Explore tweets tagged as #computation
Modern privacy-enhancing technologies guide a responsible approach to data use by applying anonymization, encryption, secure computation, minimization, and distributed trust models, protecting personal information while supporting analytical work. Microblog by @antgrasso
17
62
87
Here is the link to download the pdf of my 3rd course @cdf1530 on biological computation. I present and discuss network motifs that reveal the hidden logic of complex networks. Enjoy https://t.co/QqrGb1iJz6
8
60
445
Neuron The neural computation of affective internal states in the hypothalamus: A dynamical systems perspective https://t.co/DiMDPwRwuf
2
71
357
Build on Zama 🎉 @zama is building a complete ecosystem where computation happens on fully encrypted data, without breaking privacy at any point. From private execution to confidential smart contracts, every layer is designed to keep user data safe while still enabling real
216
14
277
Learn complex analysis the modern way—not just from the page, but from computation. New in the Wolfram eTextbook series: "Essentials of Complex Analysis" lets you run live code, visualize concepts and test your understanding. https://t.co/WmWjasUEK2
2
82
605
The FUD comes from misunderstanding what $ICP actually is. ICP isn’t a hype coin. It’s a utility token that burns computation to run a global, decentralized internet inside tamper-proof canisters. It’s not competing with Solana. It’s capable of hosting Solana — and every other
8
15
60
The immune system has computation and memory. This pathway map shows how innate and adaptive immunity coordinate threat detection, signal amplification, targeted killing, and long-term archival of antigen data. -Innate: pattern-recognition receptors, complement, macrophages,
10
143
524
Rankings change, but real impact compounds. @zama isn’t chasing short term visibility it's building foundational privacy infrastructure with FHE. By turning deep cryptographic research into usable tools like FHEVM, $Zama is making encrypted computation practical for
18
17
83
The more I look at this space, the more obvious it feels that privacy was never optional, it was just ignored. On chain shouldn’t automatically mean your data is public. What @zama is doing with fully homomorphic encryption proves that real computation can happen without
183
76
260
gZama 🧡 In Web3, most conversations revolve around speed, scaling, and fees. Very few focus on. @zama is work brings dignity back into computation. They make it possible for applications to run logic on encrypted data, where personal information stays personal, even while
229
8
294
🧩 What is Hyra’s Zero-Knowledge Proof (ZKP)? ZKP is a cryptographic method that lets you verify a computation without ever revealing the underlying data. In the Hyra ecosystem, ZKP is the core technology enabling verifiable, private, decentralized AI at scale. 🔒 Why ZKP
146
1K
1K
you know how @zama tek lets you process data without ever decrypting it a very major contributor to that is TFHErs (torus fully homomorphic encryption), this is a rust programming language allows computation on encrypted data without ever decrypting it encrypt → compute →
10
2
12
The future of trustless computation is HERE. 2025 was a monumental year for DeAI Nexus! We successfully proved our core architecture. Next up: Testnet V1 (Q2 2026)! This is the official proving ground, ready to be stress-tested by YOU. Our community is the engine of the
93
182
989
What makes Zama interesting is how it treats encrypted computation as part of the normal blockchain workflow, not a special add-on The data stays private, the results remain verifiable, and the heavy FHE computation is handled offchain through a structured coprocessor network
52
5
66
Confidentiality is the missing layer of Web3 At Zama Protocol, Homomorphic Encryption (HE) is the core technology enabling computation directly on encrypted data without ever revealing the underlying information. But he alone isn’t enough. To address the limitations of
13
0
16