From 549751b13fc3b307715ca656d520d677ee7c6ff5 Mon Sep 17 00:00:00 2001 From: kilavvy <140459108+kilavvy@users.noreply.github.com> Date: Sat, 14 Jun 2025 23:52:50 +0200 Subject: [PATCH] Improve Clarity and Correctness in Articles on iO and Trinity Protocol (#462) * Update hello-world-the-first-signs-of-practical-io.md * Update introducing-trinity.md --- content/articles/hello-world-the-first-signs-of-practical-io.md | 2 +- content/articles/introducing-trinity.md | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/content/articles/hello-world-the-first-signs-of-practical-io.md b/content/articles/hello-world-the-first-signs-of-practical-io.md index fc548f8..a08b34c 100644 --- a/content/articles/hello-world-the-first-signs-of-practical-io.md +++ b/content/articles/hello-world-the-first-signs-of-practical-io.md @@ -22,7 +22,7 @@ While technological acceleration is increasingly driven by data-centric algorith We believe that a **global private computation platform** represents the only viable bridge to reconcile and further boost tech acceleration and personal data sovereignty. As the value of private information delegated to such a platform grows, it becomes necessary to rely on a security foundation that can scale regardless of the stakes involved. -Unlike other technologies such as Multi-Party Computation (MPC) or Multi-Party Fully Homomorphic Encryption (MP-FHE), facing [privacy scalability issues](https://mirror.xyz/privacy-scaling-explorations.eth/nXUhkZ84ckZi_5mYRFCCKgkLVFAmM2ECdEFCQul2jPs), iO completely removes the perpetual reliance on committees after distributed trusted setup processes. In other words, iO unlocks a programable protocol that acts as the **perfect trustless third party**, relying solely on cryptographic hardness assumptions to guarantee the security of any secrets—akin to Nick Szabo's definition of [God Protocol](https://nakamotoinstitute.org/library/the-god-protocols/). +Unlike other technologies such as Multi-Party Computation (MPC) or Multi-Party Fully Homomorphic Encryption (MP-FHE), facing [privacy scalability issues](https://mirror.xyz/privacy-scaling-explorations.eth/nXUhkZ84ckZi_5mYRFCCKgkLVFAmM2ECdEFCQul2jPs), iO completely removes the perpetual reliance on committees after distributed trusted setup processes. In other words, iO unlocks a programmable protocol that acts as the **perfect trustless third party**, relying solely on cryptographic hardness assumptions to guarantee the security of any secrets—akin to Nick Szabo's definition of [God Protocol](https://nakamotoinstitute.org/library/the-god-protocols/). Following a series of studies on iO, [a breakthrough work by Aayush Jain, Huijia Lin, and Amit Sahai in 2020](https://dl.acm.org/doi/pdf/10.1145/3406325.3451093) demonstrated that iO could be constructed solely from standard assumptions, firmly established through over a decade of research. However, iO has been seen as a theoretical cryptographic primitive because of the complexity of its constructions. In fact, [one of the most recent studies on the iO implementation](https://link.springer.com/chapter/10.1007/978-3-319-15618-7_12) reports a simulation result that obfuscating a 2-bit multiplication circuit requires around 10^27 years and 20 Zetta bytes of memory. diff --git a/content/articles/introducing-trinity.md b/content/articles/introducing-trinity.md index dba1bca..624c75f 100644 --- a/content/articles/introducing-trinity.md +++ b/content/articles/introducing-trinity.md @@ -189,7 +189,7 @@ socket?.send( ### Evaluate the circuit -Now Alice can receive the garbeld data from the Bob and evaluate the circuit. Note that the process is assymetric, and only Alice evaluate the circuit on here side and can send back the result to Bob. +Now Alice can receive the garbeld data from the Bob and evaluate the circuit. Note that the process is asymmetric, and only Alice evaluate the circuit on here side and can send back the result to Bob. ```ts // Receiving serialized Garbled data