And using ZK, it can then use to authenticate in a way that doesn’t ping back, doesn’t phone home to the state. And also it can be used for, like, a composable zero-knowledge proof of personhood.
j previous speech k next speech