Skip to content

Kris Shinn

@raggamuffin_rox

Kris Shinn

@raggamuffin_rox

I'm a officially a web3 hacker!

I'm a officially a web3 hacker!

Los Angeles, United States

Devfolio stats

Devfolio stats

1

project

1

2

prizes

2

1

hackathon

1

0

Hackathons org.

0

GitHub

GitHub

3

contributions in the last year

May

S

M

T

W

T

F

S

0 contributions on 2025-05-18
0 contributions on 2025-05-19
0 contributions on 2025-05-20
0 contributions on 2025-05-21
0 contributions on 2025-05-22
0 contributions on 2025-05-23
0 contributions on 2025-05-24
0 contributions on 2025-05-25
0 contributions on 2025-05-26
0 contributions on 2025-05-27
0 contributions on 2025-05-28
0 contributions on 2025-05-29
0 contributions on 2025-05-30
0 contributions on 2025-05-31
0 contributions on 2026-05-01
0 contributions on 2026-05-02
0 contributions on 2026-05-03
0 contributions on 2026-05-04
0 contributions on 2026-05-05
0 contributions on 2026-05-06
0 contributions on 2026-05-07
0 contributions on 2026-05-08
0 contributions on 2026-05-09
0 contributions on 2026-05-10
0 contributions on 2026-05-11
0 contributions on 2026-05-12
0 contributions on 2026-05-13
0 contributions on 2026-05-14
0 contributions on 2026-05-15
0 contributions on 2026-05-16
0 contributions on 2026-05-17
0 contributions on 2026-05-18

Apr

0 contributions on 2026-04-01
0 contributions on 2026-04-02
0 contributions on 2026-04-03
0 contributions on 2026-04-04
0 contributions on 2026-04-05
0 contributions on 2026-04-06
0 contributions on 2026-04-07
0 contributions on 2026-04-08
0 contributions on 2026-04-09
0 contributions on 2026-04-10
0 contributions on 2026-04-11
0 contributions on 2026-04-12
0 contributions on 2026-04-13
0 contributions on 2026-04-14
0 contributions on 2026-04-15
0 contributions on 2026-04-16
0 contributions on 2026-04-17
0 contributions on 2026-04-18
0 contributions on 2026-04-19
0 contributions on 2026-04-20
0 contributions on 2026-04-21
0 contributions on 2026-04-22
0 contributions on 2026-04-23
0 contributions on 2026-04-24
0 contributions on 2026-04-25
0 contributions on 2026-04-26
0 contributions on 2026-04-27
0 contributions on 2026-04-28
0 contributions on 2026-04-29
0 contributions on 2026-04-30

8

stars earned

27

repositories

49

followers

View on GitHub

Work Experience

Work Experience

C

consensys.io

VP Engineering

C

VP Engineering

consensys.io,

Top Projects

Top Projects

U

Umbra Gateway

Maximally private wallet stack

There is a lot of great work getting done in the privacy space. The majority of this work focusses on the wallet / dapp, transaction layer, or chain layer. These are all very important from a data shielding standpoint, but it privacy breaks down at the RPC layer. Even if you are using Helios locally, it still must connect to RPC to validate state with eth_getProof for state calls. We end up leaving a data trail with a few, very trusted, centralized providers. Providers like Alchemy, Quicknode, and Infura have long been criticized as centralized trusted RPC providers. Connecting to the RPC service leaks data in multiple ways, User accounts (emails, credit card payments, project IDs), traffic leakage (IP addresses from connecting from the wallet), payload leakage (method, parameters, and call data). While these providers don't sell / publish this data, we must trust they have diligence in protecting this data. Even if they don't sell it, this data can be mined and correlated to understand correlations between wallet, IP, and call patterns. Projects like Kohaku are doing great work in a "fat" privacy wallet. It is important that a privacy first wallet come with a full privacy stack. Asking the user to install a tor client, have a local client running to connect to, or otherwise setup infrastructure for privacy focused transactions is too much to expected of a user. This project focuses primarily on the RPC (or "dial tone") part of the stack. This project provides a way to get anonymous RPC. It can be thought of as dial tone from a payphone. No Credit Cards needed, pay with stables, the connection is anonymized via onion routing. Even if the gateway is connecting to a cloud provider, it doesn't leak location data.