Explore tweets tagged as #Encryption
Getting ice cream at The Burj but all I can think about is Zama. The world has to know that @zama is making onchain privacy great again. You see, Zama uses a special encryption known as FHE that lets blockchains process your transactions without ever seeing your data. You can
108
1
134
Proof by Poem: The RSA Encryption Algorithm Daniel G. Treat, NDA Mathematics Magazine, Vol. 75, No. 4 (Oct., 2002), p. 255
6
10
90
Huge Victory: #ChatControl no longer forces us to break #encryption. 🎉 🚨But: It now wants #AgeVerification. The Trilogue starts today 🗓️ You've helped us stop #backdoors: https://t.co/ExZQOnhQIs Now, help us stop #AgeVerification! 👇️ https://t.co/yLiO7fSAkX
40
528
2K
World Chat: a messaging app for humans. End-to-end encryption, global payments and Mini Apps inside conversations. Secured by @xmtp_ Try World Chat: https://t.co/4ziBHrDHkJ
34
48
557
🔐 SSL vs TLS vs HTTPS - Explained Simply • SSL ❌ Old & broken security protocol All versions are deprecated • TLS ✅ Modern encryption standard Faster, stronger, secure (TLS 1.2 / 1.3) • HTTPS 🌐 HTTP + TLS encryption Keeps web data private & authentic 👉 Rule to
14
79
526
GM everyone! 💛 Fully Homomorphic Encryption (FHE) is revolutionizing the way we handle data privacy and security. With FHE, data can remain fully encrypted throughout processing and computation. This means that even in cloud environments, sensitive information is never exposed
89
3
117
Key management is easily one of the hardest parts of working with Fully Homomorphic Encryption, especially in systems like @zama 🔐 When data never gets decrypted, keys become the single most sensitive component in the entire flow. They need to move safely between users,
64
0
63
$ZAMA is setting a new baseline for what real privacy looks like in Web3 and AI. Fully Homomorphic Encryption is no longer a theoretical breakthrough. It is actively being used by privacy focused companies to enable computation on encrypted data without ever exposing the
56
0
59
Chat Control no longer forces us to break encryption But it now requires age verification. https://t.co/K7KokeJkWW
55
351
2K
Zama is not chasing hype. Zama is fixing a core flaw of the internet. For years we encrypted communication (HTTPS). We encrypted storage. But the moment data is used, it becomes exposed. That’s the gap @Zama fills. With FHE (Fully Homomorphic Encryption), Zama lets smart
22
1
40
Zama is tackling one of blockchain’s hardest problems: how to compute on data without exposing it @zama this is where FHE and FHEVM come in FHE (Fully Homomorphic Encryption) allows computations to run directly on encrypted data the data is never decrypted, even while being
42
0
92
Cloudflare uses lava lamps to achieve randomness for data encryption.
70
46
1K
Onchain confidentiality has always come with trade off . You get security, but lose decentralization. You get scalability, but sacrifice verifiability. You get privacy, but break composability. @zama is changing that. By leveraging Fully Homomorphic Encryption (FHE), Zama is
22
3
20
Zama is an open-source cryptography company working to implement fully homomorphic encryption (FHE) technology, which enables computation/processing on encrypted data without ever decrypting it. It's not just computing a privacy tool, blockchain apps and AI are creating a new
89
1
86
Modern privacy-enhancing technologies guide a responsible approach to data use by applying anonymization, encryption, secure computation, minimization, and distributed trust models, protecting personal information while supporting analytical work. Microblog by @antgrasso
17
61
87
As a backend engineer. Please learn: - System Design (scalability, microservices) -APIs (REST, GraphQL, gRPC) -Database Systems (SQL, NoSQL) -Distributed Systems (consistency, replication) -Caching (Redis, Memcached) -Security (OAuth2, JWT, encryption) -DevOps (CI/CD,
91
508
5K
❗️The Company That Sells Toilet Cameras Has Access to Images of Their User's Poop The $600 Kohler Dekoda camera, which requires a subscription to function, was advertised as having “end-to-end” encryption. Investigations show the other end is the company itself.
40
51
298