ZK in Reclaim - an approximate explanation

Understanding ZK Proofs is not intuitive. I’ve explained how Reclaim Works to over a dozen people spending several hours each, to distill what actually clicks - so that you don’t have to sit through one of those sessions filled with banging heads on to the table. Note, this post deliberately provides incomplete or incorrect information - in the interest of appealing to intuition. For an accurate explanation refer the whitepaper...

July 14, 2023

Leapfrogging DAOs w/ Reclaim Protocol

DAOs - Decentralized Autonomous Organizations. A phrase that captures the imagination but, so far, lacks in delivery. Today’s DAOs are not living up to their full potential. They’re often imbalanced democracies, not the advanced, efficient entities we envisioned. But with the Reclaim Protocol, we’re on the cusp of a revolution. The success of traditional corporations lies in their ability to channel capital towards profit-making. However, the user experience, the very essence of their products, is often sacrificed on the altar of profits....

July 3, 2023

Casestudy: Blue tick for verified devs on Lens Protocol

On any social media it is hard to say whether the user is who they really claim to be. For example, a developer may say that they are one of the core contributors to the Aave Github repository and run a scam on social media. One option is for the social media website to ask users to login using Github on their app, use Github API show a blue tick next to the user if they are a core contributor on the repository they claim to be of....

April 25, 2023

Reclaim protocol ensures privacy

Reclaim Protocol can prove that a user opened a certain webpage and the said webpage had some information on it. For example, a user opens their bank account webpage and generates a proof of their bank balance as mentioned on the web page. There are two parts to opening a webpage. The request, and the response. User’s privacy needs to be maintained in the request as well as the response. This post is going to talk about how the request is validated yet keeping the request private....

April 18, 2023

Casestudy: Claim GSoC bounty using Reclaim Protocol

By @solvedbiscuit71 GSoC is an annual program sponsored by Google that offers a stipend to student who complete coding project for chosen open source organisation. At the end of the program, students present their completed project to the community and receive stipend for their contribution. A student becomes a contributor to an Open Source repository byt fixing issues and raising PRs. They then need to get the certificate and stipend for the contribution....

April 12, 2023

Casestudy : Verified YC Founders NFT Airdrop

Using Reclaim Protocol, YCombinator Alum DAO could airdrop NFTs and Tokens only to YC Alumni without needing any website or API change from YC. YC doesn’t have an API to authorize YC Alumni. So, for a DAO that is not directly affiliated to YC, how can it conduct an Airdrop only to YC Founders? Also, how can a YC Founder make sure that they cannot be left out of the airdrop because of censoring or a human error?...

April 3, 2023

What Is Reclaim Protocol

Reclaim Protocol unlocks unlimited possibilities by making HTTPS verifiable in zero knowledge. If you want to prove to me that you have more than a million dollars in your bank account, how would you do it? One option is you send me a screenshot. However, I cannot be sure that you didn’t morph the screenshot. The other option is for you to send me your username password and let me login and check your balance myself....

April 3, 2023