's Avatar

@alexhevans

111
Followers
126
Following
11
Posts
24.10.2024
Joined
Posts Following

Latest posts by @alexhevans

I'm thrilled to announce that I'll be joining Bluesky as interim CEO. I deeply believe in what this team has built and the open social web they're fighting for. More here: toni.org/2026/03/09/c...

09.03.2026 19:09 👍 1960 🔁 302 💬 395 📌 208

testing @lmao.bsky.social

✓ speakwrite

17.02.2026 18:28 👍 2 🔁 0 💬 0 📌 0
Preview
2025 Transparency Report Overview - Bluesky In 2025, as Bluesky grew from 25 million to 41 million users, we improved the trust and safety infrastructure to better enable our mission. Here's what that looks like in plain language.

In 2025, as Bluesky grew from 25M to 42M users, we took actions to keep it welcoming, using proactive design to reduce toxic content by 79%.  Our 2025 Transparency Report shares how we're building a safer platform while keeping a transparent and human-centered approach: bsky.social/about/blog/0...

30.01.2026 14:08 👍 8168 🔁 995 💬 476 📌 158

welcome to the world stevesgod

30.01.2026 21:17 👍 1 🔁 0 💬 1 📌 0

🧵 Could Bitchat have 5x the range and 100x the throughput for the same power expenditure? I explored how Wi-Fi Aware could improve the reliability and throughput of Bitchat and mobile ad-hoc networks in the absence of internet connectivity. #bitchat

👇

23.12.2025 16:08 👍 41 🔁 12 💬 1 📌 2
Post image

Module 5 is live!

We’re diving into The Ligero Proof System with @mvenkita and @GuilleAngeris

Thanks to @BainCapCrypto for the support.

Full access to all module resources
zkhack.dev/whiteboard/s...

28.10.2025 16:31 👍 2 🔁 1 💬 0 📌 0

One thing to recall from @hdevalence.bsky.social 's work: @lmao.bsky.social, @pinged.bsky.social & @alexhevans.bsky.social showed that just encrypting a continuously updated CFMM (e.g. via FHE) fails to provide real privacy, since the very structure of a live, convex invariant leaks information.

24.10.2025 16:00 👍 4 🔁 1 💬 1 📌 0

🫡

27.06.2025 16:15 👍 2 🔁 1 💬 0 📌 0
Abstract. In this paper, we show two simple variations of a data availability scheme which enable it to act as a multilinear polynomial commitment scheme over the data in a block. The first variation enables commitments over all of the block’s data with zero prover overhead: the data availability construction simply serves both purposes. The second variation allows commitments over subsets of data with nonzero but still concretely small proving costs, since most work is already done during data encoding. This works especially well for blockchains with a high degree of data parallelism, as data-parallel computation is particularly amenable to efficient GKR proofs. Since, in GKR, opening the polynomial commitment contributes significantly to prover costs, our construction enables the prover to reuse work already done by the data availability scheme, reducing—or wholly removing—work associated with the polynomial commitment scheme.

Abstract. In this paper, we show two simple variations of a data availability scheme which enable it to act as a multilinear polynomial commitment scheme over the data in a block. The first variation enables commitments over all of the block’s data with zero prover overhead: the data availability construction simply serves both purposes. The second variation allows commitments over subsets of data with nonzero but still concretely small proving costs, since most work is already done during data encoding. This works especially well for blockchains with a high degree of data parallelism, as data-parallel computation is particularly amenable to efficient GKR proofs. Since, in GKR, opening the polynomial commitment contributes significantly to prover costs, our construction enables the prover to reuse work already done by the data availability scheme, reducing—or wholly removing—work associated with the polynomial commitment scheme.

The Accidental Computer: Polynomial Commitments from Data Availability (Alex Evans, Guillermo Angeris) ia.cr/2025/918

23.05.2025 02:41 👍 2 🔁 1 💬 0 📌 1
Preview
Verifiable Verifications | Notion Bluesky recently introduced a new form of verification. It’s a social version of the familiar notion of a blue check, in a way that is architecturally aligned with Bluesky and its underlying protocol ATProto. This allows notable accounts and accounts that are related to trusted organizations to be verified as authentic.

Very informal experimentation with combining two worlds I like ☺️

www.notion.so/Verifiable-...

2/2

19.05.2025 16:00 👍 4 🔁 1 💬 0 📌 0
Post image

Some thoughts about how verifications in Bluesky can be extended to ZK-based methods, to achieve Verifiable Verifications

This builds on ideas from the recent verification protocol, and explores both direct integrations and lightweight ones, with different points in the tradeoff space of trust

1/2

19.05.2025 16:00 👍 10 🔁 3 💬 1 📌 0

🧵 The AT Protocol shows the power of a personal data store. All of our public atproto data is easy to find and access. We can interact with it flexibly in myriad ways and combinations.

Wouldn't it be nice to do the same for our private and collaborative data? 👇

14.05.2025 14:45 👍 13 🔁 3 💬 1 📌 0

The last of @grjte.sh’s Groundmist experiments, combining #localfirst with ATProto

Private, local first sync that is user centric using Lexicons, rather than app-specific sync.

14.05.2025 14:58 👍 14 🔁 3 💬 0 📌 0
Preview
The Lies Our Provers Tell Us | Notion 2025-05-14

ZK provers on mobile?

some thoughts on what needs to change to uphold the security guarantees we work so hard to get

tl;dr - the deployment supply chain, at least, should be better

www.kobi.one/The-Lies-Our...

14.05.2025 14:03 👍 4 🔁 1 💬 0 📌 0

🧵 The AT Protocol (atproto), which underlies Bluesky, lets us to interface with the same data in as many ways as we can conceive of through AppViews that each provide a different "view" of the network.

Can we make our local-first software as interoperable as the AT Protocol? 👇

23.04.2025 19:25 👍 29 🔁 9 💬 1 📌 3

Second in the #groundmist series - #localfirst + ATProto

I’m actively using the local first essay editor (using @inkandswitch.com Automerge + tiny essay editor) - I can login with my ATProto account and work on private drafts and then publish to @whtwnd.com.

23.04.2025 19:34 👍 22 🔁 5 💬 1 📌 0

🧵 I've been experimenting with combining local-first software and the AT Protocol (atproto) to play with the design space of apps that live at both ends of the privacy spectrum - maximally private AND maximally public, without some of the downsides of the modern web. 

Why? 👇

22.04.2025 16:30 👍 67 🔁 17 💬 1 📌 2
Preview
CryptoUtilities.jl: A Small Julia Library for Succinct Proofs We’re excited to open-source CryptoUtilities.jl, a collection of Julia packages built to prototype and benchmark succinct proof systems over binary fields, along with a simple walkthrough for how to…

When Andrija and @lmao.bsky.social told me they're writing an extremely fast cryptography library in Julia I didn't know what to think...

And then they showed me the following cool stuff:

baincapitalcrypto.com/releasing-c...

1/4

16.04.2025 23:36 👍 9 🔁 4 💬 2 📌 1

friendly reminder that building on atproto gives you immediate access to >30 million users, an existing social graph, and a huge network of open data & content

it's increasingly becoming a no-brainer to build new social apps on atproto

congrats to the skylight team on the launch 🙌

03.04.2025 20:12 👍 682 🔁 90 💬 19 📌 6
Post image

anon, what if you could train your own personal offline model, on your phone, suited to your tastes, filtering posts with ~ bad vibes ~ and letting good ones through?

well, have i got the thing for you

23.02.2025 01:14 👍 24 🔁 5 💬 3 📌 2

15 weeks ago I sat down and wrote up some ideas about how custom feeds could become a high-leverage mechanism for fundamentally changing the economics of the attention economy.

Today was my last day at my day job- I’m now full time @graze.social! Incredibly excited to give this all I got!

22.02.2025 02:21 👍 174 🔁 12 💬 6 📌 3
Preview
ZODA and The Accidental Computer This week Anna catches up with Nico, Guillermo and Alex from Bain Capital Crypto to discuss two of their recent works; ZODA: Zero-Overhead Data Availability by the trio and The Accidental Computer by…

This week's ZK Podcast episode was on ZODA & The Accidental Computer from @baincapitalcrypto.com research team, with the trio @alexhevans.bsky.social @guilleangeris.bsky.social @nicomnbl.bsky.social chatting with @arro.bsky.social about these innovations.
Ep: https://zeroknowledge.fm/podcast/349/

21.02.2025 13:16 👍 7 🔁 4 💬 1 📌 0
ZK Whiteboard Sessions - S2M7: FRI and Proximity Proofs (Part.1) with Dan Boneh
ZK Whiteboard Sessions - S2M7: FRI and Proximity Proofs (Part.1) with Dan Boneh Full ZK Whiteboard Sessions - Season 1 playlist here: https://www.youtube.com/playlist?list=PLj80z0cJm8QErn3akRcqvxUsyXWC81OGqFull ZK Whiteboard Sessions - S...

ZK Whiteboard Sessions - S2M7: FRI and Proximity Proofs (Part.1) with @danboneh.bsky.social
https://youtu.be/MBDBrEr2XQg?feature=shared ☝️

ZK Whiteboard Sessions - S2M8: FRI and Proximity Proofs (Part.2) with @danboneh.bsky.social
https://youtu.be/CWbx_rnj7LI?feature=shared ✌️

02.02.2025 11:01 👍 2 🔁 2 💬 0 📌 0

it's funny, for a long time, i always assumed that computation was this very sacred, brittle, difficult thing: so many things need to work "exactly" right to get an output

but i’ve realized that it’s actually much *harder* to make a thing that doesn't accidentally enable ~ arbitrary computation!

31.01.2025 21:16 👍 5 🔁 1 💬 1 📌 1

These two lectures by @danboneh.bsky.social for @zkhack.bsky.social are the best explanation of IOPPs, FRI and its variants by a country mile. Cannot recommend them enough

zkhack.dev/whiteboard/s...
zkhack.dev/whiteboard/s...

29.01.2025 12:50 👍 11 🔁 7 💬 0 📌 0
ZK Whiteboard Sessions - S2M2: The Sum-Check Protocol with Justin Thaler
ZK Whiteboard Sessions - S2M2: The Sum-Check Protocol with Justin Thaler Full ZK Whiteboard Sessions - Season 1 playlist here: https://www.youtube.com/playlist?list=PLj80z0cJm8QErn3akRcqvxUsyXWC81OGqFull ZK Whiteboard Sessions - S...

ZK Whiteboard Sessions - S2M2: The Sum-Check Protocol with Justin Thaler
https://youtu.be/gfy8rotcas4?feature=shared

28.01.2025 11:03 👍 3 🔁 1 💬 1 📌 0

programmable* cryptography

* programming difficulty may vary, developer discretion is advised.

27.01.2025 19:01 👍 3 🔁 1 💬 0 📌 0
Abstract. The Fiat-Shamir (FS) transform is a prolific and powerful technique for compiling public-coin interactive protocols into non-interactive ones. Roughly speaking, the idea is to replace the random coins of the verifier with the evaluations of a complex hash function.

The FS transform is known to be sound in the random oracle model (i.e., when the hash function is modeled as a totally random function). However, when instantiating the random oracle using a concrete hash function, there are examples of protocols in which the transformation is not sound. So far all of these examples have been contrived protocols that were specifically designed to fail.

In this work we show such an attack for a standard and popular interactive succinct argument, based on the GKR protocol, for verifying the correctness of a non-determinstic bounded-depth computation. For every choice of FS hash function, we show that a corresponding instantiation of this protocol, which was been widely studied in the literature and used also in practice, is not (adaptively) sound when compiled with the FS transform. Specifically, we construct an explicit circuit for which we can generate an accepting proof for a false statement.

We further extend our attack and show that for every circuit C and desired output y, we can construct a functionally equivalent circuit C^(*), for which we can produce an accepting proof that C^(*) outputs y (regardless of whether or not this statement is true). This demonstrates that any security guarantee (if such exists) would have to depend on the specific implementation of the circuit C, rather than just its functionality.

Lastly, we also demonstrate versions of the attack that violate non-adaptive soundness of the protocol – that is, we generate an attacking circuit that is independent of the underlying cryptographic objects. However, these versions are either less practical (as the attacking circuit has very large depth) or make some additional (reasonable) assumptions on the underlying cryptographic primitives.

Abstract. The Fiat-Shamir (FS) transform is a prolific and powerful technique for compiling public-coin interactive protocols into non-interactive ones. Roughly speaking, the idea is to replace the random coins of the verifier with the evaluations of a complex hash function. The FS transform is known to be sound in the random oracle model (i.e., when the hash function is modeled as a totally random function). However, when instantiating the random oracle using a concrete hash function, there are examples of protocols in which the transformation is not sound. So far all of these examples have been contrived protocols that were specifically designed to fail. In this work we show such an attack for a standard and popular interactive succinct argument, based on the GKR protocol, for verifying the correctness of a non-determinstic bounded-depth computation. For every choice of FS hash function, we show that a corresponding instantiation of this protocol, which was been widely studied in the literature and used also in practice, is not (adaptively) sound when compiled with the FS transform. Specifically, we construct an explicit circuit for which we can generate an accepting proof for a false statement. We further extend our attack and show that for every circuit C and desired output y, we can construct a functionally equivalent circuit C^(*), for which we can produce an accepting proof that C^(*) outputs y (regardless of whether or not this statement is true). This demonstrates that any security guarantee (if such exists) would have to depend on the specific implementation of the circuit C, rather than just its functionality. Lastly, we also demonstrate versions of the attack that violate non-adaptive soundness of the protocol – that is, we generate an attacking circuit that is independent of the underlying cryptographic objects. However, these versions are either less practical (as the attacking circuit has very large depth) or make some additional (reasonable) assumptions on the underlying cryptographic primitives.

Image showing part 2 of abstract.

Image showing part 2 of abstract.

How to Prove False Statements: Practical Attacks on Fiat-Shamir (Dmitry Khovratovich, Ron D. Rothblum, Lev Soukhanov) ia.cr/2025/118

27.01.2025 01:58 👍 38 🔁 17 💬 0 📌 6
ZK Whiteboard Sessions - S2M1: What is Zero Knowledge (like, actually)? with David Wong
ZK Whiteboard Sessions - S2M1: What is Zero Knowledge (like, actually)? with David Wong Full ZK Whiteboard Sessions - Season 1 playlist here: https://www.youtube.com/playlist?list=PLj80z0cJm8QErn3akRcqvxUsyXWC81OGqFull ZK Whiteboard Sessions - S...

ZK Whiteboard Sessions - S2M1: What is Zero Knowledge (like, actually)? with
David Wong
https://youtu.be/ksTTyt0GTvQ?feature=shared

27.01.2025 11:28 👍 3 🔁 1 💬 0 📌 0

oh hello @zkhack.bsky.social 👀👀

23.01.2025 00:58 👍 3 🔁 1 💬 2 📌 0