SlideShare a Scribd company logo
1 of 18
Download to read offline
End-to-end encryption for DApps with
NuCypher KMS
Sergey Zotov
Blockchain Fairytales, 16 Dec 2017
Sergey NuCypher KMS 16 Dec 2017 1 / 18
Why
Encrypted file sharing
Sender
Receiver
Receiver
Receiver
Storage
?
Sergey NuCypher KMS 16 Dec 2017 2 / 18
Why
Encrypted multi-user chats
Chat messages
Sender
Different receivers
Sergey NuCypher KMS 16 Dec 2017 3 / 18
Why
Decentralized Netflix
Content
producer
Receiver
Receiver
Receiver
CDN
if ( ):
if (
):
if (
):
Sergey NuCypher KMS 16 Dec 2017 4 / 18
Central server + TLS
Data vulnerable to hackers, state actors etc
Sender
Receiver
Receiver
Receiver
Sergey NuCypher KMS 16 Dec 2017 5 / 18
Solution
Proxy re-encryption + decentralization
Receiver
[ ]
[ ]
= decrypt( , )
{ }
= decrypt( , ){ }
Network of re-encrypting proxies
Sergey NuCypher KMS 16 Dec 2017 6 / 18
What is proxy re-encryption (PRE)
Alice Bob
Proxy
skA — Alice’s secret key;
pkA — Alice’s public key;
rkA→B — re-encryption key.
skB — Bob’s secret key;
pkB — Bob’s public key;
Sergey NuCypher KMS 16 Dec 2017 7 / 18
Centralized KMS using PRE
Encryption
EDEKSender
Receiver
Proxy
Storage
Sergey NuCypher KMS 16 Dec 2017 8 / 18
Centralized KMS using PRE
Access delegation
EDEK
Sender
Receiver
Proxy
Storage
Sergey NuCypher KMS 16 Dec 2017 9 / 18
Centralized KMS using PRE
Decryption
EDEK
Sender
Receiver
Proxy
Storage
EDEK
EDEK'
Sergey NuCypher KMS 16 Dec 2017 10 / 18
Decentralized key management
Using threshold split-key re-encryption (Umbral)
EDEK
Receiver
Proxy 2
Storage
EDEK
EDEK'1
Proxy 1
Proxy 3
EDEK
EDEK'2
EDEK
EDEK'3
https://github.com/nucypher/nucypher-kms/
https://github.com/nucypher/nucypher-pre-python/
Sergey NuCypher KMS 16 Dec 2017 11 / 18
KMS token
Purpose
Splitting trust between re-encryption nodes (more tokens =
more trust and more work);
In-network means of payment for deploying policies;
Proof of Stake for minting new coins according to the mining
schedule;
Security deposit to be at stake against malicious behavior of
nodes
Sergey NuCypher KMS 16 Dec 2017 12 / 18
KMS token
Mining
Mining reward:
reward =
locked_tokens × reward_rate
∑
all miners locked_tokens
+
∑
this miner
miner_fees
Sergey NuCypher KMS 16 Dec 2017 13 / 18
Early users
Decentralized marketplaces:
Datum;
Helios.
Decentralized databases:
Bluzelle;
Fluence;
Wolk.
Medical data sharing
Medibloc;
ZeroPass;
Wholesome.
IoT
Spherity (together with BigchainDB).
Sergey NuCypher KMS 16 Dec 2017 14 / 18
Investors
Sergey NuCypher KMS 16 Dec 2017 15 / 18
Team
Founders
CTO, Michael Egorov
(LinkedIn, MIPT)
CEO, MacLane Wilkison
(Morgan Stanley, CISSP)
Sergey NuCypher KMS 16 Dec 2017 16 / 18
Team
Advisors
Prof. Giuseppe Ateniese
(Stevens Institute of Technology)
Prof. Dave Evans
(University of Virginia)
John Bantleman
(Entrepreneur; Rainstor etc.)
Tony Bishop
(Equinix, Morgan Stanley)
Sergey NuCypher KMS 16 Dec 2017 17 / 18
How to contribute, learn
Website: https://nucypher.com/blockchain.html
Github: https://github.com/nucypher/
Slack: https://nucypher-kms-slack.herokuapp.com/
Whitepaper: https://arxiv.org/abs/1707.06140
E-mail: hello@nucypher.com
Sergey NuCypher KMS 16 Dec 2017 18 / 18

More Related Content

What's hot

Hybridizing Kubernetes and HPC securely - Pavan Gupta
Hybridizing Kubernetes and HPC securely - Pavan GuptaHybridizing Kubernetes and HPC securely - Pavan Gupta
Hybridizing Kubernetes and HPC securely - Pavan GuptaPacificResearchPlatform
 
Hug #9 who's keeping your secrets
Hug #9 who's keeping your secretsHug #9 who's keeping your secrets
Hug #9 who's keeping your secretsCameron More
 
Introduction to BigchainDB
Introduction to BigchainDBIntroduction to BigchainDB
Introduction to BigchainDBFeng-Ren Tsai
 
CBGTBT - Part 6 - Transactions 102
CBGTBT - Part 6 - Transactions 102CBGTBT - Part 6 - Transactions 102
CBGTBT - Part 6 - Transactions 102Blockstrap.com
 
Android is not just mobile
Android is not just mobileAndroid is not just mobile
Android is not just mobileKevin McDonagh
 
Control Plane: Continuous Kubernetes Security (DevSecOps - London Gathering, ...
Control Plane: Continuous Kubernetes Security (DevSecOps - London Gathering, ...Control Plane: Continuous Kubernetes Security (DevSecOps - London Gathering, ...
Control Plane: Continuous Kubernetes Security (DevSecOps - London Gathering, ...Michael Man
 
Trent McConaghy- BigchainDB
Trent McConaghy- BigchainDBTrent McConaghy- BigchainDB
Trent McConaghy- BigchainDBPyData
 
Cosmos SDK Workshop: How to Build a Blockchain from Scratch
Cosmos SDK Workshop: How to Build a Blockchain from ScratchCosmos SDK Workshop: How to Build a Blockchain from Scratch
Cosmos SDK Workshop: How to Build a Blockchain from ScratchTendermint Inc
 
Quantum Computing & Cryptography: A Brief Introduction
Quantum Computing & Cryptography: A Brief IntroductionQuantum Computing & Cryptography: A Brief Introduction
Quantum Computing & Cryptography: A Brief IntroductionHedera Hashgraph
 
BigchainDB 2.0 - The Blockchain Database
BigchainDB 2.0 - The Blockchain Database BigchainDB 2.0 - The Blockchain Database
BigchainDB 2.0 - The Blockchain Database BigchainDB
 
Waffle - simpler and sweeter smart contract testing
Waffle - simpler and sweeter smart contract testingWaffle - simpler and sweeter smart contract testing
Waffle - simpler and sweeter smart contract testingEthWorks
 
OSGi als App-Plattform - Ein Ausflug durch den Security-Layer
OSGi als App-Plattform - Ein Ausflug durch den Security-Layer	OSGi als App-Plattform - Ein Ausflug durch den Security-Layer
OSGi als App-Plattform - Ein Ausflug durch den Security-Layer OSGiUsers
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to BlockchainAkshay Kumar
 
SSL/TLS for Mortals (DevNexus)
SSL/TLS for Mortals (DevNexus)SSL/TLS for Mortals (DevNexus)
SSL/TLS for Mortals (DevNexus)Maarten Mulders
 
How does the Bitcoin network work?
How does the Bitcoin network work?How does the Bitcoin network work?
How does the Bitcoin network work?Akshay Kumar
 
Container and Microservice Meetup
Container and Microservice MeetupContainer and Microservice Meetup
Container and Microservice MeetupAndrew Leung
 
Implementing Active Security with Sysdig Falco - Docker Meetup Barcelona
Implementing Active Security with Sysdig Falco - Docker Meetup BarcelonaImplementing Active Security with Sysdig Falco - Docker Meetup Barcelona
Implementing Active Security with Sysdig Falco - Docker Meetup BarcelonaNéstor Salceda
 

What's hot (19)

Hybridizing Kubernetes and HPC securely - Pavan Gupta
Hybridizing Kubernetes and HPC securely - Pavan GuptaHybridizing Kubernetes and HPC securely - Pavan Gupta
Hybridizing Kubernetes and HPC securely - Pavan Gupta
 
Hug #9 who's keeping your secrets
Hug #9 who's keeping your secretsHug #9 who's keeping your secrets
Hug #9 who's keeping your secrets
 
Introduction to BigchainDB
Introduction to BigchainDBIntroduction to BigchainDB
Introduction to BigchainDB
 
CBGTBT - Part 6 - Transactions 102
CBGTBT - Part 6 - Transactions 102CBGTBT - Part 6 - Transactions 102
CBGTBT - Part 6 - Transactions 102
 
Android is not just mobile
Android is not just mobileAndroid is not just mobile
Android is not just mobile
 
Control Plane: Continuous Kubernetes Security (DevSecOps - London Gathering, ...
Control Plane: Continuous Kubernetes Security (DevSecOps - London Gathering, ...Control Plane: Continuous Kubernetes Security (DevSecOps - London Gathering, ...
Control Plane: Continuous Kubernetes Security (DevSecOps - London Gathering, ...
 
Trent McConaghy- BigchainDB
Trent McConaghy- BigchainDBTrent McConaghy- BigchainDB
Trent McConaghy- BigchainDB
 
Cosmos SDK Workshop: How to Build a Blockchain from Scratch
Cosmos SDK Workshop: How to Build a Blockchain from ScratchCosmos SDK Workshop: How to Build a Blockchain from Scratch
Cosmos SDK Workshop: How to Build a Blockchain from Scratch
 
Quantum Computing & Cryptography: A Brief Introduction
Quantum Computing & Cryptography: A Brief IntroductionQuantum Computing & Cryptography: A Brief Introduction
Quantum Computing & Cryptography: A Brief Introduction
 
BigchainDB 2.0 - The Blockchain Database
BigchainDB 2.0 - The Blockchain Database BigchainDB 2.0 - The Blockchain Database
BigchainDB 2.0 - The Blockchain Database
 
Waffle - simpler and sweeter smart contract testing
Waffle - simpler and sweeter smart contract testingWaffle - simpler and sweeter smart contract testing
Waffle - simpler and sweeter smart contract testing
 
OSGi als App-Plattform - Ein Ausflug durch den Security-Layer
OSGi als App-Plattform - Ein Ausflug durch den Security-Layer	OSGi als App-Plattform - Ein Ausflug durch den Security-Layer
OSGi als App-Plattform - Ein Ausflug durch den Security-Layer
 
Vault
VaultVault
Vault
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to Blockchain
 
Sia report
Sia reportSia report
Sia report
 
SSL/TLS for Mortals (DevNexus)
SSL/TLS for Mortals (DevNexus)SSL/TLS for Mortals (DevNexus)
SSL/TLS for Mortals (DevNexus)
 
How does the Bitcoin network work?
How does the Bitcoin network work?How does the Bitcoin network work?
How does the Bitcoin network work?
 
Container and Microservice Meetup
Container and Microservice MeetupContainer and Microservice Meetup
Container and Microservice Meetup
 
Implementing Active Security with Sysdig Falco - Docker Meetup Barcelona
Implementing Active Security with Sysdig Falco - Docker Meetup BarcelonaImplementing Active Security with Sysdig Falco - Docker Meetup Barcelona
Implementing Active Security with Sysdig Falco - Docker Meetup Barcelona
 

Similar to End-to-end encryption for Dapps with NuCypher KMS. Sergey Zotov, software developer, nucypher

MyTutorialON Cryptography.ppt
MyTutorialON Cryptography.pptMyTutorialON Cryptography.ppt
MyTutorialON Cryptography.ppthalosidiq1
 
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOSPart 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOSMen and Mice
 
Navigating MongoDB's Queryable Encryption for Ultimate Security - Mydbops
Navigating MongoDB's Queryable Encryption for Ultimate Security - MydbopsNavigating MongoDB's Queryable Encryption for Ultimate Security - Mydbops
Navigating MongoDB's Queryable Encryption for Ultimate Security - MydbopsMydbops
 
Cryptography with Zend Framework
Cryptography with Zend FrameworkCryptography with Zend Framework
Cryptography with Zend FrameworkEnrico Zimuel
 
DNSSEC signing Tutorial
DNSSEC signing Tutorial DNSSEC signing Tutorial
DNSSEC signing Tutorial Men and Mice
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securityNagendra Um
 
Get the most out of your security logs using syslog-ng
Get the most out of your security logs using syslog-ngGet the most out of your security logs using syslog-ng
Get the most out of your security logs using syslog-ngPeter Czanik
 
Ch12 Encryption
Ch12 EncryptionCh12 Encryption
Ch12 Encryptionphanleson
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfKailasS9
 
Scapy TLS: A scriptable TLS 1.3 stack
Scapy TLS: A scriptable TLS 1.3 stackScapy TLS: A scriptable TLS 1.3 stack
Scapy TLS: A scriptable TLS 1.3 stackAlexandre Moneger
 
Apache Spark on K8S and HDFS Security with Ilan Flonenko
Apache Spark on K8S and HDFS Security with Ilan FlonenkoApache Spark on K8S and HDFS Security with Ilan Flonenko
Apache Spark on K8S and HDFS Security with Ilan FlonenkoDatabricks
 
Active Directory Recon 101
Active Directory Recon 101Active Directory Recon 101
Active Directory Recon 101prashant3535
 
Dual server public-key encryption with keyword search for secure cloud storage
Dual server public-key encryption with keyword search for secure cloud storageDual server public-key encryption with keyword search for secure cloud storage
Dual server public-key encryption with keyword search for secure cloud storageShakas Technologies
 
Walking the Bifrost: An Operator's Guide to Heimdal & Kerberos on macOS
Walking the Bifrost: An Operator's Guide to Heimdal & Kerberos on macOSWalking the Bifrost: An Operator's Guide to Heimdal & Kerberos on macOS
Walking the Bifrost: An Operator's Guide to Heimdal & Kerberos on macOSCody Thomas
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption StandardAmirul Wiramuda
 
[BlackHat USA 2016] Nonce-Disrespecting Adversaries: Practical Forgery Attack...
[BlackHat USA 2016] Nonce-Disrespecting Adversaries: Practical Forgery Attack...[BlackHat USA 2016] Nonce-Disrespecting Adversaries: Practical Forgery Attack...
[BlackHat USA 2016] Nonce-Disrespecting Adversaries: Practical Forgery Attack...Aaron Zauner
 
Cryptography Final Presentation.pptx
Cryptography Final Presentation.pptxCryptography Final Presentation.pptx
Cryptography Final Presentation.pptxGaneshBagul8
 

Similar to End-to-end encryption for Dapps with NuCypher KMS. Sergey Zotov, software developer, nucypher (20)

MyTutorialON Cryptography.ppt
MyTutorialON Cryptography.pptMyTutorialON Cryptography.ppt
MyTutorialON Cryptography.ppt
 
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOSPart 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
 
Navigating MongoDB's Queryable Encryption for Ultimate Security - Mydbops
Navigating MongoDB's Queryable Encryption for Ultimate Security - MydbopsNavigating MongoDB's Queryable Encryption for Ultimate Security - Mydbops
Navigating MongoDB's Queryable Encryption for Ultimate Security - Mydbops
 
Cryptography with Zend Framework
Cryptography with Zend FrameworkCryptography with Zend Framework
Cryptography with Zend Framework
 
DNSSEC signing Tutorial
DNSSEC signing Tutorial DNSSEC signing Tutorial
DNSSEC signing Tutorial
 
Pki Training V1.5
Pki Training V1.5Pki Training V1.5
Pki Training V1.5
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Get the most out of your security logs using syslog-ng
Get the most out of your security logs using syslog-ngGet the most out of your security logs using syslog-ng
Get the most out of your security logs using syslog-ng
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
Cryptography Cryptography
Cryptography
 
Ch12 Encryption
Ch12 EncryptionCh12 Encryption
Ch12 Encryption
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
 
Scapy TLS: A scriptable TLS 1.3 stack
Scapy TLS: A scriptable TLS 1.3 stackScapy TLS: A scriptable TLS 1.3 stack
Scapy TLS: A scriptable TLS 1.3 stack
 
Apache Spark on K8S and HDFS Security with Ilan Flonenko
Apache Spark on K8S and HDFS Security with Ilan FlonenkoApache Spark on K8S and HDFS Security with Ilan Flonenko
Apache Spark on K8S and HDFS Security with Ilan Flonenko
 
Active Directory Recon 101
Active Directory Recon 101Active Directory Recon 101
Active Directory Recon 101
 
Dual server public-key encryption with keyword search for secure cloud storage
Dual server public-key encryption with keyword search for secure cloud storageDual server public-key encryption with keyword search for secure cloud storage
Dual server public-key encryption with keyword search for secure cloud storage
 
Walking the Bifrost: An Operator's Guide to Heimdal & Kerberos on macOS
Walking the Bifrost: An Operator's Guide to Heimdal & Kerberos on macOSWalking the Bifrost: An Operator's Guide to Heimdal & Kerberos on macOS
Walking the Bifrost: An Operator's Guide to Heimdal & Kerberos on macOS
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption Standard
 
[BlackHat USA 2016] Nonce-Disrespecting Adversaries: Practical Forgery Attack...
[BlackHat USA 2016] Nonce-Disrespecting Adversaries: Practical Forgery Attack...[BlackHat USA 2016] Nonce-Disrespecting Adversaries: Practical Forgery Attack...
[BlackHat USA 2016] Nonce-Disrespecting Adversaries: Practical Forgery Attack...
 
Cryptography Final Presentation.pptx
Cryptography Final Presentation.pptxCryptography Final Presentation.pptx
Cryptography Final Presentation.pptx
 

More from Cyber Fund

Разработка на блокчейн Голос | Ерлан Шиндаулетов
Разработка на блокчейн Голос | Ерлан ШиндаулетовРазработка на блокчейн Голос | Ерлан Шиндаулетов
Разработка на блокчейн Голос | Ерлан ШиндаулетовCyber Fund
 
Mesh-сети - интернет, который мы заслужили. Матвей Сиворакша
Mesh-сети - интернет, который мы заслужили. Матвей СиворакшаMesh-сети - интернет, который мы заслужили. Матвей Сиворакша
Mesh-сети - интернет, который мы заслужили. Матвей СиворакшаCyber Fund
 
Продукты и сервисы на блокчейне биткоина. Спикер: Алексей Карпов
Продукты и сервисы на блокчейне биткоина. Спикер: Алексей КарповПродукты и сервисы на блокчейне биткоина. Спикер: Алексей Карпов
Продукты и сервисы на блокчейне биткоина. Спикер: Алексей КарповCyber Fund
 
Blockchain wallet Multy
Blockchain wallet MultyBlockchain wallet Multy
Blockchain wallet MultyCyber Fund
 
Практические кейсы использования приватных блокчейнов на EXONUM. Спикер: Глеб...
Практические кейсы использования приватных блокчейнов на EXONUM. Спикер: Глеб...Практические кейсы использования приватных блокчейнов на EXONUM. Спикер: Глеб...
Практические кейсы использования приватных блокчейнов на EXONUM. Спикер: Глеб...Cyber Fund
 
Onchain масштабирование блокчейна. Спикер: Дмитрий Мешков
Onchain масштабирование блокчейна. Спикер: Дмитрий МешковOnchain масштабирование блокчейна. Спикер: Дмитрий Мешков
Onchain масштабирование блокчейна. Спикер: Дмитрий МешковCyber Fund
 
Анонимизация и деанонимизация пользователей в блокчейн-сетях. Спикер: Григори...
Анонимизация и деанонимизация пользователей в блокчейн-сетях. Спикер: Григори...Анонимизация и деанонимизация пользователей в блокчейн-сетях. Спикер: Григори...
Анонимизация и деанонимизация пользователей в блокчейн-сетях. Спикер: Григори...Cyber Fund
 
Оракулы для блокчейнов. Обзор платформы Exonum. Спикер: Алексей Сидоров
Оракулы для блокчейнов. Обзор платформы Exonum. Спикер: Алексей СидоровОракулы для блокчейнов. Обзор платформы Exonum. Спикер: Алексей Сидоров
Оракулы для блокчейнов. Обзор платформы Exonum. Спикер: Алексей СидоровCyber Fund
 
CyberSearch: The Blockchain Browser. Valery Litvin
CyberSearch: The Blockchain Browser. Valery LitvinCyberSearch: The Blockchain Browser. Valery Litvin
CyberSearch: The Blockchain Browser. Valery LitvinCyber Fund
 
Verifying offchain computations using TrueBit. Sami Makela
Verifying offchain computations using TrueBit. Sami MakelaVerifying offchain computations using TrueBit. Sami Makela
Verifying offchain computations using TrueBit. Sami MakelaCyber Fund
 
The Melon security approach. Reto Trinkler
The Melon security approach. Reto TrinklerThe Melon security approach. Reto Trinkler
The Melon security approach. Reto TrinklerCyber Fund
 
The censorship resistance. Andrey Sobol
The censorship resistance. Andrey SobolThe censorship resistance. Andrey Sobol
The censorship resistance. Andrey SobolCyber Fund
 
Creating CI/ CD infrastructure for open source projects. Denis Soldatov, dev-...
Creating CI/ CD infrastructure for open source projects. Denis Soldatov, dev-...Creating CI/ CD infrastructure for open source projects. Denis Soldatov, dev-...
Creating CI/ CD infrastructure for open source projects. Denis Soldatov, dev-...Cyber Fund
 
Rust & Web Assembly
Rust & Web AssemblyRust & Web Assembly
Rust & Web AssemblyCyber Fund
 
Будущее блокчейн. Спикер: Владимир Попов
Будущее блокчейн. Спикер: Владимир ПоповБудущее блокчейн. Спикер: Владимир Попов
Будущее блокчейн. Спикер: Владимир ПоповCyber Fund
 
Почему децентрализованные биржи ближе чем нам кажется. Андрей Соболь
 Почему децентрализованные биржи ближе чем нам кажется. Андрей Соболь Почему децентрализованные биржи ближе чем нам кажется. Андрей Соболь
Почему децентрализованные биржи ближе чем нам кажется. Андрей СобольCyber Fund
 
Новеллы в законодательстве. Спикер: Алексей Воробей
Новеллы в законодательстве. Спикер: Алексей ВоробейНовеллы в законодательстве. Спикер: Алексей Воробей
Новеллы в законодательстве. Спикер: Алексей ВоробейCyber Fund
 
Перспективы технологии и философии. Спикер: Владимир Попов
Перспективы технологии и философии. Спикер: Владимир ПоповПерспективы технологии и философии. Спикер: Владимир Попов
Перспективы технологии и философии. Спикер: Владимир ПоповCyber Fund
 
Использование открытых данных блокчейн . Спикер: Александр Давыдов.pptx
Использование открытых данных блокчейн . Спикер: Александр Давыдов.pptxИспользование открытых данных блокчейн . Спикер: Александр Давыдов.pptx
Использование открытых данных блокчейн . Спикер: Александр Давыдов.pptxCyber Fund
 
Lightning — текущий статус разработок. Спикер: Панков Александр.odp
Lightning — текущий статус разработок. Спикер: Панков Александр.odpLightning — текущий статус разработок. Спикер: Панков Александр.odp
Lightning — текущий статус разработок. Спикер: Панков Александр.odpCyber Fund
 

More from Cyber Fund (20)

Разработка на блокчейн Голос | Ерлан Шиндаулетов
Разработка на блокчейн Голос | Ерлан ШиндаулетовРазработка на блокчейн Голос | Ерлан Шиндаулетов
Разработка на блокчейн Голос | Ерлан Шиндаулетов
 
Mesh-сети - интернет, который мы заслужили. Матвей Сиворакша
Mesh-сети - интернет, который мы заслужили. Матвей СиворакшаMesh-сети - интернет, который мы заслужили. Матвей Сиворакша
Mesh-сети - интернет, который мы заслужили. Матвей Сиворакша
 
Продукты и сервисы на блокчейне биткоина. Спикер: Алексей Карпов
Продукты и сервисы на блокчейне биткоина. Спикер: Алексей КарповПродукты и сервисы на блокчейне биткоина. Спикер: Алексей Карпов
Продукты и сервисы на блокчейне биткоина. Спикер: Алексей Карпов
 
Blockchain wallet Multy
Blockchain wallet MultyBlockchain wallet Multy
Blockchain wallet Multy
 
Практические кейсы использования приватных блокчейнов на EXONUM. Спикер: Глеб...
Практические кейсы использования приватных блокчейнов на EXONUM. Спикер: Глеб...Практические кейсы использования приватных блокчейнов на EXONUM. Спикер: Глеб...
Практические кейсы использования приватных блокчейнов на EXONUM. Спикер: Глеб...
 
Onchain масштабирование блокчейна. Спикер: Дмитрий Мешков
Onchain масштабирование блокчейна. Спикер: Дмитрий МешковOnchain масштабирование блокчейна. Спикер: Дмитрий Мешков
Onchain масштабирование блокчейна. Спикер: Дмитрий Мешков
 
Анонимизация и деанонимизация пользователей в блокчейн-сетях. Спикер: Григори...
Анонимизация и деанонимизация пользователей в блокчейн-сетях. Спикер: Григори...Анонимизация и деанонимизация пользователей в блокчейн-сетях. Спикер: Григори...
Анонимизация и деанонимизация пользователей в блокчейн-сетях. Спикер: Григори...
 
Оракулы для блокчейнов. Обзор платформы Exonum. Спикер: Алексей Сидоров
Оракулы для блокчейнов. Обзор платформы Exonum. Спикер: Алексей СидоровОракулы для блокчейнов. Обзор платформы Exonum. Спикер: Алексей Сидоров
Оракулы для блокчейнов. Обзор платформы Exonum. Спикер: Алексей Сидоров
 
CyberSearch: The Blockchain Browser. Valery Litvin
CyberSearch: The Blockchain Browser. Valery LitvinCyberSearch: The Blockchain Browser. Valery Litvin
CyberSearch: The Blockchain Browser. Valery Litvin
 
Verifying offchain computations using TrueBit. Sami Makela
Verifying offchain computations using TrueBit. Sami MakelaVerifying offchain computations using TrueBit. Sami Makela
Verifying offchain computations using TrueBit. Sami Makela
 
The Melon security approach. Reto Trinkler
The Melon security approach. Reto TrinklerThe Melon security approach. Reto Trinkler
The Melon security approach. Reto Trinkler
 
The censorship resistance. Andrey Sobol
The censorship resistance. Andrey SobolThe censorship resistance. Andrey Sobol
The censorship resistance. Andrey Sobol
 
Creating CI/ CD infrastructure for open source projects. Denis Soldatov, dev-...
Creating CI/ CD infrastructure for open source projects. Denis Soldatov, dev-...Creating CI/ CD infrastructure for open source projects. Denis Soldatov, dev-...
Creating CI/ CD infrastructure for open source projects. Denis Soldatov, dev-...
 
Rust & Web Assembly
Rust & Web AssemblyRust & Web Assembly
Rust & Web Assembly
 
Будущее блокчейн. Спикер: Владимир Попов
Будущее блокчейн. Спикер: Владимир ПоповБудущее блокчейн. Спикер: Владимир Попов
Будущее блокчейн. Спикер: Владимир Попов
 
Почему децентрализованные биржи ближе чем нам кажется. Андрей Соболь
 Почему децентрализованные биржи ближе чем нам кажется. Андрей Соболь Почему децентрализованные биржи ближе чем нам кажется. Андрей Соболь
Почему децентрализованные биржи ближе чем нам кажется. Андрей Соболь
 
Новеллы в законодательстве. Спикер: Алексей Воробей
Новеллы в законодательстве. Спикер: Алексей ВоробейНовеллы в законодательстве. Спикер: Алексей Воробей
Новеллы в законодательстве. Спикер: Алексей Воробей
 
Перспективы технологии и философии. Спикер: Владимир Попов
Перспективы технологии и философии. Спикер: Владимир ПоповПерспективы технологии и философии. Спикер: Владимир Попов
Перспективы технологии и философии. Спикер: Владимир Попов
 
Использование открытых данных блокчейн . Спикер: Александр Давыдов.pptx
Использование открытых данных блокчейн . Спикер: Александр Давыдов.pptxИспользование открытых данных блокчейн . Спикер: Александр Давыдов.pptx
Использование открытых данных блокчейн . Спикер: Александр Давыдов.pptx
 
Lightning — текущий статус разработок. Спикер: Панков Александр.odp
Lightning — текущий статус разработок. Спикер: Панков Александр.odpLightning — текущий статус разработок. Спикер: Панков Александр.odp
Lightning — текущий статус разработок. Спикер: Панков Александр.odp
 

Recently uploaded

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 

Recently uploaded (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 

End-to-end encryption for Dapps with NuCypher KMS. Sergey Zotov, software developer, nucypher