Created on 8th December 2024
•
Imagine this: in industries like defense, finance, healthcare, and legal compliance, the stakes are life-altering. Trust is everything, but proving the validity and origin of sensitive data today often means exposing confidential information—a risk no one can afford.
Here’s the reality:
1. 15% of military components in the defense supply chain are counterfeit, threatening operations in a market worth over $1.14 trillion.
Fraud costs the finance industry a jaw-dropping $5.38 trillion annually, with outdated systems that can’t protect sensitive transaction data.
2. In healthcare, 41 million patient records were breached last year, exposing lives to unnecessary risk and violating trust.
Companies are spending $214 billion annually on compliance tools, yet still fall short of safeguarding privacy while meeting regulatory demands.
3. This is not just a problem; it’s a ticking time bomb. Industries are bleeding money, eroding trust, and failing to meet the growing demand for privacy-first solutions.
Now imagine a world where sensitive data can be verified without ever being exposed. With technologies like zero-knowledge proofs and confidential computing, we can eliminate fraud, supercharge compliance, and rebuild trust—all while unlocking billions in savings and market potential.
Integration Issues with Noir Framework: The Noir language, although promising for circuit generation, presented some difficulties due to its experimental nature. We faced challenges like "stack too deep" errors and compiler bugs, which made it hard to seamlessly integrate circuits with our overall application.
Complex Access Control Policies: Implementing NFT-based granular access controls for sensitive data was a complex task. Developing smart contracts to manage temporary permissions, revoke access, and ensure compliance with data policies required multiple revisions to address edge cases and potential vulnerabilities.
DKIM Integration Issues: We encountered issues when trying to integrate the zkEmail SDK, primarily due to server-side problems. Additionally, zkEmail did not support using the same regex with multiple public fields, and their UI provided limited assistance, making the process more challenging.
We added zkEmail for account recovery, Anon Aadhar for user authentication and data access policy and Walrus for storage, and deployed the contracts on Base chain and Polygon zkEVM.
Tracks Applied (6)
privacy + scaling explorations
privacy + scaling explorations
BuidlGuidl.eth 🏰 🔥
Walrus
Base
Polygon