all InfoSec news
Tag, you’re it: Signal tagging in Circom
Malware Analysis, News and Indicators - Latest topics malware.news
By Tjaden Hess
We at Trail of Bits perform security reviews for a seemingly endless stream of applications that use zero-knowledge (ZK) proofs. While fast new arithmetization and folding libraries like Halo2, Plonky2, and Boojum are rapidly gaining adoption, Circom remains a mainstay of ZK circuit design. We’ve written about Circom safety before in the context of Circomspect, our linter and static analyzer; in this post, we will look at another way to guard against bugs in your Circom …
adoption applications bits design fast knowledge libraries reviews safety security signal stream tag tagging trail of bits written