
>
> Intrackability is a property whereby one or more Issuers are prevented to learn
> by wh…
-
Addresses now must commit to VPs, so we must distinguish between old-style public key addresses (which we are also keeping, but only have meaning inside of VPs) and new-style VP addresses.
- [x] Im…
-
**Output selection:**
I just noticed that in the new wallet 'Wolfram Warptangent' (v0.10.3.1-release), the output selection for a given transaction doesn't seem to be randomized anymore. I tried us…
-
Creating a shielded transaction on a node that is not synced up can have harmful privacy implications, for several reasons:
1. If the node lags by more than 20 blocks, then the newly-created transa…
-
As was raised recently during the DCP WG face to face call.
If a wallet is making use of cryptographic keys that require some form of user authentication in order to perform a cryptographic operati…
-
An MSPA requirement for NPPs is to:
> protect both sender and recipient network location from all parties, including each other or any other party
There are privacy properties beyond protecting …
-
As part of https://github.com/w3f/messaging/, A Decentralised Privacy-Preserving Communication Protocol, we are exploring what we'd need from the P2P layer. You can read more about this protocol and i…
-
A Symbolic Analysis of Privacy for TLS 1.3 with Encrypted Client Hello
Karthikeyan Bhargavan, Vincent Cheval, Christopher A. Wood
https://research.cloudflare.com/publications/Bhargavan2022/
https:/…
wkrp updated
9 months ago
-
Always Denis:
Section 15.3. Unlinkability and Reusability of Status Assertions, the text states:
This design is pivotal in ensuring unlinkability between Verifiers, where actions t…