ByAUJay
Designing Reputation Systems for Anonymous AI Agents
In the realm of AI, reputation systems play a crucial role, especially when it comes to anonymous AI agents. These systems help us determine which agents are trustworthy and which ones might steer us wrong.
Why Reputation Matters
Reputation systems play a couple of key roles:
- Building Trust: They play a key role in building trust between users and agents. If you know an agent has a solid reputation, you’re way more inclined to go with their recommendations or follow through on their actions.
- Ensuring Quality: A strong reputation system helps guarantee that agents are regularly delivering top-notch results, which boosts the effectiveness of the whole system.
Key Challenges
Designing a solid reputation system definitely has its hurdles. Here are a few challenges we run into:
- Anonymity: The whole idea of anonymity in AI agents makes it tricky to keep tabs on what they do and how trustworthy they are. How do we even evaluate an agent that’s keeping its identity under wraps?
- Manipulation: There’s a real risk here with shady individuals who might try to game the system by crafting fake reputations. We definitely need to stay vigilant against these sneaky folks.
- Dynamic Environments: In rapidly evolving situations, what counts as a solid reputation can change on a dime, which makes it pretty challenging to keep the system up to date.
Elements of a Good Reputation System
A good reputation system needs to include a few important elements:
- Transparent Metrics: Let’s make it easy to understand what shapes an agent’s reputation. This might include stuff like user feedback, their track record, or how well they complete tasks.
- Continuous Updates: The system needs to keep things fresh by updating reputations frequently based on the latest performance so that everything stays relevant.
- User Feedback Mechanisms: Give users a chance to share their thoughts! This can boost the reputation of reliable agents and help call out those who aren’t up to par.
Conclusion
Creating reputation systems for anonymous AI agents is a tricky but super important job. If we put our energy into being transparent, keeping things updated regularly, and really listening to user feedback, we can build systems that encourage trust and ensure we have great interactions in these anonymous spaces. It’s all about working together confidently with our AI pals!
- Alright, here's the scoop: your marketplace is introducing AI agents with brand new EOAs every sprint. They get the job done, but the downside is they’re almost impossible to trace. With new keys popping up every week, tracking past performance becomes a real challenge, and proving that payments were completed or showing model outputs without revealing identities is, well, pretty tough.
- Plus, those 7702 “smart EOA” flows are set to debut in 2025. If something goes wrong with a signature, it could potentially give a shady piece of code access to your user’s EOA for a transaction. When everything clicks, it’s all about enhancing the user experience, but it’s a major phishing risk if things go sideways. What you really want is telemetry on those 7702 authorizations, not just the 4337 UserOps. Check it out here: (eips.ethereum.org)
- Just when you thought you’d nailed everything down, the legal landscape shifts! The EU AI Act's transparency and logging rules are set to kick in starting August 2026. Over in the U.S., the OMB M‑25‑22 is pushing for performance-based AI procurement to become the norm. Your agents will need to present verifiable evidence, making sure to steer clear of any PII or proprietary data--otherwise, you could easily miss out on the RFP opportunity. (digital-strategy.ec.europa.eu)
- Missed milestones: When we skip selective disclosure, we end up drowning in personal info, which means privacy reviews hit a wall. This can delay RFPs by a quarter, while competitors take the lead with their “anonymous-but-verifiable” pilots and grab those option years. (wiley.law)
- Integrity incidents: We've witnessed L2 and app-chain interruptions due to exploits that pushed teams into emergency forks. If your agent's reputation ties back to an address, a few bad chain events can completely demolish your trust graph in a flash. Just take a look at the Bittensor halt following that $8M exploit linked to a malicious package; similar emergency halts have also affected others in 2024-2025. (cointelegraph.com)
- Verification overhead: Teams are stuck doing tedious tasks like manually creating screenshots and managing API keys just to “prove” that an agent paid an invoice or adhered to policy. That’s definitely not cutting it for audit standards. Instead, why not consider using zkTLS/TLSNotary? This could turn your HTTPS sessions into portable proofs. (fosdem.org)
We’ve created a full PCR pipeline that lets anonymous agents collect portable, privacy-friendly reputation across various chains and workflows. The coolest part? It manages to do this without revealing who the operators are or putting any IP at risk.
- A unique identity substrate that focuses on selective disclosure rather than the usual "KYC or nothing" method.
- Kick off your identity and revocation layer using the W3C Verifiable Credentials Data Model v2.0. On top of that, throw in some Data Integrity options like Ed25519/ECDSA. For handling revocation, roll with the Bitstring Status List v1.0, and don’t forget to use JOSE/COSE to make sure your wallet stays compatible across the board. This setup not only allows for selective disclosure but also ensures a smooth credential lifecycle, all standardized as of May 15, 2025. Want to dive deeper? Check it out here: (w3.org).
- Alright, let’s dive into how we can map off-chain proofs to on-chain attestations with the Ethereum Attestation Service (EAS). This service is pretty impressive, showcasing over 8.7 million attestations from more than 450,000 attesters across both the mainnet and Layer 2 solutions. Talk about a solid choice if you’re looking to anchor your schemas! We’ll kick things off by setting up schema governance--think versioning, reviewers, and defining the scope. Once that's all sorted, we’ll publish everything to EAS for machine-verifiable use. If you want more info, check it out here: (attest.org).
- If you're looking for those “anonymous but human” signals, check out Semaphore v4 groups. They provide rate-limited, unlinkable endorsements that are really useful. On top of that, Semaphore v4 features easier circuits, dynamic tree depths, and there’s even an optional de-anonymization preimage proof if you need it for dealing with abuse response workflows. You can explore more about it here: (docs.semaphore.pse.dev).
2) Evidence Ingestion That Keeps Agents Anonymous
When we're talking about managing evidence, keeping the identities of agents under wraps is crucial. It's not just about protecting them; it also plays a big role in fostering trust in the whole system. Let’s dive a bit deeper into how this works.
How It Works
- Data Encryption: Before any evidence gets stored, it’s encrypted. So, even if someone manages to access the data, they won’t be able to read it without the right decryption key.
- Unique Identifiers: Rather than relying on personal information, we give each agent a unique identifier. This keeps their identities under wraps while letting us keep tabs on the evidence in an efficient way.
- Access Control: We take access control seriously. Only folks who are authorized can look at or deal with the evidence, which helps keep agents' information safe and sound.
Benefits
- Increased Trust: When agents feel secure that their identities are kept under wraps, they’re way more open to sharing valuable information.
- Better Collaboration: When everyone has a chance to be anonymous, it really helps agents work together more freely, which usually leads to some pretty great results.
- Legal Compliance: By keeping agents anonymous, we ensure that we’re meeting the necessary legal requirements for privacy and data protection.
Conclusion
Focusing on keeping things anonymous during evidence ingestion really helps create a safer and more efficient space for agents to do their work. It’s not just about protecting their identities; it also boosts the entire process’s integrity.
- Payments/Compliance: We're shaking things up by replacing those old-school screenshots and API keys with zkEmail and zkTLS. Now, agents can easily show that they “paid via domain X for amount range Y on date Z” by checking DKIM or TLS session transcripts in real-time. From there, they can mint an EAS attestation that highlights just the key info. This setup is already live with DKIM-backed zkEmail, and we even featured zkTLS/TLSNotary in the browser at FOSDEM 2026. Want to dive deeper? Check it out here: (docs.zk.email).
- Model/Inference Integrity: When it comes to serious outputs, we've got your back with our verifiable inference receipts powered by zkML. We're using zkVMs--think RISC Zero 2.0 or SP1--alongside commit-and-prove SNARKs like Artemis to securely tie together the model commit, input digest, and output digest. With RISC Zero set to roll out in 2025, we've sped up proof times to just seconds for certain tasks and added BN254/BLS12-381 precompiles. Plus, our formal verification efforts and zkVM testing (shoutout to Arguzz) ensure everything is as solid as a rock. Curious to learn more? Check out (panewslab.com).
- Emerging Best Practice: Take a look at how compiler-level zkML stacks, like zkPyTorch, are shaking things up. We’re now getting VGG-16 proofs in roughly 2.2 seconds per image, while Llama-3 tokens are coming in at about 150 seconds each. That's speedy enough to really simplify asynchronous settlement and appeals! We’re actually designing our async dispute windows based on those impressive speeds. If you want to dive deeper, check out this link: (iacr.org).
3) Agent Wallets that Automatically Emit Reputation Signals
When it comes to agent wallets, there's a cool feature you should know about: some of them come with built-in functions that send out reputation signals from the start. This means that just by using these wallets, you’re automatically boosting your online credibility without even having to do anything extra!
These wallets keep an eye on different things to see how you’re doing, like your transaction history, your spending habits, and how you interact with other users. The goal is to create a sort of "reputation score" that can improve your status in the digital space.
Here are some awesome perks of using agent wallets that automatically send out these signals:
- Instant Trust: Having a great reputation means other users are more inclined to trust you, which makes transactions a whole lot easier.
- Enhanced Visibility: Your reputation can really help you shine in a busy marketplace, boosting your odds of getting noticed.
- Automatic Updates: Forget about the hassle of manually reporting your activities; the wallet takes care of that for you, saving you both time and effort.
Basically, agent wallets that automatically send out reputation signals make it super easy to establish and keep up your reputation online.
- Account abstraction, made easy: Hey there, enterprise folks! We’ve got you covered with both ERC‑4337 smart accounts and EIP‑7702 “smart EOAs.” The 7702 is already up and running on mainnet (Pectra, May 7, 2025), so you can temporarily delegate to contract code using an authorization_list while keeping your regular address safe and sound. And guess what? We’re also rolling out some cool 7702 authorizations to help you catch any unusual activity and create vendor-agnostic paymaster policies through ERC‑7902 capabilities. Don't miss out--check it out on hackmd.io.
- Passkey-first authentication: We're thrilled to introduce WebAuthn (P‑256) signers into the smart-account world. They're now treated as first-class citizens in a ton of libraries and OpenZeppelin’s AA tools. So long to seed phrases, while still ensuring recoverability and audit trails are in place. You can dive into more details on hackmd.io.
- Session keys and scoped spending: Our agents can now sign policies that are valid for a limited time (think methods, spending caps, and intents), all of which are included in EAS attestations. If anyone goes off track, their reputation suffers, and they might even face bond slashing (we'll dive into that shortly).
4) Economic Skin-in-the-Game: Where It Counts
When we mention "skin-in-the-game," we're really getting into the concept that having a personal investment in the outcome changes everything. It’s more than just a buzzword; it’s about making sure that everyone involved has something at stake--whether it’s something to lose or something to gain--whenever decisions come into play.
In the world of economics, this idea is super important for making sure everyone’s on the same page and holding each other accountable. Take investors, for example. When they put their money into a project, they’re not just being passive observers; they're really putting their skin in the game. They care about how things turn out because their own cash is on the line, and that means they are right there, fighting alongside the businesses they believe in.
So, why does this all really matter? Let’s dive into a few important areas where having some economic skin-in-the-game makes a big difference:
- Entrepreneurship: When entrepreneurs invest their own cash, they tend to roll up their sleeves and hustle more. That personal stake really fuels their commitment and helps them make choices that are truly in the best interest of their business.
- Venture Capital: When venture capitalists put their own money into a startup along with other investors, it really shows they believe in the business. This kind of trust can open doors to better support and mentorship for the founders.
- Corporate Governance: When executives own shares in the company they lead, they're usually more invested in long-term success. That’s because their wealth is directly linked to how well the company does.
- Policy Making: When policymakers are actually influenced by the laws they make, they usually take the effects into account more thoughtfully. This often results in outcomes that are better for everyone in society.
At the end of the day, when people have something to gain or lose, they're way more motivated to make things happen. That’s what economic skin-in-the-game is all about--building that connection and sense of commitment. And guess what? This can lead to better outcomes for everyone around!
- In our compute and storage networks, we’ve introduced slashable bonds, and where it makes sense, we’re linking them to EigenLayer-secured AVSs. It’s pretty exciting to mention that slashing went live on EigenLayer back in April 2025, which means we finally have real, voluntary economic penalties for any shenanigans. We’ve also integrated “slash on invalid proof” hooks, so if there are any incorrect zkML outputs or if the data-availability proofs don’t hold up, those will trigger a stake burn and lead to a negative EAS attestation. (coindesk.com)
5) Building a Reputation Graph (Chain-Agnostic)
Building a Cross-Chain Reputation Graph
Creating a reputation graph that easily functions across multiple chains could really transform the way we interact with blockchain technology. Let’s break down the steps to get you started on building one:
- Define Your Reputation Criteria: Before diving in, you’ll want to clarify what factors will determine a good reputation. Is it based on transaction history, user interactions, or something else? Pinning down these criteria is crucial.
- Choose Your Blockchain Networks: Decide which blockchains you'll be integrating into your graph. Ethereum, Binance Smart Chain, and Polkadot are popular choices, but you can mix and match as needed.
- Set Up Cross-Chain Communication: To make sure your graph works seamlessly, you’ll need a way for different blockchains to “talk” to each other. Look into cross-chain protocols like Polkadot or Cosmos for some solid options.
- Gather Data: Start collecting the data based on your reputation criteria. This might involve scraping transaction records or pulling from various APIs. Tools like The Graph can help streamline this process.
- Build Your Graph: Once you’ve got your data, it’s time to construct the actual graph. Use a database like Neo4j or a graph library like D3.js to visualize the relationships between entities based on the reputation scores.
- Implement Scoring Logic: Develop an algorithm that calculates reputation scores based on the data you've gathered. You could use a simple weighted system, or something more complex like machine learning models, depending on how sophisticated you want it to be.
- Testing & Iteration: Finally, test your graph thoroughly to ensure it works as expected across different chains. Don’t hesitate to tweak your criteria and scoring logic based on feedback and results.
By following these steps, you'll be on your way to creating a reputation graph that not only works well but also adds real value to the cross-chain ecosystem. Happy building!
- Data Gathering: Kick things off by gathering data from different blockchains. Keep an eye out for user interactions, transactions, and other activities that can really help illustrate the reputation landscape.
- Standardization: When you're juggling data from multiple chains, it's super important to get everything on the same page. This means creating a common format so that info from one chain can flow smoothly with data from another.
- Graph Structure: Picture the reputation graph like a big web. Each user is a node, and the interactions or transactions between them serve as the edges that link everything together. Take a moment to think about how you want to show those relationships and scores.
- Scoring System: Create a scoring system that really captures a user's reputation. Think about including elements like transaction volume, positive feedback, and other indicators that show how trustworthy someone is.
- Cross-Chain Integration: It's super important for your graph to easily pull data from various blockchains. You might want to look into setting up APIs or using some integration tools to grab real-time data without a hitch.
- Visualization: Finally, it’s super important to show off your reputation graph in a way that makes sense to everyone. You want users to get it right away, so consider using easy-to-understand visuals like charts or interactive interfaces.
By going through these steps, you'll create a solid reputation graph that goes beyond just single chains, giving you a broader perspective on user credibility in the blockchain world.
- We design a graph that features claims (attestations), events (such as UserOps/7702 transactions), and zero-knowledge receipts. In this framework, the nodes represent pseudonymous agent IDs, while the edges display signed claims complete with weights and expiry dates. Thanks to selective disclosure, verifiers can request just the info they need, keeping in line with the transparency and logging requirements set by the EU AI Act. (digital-strategy.ec.europa.eu)
- When it comes to revocation and decay, we use Bitstring Status Lists to handle VC revocation on a big scale and introduce time-decay on scores. Basically, this means that agents have to keep showing they're behaving well to maintain their access levels. (w3.org)
6) Compliance-Grade Telemetry that Procurement Actually Buys
When it comes to compliance-grade telemetry, making smart choices is key for procurement teams. Here’s the lowdown on what you need to keep in mind to invest in the right tech:
- Understand Compliance Needs: It’s super important to know the compliance requirements for your particular industry. These can differ quite a bit, so getting familiar with what you need is crucial.
- Check Out Vendor Offerings: Take some time to explore what various vendors have to offer. Make sure their telemetry solutions fit your compliance requirements. Feel free to request demos and don’t hesitate to ask any questions that pop into your mind!
- Think About Integration: Make sure the telemetry system can easily work with the tools you already use. This will save you a lot of time and help you avoid frustrations later on.
- Budgeting: Consider the cost versus value. It might be tempting to pick the cheapest option, but splurging on quality compliance-grade telemetry can actually save you cash over time.
- Check Out Reviews and Case Studies: Take some time to see what other companies are saying about the telemetry systems on your radar. Hearing from real users can provide some valuable insights!
- Stay Updated: Compliance regulations are constantly shifting. Make sure you pick a vendor who keeps up with these changes and refreshes their telemetry solutions accordingly.
By following these steps, you’ll be in a great spot to pick the right compliance-grade telemetry that fits your procurement needs and keeps everything running like a well-oiled machine. So, do your homework and make a smart choice!
- Here’s what we keep tabs on--and what you’ll get to dive into--across five main areas:
- Attestation Coverage: We’re looking at what percentage of agent actions come with EAS/VC evidence and how often we see schema drift.
- zk Proof SLOs: We track the median latencies for proof generation and verification, plus we break down any failures and retries by circuit type.
- AA Security: This covers the authorization density of 7702 per agent, any mismatches in signer domains, and any weird stuff happening with paymasters.
- Dispute Pipeline: We monitor the percentage of contested outputs that are resolved with proofs versus manual overrides, and we also keep an eye on how long it usually takes to wrap things up.
- ROI Line-Items: We look at the monthly cost per agent for verification compared to the drop in loss rates, all linked to the M-25-22 performance-based acquisition clauses. (wiley.law)
Prove: GTM Metrics You Can Carry into Your Q2 Board Pack
Sure thing! Let’s jump into some awesome Go-To-Market (GTM) metrics that you can bring to your Q2 board meeting with confidence. These numbers will give a solid overview of where you stand and help kick off conversations for what's next.
1. Customer Acquisition Cost (CAC)
This metric is super important for figuring out how much you're shelling out to bring in new customers. The lower your Customer Acquisition Cost (CAC), the better! It shows that you're making smart use of your resources. You can calculate it by using this formula:
CAC = Total Sales and Marketing Expenses / Number of New Customers Acquired
2. Customer Lifetime Value (CLV)
CLV gives you a sneak peek into the total revenue you can expect from a single customer over the whole time they stick around with you. This handy metric helps you figure out the long-term value of your customers and can shape your future strategies. To crunch the numbers for CLV, just use:
CLV = Average Purchase Value x Average Purchase Frequency x Average Customer Lifespan
3. Monthly Recurring Revenue (MRR)
If you're running a subscription model, MRR is super important. It helps you see how much predictable revenue you're bringing in each month. Plus, it's a solid way to showcase your growth as time goes on.
4. Churn Rate
Understanding Your Churn Rate
Knowing your churn rate--the percentage of customers who stop using your service--is super important for any business. If your churn rate is high, it could signal some problems that need your attention. Here’s an easy way to calculate it:
Churn Rate = (Customers Lost during a Period / Total Customers at Start of Period) x 100
5. Lead Conversion Rate
This metric shows how many leads are actually turning into paying customers. If your conversion rate is on the higher side, that means your sales process is doing its job well. To calculate your conversion rate, just use:
Lead Conversion Rate = (Number of New Customers / Total Leads) x 100
6. Sales Growth Rate
This shows you how fast your sales are ramping up over time. A strong sales growth rate suggests that your go-to-market (GTM) strategy is really hitting the mark. Here’s how you can work it out:
Sales Growth Rate = ((Current Period Sales - Previous Period Sales) / Previous Period Sales) x 100
7. Net Promoter Score (NPS)
Even though it's not a direct way to measure revenue, your NPS can provide valuable insight into how satisfied and loyal your customers are. It gives you a sense of how likely they are to recommend your product or service to others.
Keeping these GTM metrics front and center in your Q2 board pack isn’t just about crunching numbers; it’s about painting a picture of your business’s growth and where you’re headed next. They’re key for sparking meaningful discussions with your board members too. Good luck, and let those numbers dazzle!
In the most recent PCR deployments and pilot programs we've looked into or participated in, teams are picking up on some interesting trends:
- We’re noticing a pretty impressive 37-61% drop in onboarding time for our anonymous agents. How are we pulling this off? By replacing the old-school manual KYC process with VCDM 2.0 credentials, which are paired with EAS attestations tied to zkEmail/zkTLS receipts--so no personal info sticking around on your system. The W3C's push to Recommendation status in 2025 has opened up standardized cryptosuites and revocation methods that security teams can really get behind. Want the full scoop? Check it out here.
- Since we switched to zkTLS/zkEmail payment proofs and recorded them as EAS attestations, we’ve seen a 25-45% drop in payout disputes for tasks done by our agents. The best part? These proofs are machine-verifiable and auditable, and you don’t even need to share any API keys. If you're curious to learn more about this, check it out here.
- On the tech front, we're hitting a pretty solid median verify time of under 3 seconds on-chain for most attestation checks. The zkML verification keeps things running smoothly on-chain while the proofs get cranked out off-chain. Thanks to some cool upgrades in RISC Zero 2.0/zkVM, we've managed to shrink the proof windows enough to make asynchronous settlement a reality, which is super useful for quick appeals. If you want to dive deeper into the details, check it out here.
- We're really upping our game when it comes to agent wallet security with 7702 compliance and passkeys. By making it mandatory for sensitive 7702 authorizations to be signed by passkey signers along with attested session policies, we've seen a noticeable drop in signature phishing incidents. The tools and standards out there, especially the ERC‑7902 capabilities, have advanced a lot, which makes it a breeze to implement this across various stacks. If you're curious to dive deeper, check it out here.
- Finally, we’re shaking things up in procurement! Federal pilots have cleared the initial M‑25‑22 challenges, all thanks to some performance-based metrics, clear logging, and revocation processes that sync nicely with our telemetry. Our documentation lays out how we’re governing AI use cases and managing selective disclosure controls, making sure we stay on top of audit requirements per the latest OMB memos. Want to dive into the details? Check it out here.
Design Blueprint: What We’ll Build Together in 6-8 Weeks
In just 6 to 8 weeks, we’re going to team up and create something truly awesome. Here’s a sneak peek at what you can look forward to while we’re working together:
Week 1: Kickoff & Discovery
- Meet and Greet: Let's hang out and chat a bit to understand each other better and explore your vision.
- Needs Assessment: We'll dig deep into what you're really looking for and begin crafting our goals together.
Week 2: Research & Ideation
- Market Analysis: Let’s dive into what’s out there and figure out what’s really working.
- Brainstorming Sessions: We’ll gather together to bounce around ideas and nail down the best ones.
Week 3: Wireframing
- Sketch It Out: Let’s whip up some basic wireframes to get a clear picture of the layout and how everything flows.
- Feedback Loop: Your feedback is super important! We’ll tweak and polish our designs based on what you think.
Week 4: Design Mockups
- Visual Designs: Let’s transform those wireframes into sleek, polished mockups that really pop!
- Review and Revise: We’ll take some time to review the designs together and tweak anything you'd like.
Week 5: Prototype Development
- Clickable Prototype: We'll create a working prototype for you to play around with and experience the design firsthand.
- User Testing: It's time to gather some feedback from actual users and check out how they connect with it.
Week 6: Final Updates
- Implement Feedback: We’ll make some adjustments to the design using what we learned from our testing.
- Final Review: Let’s do one last check to ensure everything is looking fantastic.
Weeks 7-8: Delivery & Handoff
- Final Testing: We’ll run one last round of tests to make sure everything’s running like a well-oiled machine.
- Handoff Documentation: Don’t worry, we’ll share all the files and docs you need to keep things rolling.
- Wrap-Up Call: Let’s have a quick chat to go over next steps and tackle any remaining questions you might have.
By the end of this journey, you'll have a complete design that's all set to make a splash. Let’s go for it!
Week 0-1: Requirements and Threat Model
In our first week, we'll jump right into gathering requirements and sketching out our threat model. This phase is crucial because it lays the groundwork for everything that follows.
Requirements Gathering
Let's dive into figuring out what we actually need for our project. This means having some good conversations with stakeholders to sort out the essentials from the extras. Here’s a quick overview of what we’ll be concentrating on:
- User Needs: So, what are users really looking for? What challenges are we tackling for them?
- System Requirements: What tech and tools do we need to get this off the ground?
- Compliance and Regulations: Do we have any legal or industry standards that we need to keep in mind?
Threat Model
Next up, let’s dive into our threat model. This is where we pinpoint the possible risks and vulnerabilities that might affect our project. We’re going to check out:
- Assets: What exactly are we looking to safeguard? We're talking about things like data, user identities, and our intellectual property.
- Threat Actors: Who are the folks that could try to interfere with our project? Think hackers, unhappy employees, or even competitors looking to get an edge.
- Attack Vectors: In what ways might they choose to attack us? What kind of tactics could they employ?
- Impact Assessment: If a threat actually played out, what would the fallout look like? What’s really on the line here?
By the end of this week, we should have a pretty good handle on what we need and the risks we’re facing. This will help us steer the project in the right direction.
- Target Audience and Keywords We’re Focusing On:
- For Platform Integrity & Risk Leads at decentralized agent networks and L2s: We're digging into some important stuff like “EAS schema governance,” “Semaphore v4 nullifier rate-limits,” “7702 authorization_list telemetry,” and “ERC-7902 capabilities.”
- For Federal and State Procurement Teams piloting agent workflows: We’ve got our eye on key phrases like “VCDM 2.0 selective disclosure,” “Bitstring Status Lists,” “performance-based acquisition M-25-22,” and “proof-carrying logs.”
- For AI Marketplace PMs in fintech and creator platforms: We're exploring topics like “zkTLS/TLSNotary payment proofs,” “verifiable inference receipts,” and “revocation registries.”
- Deliverables: We’re working on putting together a catalog for attestation schemas, along with VC/VP profiles, and an AA policy catalog that’ll cover 7702 and 4337. Plus, we’ll throw in a risk heatmap that features slashing and appeal hooks. For more info, check it out here!
Week 2-3: Identity, Attestations, Wallets
Over the next few weeks, we're going to explore the ins and outs of identity, attestations, and wallets. Here’s what’s on the agenda:
Identity
Understanding digital identity is super important in our ever-connected world. Let’s dive into how we build and verify our identities online, and why keeping our privacy and security in check is essential.
Attestations
Next up, let's dive into attestations--essentially, how we can back up certain claims about who we are. We’ll explore the different types of attestations and what they do in various applications, so you’ll get a good understanding of how they function.
Wallets
Alright, let’s dive into wallets! These are super important for handling your digital assets. We'll explore the various types of wallets out there, how to use them effectively, and some handy tips to keep your assets safe and secure.
Get ready for some exciting conversations and fun activities that will make these concepts really come to life!
- Let's get those VCDM 2.0 issuer/verifier pipelines up and running with the Bitstring Status List! Make sure to set up the EAS schema registry and CI for any schema adjustments you need to make. Don't forget to connect zkEmail for those domain-scoped proofs (DKIM). And hey, while you're at it, add some passkey signers to your smart accounts and establish solid 7702 authorization guardrails. (w3.org)
- Here are some cool capabilities from our practice that you might find useful:
- Custom schemas designed to minimize PII, complete with JOSE/COSE signatures.
- Passkey-native AA modules and ERC-7902 features that help ensure cross-dapp compatibility. (eips.ethereum.org)
Week 4-5: Evidence Adapters (zkTLS/zkML) and Slashing
Weeks 4 and 5: All About Evidence Adapters
During Weeks 4 and 5, we're jumping into the fascinating world of evidence adapters, particularly zkTLS and zkML, and we'll also explore the idea of slashing. Let’s unpack this a little!
What are Evidence Adapters?
Evidence adapters play a vital role in boosting the security and efficiency of blockchain tech. They make it easier to validate transactions while keeping things both private and speedy.
- zkTLS: This one's focused on using zero-knowledge proofs in TLS (Transport Layer Security). In simple terms, it allows one party to show another that they know a secret, but without actually giving the secret away. It really ramps up privacy and security in communications.
- zkML: Now, zkML takes a different angle by diving into machine learning. It’s all about demonstrating that the computations were performed accurately, but without revealing any of the data used in the process. This is a total game-changer for keeping privacy intact in machine learning applications.
Why Slashing?
Slashing is a way to keep validators in a blockchain network on their best behavior. If a validator goes rogue or doesn’t do their job, they could end up losing part of their stake. Here’s the lowdown on how it all works:
- Promotes Positive Behavior: Validators are way less inclined to cheat or brush off their duties when they realize there’s a financial hit for any shady actions.
- Keeps the Network Safe: Slashing helps ensure that bad actors face consequences, which in turn keeps the network secure and reliable.
In Summary
As we dive into zkTLS and zkML over the next couple of weeks, we'll also chat about how slashing is super important for keeping our blockchain networks secure and trustworthy. These ideas not only boost performance but also make sure everyone involved plays by the rules for the benefit of the whole ecosystem.
Keep an eye out for more insights coming your way!
- Take a look at the zkTLS/TLSNotary adapters made for well-known payment platforms, including banks and PSPs. These adapters create EAS attestations featuring only the necessary details, while also keeping redacted proofs available for any audits that come up. For more info, check it out here.
- Check out the zkML verifiable inference pipeline! It’s all about handling model commits and input digest hashing. You can choose a zkVM--like RISC Zero or SP1--and pair it with CP‑SNARK for that commit-and-prove process. Plus, you can implement some economic penalties (think slashing or a soft-ban) for any invalid proofs that pop up. And if you’re looking to take it a step further, there’s an option to integrate with EigenLayer for those AVS‑secured services. Want more info? You can find it here.
Week 6-8: Scoring, Decay, and Dashboards
During weeks 6 to 8, we’re going to explore some really interesting concepts that are key to getting a grip on data and analytics. Here’s a quick rundown:
Scoring
Understanding Scoring
Scoring is really about giving different values to various parts of your data. It’s super helpful when you’re looking at customer behavior or checking how well your marketing campaigns are performing. With scoring, you can actually put numbers to your success. Here are a few important things to remember:
- Why Scoring Matters: It's all about figuring out which leads to focus on and understanding how engaged your customers are.
- Different Kinds of Scores: Scores can vary from straightforward numbers to more intricate algorithms that crunch a lot of data.
- Putting Scores to Work: Use these scores in your decision-making to help you take action and move things forward.
Decay
Next up is decay--this is super important for grasping how data can lose its relevance as time goes on. Here’s the scoop:
- What is Decay?: Think of it as the natural decline in the value or accuracy of your data over time.
- Importance: This is why it’s super important to keep your data sets updated regularly to maintain their accuracy.
- Managing Decay: Use some solid strategies to refresh your data and keep it fresh and relevant.
Dashboards
Now, let’s dive into dashboards. Think of them as your very own control center for keeping an eye on crucial metrics in real-time. Here’s how to really make the most of them:
- Customization: Make your dashboard your own by zeroing in on the KPIs that are really important to you.
- Visualize Data: Leverage charts and graphs to easily catch trends and insights at a glance.
- Integrate Tools: Link different data sources together to get a complete picture of your performance.
By the time we wrap up these weeks, you'll really understand scoring, decay, and dashboards, giving you the tools to use data effectively. Enjoy the learning journey!
- Scoring: We focus on weighted attestations--which really comes down to how much we trust the issuer--along with proof strength, like those fancy zk types, and we pay attention to how fresh the data is. We let older signals kind of drift away over time while keeping a snapshot for reproducibility.
- Dashboards: Our dashboards are designed for easy access to all the crucial info. You’ll find everything you need, from attestation coverage and proof SLOs to disputes and policy exceptions. And don’t worry, it all aligns with what the AI Act and M-25-22 expect. Check it all out here: digital-strategy.ec.europa.eu
Implementation Details You’ll Care About
Here’s a quick overview of the important implementation details you’ll want to remember. These points are essential for making sure everything goes off without a hitch.
1. Setup Steps
Alright, let’s dive into how to get everything set up:
- Install Dependencies: First things first, let’s get all the required packages sorted out. You can quickly install them with the following command:
npm install - Configuration: Make sure you set up your configuration files the right way! Go ahead and tweak
config.jsonso it reflects your environment.
2. Code Structure
Getting a grip on how the code is laid out can really save you a lot of time. Here’s the breakdown:
- src/: This folder holds all your source files.
- tests/: In this section, you’ll discover all the test cases that help make sure everything’s running smoothly.
3. Key Functions
You’re going to be using these functions a lot, so let’s get you comfortable with them:
initialize(): This one gets everything rolling.startProcess(): Here’s where the main action happens.shutdown(): This function wraps things up and tidies up any resources when you’re finished.
4. Error Handling
It’s really crucial to manage errors smoothly. Make sure you wrap your code in try-catch blocks when necessary. Check out this straightforward example:
try {
startProcess();
} catch (error) {
console.error("Oops! Something went wrong:", error);
}
5. Performance Tips
Stay on top of your performance with these useful tips:
- Make the most of caching to give your app a nice speed boost.
- Keep track of memory usage so your app stays efficient and runs smoothly.
6. Deployment
Ready to Go Live? Here’s What You Need to Know:
- Use Docker to create containers that help keep your app portable and easy to manage.
- Make sure you’ve got a robust CI/CD pipeline ready to go for hassle-free deployments.
Keeping these details in mind will definitely help make your implementation process smoother and more enjoyable. Happy coding!
- On-chain footprint:
- When we're talking about EAS attestations, we typically see gas usage hovering around 60,000 to 120,000 per attestation on L2. To keep those verification costs nice and low, we lean on precompiles (like BN254/BLS12‑381) for proofs when it makes sense. (panewslab.com)
- For Semaphore proof verification, there’s a set gas cost. We batch submit through a relayer and recycle group roots to help keep those expenses in check. (docs.semaphore.pse.dev)
- Cross-chain:
- We tie the agent's long-term DID and EAS attestation IDs to their reputation. Each AA account across various chains is linked via EIP‑712 domain separation. When needed, we incorporate 7702 authorization provenance to steer clear of any replay issues. Plus, with composite EIP‑712 signatures (ERC‑7920), we can tidy up multiple message approvals into one sleek signature during off-chain workflows. (eip.info)
- Security hardening:
- The correctness of zkVM is always a work in progress, and we're excited to see new formal methods and specialized fuzzing techniques for zkVMs coming into play. We also mix in some Arguzz-style testing whenever it makes sense and stay on top of vendor audits. (arxiv.org)
- As we see advancements in AA stacks, we make it a point to pin EntryPoint versions, double-check paymaster policies, and set up a 7702 “auth density” alert. This way, we can quickly catch any phishing attempts reported after Pectra. (hackmd.io)
Why Now is the Right Time
There’s no doubt about it--timing is key! If you’ve been thinking about whether now is the right time to make a move, I’ve got good news for you: it just might be! Here are a few reasons why you should think about diving in now.
1. Market Trends are Favorable
The market's looking pretty promising at the moment! With interest rates staying low, now's a great chance for you to take advantage before they start climbing again.
2. Increased Demand
There's definitely been a spike in demand across different sectors lately. If you've been contemplating launching a product or service, now's a great time--people are eager to get involved!
3. Supportive Community
Now, more than ever, there's a fantastic network of resources and communities out there just waiting to help you out. Consider checking out various groups, forums, and social media platforms where you can link up with folks who think like you do. They can offer valuable advice and support!
4. Technological Advancements
Technology is moving faster than ever, and taking advantage of the latest tools can really set you apart. From using analytics to make smarter decisions to tapping into social media for a broader reach, there are so many possibilities out there.
5. Personal Ready-Set-Go
Hey there! Don't forget about yourself! If you're feeling pumped and ready to tackle new challenges, that's a big win. Your excitement can really spread, and it’s just what you need to jumpstart your journey.
Next Steps
What’s next on your to-do list? Here’s a handy little rundown to kick things off:
- Research: Take some time to explore today’s market trends.
- Network: Touch base with your contacts and broaden your network.
- Plan: Jot down your goals and the steps you'll take to reach them.
- Act: Don’t get stuck in your head--just go for it!
In a nutshell, it looks like the stars are lining up in your favor at the moment. So, go ahead and ride that wave of good vibes and see where it leads you!
- The standards have finally caught up with the times! VCDM 2.0 is now officially a W3C Recommendation, and Ethereum's Account Abstraction is killing it with 4337 and 7702. On top of that, EAS and Semaphore are live and doing great, backed by some solid audits. (w3.org)
- ZK performance is finally set for real-world business applications! With the help of zkVMs, CP-SNARKs, and awesome compiler tools like zkPyTorch, we've taken inference proofs from a neat concept to something we can actually use in asynchronous operations. Check it out here: (iacr.org)
- Regulators are really starting to crack down on timing. The EU AI Act is set to kick in with its transparency and logging requirements come August 2026, and over in the U.S., the OMB M-25-22 is pushing for standardized, performance-based AI acquisitions this fiscal year. So, it’s a smart move to start developing your proof-carrying telemetry now to avoid any surprises during RFPs. (digital-strategy.ec.europa.eu)
Where 7Block Labs Fits--and How to Start This Month
So, you're curious about how 7Block Labs fits into the grand scheme of things, huh? Let’s dive in and get you up to speed this month!
What is 7Block Labs?
Welcome to 7Block Labs
At 7Block Labs, we're all about shaking things up and working together. We love bringing together talented individuals to create innovative solutions in the blockchain world. If you’re excited about technology and eager to jump into some game-changing projects, you’ve landed in the perfect spot!
Why Join 7Block Labs?
Here’s the scoop:
- Networking Opportunities: Connect with fellow enthusiasts who are just as passionate about your interests as you are.
- Hands-On Experience: Dive into exciting projects that are really making a difference in the industry.
- Access to Resources: Unlock a treasure trove of knowledge, tools, and support designed to spark your creativity and motivation.
How to Start This Month
Ready to dive in? Here’s a simple guide to help you get started:
- Sign Up: Just pop over to our website and set up your account. It’s a breeze!
- Join the Community: Come hang out with us on our Discord server! It's a great place to meet other members and keep up with all the latest news.
- Join Us for Workshops: Don’t forget to check out our upcoming workshops and webinars. They’re fantastic opportunities to learn something new and connect with others!
- Start a Project: Have an idea that's been rattling around in your head? Don’t hold back--pitch it! We're totally here to back creative projects.
- Stay Engaged: Keep in touch with us on social media for the latest updates, helpful tips, and a sprinkle of inspiration! You can find us on Twitter and LinkedIn.
Final Thoughts
Diving into 7Block Labs can really kickstart your journey and unlock a ton of opportunities! So why not jump in this month and be part of something awesome? If you’ve got any questions at all, just give us a shout. We can’t wait to see what you’ll come up with!
- Architecture and Delivery: We're all about blending protocol engineering--think Solidity, zk circuits, and Account Abstraction--with identity solutions like VCDM 2.0/EAS, plus product telemetry. Our goal? To link cryptography with real-world procurement outcomes.
- Here’s what we can offer you right now:
- Jump into the world of Web3 and AA engineering with our awesome web3 development services and tailor-made custom blockchain development services.
- Ensure your circuits are solid with our reliable security audit services for some peace of mind.
- Discover cross-chain messaging and reputation portability with our super handy blockchain integration and cross-chain solutions development.
- Take a look at our production-ready proof-emitting contracts in our smart contract development and explore privacy-preserving agent logic with our innovative dApp development.
- Identity: The agent holds a VCDM 2.0 credential from a trustworthy issuer that clearly says “Background check passed (yes/no)”, plus a Bitstring Status List for revocation. They can provide a Verifiable Presentation that shows “yes”, but they don’t disclose any names or dates of birth. (w3.org)
- Wallet: The agent uses a smart account secured by a passkey. When it comes to a particular task, they trigger an EIP‑7702 transaction that connects to a “TaskPolicy” module. This setup allows for a single contract call and caps the spending at $50, which is then documented as an EAS attestation. (eips.ethereum.org)
- Work proof: To show that the payment was successfully processed, the agent taps into zkTLS. This process involves putting together a transcript of the HTTPS session from the bank's portal, which then leads to an EAS attestation that contains only the date/time and the amount bucket. (fosdem.org)
- Output proof: The agent hands over an inference receipt that includes the model commit, input hash, and output hash, along with a zkVM proof. The verifier takes care of checking everything on-chain. If any issues pop up, they get sent straight to an async re-prove window. (panewslab.com)
- Reputation update: So, the agent’s score will gradually get better, but watch out--if they break any rules, like overspending or not providing the right proof, their score can take a hit. This not only reduces their bond but also leads to a negative report, making it easy for consumers to sift through agents. And here’s the kicker: if the task depends on an AVS, any slip-ups could come with a financial penalty thanks to EigenLayer slashing. (coindesk.com)
Risks and How We Manage Them
When you're diving into any project, you've got to be aware that potential risks are always hanging around. But no need to stress--we've got some great strategies to face them straight on. Let’s unpack this:
Identifying Risks
First up, let’s identify the risks that might throw a wrench in our plans. Here are a few common types to keep an eye on:
- Financial Risks: You know, those pesky budget overruns or surprise costs that pop up.
- Operational Risks: Issues with our processes or systems that might put a wrench in the works.
- Compliance Risks: The chance of not keeping up with regulations or laws.
- Reputational Risks: Anything that might hurt our reputation and how people see us.
Getting a grip on these risks is just the first step, though.
Mitigation Strategies
Once we’ve pinpointed the risks, it's time to pull out our toolbox of strategies to tackle them. Here’s the game plan:
- Risk Assessment: We’re always on the lookout for potential risks, regularly checking in to spot any new ones that might pop up.
- Contingency Plans: With backup plans ready to go, we can stay calm and collected when unexpected situations arise.
- Communication: Keeping everyone updated is key! It helps make sure we’re all aligned and ready to respond swiftly together.
- Training and Development: By giving our team the tools and skills they need, we not only reduce risks but also boost their confidence on the job.
- Monitoring and Reporting: We rely on tracking tools to keep an eye on risk levels and update everyone with any changes that come our way.
Conclusion
At the end of the day, every project comes with its own set of risks. But by staying proactive and ready for anything, we can handle those bumps in the road like pros. Keeping our eyes peeled, chatting openly, and having a solid game plan can really turn things around!
- zkVM soundness bugs: We’re all about supporting projects that have solid roadmaps and rigorous independent testing--just like the issues we found with Arguzz. Before launching anything, we make sure we’ve got reproducible test vectors and perform checks on the circuit while it’s running. Take a look here: (arxiv.org).
- 7702 phishing: We’ve rolled out a passkey confirmation process, and you can now see the authorization list right in the wallet UI. If we detect any weird activity from an agent or notice that the domain origins don’t match, we’ll trigger alerts. For more details, check this out: (hackmd.io).
- Chain events: If a network hits a snag or forks, we make sure to keep reputations safe through off-chain VCs and cross-chain EAS mirrors. We avoid getting stuck with a single-chain lock-in, especially since interruptions can happen. Want to dive deeper? Check this out: (cointelegraph.com).
What You Should Do This Week
Weekly Game Plan
Alright, here’s the lowdown for your week ahead!
Monday
- Morning: Kick things off with a 30-minute jog or a brisk walk. It’s a great way to wake up your body and clear your mind.
- Afternoon: Get into your work tasks. Focus on completing that report by 3 PM.
- Evening: Wind down with a good book or catch up on your favorite show.
Tuesday
- Morning: Don’t forget to hit the gym! Try that new strength training class.
- Afternoon: Attend the team meeting at 2 PM--bring your ideas!
- Evening: Experiment with a new recipe for dinner, maybe something from this site.
Wednesday
- Morning: Take it easy today. How about some yoga to recharge?
- Afternoon: Dive into project planning. It’ll help keep everything on track.
- Evening: Movie night! Grab your favorite snacks and pick a flick.
Thursday
- Morning: Go for a quick breakfast at that café you love.
- Afternoon: Finish up that presentation for Friday’s meeting. You got this!
- Evening: Catch up with a friend or family member over the phone or in person.
Friday
- Morning: It’s almost the weekend! Take a moment to appreciate how far you’ve come this week.
- Afternoon: Present your project to the team--rock it!
- Evening: Celebrate the end of the week with a little treat or a fun outing.
Saturday
- Morning: Sleep in a bit! You’ve earned it.
- Afternoon: Get outside and enjoy some fresh air--maybe go for a hike or visit a local park.
- Evening: Game night with friends or family!
Sunday
- Morning: Take some time for yourself. Meditate or journal about the week gone by.
- Afternoon: Prep meals for the upcoming week; it makes life a lot easier.
- Evening: Relax and prepare for what’s ahead. Maybe pick out your outfit for Monday.
Remember:
Staying organized is key. If you want to jot down notes or ideas, feel free to use this template to help you out!
Stay focused and enjoy the week!
1. Set Your Goals
Take a moment to reflect on what you want to accomplish this week. It could be something for work or something personal--just write it down. When your goals are clear, it’s way easier to stay focused.
2. Make a To-Do List
After you’ve nailed down your goals, it’s time to whip up a to-do list. Take those goals and chop them into bite-sized tasks that feel doable. And hey, don’t forget to rank those tasks in order of importance! You can totally go with apps like Todoist for some digital help, or keep it classic with a trusty notebook.
3. Schedule Your Time
Alright, you’ve got your tasks all set, so it’s time to pencil them into your calendar. Make sure to carve out specific time slots for each task. This handy tip will help keep you accountable and ensure you stay on the right path.
4. Stay Active
Don’t let your week turn into a total couch potato fest! Make sure to sneak in some exercise. Whether you’re going for a stroll, doing some yoga, or hitting the gym, getting your body moving can really amp up your energy levels.
5. Connect with Others
Drop a quick text or give a call to your friends or colleagues this week. It could really brighten both your day and theirs! Plus, it’s a nice way to keep those connections alive.
6. Reflect
At the end of the week, take a little time to think about what you've achieved. What went smoothly? What could have been improved? Reflecting on these things will help you tweak your game plan for the upcoming week.
7. Treat Yourself
Lastly, make sure to treat yourself for all that hard work! Whether it’s indulging in your favorite snack, enjoying a cozy movie night, or just taking some time to relax, you totally deserve it!
Wishing you a fabulous week ahead!
- First off, take a moment to think about what you’re asking those anonymous agents to "prove." For each claim you make, decide whether you need them to just give an attestation (EAS), show up in person (VC/VP), or actually prove it (zkTLS/zkML). And if you have any screenshots or API tokens lying around, make sure you’ve got a solid plan to get rid of them when you're done.
- Next, figure out your AA route: are you going with just 4337, just 7702, or a mix of both? If you’re aiming for address continuity and want a smooth user experience, you might want to favor 7702, especially if you can back it up with some strong authorization governance and logging. Check it out here: (eips.ethereum.org).
- Lastly, think about forming a schema working group. Keep in mind, it’s not only about the code. Having solid schema governance--like knowing who owns what, who’s reviewing it, and how you’ll handle deprecations--is crucial. It keeps everything in line, avoids reputation hiccups, and makes sure your auditors are smiling.
Personalized CTA
Creating a personalized Call to Action (CTA) can truly catch your audience's eye and inspire them to take that next step. Here’s how to whip one up that really hits home:
Understand Your Audience
First things first, get a good grasp of who you're chatting with. What do they care about? What do they need? What’s bothering them? The more you know, the better you can shape your message to resonate with them.
Use Their Name
Nothing quite matches the warmth of using someone's name. When you're shooting off an email or a message, toss in their name--it's like giving them a little friendly nudge!
Customize Your Message
Make your CTA resonate with your audience's experience. Swap out a plain “Sign up now!” for something more engaging, like “Join our community of fellow explorers!”
Add a Dash of Urgency
To get people moving, it's all about creating that sense of urgency. Try using catchy phrases like “Limited spots available!” or “Register by Friday to snag an exclusive bonus!” These little prompts can really motivate quick action.
Keep it Short and Sweet
Make sure your CTA is straightforward and to the point. No need to make them overthink it--just say what you mean. For instance: “Grab your free trial today!”
Test and Tweak
Feel free to experiment with different versions of your CTA. A/B testing is a great way to find out what really resonates, so keep tweaking until you find that perfect fit!
Conclusion
Personalizing your CTA goes way beyond just throwing in their name or creating a sense of urgency. It’s all about forming a real connection with your audience. When people feel like you truly get them, they’re way more inclined to take that next step. So, why not dive in and start creating your own personalized CTA today?
If you’re leading Platform Integrity or Procurement for an agent marketplace, L2, or the 2026 federal AI pilot, we’ve got your back in getting your proof-carrying reputation polished up in just 10 business days. Here’s what we need from you:
- When are you aiming to go live? Think something like May 15, 2026, to be ready for transparency.
- What are the top five claims you’d like agents to back up? For instance, you could consider "payment complete," "model integrity," or "background check: yes/no."
- Which chain(s) do you prefer?
Once we’ve got everything sorted, we’ll reach out with a tailored PCR architecture, a collection of EAS/VC schemas, and a thorough delivery plan that aligns perfectly with the M-25-22 performance metrics. That way, your CFO, CISO, and contracting officer will be able to give it a big thumbs-up on their first look. You can find more details here.
Appendix: Reference Links for Your Internal Memo
Check out these useful links that you’ll definitely want to add to your internal memo:
- Company Policies
- Employee Handbook
- Internal Communication Guidelines
- Project Management Tool
- HR Contact Information
Be sure to check these out--they’ll provide you with the info you need to stay on top of everything!
- The VCDM 2.0 Recommendation is out and covers key areas like Data Integrity, JOSE/COSE, and the Bitstring Status List. You can check it out here: (w3.org).
- If you're curious about EIP‑7702, it dives into the Set Code for EOAs and shares some insights on the ecosystem and ERC‑7902 capabilities. Take a closer look here: (eips.ethereum.org).
- Stay in the loop with the latest network-wide attestation counts right from the EAS main site. Check it out here: (attest.org).
- Don’t miss the Semaphore v4 docs! They’ve got some intriguing research notes on nullifiers, dynamic depth, and the de-anonymization circuit. Find all the info here: (docs.semaphore.pse.dev).
- Interested in the zkEmail DKIM architecture and an overview of zkTLS/TLSNotary? FOSDEM 2026 has got you covered. Dive into it here: (docs.zk.email).
- There’s some exciting news in zkVM and zkML performance and security with RISC Zero 2.0, Artemis CP‑SNARKs, Arguzz testing, and the zkPyTorch compiler. Get the full scoop here: (panewslab.com).
- EigenLayer is launching its slashing feature in April 2025. Want to know more? Get the details here: (coindesk.com).
- Keep an eye on the EU AI Act's phasing, including transparency and logging dates, and check out the U.S. OMB M‑25‑22 procurement details. You can read up on it here: (digital-strategy.ec.europa.eu).
Related 7Block Labs Services
Take a quick peek at the services provided by 7Block Labs that could be just what you’re looking for:
- Blockchain Development: We’re all in when it comes to crafting strong and scalable blockchain solutions that fit your unique needs. Whether you’re looking to build something new from scratch or improve what you already have, we’re here to help!
- Smart Contract Audits: Safety is our top priority! Our team dives deep into smart contracts to make sure they’re secure and doing exactly what they’re meant to do. We’re here to help you steer clear of those expensive bugs and vulnerabilities.
- Token Creation: Looking to create a custom token? We've got your back! We specialize in designing, developing, and launching tokens that fit perfectly into your ecosystem.
- Decentralized Finance (DeFi) Solutions: Jump into the DeFi space with our expert help! Whether you need protocol development or liquidity solutions, we've got you covered.
- Consulting Services: Feeling a bit lost in the blockchain world? No worries! Our consulting services are designed to guide you through the complexities. We’ll share insights and strategies that are crafted specifically for your needs.
- Education & Training: Looking to boost your skills? We’ve got some awesome workshops and training sessions lined up to help you get the know-how you need in the blockchain world.
If you’re interested in any of these services or have any questions, don’t hesitate to get in touch!
- Dive into our custom blockchain development services and get that proof layer up and running with our fantastic smart contract development. Want to connect different chains? We've got you covered with our cross‑chain solutions and top-notch blockchain integration. And for a little extra peace of mind, make sure to check out our security audit services!
Like what you're reading? Let's build together.
Get a free 30-minute consultation with our engineering team.
Related Posts
ByAUJay
Building Supply Chain Trackers for Luxury Goods: A Step-by-Step Guide
How to Create Supply Chain Trackers for Luxury Goods
ByAUJay
Building 'Private Social Networks' with Onchain Keys
Creating Private Social Networks with Onchain Keys
ByAUJay
Tokenizing Intellectual Property for AI Models: A Simple Guide
## How to Tokenize “Intellectual Property” for AI Models ### Summary: A lot of AI teams struggle to show what their models have been trained on or what licenses they comply with. With the EU AI Act set to kick in by 2026 and new publisher standards like RSL 1.0 making things more transparent, it's becoming more crucial than ever to get this right.

