Hey, I'm David! ๐
Senior developer & zero-knowledge explorer ๐งช
I'm obsessed with security and modern cryptography (ZK, MPC, FHE).
I love tinkering with low-level internals and breaking things to understand them better.
Writings
Explore my latest deep dives on cryptography, algebra, zero-knowledge proofs and MPC.
Read ArticlesLatest Projects
Highlights from my recent work in zero-knowledge proofs and cryptography
privacyzero-knowledgenoir
Privacy-preserving housing application using 2D-Doc
Built a PoC for French people to avoid sharing their ID documents with their landlords.
Takes in an ID and a salary slip, and outputs a ZK proof that the ID is valid, and the salary is enough to cover the rent.
See the detailed post on Hyli's blog
You can play with the Noir circuits on tdd.nr repo.
If you're lucky, maybe the app is still live...
Takes in an ID and a salary slip, and outputs a ZK proof that the ID is valid, and the salary is enough to cover the rent.
See the detailed post on Hyli's blog
You can play with the Noir circuits on tdd.nr repo.
If you're lucky, maybe the app is still live...
mpcco-snarkstaceo
Secure MPC matching via TACEO's co-snarks
I built a Private dating app ๐ถ๏ธ using TACEO's co-noir (experimental) tech.
It was a fun project to see what's possible with private shared state
App is probably down, but just in case if you want to take a look: co-match.vercel.app
It was a fun project to see what's possible with private shared state
App is probably down, but just in case if you want to take a look: co-match.vercel.app
Security
โ ๏ธsince Jan 2024
securityeducationassembly
Learning low-level security: from 'simple' binary exploitation to kernel exploits and more
I'm passionate about security, especially low-level (like reverse engineering, assembly, and binary exploitation) but I also enjoy web and network hacking.
Entirely self-taught, mostly through HackTheBox and Root-Me
From "simple" binary exploitation to kernel exploits and more.
Entirely self-taught, mostly through HackTheBox and Root-Me
From "simple" binary exploitation to kernel exploits and more.