-
Notifications
You must be signed in to change notification settings - Fork 9
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
167 changed files
with
66,485 additions
and
22,935 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
41 changes: 41 additions & 0 deletions
41
devcon-api/data/sessions/devcon-7/a-mobile-based-light-client-solution.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,41 @@ | ||
{ | ||
"id": "a-mobile-based-light-client-solution", | ||
"sourceId": "7GAKDX", | ||
"title": "A mobile-based light-client solution", | ||
"description": "After PoS Merge, there was a bit of a lag in Light-client related work. In response, we developed a mobile-based Light-client to help more devices natively join the Ethernet network.", | ||
"track": "Core Protocol", | ||
"type": "Lightning Talk", | ||
"expertise": "Intermediate", | ||
"audience": "Engineering", | ||
"featured": false, | ||
"doNotRecord": false, | ||
"keywords": [ | ||
"Mobile-based", | ||
"light", | ||
"client" | ||
], | ||
"tags": [ | ||
"Core Protocol", | ||
"Light Clients", | ||
"Tooling", | ||
"DePIN", | ||
"Mobile", | ||
"client", | ||
"mobile-based", | ||
"light", | ||
"Core Protocol", | ||
"DePIN", | ||
"Light Clients", | ||
"Mobile", | ||
"Tooling" | ||
], | ||
"language": "en", | ||
"speakers": [ | ||
"hsyodyssey" | ||
], | ||
"eventId": "devcon-7", | ||
"slot_start": "2024-11-13T03:30:00.000Z", | ||
"slot_end": "2024-11-13T03:40:00.000Z", | ||
"slot_roomId": "stage-4", | ||
"resources_presentation": "https://docs.google.com/presentation/d/12UHcSuu5GQ6wnR7hF85Jbn50E2isW06Y01rwhLqYr20" | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
36 changes: 36 additions & 0 deletions
36
...ta/sessions/devcon-7/a-toolbox-for-monitoring-the-health-of-the-ethereum-p2p-network.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,36 @@ | ||
{ | ||
"id": "a-toolbox-for-monitoring-the-health-of-the-ethereum-p2p-network", | ||
"sourceId": "E3GEEN", | ||
"title": "A toolbox for monitoring the health of the Ethereum P2P Network", | ||
"description": "Monitoring the P2P layer of Web 3.0 networks is extremely critical for the healthy operation of the system, but has been overlooked for quite a while. ProbeLab has developed a suite of open source tools to monitor closely the journey of blocks and messages in the Ethereum network, as well as the operational details of Ethereum nodes. The target is to assess the health of the network as a whole.In this workshop we’ll walk through and demo the details to enable others to benefit from our tooling.", | ||
"track": "Core Protocol", | ||
"type": "Talk", | ||
"expertise": "Expert", | ||
"audience": "Engineering", | ||
"featured": false, | ||
"doNotRecord": false, | ||
"keywords": [ | ||
"P2P", | ||
"DHT", | ||
"Gossipsub" | ||
], | ||
"tags": [ | ||
"Protocol Design", | ||
"Tooling", | ||
"Network State", | ||
"gossipsub", | ||
"Network State", | ||
"Protocol Design", | ||
"Tooling" | ||
], | ||
"language": "en", | ||
"speakers": [ | ||
"yiannis-psaras", | ||
"dennis-trautwein" | ||
], | ||
"eventId": "devcon-7", | ||
"slot_start": "2024-11-13T05:50:00.000Z", | ||
"slot_end": "2024-11-13T06:20:00.000Z", | ||
"slot_roomId": "classroom-a", | ||
"resources_presentation": "https://docs.google.com/presentation/d/1l0VK-WM6V4AzPauAgjULwr3ct22celTYmuy97iN9sPw" | ||
} |
35 changes: 35 additions & 0 deletions
35
devcon-api/data/sessions/devcon-7/anon-aadhaar-protocol-using-halo2-and-noir.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,35 @@ | ||
{ | ||
"id": "anon-aadhaar-protocol-using-halo2-and-noir", | ||
"sourceId": "CCHL9K", | ||
"title": "Anon-Aadhaar Protocol using Halo2 and Noir", | ||
"description": "We will introduce the Anon-Aadhaar protocol which is an anonymity layer on top of a social security like Scheme (Aadhaar card) for Indian citizens using Zero-knowledge proofs. This can be used for getting many basic services in India like electricity, banking, etc. We will describe the implementation results of the protocol using Halo2. We will also provide a comparative analysis of benchmarks using different backends like Circom, Halo2 and Noir.", | ||
"track": "Applied Cryptography", | ||
"type": "Lightning Talk", | ||
"expertise": "Intermediate", | ||
"audience": "Engineering", | ||
"featured": false, | ||
"doNotRecord": false, | ||
"keywords": [ | ||
"Halo2", | ||
"Circom", | ||
"Noir" | ||
], | ||
"tags": [ | ||
"Anonymity", | ||
"Identity", | ||
"ZKP", | ||
"noir", | ||
"Anonymity", | ||
"Identity", | ||
"ZKP" | ||
], | ||
"language": "en", | ||
"speakers": [ | ||
"hridam-basu" | ||
], | ||
"eventId": "devcon-7", | ||
"slot_start": "2024-11-15T08:50:00.000Z", | ||
"slot_end": "2024-11-15T09:00:00.000Z", | ||
"slot_roomId": "stage-3", | ||
"resources_presentation": "https://docs.google.com/presentation/d/1S4syGheCfolTfnj5zU6ru1154BHASk0dMcmtV1Y1Gmk" | ||
} |
30 changes: 30 additions & 0 deletions
30
devcon-api/data/sessions/devcon-7/beyond-recursive-proving-for-starknet.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,30 @@ | ||
{ | ||
"id": "beyond-recursive-proving-for-starknet", | ||
"sourceId": "3CNMYL", | ||
"title": "Beyond recursive proving for Starknet", | ||
"description": "Recursive proving is very cool tech enabling very large proofs or combining many different statements into a single proof. Beyond recursive proving, statements can be combined in interesting ways to further reduce system overheads such as data availability compression and layer1 state updates as well as various privacy concepts. In this session we'll discuss some of these technologies and how they are being applied in Starknet to achieve various user and system benefits.", | ||
"track": "Layer 2", | ||
"type": "Talk", | ||
"expertise": "Intermediate", | ||
"audience": "Engineering", | ||
"featured": false, | ||
"doNotRecord": false, | ||
"keywords": [ | ||
"Proving", | ||
"recursion" | ||
], | ||
"tags": [ | ||
"Zk Rollups", | ||
"starknet", | ||
"recursion" | ||
], | ||
"language": "en", | ||
"speakers": [ | ||
"gideon-kaempfer" | ||
], | ||
"eventId": "devcon-7", | ||
"slot_start": "2024-11-15T04:20:00.000Z", | ||
"slot_end": "2024-11-15T04:50:00.000Z", | ||
"slot_roomId": "classroom-a", | ||
"resources_presentation": "https://docs.google.com/presentation/d/1iFe5uo4vVJtKR4EYxLvteyWIaeQLzKWuZBOgGlIlGLk" | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
35 changes: 35 additions & 0 deletions
35
devcon-api/data/sessions/devcon-7/bringing-ethereum-to-1b-telegram-users.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,35 @@ | ||
{ | ||
"id": "bringing-ethereum-to-1b-telegram-users", | ||
"sourceId": "GZQ7PE", | ||
"title": "Bringing Ethereum to 1B Telegram Users", | ||
"description": "Learn how we use account abstraction to build an invisible wallet for 1 billion Telegram users. We will share our methods and learnings, showing how users and dapp developers will soon seamlessly interact with Ethereum, enjoying a smooth experience without ever realizing they are using a wallet. Features like biometric authentication will enhance user experience, while session keys make transactions invisible, ensuring secure and effortless interactions.", | ||
"track": "Usability", | ||
"type": "Lightning Talk", | ||
"expertise": "Intermediate", | ||
"audience": "Developer", | ||
"featured": false, | ||
"doNotRecord": false, | ||
"keywords": [ | ||
"Session Keys", | ||
"Invisible Wallets", | ||
"Integration" | ||
], | ||
"tags": [ | ||
"Developer Infrastructure", | ||
"User Experience", | ||
"Account Abstraction", | ||
"integrations", | ||
"Account Abstraction", | ||
"Developer Infrastructure", | ||
"User Experience" | ||
], | ||
"language": "en", | ||
"speakers": [ | ||
"julien-niset" | ||
], | ||
"eventId": "devcon-7", | ||
"slot_start": "2024-11-12T06:30:00.000Z", | ||
"slot_end": "2024-11-12T06:40:00.000Z", | ||
"slot_roomId": "stage-2", | ||
"resources_presentation": "https://docs.google.com/presentation/d/1zCoYHO3MyfIPj-uA_nWYvHwd9lM6-v7ZDScGGdme-Fg" | ||
} |
33 changes: 0 additions & 33 deletions
33
devcon-api/data/sessions/devcon-7/building-an-end-to-end-zk-identity-application.json
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
34 changes: 34 additions & 0 deletions
34
...we-formally-verify-implementations-of-cryptographic-libraries-like-the-c-kzg-library.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,34 @@ | ||
{ | ||
"id": "can-we-formally-verify-implementations-of-cryptographic-libraries-like-the-c-kzg-library", | ||
"sourceId": "HQP3RJ", | ||
"title": "Can we formally verify implementations of cryptographic libraries like the c-kzg library?", | ||
"description": "In this talk, we present our work on formally verifying the implementation of a cryptographic library key to the security of the Ethereum Data Availability layer: the c-kzg library. We will explore what we have been able to prove so far and what is ahead of us.", | ||
"track": "Security", | ||
"type": "Lightning Talk", | ||
"expertise": "Intermediate", | ||
"audience": "Engineering", | ||
"featured": false, | ||
"doNotRecord": false, | ||
"keywords": [ | ||
"Cryptol", | ||
"SAW" | ||
], | ||
"tags": [ | ||
"Layer 1", | ||
"Cryptography", | ||
"Formal Verification", | ||
"saw", | ||
"Cryptography", | ||
"Formal Verification", | ||
"Layer 1" | ||
], | ||
"language": "en", | ||
"speakers": [ | ||
"thanh-hai-tran" | ||
], | ||
"eventId": "devcon-7", | ||
"slot_start": "2024-11-13T04:00:00.000Z", | ||
"slot_end": "2024-11-13T04:10:00.000Z", | ||
"slot_roomId": "classroom-a", | ||
"resources_presentation": "https://docs.google.com/presentation/d/1hG56xfpzqIZ6kxBtsd4z9tj3Nz-JQcrTh2y22jsemLo" | ||
} |
Oops, something went wrong.