Circomspect has been integrated into the Sindri CLI

By Jim Miller Our tool Circomspect is now integrated into the Sindri command-line interface (CLI)! We designed Circomspect to help developers build Circom circuits more securely, particularly given the limited tooling support ...
identity cyberattacks ransomware

Modern Cybersecurity Problems Need Next-Gen PAM Solutions

The digital landscape continues evolving with no signs of slowing down. As the volume and severity of cyberattacks intensify, IT and security leaders need effective, user-friendly solutions to help secure their privileged ...
Security Boulevard
Specialized Zero-Knowledge Proof failures

Specialized Zero-Knowledge Proof failures

By Opal Wright Zero-knowledge (ZK) proofs are useful cryptographic tools that have seen an explosion of interest in recent years, largely due to their applications to cryptocurrency. The fundamental idea of a ...

We’re streamers now

Over the years, we’ve built many high-impact tools that we use for security reviews. You might know some of them, like Slither, Echidna, Amarna, Tealer, and test-fuzz. All of our tools are ...
Serving up zero-knowledge proofs

Serving up zero-knowledge proofs

| | cryptography, Zero Knowledge
By Jim Miller, Senior Cryptography Analyst Zero-knowledge (ZK) proofs are gaining popularity, and exciting new applications for this technology are emerging, particularly in the blockchain space. So we’d like to shine a ...

DEF CON 27, Crypto And Privacy Village – Cathie Yun’s ‘Implementing A Zero Knowledge Proof’

Thanks to Def Con 27 Volunteers, Videographers and Presenters for publishing their superlative conference videos via their YouTube Channel for all to see, enjoy and learn. Permalink ...