AtHeartEngineer

joined 2 years ago
MODERATOR OF
[–] AtHeartEngineer 1 points 22 hours ago
[–] AtHeartEngineer 2 points 5 days ago* (last edited 5 days ago) (1 children)

Integrity of the model, inputs, and outputs, but with the potential to hide either the inputs or the model and maintain verifiability.

Definitely not reasoning, that's a whole can of worms.

[–] AtHeartEngineer 2 points 5 days ago

Zk in this context allows someone to be able to thoroughly test a model and publish the results with proof that the same model was used.

Blockchain for zk-ml is actually a great use case for 2 reasons:

  1. it's a public immutable database where people can commit to the hash of some model they want to hide.
  2. It allows someone with a "model" (that doesn't have to be a neural net, it could be some statistical computation) and verifier to do work for others for a fee. Let's say I have a huge data set of property values/data for some given area, and I'm a real estate agent, and I want to have other people run some crazy computation on it to predict which houses will likely sell first in the next 30 days. I could post this challenge online with the data, other people could run models against that data and post their results (but not how they got them) on chain. In 30 days the real estate agent could publish the updated data and reward the best performer, and potentially "buy" their model. You could do this with a centralized service, but they would likely take a fee, keep things proprietary, and likely try to make some shady back room deals. This removes the middleman.
[–] AtHeartEngineer 2 points 5 days ago

Ahh, ya, so this is a deep rabbit hole but I will try to explain best I can.

Zero knowledge is a cryptographic way of proving that some computation was done correctly. This allows you to "hide" some inputs if you want.

In the context of the "ezkl" library, this allows someone to train a model and publicly commit to it by posting a hash of the model somewhere, and someone else can run inference on that model, and what comes out is the hash of the model and the output of the inference along with a cryptographic "proof" that anyone can verify that the computation was indeed done with that model and the result was correct, but the person running the inference could hide the input.

Or let's say you have a competition for whoever can train the best classifier for some specific task. I could train a model and when I run it the test set inputs could be public, and I could "hide" the model but the zk computation would still reveal the hash of the model. So let's say I won this competition, I could at the end reveal the model that I tried, and anyone would be able to check that the model I revealed and the model that was ran that beat everyone else was in fact the same model.

[–] AtHeartEngineer 5 points 5 days ago (2 children)

The model that is doing the inference is committed to before hand (it's hashed) so you can't lie about what model produced the inference. That is how ezkl, the underlying library, works.

I know a lot of people in this cryptography space, and there are definitely scammers across the general "crypto space", but in the actual cryptography space most people are driven by curiosity or ideology.

[–] AtHeartEngineer 0 points 1 week ago

Ya that's what I thought too.

[–] AtHeartEngineer 2 points 1 week ago

Most of the people that I know that make decent money don't use the service, but the people that work at restaurants or do gig work occasionally do... I don't understand

[–] AtHeartEngineer 5 points 2 weeks ago

I agree. I switched from Roku to apple tv recently (and I don't really have apple devices), and it was worth it.

[–] AtHeartEngineer 6 points 2 weeks ago

Try endeavoros, it's an opinionated arch with a simple installer

[–] AtHeartEngineer 65 points 2 weeks ago (8 children)

OPM also houses all the clearance applications and associated investigation paperwork. Great..

[–] AtHeartEngineer 1 points 2 weeks ago

Prohibition of technology import is insane, how fucking moronic.

 

It uses MPC and ZK to prove some data from a server (that uses TLS) is authentic given some request.

One of the simple demos is proving you received a DM from someone on twitter, without sharing your session token or login credentials with the other party.

Another idea is proving you know some exploit (think sql injection) without revealing how you did it.

Or proving you purchased some item off a website so you can review it on a neutral platform (amazon reviews but without amazon being able to manipulate the votes)

8
submitted 2 years ago* (last edited 2 years ago) by AtHeartEngineer to c/cryptocurrency
 

In the spirit of an open internet, a fair number of people are moving from reddit to Lemmy, and we wanted to make sure you had a place to go.

Same rules apply, spam posts will be removed and scammers will be banned. Everyone else, keep it civil and let's grow an excellent community!

4
AudioPalm from Google (google-research.github.io)
 

But when are Google homes getting an update?!?

 

Meet --holesky, the first long-standing, merged-from-genesis, public Ethereum testnet. Holešky will replace Goerli as a staking, infrastructure and protocol-developer testnet in 2023. For testing decentralized applications, smart contracts, and other EVM functionality, please use Sepolia!

view more: next ›