Skip to content

Commit 1eae64f

Browse files
committed
updating images
1 parent 46ec681 commit 1eae64f

40 files changed

+22
-22
lines changed

_posts/2023-06-27-Coinbase Wallet as a Service.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ date: 2023-06-27 06:24:30 -0800
44
categories: [Infrastructure, Crypto Wallet]
55
toc: true
66
image:
7-
path: https://coincu.com/wp-content/uploads/2023/05/image-1191.png
7+
path: /assets/img/coinbase.gif
88
---
99

1010
Coinbase’s Wallet as a Service (WaaS) is a set of wallet infrastructure APIs, enabling companies to create and deploy customizable wallets. Wallets built with WaaS will use MPC for generating signatures on transactions. The key is secret-shared between the end user and Coinbase. Coinbase uses public-verifiable backups in the case of an end user losing access to their device.

_posts/2023-06-27-Confidential Space.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ date: 2023-06-27 06:24:30 -0800
44
categories: [Infrastructure]
55
toc: true
66
image:
7-
path: https://storage.googleapis.com/gweb-cloudblog-publish/images/Confidential_Space.max-2600x2600.jpg
7+
path: /assets/img/google.jpg
88
---
99

1010
Google Cloud’s Confidential Space allows Google Cloud customers to deploy MPC solutions. Confidential Spaces can facilitate data analysis and machine learning on sensitive or regulated data among distrusting parties, an effort to ease tensions between data sharing and regulatory requirements by encouraging collaboration while maintaining data privacy. One potential application includes MPC wallets, in which the sensitive operation (signature generation using the key shards) can occur within a TEE.

_posts/2023-06-27-Crypto Key Custody.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ date: 2023-06-27 06:24:30 -0800
44
categories: [Crypto Wallet]
55
toc: true
66
image:
7-
path: https://ctf-images-01.coinbasecdn.net/c5bd0wqjc7v0/3HNtoqqD2LJQLHjJZanDJE/fd370af7477d35448be6ce11cb1179bc/Wallet_SDK_HighRes2.png
7+
path: /assets/img/coinbase-custody.png
88
---
99

1010
Coinbase must secure signing keys since it custodies users’ digital assets. MPC is used for generating signatures on transactions without a central point of attack through a Threshold Signing Service (TSS). Each party’s longterm private keys are loaded onto Hardware Security Modules (HSMs) to prevent anyone from using the private keys if they do not have physical access to the HSM. Key generation and signature generation then occurs through the TSS protocol.

_posts/2023-06-27-Crypto Web3Auth Wallet as a Service.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ date: 2023-06-27 06:24:30 -0800
44
categories: [Infrastructure, Crypto Wallet]
55
toc: true
66
image:
7-
path: https://web3auth.io/images/MPC-Graphic-Final---Website-3.0.svg
7+
path: /assets/img/web3auth.png
88
---
99

1010
With Web3Auth infrastructure, a cryptocurrency signing key is divided into multiple parts and stored across the user’s devices, as well as the Web3Auth network. The objective is to ensure that the key is always available without a central point of attack. A Threshold Signature Scheme (TSS) is used to produce the final signed blockchain transaction.

_posts/2023-06-27-Crypto ZenGo MPC Wallet.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ date: 2023-06-27 06:24:30 -0800
44
categories: [Crypto Wallet]
55
toc: true
66
image:
7-
path: https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F4bceec2a-3b27-47fd-91ce-45c93cf1274c%2FUntitled.png?table=block&id=c84d7635-bab4-4437-898b-961c556ef7b2&spaceId=85d84701-7672-4213-b7b6-d2de90f117b7&width=2000&userId=4437e3b9-e2de-4cb0-890e-b0aa85895308&cache=v2
7+
path: /assets/img/zengo.png
88
---
99

1010
Zengo, like other MPC wallets, replaces the traditional cryptocurrency private key with two secret shares. Zengo Threshold Signature Schemes (TSS) for distributed key generation and signing. One share is stored on the client device and another on a Zengo server.

_posts/2023-06-27-Divvi Up A Privacy-Respecting System for Aggregate Statistics.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ date: 2023-06-27 06:24:30 -0800
44
categories: [Private Analytics]
55
toc: true
66
image:
7-
path: https://divviup.org/images/DivviUpSocialShare.png
7+
path: /assets/img/divviup-logo.png
88
---
99

1010
Divvi Up is the Internet Security Research Group’s system for private statistical aggregation of software telemetry. Divvi Up offers the Prio3 suite of algorithms. Applications upon which these aggregate statistics are collected include web browsers, mobile applications, or websites. Divvi Up is the evolution of the [experiment run with Mozilla](https://blog.mozilla.org/security/2019/06/06/next-steps-in-privacy-preserving-telemetry-with-prio/), in which Prio was used to collect browser Telemetry data.

_posts/2023-06-27-Fireblocks MPC Wallet.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ date: 2023-06-27 06:24:30 -0800
44
categories: [Crypto Wallet]
55
toc: true
66
image:
7-
path: https://dev.rootstock.io/assets/img/solutions/fireblocks/fireblocks-banner.jpg
7+
path: /assets/img/fireblocks.jpeg
88
---
99

1010
Fireblocks is one of the leading cryptocurrency wallets which distributes trust between the application provider and the client in order to mitigate central points of attack. As opposed to storing the private key in a single location, Fireblocks never materializes it and instead shards the secret among Fireblocks servers and the client’s mobile devices. To sign a blockchain transaction, a quorum of at least 3 endpoints conduct an MPC signature protocol to generate a valid signature on a proposed user transaction. In addition, Fireblocks stores keys and API keys in SGX so they cannot be extracted even if malware or a hacker has control over the server’s OS.

_posts/2023-06-27-MPC for Social Good.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ date: 2023-06-27 06:24:30 -0800
44
categories: [Social Good]
55
toc: true
66
image:
7-
path: https://images.squarespace-cdn.com/content/v1/5c929cff51f4d4fc49ab6f8b/1556651262449-0UV2ZQJBNNKVI1IHT2MM/full+logo.png
7+
path: /assets/img/bwwc.png
88
---
99

1010
Researchers at Boston University have collaborated with several institutions in order to deploy social good MPC applications. One example is collaborating with Callisto for detecting serial perpetrators of sexual misconduct, and another is collaborating with the Boston Women’s Workforce Council to collect information about gender-related pay equity.

_posts/2023-06-27-Privacy-Preserving COVID-19 Exposure Notifications.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ date: 2023-06-27 06:24:30 -0800
44
categories: [Private Analytics]
55
toc: true
66
image:
7-
path: https://duet-cdn.vox-cdn.com/thumbor/0x0:1920x1080/1200x800/filters:focal(960x540:961x541):format(webp)/cdn.vox-cdn.com/uploads/chorus_asset/file/21831792/COVID_19_Exposure_Notification_Update_9.1.20___Hero_Screens.001.jpeg
7+
path: /assets/img/covid.png
88
---
99

1010
The Internet Security Research Group (ISRG) and the National Institute of Health (NIH) use MPC for extracting private analytics from COVID-19 Exposure Notifications from Google and Apple devices. The objective is to allow Public Health Authorities (PHAs) to collect meaningful data from user devices (e.g. the total number of exposure notification alerts) without exposing any one client’s data.

_posts/2023-06-27-Privacy-Preserving Inventory Matching.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ date: 2023-06-27 06:24:30 -0800
44
categories: [Private Inventory Matching]
55
toc: true
66
image:
7-
path: https://investorjunkie.com/wp-content/uploads/2022/05/JP-Morgan-Self-Directed-Investing-Review.png
7+
path: /assets/img/jpmorgan-chase.jpeg
88
---
99

1010
Inventory matching is a mechanism for trading financial stocks in which buyers and sellers are paired. In the centralized setting, parties must share their order to buy or sell a stock, accompanied by the quantity. This is sensitive information that could cause adverse price movements prematurely, swaying prices adversely before a transaction finalizes. Prime Match allows clients to match their orders with reduced market impact while maintaining privacy through MPC. Prime Match runs in production at J.P Morgan, a large U.S. bank.

0 commit comments

Comments
 (0)