Improving on the previous version of RLN by allowing dynamic epoch sizes.
Research Blog
BlogVerifying RLN Proofs in Light Clients with Subtrees
How resource-restricted devices can verify RLN proofs fast and efficiently.
Strengthening Anonymous DoS Prevention with Rate Limiting Nullifiers in Waku
Rate Limiting Nullifiers in practice, applied to an anonymous p2p network, like Waku.
GossipSub Improvements: Evolution of Overlay Design and Message Dissemination in Unstructured P2P Networks
GossipSub Improvements: Evolution of Overlay Design and Message Dissemination in Unstructured P2P Networks
Nescience - A zkVM leveraging hiding properties
Nescience, a privacy-first blockchain zkVM.
Device Pairing in Js-waku and Go-waku
Device pairing and secure message exchange using Waku and noise protocol.
The Future of Waku Network: Scaling, Incentivization, and Heterogeneity
Learn how the Waku Network is evolving through scaling, incentivization, and diverse ecosystem development and what the future might look like.
Waku for All Decentralized Applications and Infrastructures
Waku is an open communication protocol and network. Decentralized apps and infrastructure can use Waku for their communication needs. It is designed to enable dApps and decentralized infrastructure projects to have secure, private, scalable communication. Waku is available in several languages and platforms, from Web to mobile to desktop to cloud. Initially, We pushed Waku adoption to the Web ecosystem, we learned that Waku is usable in a variety of complex applications and infrastructure projects. We have prioritized our effort to make Waku usable on various platforms and environments.
Building Privacy-Protecting Infrastructure
What is privacy-protecting infrastructure? Why do we need it and how we can build it? We'll look at Waku, the communication layer for Web3. We'll see how it uses ZKPs to incentivize and protect the Waku network. We'll also look at Zerokit, a library that makes it easier to use ZKPs in different environments. After reading this, I hope you'll better understand the importance of privacy-protecting infrastructure and how we can build it.
Waku Privacy and Anonymity Analysis Part I: Definitions and Waku Relay
Introducing a basic threat model and privacy/anonymity analysis for the Waku v2 relay protocol.