Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
Technology
Health & Fitness
About Us
Contact Us
Copyright
© 2024 PodJoint
Podjoint Logo
US
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/d4/02/a5/d402a5ab-7153-7db9-2476-2ed742ba4577/mza_13277582984184660621.jpg/600x600bb.jpg
Blackbox Podcast
Blackbox Podcast
6 episodes
3 days ago
The Blackbox Podcast is where builders of the future come to talk shop — no fluff, no hype, just real technical insight. Whether you’re a solo creator, startup innovator, or enterprise architect, we want your perspective on the systems shaping confidential computing and SAFE AGI. Each episode dives into the architectures that matter — from TEE CPU/GPU deployments (SGX, TDX, SEV, etc.) to Zero Trust frameworks and privacy-first design principles. We’re here to explore how these technologies actually work in practice, and to spotlight the visions driving them forward.
Show more...
Technology
RSS
All content for Blackbox Podcast is the property of Blackbox Podcast and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
The Blackbox Podcast is where builders of the future come to talk shop — no fluff, no hype, just real technical insight. Whether you’re a solo creator, startup innovator, or enterprise architect, we want your perspective on the systems shaping confidential computing and SAFE AGI. Each episode dives into the architectures that matter — from TEE CPU/GPU deployments (SGX, TDX, SEV, etc.) to Zero Trust frameworks and privacy-first design principles. We’re here to explore how these technologies actually work in practice, and to spotlight the visions driving them forward.
Show more...
Technology
https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_episode/44194214/44194214-1761351310024-6d669f7f9188f.jpg
E06 with Jens Groth: Scaling Zero-Knowledge Proofs with Instruction Sorting
Blackbox Podcast
1 hour 12 minutes 25 seconds
1 week ago
E06 with Jens Groth: Scaling Zero-Knowledge Proofs with Instruction Sorting

In this episode, Dylan sat down with Jens Groth (pronounced “Yens”)—Chief Scientist at Nexus, creator of the Groth16 SNARK—to map how verifiable computation reaches internet scale. We unpack Nexus’s zkVM (RISC-V), its distributed prover network (orchestrator + workers) for low-latency proving, and why proofs-of-proofs are the practical path to tiny, fast-verifying artifacts. Jens explains the coming shift to instruction sorting—bucketing additions/XORs/etc. to cut redundant constraints—and where privacy fits when you parallelize proving. We also compare ZK vs TEE vs FHE in real systems, talk formal verification on the verifier path, and preview Nexus’s L1 that makes proofs first-class citizens for DeFi and beyond.

  • How a zkVM compiles, executes, and emits an extended witness + proof—and what the verifier actually checks.

  • Why a centralized orchestrator plus many workers wins on latency today, and where that clashes with privacy.

  • The real trade-offs between TEEs (TDX/SEV) for speed, ZK for public verifiability, and FHE/MPC for data-in-use privacy.

  • Instruction sorting: reordering the execution trace into per-op buckets to shrink constraints—an orders-of-magnitude lever when combined with proof composition.

  • What “maturity” looks like in ZK stacks: open source, audits, formal verification for verifiers, supply-chain discipline, and reproducible builds.

  • Nexus — zkVM v3 overview, distributed prover network, and blog updates:
    https://specification.nexus.xyz/ • https://docs.nexus.xyz/zkvm • https://blog.nexus.xyz/nexus-zkvm-3/ • https://blog.nexus.xyz/nexus-launches-worlds-first-open-prover-network/

  • Phala Network docs — confidential computing stack & TDX direction:
    https://docs.phala.com/overview/phala-network

  • dstack-TEE — builder notes for attested, policy-driven confidential compute:
    https://phalanetwork.mintlify.app/docs/overview/what-is-dstack

  • RISC-V ISA resources (for how zkVMs model CPU steps):
    https://riscv.org/specifications/ratified/

  • STARK proving system background (why many zk stacks compose proofs):
    https://starkware.co/stark-101/ • https://starkware.co/stark/

If you’re building rollups, privacy-first apps, or just need verifiable backends, this one’s a blueprint: start efficient at the base proof, compose downward, verify in milliseconds, and use privacy where it truly survives distribution.

Blackbox Podcast
The Blackbox Podcast is where builders of the future come to talk shop — no fluff, no hype, just real technical insight. Whether you’re a solo creator, startup innovator, or enterprise architect, we want your perspective on the systems shaping confidential computing and SAFE AGI. Each episode dives into the architectures that matter — from TEE CPU/GPU deployments (SGX, TDX, SEV, etc.) to Zero Trust frameworks and privacy-first design principles. We’re here to explore how these technologies actually work in practice, and to spotlight the visions driving them forward.