WEBVTT

00:00.000 --> 00:12.120
All right, everybody, this is a mirror because we've lost a little bit of time to project

00:12.120 --> 00:13.120
our issues.

00:13.120 --> 00:16.600
I would love it if we can give him all the time to present, and if you've got questions

00:16.600 --> 00:21.600
for him, we can take it into the hallway, I want to get your questions, but at the same

00:21.600 --> 00:24.560
time, I want to give him all the time necessary that he needs to show off what he's working

00:24.560 --> 00:25.560
on.

00:25.560 --> 00:32.560
This is, I forgot, darfies, zero knowledge cryptography for anonymous unsensored organizations.

00:32.560 --> 00:38.560
Yep, I will do, I will do an intrarier as well.

00:38.560 --> 00:40.560
If stickers, if you haven't got them.

00:40.560 --> 00:49.560
Okay, so how do I, how do I fall screaming, can I help him?

00:50.560 --> 00:54.560
Super and plus.

00:54.560 --> 00:56.560
Oh, arrow up.

00:56.560 --> 00:57.560
Eyebrillant.

00:57.560 --> 01:00.560
And how do I switch?

01:00.560 --> 01:01.560
What up?

01:01.560 --> 01:05.560
Yeah, I'm eating.

01:05.560 --> 01:11.560
Oh, I don't know exactly.

01:11.560 --> 01:16.560
This is too normal for me.

01:16.560 --> 01:23.560
Oh, yeah, there we go.

01:23.560 --> 01:27.560
Why can't we just have a Mac?

01:27.560 --> 01:31.560
Ooh, no, he didn't.

01:31.560 --> 01:36.560
Okay, how do I?

01:36.560 --> 01:39.560
The hell?

01:39.560 --> 01:43.560
Okay.

01:44.560 --> 01:46.560
Hello, everyone.

01:46.560 --> 01:48.560
My name is Amir Taki.

01:48.560 --> 01:51.560
I'm a free software developer of 20 years.

01:51.560 --> 01:59.560
I was one of the first five Bitcoin developers mainly worked on anonymity and privacy tech.

01:59.560 --> 02:06.560
I made the first coin join and stealth addresses on Bitcoin.

02:06.560 --> 02:12.560
And in this talk, I'm going to talk about Darkfire, which is an L1 for anonymous application.

02:12.560 --> 02:21.560
So, you know, what does that mean means like anonymous payments, anonymous communications,

02:21.560 --> 02:31.560
anonymous DAOs, all the tools that we need to build anonymous unsensored organizations in the internet on the internet.

02:31.560 --> 02:41.560
So, you know, we're at Phos Dam and, you know, when I was, you know, 15, 16, I was very inspired by the internet.

02:41.560 --> 02:51.560
I was inspired by free software movement and what it meant for the future of economics and, you know, people organizing together.

02:51.560 --> 02:56.560
And I saw, like, this huge potential for what Linux could become.

02:56.560 --> 03:08.560
And today, you know, we went through this period, post 2000s, where, you know, Ubuntu, the open source kind of movement.

03:08.560 --> 03:12.560
This one ideology stuff was all about, you know, trying to play catch up to Windows.

03:12.560 --> 03:19.560
Trying to be, you know, the next thing after Windows, and we were always one step behind.

03:19.560 --> 03:25.560
And the consequence of that was the, you know, Linux was always just a shitty alternative.

03:25.560 --> 03:28.560
And today we're undergoing a kind of Renaissance.

03:28.560 --> 03:36.560
This is like my view in Linux is where people are trying to understand what went wrong exactly.

03:36.560 --> 03:47.560
And actually the, the value proposition of Linux, which, you know, proprietary software is a company gives a piece of software to its users.

03:47.560 --> 03:49.560
The users consume that software.

03:49.560 --> 03:53.560
And, you know, when something's wrong with the software.

03:53.560 --> 03:57.560
I mean, this is a story of Storman and, you know, why he went and hacked the printer.

03:57.560 --> 04:00.560
When something's wrong, you're just reduced the banking, the organization.

04:00.560 --> 04:05.560
We all see that, you know, I don't know, sonos speakers or reddit.

04:05.560 --> 04:11.560
You know, some unpopular feature and the users are just reduced to making petitions.

04:11.560 --> 04:14.560
They're completely powerless.

04:14.560 --> 04:25.560
And, you know, even read something recently, which said that, you know, Gen Z doesn't know how to use a printer.

04:25.560 --> 04:28.560
Gen Z doesn't know how to use a file system.

04:28.560 --> 04:32.560
And the fact is this Silicon Valley proprietary paradigm.

04:32.560 --> 04:35.560
It creates software.

04:35.560 --> 04:41.560
There's deliberately engineered for the mass market for, you know, in, and there's not my words.

04:41.560 --> 04:46.560
This is what they, how they see people is low IQ, normie cattle.

04:46.560 --> 04:51.560
And the fact is that the, the, they're doing that because they're like,

04:51.560 --> 04:57.560
this, we need to onboard this huge amount of people, but not only this simplified view of a human being.

04:57.560 --> 05:00.560
It actually ends up people become like that.

05:00.560 --> 05:08.560
And, and, you know, when you, when you look, for example on the Mac, you see indeed that the file system is hidden from you.

05:08.560 --> 05:10.560
So, you're not, it's something you're not meant to know about.

05:10.560 --> 05:13.560
In fact, you become disempowered as a user.

05:13.560 --> 05:20.560
So, us as Linux people, we're starting to realize that a Linux, it's not Windows, it's not Mac, it's a Linux.

05:20.560 --> 05:25.560
Linux enables people to build infrastructure to become powerful.

05:25.560 --> 05:35.560
However, we've, we've come and reached a kind of standpoint where, you know, we're creating applications and people use the applications.

05:35.560 --> 05:42.560
And they're, they're all run locally, but they, you know, a lot of what we're doing today is like collaborative.

05:42.560 --> 05:50.560
We're like, we're organizing together, people are mobilizing, people are, you know, the internet is connected and people are going to change.

05:50.560 --> 05:53.560
You know, how do people do that? People are using Google documents.

05:53.560 --> 05:57.560
People are using surveillance capitalism, big tech.

05:57.560 --> 06:01.560
And so, we haven't been able to put forward a paradigm for that.

06:01.560 --> 06:06.560
I mean, even this conference, like you look at, it's sponsored by Google and Microsoft.

06:06.560 --> 06:11.560
We, as a free software community, we don't even have the economics behind that.

06:11.560 --> 06:20.560
So, you know, dark-fi, this is our project, which is just a small piece of this larger puzzle.

06:20.560 --> 06:25.560
But what we're interested in is strong anonymity.

06:25.560 --> 06:38.560
Because, you know, the early days of, you know, cryptocurrency when Bitcoin was starting, a lot of us thought we believed fairly strongly that this would usher in this new age.

06:38.560 --> 06:45.560
Because, you know, had this new form of, you know, money on the internet.

06:45.560 --> 06:55.560
And, you know, there's one of the main reasons I go into it was because I saw the potential for how free software could provision infrastructure.

06:55.560 --> 06:59.560
And we could use that to scale up.

06:59.560 --> 07:06.560
And that, that didn't, that vision of, you know, agarist society.

07:06.560 --> 07:11.560
It didn't come to be, and instead, what we've got is institutional capture.

07:11.560 --> 07:19.560
And, you know, our thesis is that a big reason why this, this is because of the lack of anonymity.

07:19.560 --> 07:26.560
If you're creating a movement on the internet, political movement, if people are not protected,

07:26.560 --> 07:31.560
and they're going out there and they're trying to change the way, trying to actively change things.

07:31.560 --> 07:41.560
If you don't have the means to defend yourself from attack, you know, like, you know, you're doing something, it's challenging the status quo.

07:41.560 --> 07:44.560
You can't survive as an organization in the internet.

07:44.560 --> 07:55.560
Now, we live in a very interesting time now as well, because we're in inflection point where, you know, five years ago, ten years ago,

07:55.560 --> 08:04.560
you know, you would tell people about, you know, how technology was being used to create this architecture of oppression,

08:04.560 --> 08:07.560
and people thought that was crazy.

08:07.560 --> 08:14.560
You'd tell people that, you know, London has high stress, CCTV, and, you know, people didn't, people like, it's not really happening.

08:14.560 --> 08:19.560
But then Snowden came out, and that suddenly became a lot more real for people.

08:20.560 --> 08:29.560
And then, you know, even a year ago, two years ago, there was this attitude amongst people, where they were like, okay, yes.

08:29.560 --> 08:39.560
We know that things, we know that they're spying on us, we know that, you know, people are being divided, and, you know,

08:39.560 --> 08:45.560
the social fabric is being broken down, but there's nothing we can do about it.

08:45.560 --> 08:54.560
This is all pervasive nihilism, but more recently, there is a shift happening where people are becoming optimistic,

08:54.560 --> 09:00.560
and people are like, we actually have the power to change things, and we can mobilize to change things.

09:00.560 --> 09:07.560
And this is where we as technologists come in with this means to be able to change things.

09:07.560 --> 09:20.560
And, you know, in dark five, what we're using is zero knowledge proofs, and zero knowledge proofs, most of you probably know, but some don't.

09:20.560 --> 09:33.560
But zero knowledge proof is very powerful piece of kit, because what you can do is, you know, normally if you have a function, let's say it's a function, you know,

09:33.560 --> 09:48.560
the proofs, and it takes three parameters, sx, y, and it computes something, can it outputs some value, and I give you the output, that function, I say this value is the output of a function, and then you go to me, okay,

09:48.560 --> 09:51.560
okay, how do I know that that's true?

09:51.560 --> 10:00.560
Normally the way I do that is, you have the function, I give you the inputs to the function, you put it in the function, and you get the output,

10:00.560 --> 10:09.560
but zero knowledge proof, you don't need the inputs, and you don't even know what the inputs are, you just know that this was computed as the output of a function.

10:09.560 --> 10:26.560
So you can construct statements, like, you know, here's a set of like, I don't know, people that can vote in a vote, and then each person when they vote, you go like, okay, here's my, I have one of these votes in the set,

10:26.560 --> 10:35.560
and I've constructed a vote, and I've constructed this nullifier that now means I can't double vote, and there's no way to cheat that protocol.

10:35.560 --> 10:49.560
And so, before when we are constructing anonymous applications five, ten years ago, you know, I had to know this, you had to know a lot of very specific math to construct a schema, but now it's a very general toolkit.

10:49.560 --> 11:18.560
So you now have the ability as a developer to go and construct any anonymous application, basically, and there are even more interesting calls, tools coming, like, intent in, in distinguishability of the application, which means that you can have a function, and everybody can have this function, and the function can say data like secret keys, and it can sign messages, but you can't see what that secret data that the function holds,

11:18.560 --> 11:29.560
or NPC, like, or, you know, FHE, et cetera, a lot more interesting math crypto that's coming on the horizon.

11:29.560 --> 11:44.560
We can leverage these tools, and we can build infrastructure that's privacy preserving the enables people to build organizations, and enables a new sphere of activity for people to change things.

11:44.560 --> 11:49.560
So, you know, that's people mobilizing.

11:49.560 --> 12:07.560
So, one of our thesis is the lunar punk cycle thesis, which is that, you know, there are two kinds of systems, there are fragile systems and anti-fragile systems, and a fragile system.

12:08.560 --> 12:29.560
When you shake it, it breaks down, and example of fragile system is, you know, corporate companies, you know, that are dependent on, you know, money from VCs, and, you know, the financial system.

12:29.560 --> 12:41.560
And, you know, whenever that system experiences a crisis or a shock, you know, then, you know, liquidity exists from that, and people exit from that.

12:41.560 --> 12:57.560
Whereas an anti-fragile system, the more that it gets shaken, the stronger it gets, and so, a good example of that is, you know, when you create privacy tools for people, and you're like, you know, you need these privacy tools to preserve your rights,

12:57.560 --> 13:03.560
to preserve your speech, you know, your ability to organize as communities.

13:03.560 --> 13:14.560
And, as soon as, you know, your community experiences a crackdown or oppression against it, suddenly, you see, it validates why this thing needs to exist.

13:14.560 --> 13:21.560
And it's suddenly, and it becomes like, oh, these tools are actually crucial to our survival, to our existence.

13:21.560 --> 13:31.560
And so, we're kind of in an arms race where the better, the anonymity tools that we create, the more the surveillance system crackdown.

13:31.560 --> 13:43.560
So, that's the thing. So, yeah, so I'll talk a bit. So, oh, okay.

13:43.560 --> 13:52.560
So, here's some of the tools that we made in dogfight. We have the world's first and only anonymous style.

13:52.560 --> 13:59.560
And this was, you know, the reason we created this was in the Assange case.

13:59.560 --> 14:10.560
Basically, the US, well, their strategy was to bankrupt him, and they basically, they basically nearly did that.

14:10.560 --> 14:16.560
And then Assange came and came to us, and they were like, look, we need to do something.

14:16.560 --> 14:25.560
And so, we created this, the Assange style, which raised 55 million, and that's basically what bankrupt Assange's freedom.

14:25.560 --> 14:39.560
But it was a dowel, a dowel's like an organization where the members vote on chain, they manage it, they can manage a treasury, etc. Collectively, is completely anonymous.

14:39.560 --> 14:45.560
The one we made in dogfight, completely anonymous. But the one for Assange style, it wasn't anonymous.

14:45.560 --> 14:56.560
And so, they're all the, basically killed or the action, because, and who wants to act for a political prisoner, you're just some random dude, you know, you do something for Assange.

14:56.560 --> 15:01.560
They come after you and put you in jail. Nobody's going to know who you are, anything.

15:01.560 --> 15:09.560
And they can make an example of you. So, it just stopped people in the dowel mobilizing to help Assange.

15:09.560 --> 15:15.560
And in the end, what the dowel did was send the money to the while Holland Foundation.

15:15.560 --> 15:20.560
So, we made that dowel, because we're like, oh, this is one of the tools we need.

15:20.560 --> 15:37.560
So, since I only have like five minutes, I'll just show as well we released the first version of our app, you can download it on our GitHub releases page, you know, like I can show you see.

15:37.560 --> 15:51.560
This, this gets so posting has begun. So, but that's fully anonymous peer to peer chat. And you go, okay, well if it's peer to peer, how do you stop spam?

15:51.560 --> 16:04.560
There is a technique we could use called rate limit nullifiers, where every epoch, you produce a ZK proof that you have a certain, that you have a key pair that's staking a certain amount.

16:04.560 --> 16:27.560
You produce some data. And then if you double-post in an epoch, like if you're a spammer trying to flood the network, then you could then because you've posted two shares of the same secret data that allows people to calculate the private key and then they can slash you.

16:27.560 --> 16:43.560
So, there's a lot of these kind of techniques that we can use to build a PTP anonymous software. We have our own ZKVM, our own ZK compiler, ZK debugger, that's what you see in the top right, you know, wallet, etc.

16:43.560 --> 17:01.560
These two tools are actually tools to view the network, PTP network topology, so we built our own PTP network. It has tool, it can have name, it has plugable transport, so it's multi-transport.

17:01.560 --> 17:20.560
The apps we didn't want to use get-hub because get-hub is actually a source of liability, so we have our own anonymous task manager, so we don't use the get-hub issues. It's fully anonymous PTP, you know, we have swaps, we have anonymous payments.

17:20.560 --> 17:42.560
But this is a general toolkit, there's not we're just building applications, anybody can come and make apps and do ZK proofs, etc. So, yeah, so apologies not, I didn't go through deep in the tech or the app side or, you know, I just did the intro, but I'll stop there.

17:50.560 --> 17:53.560
Question, someone raise their hand, right here, who's here.

17:53.560 --> 17:57.560
How do we find more information about the apps and trying to get into the app?

17:57.560 --> 18:08.560
Yeah, you can go on the website, doc.fi, go on the docs, go in the telegram, and join this chat, download this up, join this chat.

18:08.560 --> 18:13.560
And you see, they've meet every Monday, so yeah, thank you.

