Thread

Zero-JS Hypermedia Browser

Relays: 5
Replies: 18
Generated: 22:26:07
After brainstorming with nostr:npub176p7sup477k5738qhxx0hk2n0cty2k5je5uvalzvkvwmw4tltmeqw7vgup about anonymous relay access, I wrote up how zero-knowledge proofs could let users prove they're on a WoT trusted list, and that their score is good enough, without revealing which pubkey is theirs. nostr:naddr1qqgrjvfhvv6rqdtpxymxvdnrx4jngq3qklkk3vrzme455yh9rl2jshq7rc8dpegj3ndf82c3ks2sk40dxt7qxpqqqp65wt2w8k9
2025-12-04 15:54:44 from 1 relay(s) 8 replies ↓
Login to reply

Replies (18)

Would be thankful for nostr:nprofile1qqst3axzay8sm4n8zg2n84acmt7hwwztpdg9r7p89e2f83v007f7zjcpr9mhxue69uhhqun9d45h2mfwwpexjmtpdshxuet59uq3wamnwvaz7tmjv4kxz7fwwpexjmtpdshxuet59uq32amnwvaz7tmjv4kxz7fwv3sk6atn9e5k7tc3s2hgn & nostr:nprofile1qqsxwkuyle67y94tj378gw8w2xw2wa6nwmwlqhddlwnz0z7sztsaw2qpz9mhxue69uhkummnw3ezuamfdejj7nxasma to poke holes in this approach...
2025-12-04 15:55:48 from 1 relay(s) ↑ Parent 2 replies ↓ Reply
In Zsub we are using cryptographic chaining of attestations to avoid a central computation of trust or complex circuits.. So there is not central relay that knows the social graph or path and neither does anyone in the chain. Chain links just know each other verifier knows no one. Maybe doesn't matter for your case because the graph is already public, but it was nice that we could use simpler crypto (schnorr, pederson, merkle) and get more privacy. Not sure if that helps, but maybe interesting
2025-12-04 18:35:13 from 1 relay(s) ↑ Parent 1 replies ↓ Reply
Exactly. No identities revealed. Not to the anchor, not to the verifier, and the relationship keys for the trust attestation are one-off delegations, so participants can't even collude. (Easily. There is always out of band correlation risk.)
2025-12-04 19:26:09 from 1 relay(s) ↑ Parent Reply
I think algebraic merkle trees (curve trees) are a natural fit because you get fast verification (10-50ms without batching) and fast proof (relatively fast; a second or two), because of not having to put a cryptographic hash function through arithmetization. And you still get the same ability to embed logical conditions on what is in the leaves of the tree, using standard ZK proving systems like bulletproofs (e.g. I did "proof of reserves" in aut-ct). Maybe worth looking at Luke Parker's work on FCMP for how much this can scale. I described aut-ct more wordily here if it's interesting: https://delvingbitcoin.org/t/anonymous-usage-tokens-from-curve-trees-or-autct/862 . I also think reputation is a false trail but, meh, that's just a vague opinion.
2025-12-04 20:07:54 from 1 relay(s) ↑ Parent Reply