Trending topics
#
Bonk Eco continues to show strength amid $USELESS rally
#
Pump.fun to raise $1B token sale, traders speculating on airdrop
#
Boop.Fun leading the way with a new launchpad on Solana.
Major update dropped on HyperLayer ZK
New features:
→ QR Payment Requests w/ encrypted memos
→ zk-ID Module (STARK-inspired proofs)
→ Enhanced client-side cryptography
All ops run client-side. Zero server trust required.
Let me break it down 👇

QR Payment Requests 💳
• Custom protocol: zkhl://pay?d=<base64>
• Supports USDC transfers on Solana
• Optional memo encryption:
PBKDF2 key derivation (100k iterations)
AES-GCM 256-bit encryption
• Passphrase NEVER embedded in QR
• Camera scan + manual entry fallback
zk-ID Module 🔐
Ephemeral identity system with STARK-inspired proofs
• Ed25519 keypair generation (client-side)
• 30-min auto-expiry
• Commitment anchoring via SHA-256
• Challenge-response signature verification
No private keys ever leave your browser.
zk-ID Security Stack:
┌─────────────────────────────┐
│ Secret Key Encryption │
│ → AES-GCM 256-bit │
│ → PBKDF2 key derivation │
│ → Session-bound salt │
└─────────────────────────────┘
Export contains ONLY:
• Public key
• Commitment
• Proof (no private material)
Proof Generation Flow:
Generate commitment = SHA256(pubKey + nonce)
Challenge = SHA256(commitment + timestamp + proofNonce)
Response = Ed25519.sign(challenge + commitment + timestamp)
Verify: recompute commitment, validate signature
Forgery = computationally infeasible ✅
Use Cases:
• Payment signing verification
• Session-bound identity for E2EE messaging
• Disposable identity for privacy-critical txs
• Cross-platform identity attestation
All without revealing your seed phrase or priv
1.82K
Top
Ranking
Favorites

