KupiaSecurity Profile Banner
Kupia Security Profile
Kupia Security

@KupiaSecurity

Followers
5K
Following
705
Media
97
Statuses
929

Securing Web3

Request an audit πŸ‘‰
Joined January 2023
Don't wanna be here? Send us removal request.
@KupiaSecurity
Kupia Security
3 months
One Year Competing in Public Audits. βœ… Helped secure ~100 protocols.βœ… 10x 1st Place Wins πŸ₯‡.βœ… 28x Top 3 Finishes πŸ†.βœ… $400K+ Earned finding bugs. Portfolio: Contact us for audits:
Tweet card summary image
kupia.io
KupiaSec is a top-notch smart contract audit firm, offering high-quality security solutions for Solidity-based EVM platforms.
0
2
25
@KupiaSecurity
Kupia Security
2 days
RT @cantinaxyz: Setting a new record: 971 researchers participated in the @AlchemixFi competition, and now the results are in πŸͺ. Your top r….
0
4
0
@KupiaSecurity
Kupia Security
18 days
RT @KupiaSecurity: Hard work and dedication paid off. Proud to help secure @Velvet_Capital.
Tweet media one
0
2
0
@KupiaSecurity
Kupia Security
26 days
RT @cantinaxyz: The judges have decided. Mystic Finance competition results are in. πŸ₯‡ @BengalCatBalu: $1,127.54.πŸ₯ˆ @KupiaSecurity: $1,056.9….
0
6
0
@KupiaSecurity
Kupia Security
28 days
Hard work and dedication paid off. Proud to help secure @Velvet_Capital.
Tweet media one
2
2
104
@KupiaSecurity
Kupia Security
29 days
RT @cantinaxyz: Another leaderboard locked in: Final results from the @Velvet_Capital competition are confirmed. πŸͺ. πŸ₯‡ io10: $11,741.93.πŸ₯ˆ @K….
0
4
0
@KupiaSecurity
Kupia Security
1 month
RT @KupiaSecurity: πŸŽ‰ Thrilled to announce we finished a FREE audit of @ethena_labs's cutting-edge timelock implementation! πŸ”’. Got a projec….
0
1
0
@KupiaSecurity
Kupia Security
1 month
8/8 The Bigger Picture. Trusted setups represent cryptography's ongoing quest to balance efficiency, security, and trust assumptions. Understanding these trade-offs isn't just about ZK-SNARKs - it's about appreciating how we build better privacy technologies for the future.
0
0
0
@KupiaSecurity
Kupia Security
1 month
7/8 Real-World Impact. This elegant dance between secrecy and verification enables succinct proofs that verify in constant time, regardless of computational complexity. It's a fascinating trade-off between efficiency and trust that drives innovation in privacy-preserving.
1
0
0
@KupiaSecurity
Kupia Security
1 month
6/8 The Zero-Knowledge Balance. Why all this complexity? It creates perfect asymmetry - provers know their secret witness but not the evaluation point Ο„, while verifiers can check correctness without learning the prover's secrets. This delicate balance enables zero-knowledge.
1
0
0
@KupiaSecurity
Kupia Security
1 month
5/8 Distributed Trust Solution. The single-party setup feels risky, so enter the "Powers of Tau ceremony" - a multi-party computation where dozens of participants each contribute their own secret. As long as at least one participant honestly deletes their secret, the entire setup.
1
0
0
@KupiaSecurity
Kupia Security
1 month
4/8 Mathematical Verification. But we're not flying blind! Using bilinear pairings on elliptic curve groups, we can verify that the structured reference string follows the required pattern. These pairing equations confirm the elements are correctly related without revealing the.
1
0
0
@KupiaSecurity
Kupia Security
1 month
3/8 The Trust Dilemma. Here's the catch - whoever generated the setup knows Ο„ and could potentially forge proofs. This is why it's called a "trusted" setup - we must trust that the creator permanently deleted Ο„. This trust assumption is one of the most criticized aspects of many.
1
0
0
@KupiaSecurity
Kupia Security
1 month
2/8 Enter the Structured Reference String. Someone picks a secret value Ο„ and computes its powers, but instead of revealing them, they multiply each by an elliptic curve generator point. This creates a "structured reference string" (SRS) that lets anyone evaluate polynomials at Ο„.
1
0
0
@KupiaSecurity
Kupia Security
1 month
The Cryptographic Magic Behind ZK-SNARKs - Understanding Trusted Setup. 1/8 The Secret Polynomial Problem. Ever wondered how ZK-SNARKs evaluate polynomials at secret values without revealing them? It starts with a brilliant insight - any polynomial evaluation can be expressed as.
1
0
4
@KupiaSecurity
Kupia Security
1 month
πŸŽ‰ Thrilled to announce we finished a FREE audit of @ethena_labs's cutting-edge timelock implementation! πŸ”’. Got a project with under 200 lines of code? We’re excited to offer pro-level audits at no cost. DM us or visit our website to secure your smart contracts today!.
1
1
18
@KupiaSecurity
Kupia Security
1 month
RT @KupiaSecurity: Another winning!.Thanks for the opportunity! @cantinaxyz.
0
2
0
@KupiaSecurity
Kupia Security
2 months
Another winning!.Thanks for the opportunity! @cantinaxyz.
@cantinaxyz
Cantina πŸͺ
2 months
The @InfiniFiLabs competition results are in. πŸͺ. Your top-ranked researchers:. πŸ₯‡ @KupiaSecurity β€” $6,337.13.πŸ₯ˆ @s4muraii77 β€” $2,904.70.πŸ₯‰ @bbl4de_xyz β€” $2,638.82. Thank you to everyone that participated. Full leaderboard below.
Tweet media one
3
2
71
@KupiaSecurity
Kupia Security
2 months
8/8 The Elegant Security. ECDSA's genius lies in carefully balanced constraints. Signers choose some values freely but cannot forge the discrete log relationship without knowing the private key. It's cryptographic engineering at its finest: making honest behavior easy, and.
0
0
0
@KupiaSecurity
Kupia Security
2 months
7/8 Public Key Recovery Magic. You can recover public keys from signatures using P = r⁻¹(sR - hG). This saves storage space since transactions don't need explicit public keys, just a small recovery parameter. The signature itself contains enough information.
1
0
0
@KupiaSecurity
Kupia Security
2 months
6/8 The Complete Algorithm. Pick random k, compute R = kG, set r = R.x, calculate s = k⁻¹(h + rp). Verification checks if s⁻¹(hG + rP) has x-coordinate equal to r. The math ensures only private key holders can create valid signatures.
1
0
0