Zero Knowledge Architectures for mobile Applications

042b7c0e45c53de46667f07de2fb2614?s=47 vixentael
October 05, 2017

Zero Knowledge Architectures for mobile Applications

#iosdev #security #trust #keys

- why we need ZKA
- what is ZKA, what are parts of ZKA system
- messaging, auth, data: how to use ZKA in these usecases
- ZKA data management example
- implementation details
- other possible usecases
- recap


If you can't tap on the link inside slides, please open as pdf (button on the right).


With intensifying threat access, snooping governments and insecure-internet-of-everything, the importance of zero-knowledge application architectures and end-to-end trust, for things more complicated than simple messaging, becomes more and more obvious for the app developers.

We will talk about real-world problems that ZKA fights against, learn typical cryptographic designs and progress in different spheres of ZKA. We will find out how to make data sharing, user collaboration on data in the cloud with your app provably secure.




video from MobiConf17


Links to follow:


Anatomy of a Zero-Knowledge Web Application, 2007

Zero Knowledge Protocols Without Magic

Why We Develop Zero Knowledge Software

Keybase launches encrypted git

Why We Will No Longer Use the Phrase Zero Knowledge to Describe Our Software

Explain Like I’m 5: End-to-end Encryption

Explain Like I’m 5: Zero Knowledge Proof

Zero Knowledge Proofs: An illustrated primer



October 05, 2017