09-29, 16:30–17:00 (Europe/Berlin), Main Stage
There are many ways to build a privacy-respecting transaction protocol, taking advantage of different kinds of cryptographic plumbing. But even good math can be assembled in ways that still leak information and render a design less safe than intended.
This talk will use real-world examples to show the challenge of building protocols that respect privacy and enhance safety, and how plugging cryptographic leaks is pretty darn tough.
I'm currently the research engineering lead at Alpen Labs. Previously, I was head of research at Cypher Stack, an applied cryptography research and development consultancy, focusing primarily on privacy-respecting systems.