SoraSue (@sorasue77) 's Twitter Profile
SoraSue

@sorasue77

Love cryptography (obfuscation, NIZK, etc) and public blockchains (Bitcoin & Ethereum). ZK Email. Working at PSE.

ID: 801015587145027584

linkhttps://github.com/SoraSuegami calendar_today22-11-2016 10:52:52

5,5K Tweet

2,2K Followers

580 Following

ZK Email (@zkemail) 's Twitter Profile Photo

zkemail 🤝 ens.eth 🚨 Introducing Email-as-ENS: now your email address can be your ENS name! Seamlessly map your email to your Ethereum wallet and use it across the web3 ecosystem. Easy as [email protected] becomes alice$gmail.com.zkemail.eth (this will become [email protected]

SoraSue (@sorasue77) 's Twitter Profile Photo

最近、焼きおにぎりの美味しさに目覚めた。 焼きおにぎりを食べた皿を洗って、その皿で新しいおにぎりを焼く日々。

Privacy & Scaling Explorations (@privacyscaling) 's Twitter Profile Photo

Catch SoraSue giving a talk at Simons Institute for the Theory of Computing Berkley about iO and their with Enrico Bottazzi | enrico.eth pia Ethereum needs privacy The world needs privacy Investing in future tech, means investing in Ethereum's future leadership and impact to the world Also check Pia's notes

SoraSue (@sorasue77) 's Twitter Profile Photo

I feel that more efficient iO—specifically BGG+ encodings—can be achieved by combining ideas that originate from secret sharing, ZKP, and FHE.

SoraSue (@sorasue77) 's Twitter Profile Photo

来週水曜日 (7/30)にこちらのイベントで登壇します! 暗号でスマートコントラクトはどのように強化できるかという話をします!

SoraSue (@sorasue77) 's Twitter Profile Photo

I often instruct ChatGPT to role-play as Kurisu Makise from Steins;Gate before engaging in technical discussions. When I gave the same instruction to GPT-5, I felt that it maintained her personality over a longer span of conversation compared to before!

ZK Tokyo (@zk_tokyo) 's Twitter Profile Photo

zk Core Program参加者が、アウトプットとして ZK Email の解説記事を書いてくれました! ZKを触ったことがないエンジニア向けの記事です! zenn.dev/akmrbaby/artic…

vitalik.eth (@vitalikbuterin) 's Twitter Profile Photo

I also love the emphasis on how few lines of code each piece takes. Protocols are not a dirty get-it-out-there thing that you vibe-code, where you accept permanent accumulating garbage in the name of short-term convenience. Protocols are a work of art. They should look as such.

SoraSue (@sorasue77) 's Twitter Profile Photo

Assuming that computation keeps centralizing in data centers, the role of cryptography over the next decade is to decouple trust from compute—maximizing computation efficiency without sacrificing verifiability or privacy.

Yush (@yush_g) 's Twitter Profile Photo

Georgios Konstantopoulos We had a few creative workarounds for this: - email keys rotate every 6mo, so you could have the og wallet just approve rotations (or other guardians) - we also had time locks on the rotation updates to prevent malicious oracles from stealing funds for N days - jwt keys rotate

SoraSue (@sorasue77) 's Twitter Profile Photo

I really enjoyed working with you! I’m happy you took a deep interest in cryptography, and I hope your experience at Machina iO supports you in your next chapter! 그동안 감사했습니다