From d5b9b7d98ab0cb3c187cd97e279d9b7a23832f4f Mon Sep 17 00:00:00 2001 From: Hendrik Eeckhaut Date: Fri, 3 May 2024 15:18:50 +0200 Subject: [PATCH] improvements and corrections to the content --- app/page.tsx | 2 +- content/about.tsx | 23 ++++++------------- content/faq.tsx | 9 ++++++-- content/homepage.tsx | 8 +++---- ...taly-diagram.svg => tlsnotary-diagram.svg} | 0 5 files changed, 19 insertions(+), 23 deletions(-) rename public/images/{ts-notaly-diagram.svg => tlsnotary-diagram.svg} (100%) diff --git a/app/page.tsx b/app/page.tsx index b7db003..52dd2da 100644 --- a/app/page.tsx +++ b/app/page.tsx @@ -50,7 +50,7 @@ export default function Home() { inverse >
- PLACEHOLDER +
diff --git a/content/about.tsx b/content/about.tsx index 055735d..383f6f1 100644 --- a/content/about.tsx +++ b/content/about.tsx @@ -7,40 +7,31 @@ Markdown supported for description export const ABOUT_CONTENT = { WHO_WE_ARE: { TITLE: "Who we are", - DESCRIPTION: `TLSNotary is an open-source protocol developed by the Privacy and Scaling Exploration (PSE) research lab of the Ethereum Foundation. - \nTLSNotary is not a new project; in fact, it has been around for more than a decade. In 2022, TLSNotary was rebuilt from the ground up in Rust incorporating state-of-the-art cryptographic protocols. This renewed version of the TLSNotary protocol offers enhanced security, privacy, and performance. + DESCRIPTION: `TLSNotary is an open-source protocol developed by the **Privacy and Scaling Exploration (PSE)** research lab of the Ethereum Foundation. + \nTLSNotary is not a new project; in fact, it has been around for **more than a decade**. In 2022, TLSNotary was rebuilt from the ground up in **Rust** incorporating state-of-the-art cryptographic protocols. This renewed version of the TLSNotary protocol offers enhanced security, privacy, and performance. `, }, HOW_IT_WORKS: { TITLE: "How it works", DESCRIPTION: `TLSNotary is a protocol which allows people to export data from any web application and prove facts about it to a third-party in a privacy-preserving way by leveraging secure multi-party computation (MPC) to authenticate data communicated between a Prover and a TLS-enabled web server. - + `, STEPS: [ { TITLE: "Step 1: Multiparty TLS Request", DESCRIPTION: - "The Prover requests data from a Server over TLS while cooperating with the Verifier in secure and privacy-preserving multi-party computation (MPC).", - icon: , + "The Prover requests data from a Server over TLS. The verifier cooperates in secure and privacy-preserving multi-party computation (MPC). This cooperation guaranties that the Prover can not cheat and allows the Verifier to check the authenticity of the data in step 3.", }, { TITLE: "Step 2: Selective Disclosure", DESCRIPTION: - "The Prover selectively discloses the data to the Verifier by redacting sensitive information prior to sharing it. Selective disclosure may involve simple redactions, or more advanced techniques such as a zero-knowledge proofs that can prove properties of redacted data without revealing the data itself.", - icon: , + "The Prover selectively discloses the data to the Verifier by redacting sensitive information prior to sharing it. Selective disclosure may involve simple redactions, or more advanced techniques such as a zero-knowledge proofs that can prove properties of redacted data without revealing the data itself." }, { - TITLE: "Step 3: Notarization", + TITLE: "Step 3: Data Verification", DESCRIPTION: - "A Notary cryptographically signs commitments to the data and the server's identity. Verifiers will only accept the signed data if they trust the Notary. They can also require signed data from multiple Notaries to rule out collusion between the Prover and a Notary.", - icon: , - }, - { - TITLE: "Step 4: Data Verification", - DESCRIPTION: - "The Verifier validates the proof by verifying the origin of the data. This can be verified by inspecting the Server certificate through trusted certificate authorities (CAs). The Verifier can now make assertions about the non-redacted content of the transcript.", - icon: , + "The Verifier verifies that the prover did not tamper with the data and also verifiers the data origin, by inspecting the Server certificate through trusted certificate authorities (CAs). The Verifier can now make assertions about the non-redacted content of the transcript." }, ], }, diff --git a/content/faq.tsx b/content/faq.tsx index 3d99dd9..2c5be35 100644 --- a/content/faq.tsx +++ b/content/faq.tsx @@ -25,7 +25,12 @@ export const FAQS: FAQItem[] = [ { question: "What is the overhead of using TLSNotary?", answer: - "To the server, the TLS connection appears the same as any other connection. Only the User communicates with the Server, not the Notary or the Verifier. However, the timing patterns of TLS communication might have a different fingerprint, so through statistical analysis, specific identifying patterns might be uncovered.", + "The Multi-Party Computation (MPC) between the Prover and the Verifier requires significant bandwidth, orders of magnitude more than the Server’s data size." + }, + { + question: "Can the server detect that a TLS session is being notarized?", + answer: ` + To the server, the TLS connection appears the same as any other connection. Only the User communicates with the Server, not the Notary or the Verifier. However, the timing patterns of TLS communication might have a different fingerprint, so through statistical analysis, specific identifying patterns might be uncovered.`, }, { question: "Can TLSNotary be used for public data?", @@ -35,7 +40,7 @@ export const FAQS: FAQItem[] = [ { question: "How can I inspect and verify a TLSNotary proof?", answer: - "The easiest way is to use the proof-of-concept proof visualizer: TLSNotary Proof Visualizer", + "The easiest way is to use the proof-of-concept proof visualizer: [TLSNotary Proof Visualizer](https://tlsnotary.github.io/proof_viz/)", }, { question: "Which TLS versions are supported?", diff --git a/content/homepage.tsx b/content/homepage.tsx index ab7efa3..2f3e998 100644 --- a/content/homepage.tsx +++ b/content/homepage.tsx @@ -1,14 +1,14 @@ export const HOMEPAGE_CONTENT = { - TITLE: "Privately verify any data on the web", + TITLE: "Privacy-preserving data portability for any data on the web", SUBTITLE: "TLSNotary", INTRO: { TITLE: - "An open-source protocol for authentication with selective disclosure.", + "An open-source protocol for private and verifiable data disclosure.", DESCRIPTION: "TLSNotary can be used to verify the origin of any piece of data, ensuring it hasn't been fabricated or tampered with, while allowing users to redact sensitive information. As a result, the data becomes portable, reusable, and endlessly composable!", }, DOWNLOAD: { - TITLE: "Download the browser extension", - DESCRIPTION: "PageSigner - the easy way to use TLSNotary", + TITLE: "Data portability with endless possibilities", + DESCRIPTION: "Watch the TLSNotary presentation at ETHDam 2024", }, }; diff --git a/public/images/ts-notaly-diagram.svg b/public/images/tlsnotary-diagram.svg similarity index 100% rename from public/images/ts-notaly-diagram.svg rename to public/images/tlsnotary-diagram.svg