Blog

Thoughts on security, development, and blockchain.

· 19 min read

Web3 security and OPSEC checklist: beyond the smart contract audit

A practical threat model for a small web3 company. Smart contract audits are just the start - here's everything else that can go wrong.

security
read →
· 7 min read

Hello Noir! [Part 2]

Using Barretenberg to generate and verify proofs, deploying a Solidity verifier with Foundry, and understanding the trust model.

noir
read →
· 6 min read

Hello Noir! [Part 1]

Setting up the environment and getting an idea what and how will be used.

noir
read →
· 9 min read

Lagrange interpolation: turning points into a polynomial

You have a list of points. Lagrange interpolation gives you the one polynomial that passes through all of them. Here's why ZK proofs care.

math
read →
· 8 min read

The Fiat-Shamir transform: how a hash function replaces a conversation

Schnorr signatures started as a back-and-forth conversation. Fiat-Shamir turned that conversation into a one-liner. Here's how a hash function replaces a trusted stranger.

math
read →
· 12 min read

Digital signatures: Schnorr, ECDSA and how PS3 was hacked

You made it through elliptic curves. Now let's see how they're actually used - signing things, proving identity, and why reusing a nonce will ruin your life.

math
read →