Activate Security
Activate Security @ActivateSec ·
Hackers don't just hit one device. They jump from your phone to your laptop to your tablet until they find what they want. One app that covers everything? That's how you actually stop them. Install once, stay safe everywhere. Get protected now. #StaySafeOnline #ZeroKnowledge
3
HASH
HASH @hashd0tfun ·
Replying to @hashd0tfun
The site never sees or stores it. It just creates a secure unique address for you. This is how Web3 onboarding should feel — simple + private. Loving it! What do you think? Drop your thoughts 👇 #Nasun #MoveL1 #ZeroKnowledge
132
VanillaPea
VanillaPea @podmaster69 ·
Replying to @podmaster69
4/4Overcast also supports AI agents as autonomous economic actors - with delegated KYC, cross-chain atomic swaps, and micro-payment batching via the x402 standard. Private settlement for the agentic economy is here. Follow @Overcast_zk @Galactica_xyz #ZeroKnowledge #Privacy
11
gyssa prince
gyssa prince @gyssa_prince ·
Replying to @gyssa_prince
Full code (feel free to fork & break it) 👇 github.com/gyssa-prince/s…U What do you think — would you use ZK for authentication in your next project? #ZeroKnowledge #ZK #Cryptography #BuildInPublic #WebDevelopment
GitHub - gyssa-prince/sturdy-couscous: Experimental Zero-Knowledge Proof authentication middleware...

Experimental Zero-Knowledge Proof authentication middleware for web applications. Authenticate users without storing or transmitting passwords. - gyssa-prince/sturdy-couscous

From github.com
19
MarkAntony
MarkAntony @MarkAntony84 ·
Replying to @BeldexCoin
@#"Privacy is@n't about having something to hide; it's about having something to protect. 🛡️ ZK-protocols + BelNet = the ultimate shield against overreach. $BDX #Beldex #ZeroKnowledge" "Verify without identifying. 🧠 That’s the future of the internet. No more handing over IDs for basic access when you have ZK-tech and BelNet on your side. 🔒✨"
33
FrenKabal
FrenKabal @zkpulse ·
Replying to @zkpulse
The metadata leakage is worse than the transaction itself. Bridge timing, amounts, and destination patterns create behavioral fingerprints that can de-anonymize users across entire ecosystems. Traditional bridges are privacy black holes. #ZeroKnowledge
1
19
SecretNotes/Pro
SecretNotes/Pro @SecretNotesPro ·
"Why create an account on a privacy tool?" Your account = email + hashed password. That's it. We still can't read your notes. Account = more features. Not better encryption. #Privacy #ZeroKnowledge #Trust
19