Haru (Privacy szn)
@Stanley_crypto
Followers
4K
Following
2K
Media
297
Statuses
3K
🧠 Crypto researcher by day, degen by night 🚀 | Lover of @zama @aztecnetwork at all times
Web3
Joined September 2016
I have 5 Zama OG NFT to give away. To enter: 1️⃣ Follow @zama. 2️⃣ Like & retweet the announcement quoted. 3️⃣ 📝Comment this post with "Done" to be eligible. (Announcing the winner tomorrow, December 24, at 1 PM CET, in this thread.).
The Zama OG NFT rewards creators and developers who believed in Zama’s mission early. Thanks in part to your support, Zama went from moon-math curiosity to a top-trending protocol, putting privacy + FHE on the map forever. As a token of appreciation (no pun intended), OG NFT
3K
2K
3K
The Zama OG NFT rewards creators and developers who believed in Zama’s mission early. Thanks in part to your support, Zama went from moon-math curiosity to a top-trending protocol, putting privacy + FHE on the map forever. As a token of appreciation (no pun intended), OG NFT
835
2K
3K
Zama’s real flex: it’s not a new chain. It’s a confidentiality layer you can add on top of any L1 or L2. We need to stop fighting over the same users, devs, liquidity, and capital. Let’s unlock new use cases and bring in new users... not reshuffle the same activity. gzama
79
13
214
How Zama’s Threshold MPC Keeps Keys Secure and Decentralized In @zama's fhEVM, the Threshold MPC layer is what makes decryption and signing trustless by design. It ensures no single node, not even the Gateway, ever holds the full private key. Here’s how it works 🟰 Key
Understanding Plaintext in Fully Homomorphic Encryption Every encrypted computation starts with one thing, plaintext. It’s the raw, readable data you begin with: your numbers, strings, or variables before any encryption takes place. In Fully Homomorphic Encryption (FHE),
52
21
57
Understanding Plaintext in Fully Homomorphic Encryption Every encrypted computation starts with one thing, plaintext. It’s the raw, readable data you begin with: your numbers, strings, or variables before any encryption takes place. In Fully Homomorphic Encryption (FHE),
Zama’s third Genesis Operator: @InfStones, and why InfStones? @zama is thrilled to welcome InfStones to the Genesis Operator set powering its encrypted compute protocol. After @Figment_io and @conduitxyz, InfStones brings further strength to the foundation of privacy-preserving
21
17
26
Zama’s third Genesis Operator: @InfStones, and why InfStones? @zama is thrilled to welcome InfStones to the Genesis Operator set powering its encrypted compute protocol. After @Figment_io and @conduitxyz, InfStones brings further strength to the foundation of privacy-preserving
How FHE unlocks composable onchain identity Onchain identity in Web3 has always been a tradeoff. You either reveal everything; your wallet, transaction history, and behavioral data or you stay completely anonymous and lose access to features that rely on verified identity. This
36
24
49
How FHE unlocks composable onchain identity Onchain identity in Web3 has always been a tradeoff. You either reveal everything; your wallet, transaction history, and behavioral data or you stay completely anonymous and lose access to features that rely on verified identity. This
Zama’s second Genesis Operator: @conduitxyz, and why Conduit? Following the announcement of @Figment_io, @zama is excited to introduce Conduit as the next foundational operator in the Zama Protocol’s encrypted compute network. Why Conduit? Conduit is known for helping teams
32
20
44
How Zama’s Concrete ML Brings Encryption to AI Workflows Did you know that Zama’s Concrete ML lets developers bring privacy by default into their AI models? Built on top of @zama 's Fully Homomorphic Encryption (FHE) libraries, Concrete ML allows you to take a regular machine
Zama’s first Genesis Operator: @Figment_io, and Why Figment? Ahead of the Zama Protocol launch, @zama_fhe is revealing the network of Genesis Operators responsible for running its decentralized privacy infrastructure. First up: Figment, a global leader in Web3 staking and
13
8
19
Zama’s second Genesis Operator: @conduitxyz, and why Conduit? Following the announcement of @Figment_io, @zama is excited to introduce Conduit as the next foundational operator in the Zama Protocol’s encrypted compute network. Why Conduit? Conduit is known for helping teams
Zama’s first Genesis Operator: @Figment_io, and Why Figment? Ahead of the Zama Protocol launch, @zama_fhe is revealing the network of Genesis Operators responsible for running its decentralized privacy infrastructure. First up: Figment, a global leader in Web3 staking and
12
9
13
MPC Decryption Flow, Explained @zama 's MPC decryption flow is a tightly coordinated process that transforms distributed key shares into a single decrypted output—without ever reconstructing the full private key. This ensures data remains protected even during decryption. 1.
Zama’s Custom ZK Scheme Vs Standard ZK Schemes Most people know @zama for Fully Homomorphic Encryption (FHE), the magic that lets you compute on encrypted data. But there’s another equally important part of the stack: a custom zero knowledge proof scheme designed specifically
11
18
24
How Zama’s Concrete ML Brings Encryption to AI Workflows Did you know that Zama’s Concrete ML lets developers bring privacy by default into their AI models? Built on top of @zama 's Fully Homomorphic Encryption (FHE) libraries, Concrete ML allows you to take a regular machine
Zama’s first Genesis Operator: @Figment_io, and Why Figment? Ahead of the Zama Protocol launch, @zama_fhe is revealing the network of Genesis Operators responsible for running its decentralized privacy infrastructure. First up: Figment, a global leader in Web3 staking and
13
8
19
Zama’s first Genesis Operator: @Figment_io, and Why Figment? Ahead of the Zama Protocol launch, @zama_fhe is revealing the network of Genesis Operators responsible for running its decentralized privacy infrastructure. First up: Figment, a global leader in Web3 staking and
How Zama Keeps Decryption in the User’s Hands This system is designed so that only the user ever receives plaintext results, ensuring the network never touches or exposes raw secrets. It delivers fine-grained access control while preserving true end-to-end encryption integrity.
9
36
38
How Zama Keeps Decryption in the User’s Hands This system is designed so that only the user ever receives plaintext results, ensuring the network never touches or exposes raw secrets. It delivers fine-grained access control while preserving true end-to-end encryption integrity.
Zama’s Threshold MPC Layer Explained @zama doesn’t just encrypt data, it secures encryption keys with the same level of decentralization and trustlessness. At the core of Zama’s privacy stack is the Threshold MPC Layer, a decentralized key management system that ensures no one
33
29
46
Zama’s Threshold MPC Layer Explained @zama doesn’t just encrypt data, it secures encryption keys with the same level of decentralization and trustlessness. At the core of Zama’s privacy stack is the Threshold MPC Layer, a decentralized key management system that ensures no one
MPC Decryption Flow, Explained @zama 's MPC decryption flow is a tightly coordinated process that transforms distributed key shares into a single decrypted output—without ever reconstructing the full private key. This ensures data remains protected even during decryption. 1.
24
14
32
MPC Decryption Flow, Explained @zama 's MPC decryption flow is a tightly coordinated process that transforms distributed key shares into a single decrypted output—without ever reconstructing the full private key. This ensures data remains protected even during decryption. 1.
Zama’s Custom ZK Scheme Vs Standard ZK Schemes Most people know @zama for Fully Homomorphic Encryption (FHE), the magic that lets you compute on encrypted data. But there’s another equally important part of the stack: a custom zero knowledge proof scheme designed specifically
11
18
24
Zama’s Custom ZK Scheme Vs Standard ZK Schemes Most people know @zama for Fully Homomorphic Encryption (FHE), the magic that lets you compute on encrypted data. But there’s another equally important part of the stack: a custom zero knowledge proof scheme designed specifically
FHEVM: The Core of Zama’s Architecture The FHEVM (Fully Homomorphic Encryption Virtual Machine) is @zama's foundational innovation, a modified EVM that brings encrypted computation natively to smart contracts. Instead of exposing all contract data by default, FHEVM introduces
33
15
41
FHEVM: The Core of Zama’s Architecture The FHEVM (Fully Homomorphic Encryption Virtual Machine) is @zama's foundational innovation, a modified EVM that brings encrypted computation natively to smart contracts. Instead of exposing all contract data by default, FHEVM introduces
HPU: The Hardware Heart of Zama’s Confidential Blockchain Stack(Explainer Video) The HPU (Homomorphic Processing Unit) is Zama’s purpose-built accelerator that turns the theoretically possible into practically usable by making Fully Homomorphic Encryption (FHE) fast enough for
20
17
30
Only 6 hours left. If you're whitelisted, now's your last chance to place your pre-bid before the AZTEC Public Sale opens. 👉 https://t.co/984yCmlR2P
20
6
70