<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>PODs and GPCs :: Unofficial EVE Frontier Development Notes</title>
    <link>https://f76f6398.frontier-scetrov-live.pages.dev/getting-started/pods/index.html</link>
    <description>Provable Object Datatypes (PODs) are a new approach to information hiding within EVE Frontier, along with General Purpose Circuits they provide ways to selectively reveal information to interested parties.&#xA;Creating and Verifying Pods Provable Object Datatypes (PODs) Tip Use the menu on the left hand side to find the article you are looking for. You can also use search at the top to search for specific terms.</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Wed, 30 Apr 2025 12:27:00 +0000</lastBuildDate>
    <atom:link href="https://f76f6398.frontier-scetrov-live.pages.dev/getting-started/pods/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Creating and Verifying Pods</title>
      <link>https://f76f6398.frontier-scetrov-live.pages.dev/getting-started/pods/pod-example/index.html</link>
      <pubDate>Wed, 30 Apr 2025 12:27:00 +0000</pubDate>
      <guid>https://f76f6398.frontier-scetrov-live.pages.dev/getting-started/pods/pod-example/index.html</guid>
      <description>CCP have provided an example for creating and verifying PODs. The below is a slight refinement of these examples I used to understand what was going on.&#xA;Prerequisites You will need to have setup your tools in line with Setting Up Your Tools from CCP, specifically you will need the following:&#xA;node v18 (earlier and later versions are not supported) pnpm v8 or v9 (later versions are likely to work but are untested) Check your versions with:</description>
    </item>
    <item>
      <title>Provable Object Datatypes (PODs)</title>
      <link>https://f76f6398.frontier-scetrov-live.pages.dev/getting-started/pods/provable-object-datatypes/index.html</link>
      <pubDate>Tue, 29 Apr 2025 15:14:04 +0000</pubDate>
      <guid>https://f76f6398.frontier-scetrov-live.pages.dev/getting-started/pods/provable-object-datatypes/index.html</guid>
      <description>Programmable Cryptography Traditionally we have used special-purpose cryptographic primitives to provide guarantees of specific qualities of a system or data:&#xA;Signatures guarantee the integrity of information emitted by a system, Bob can prove to Alice that the message was unchanged between it being signed and the signature verified. Encryption guarantees that a third party is unable to read information in transit, i.e. Alice is able to pass a message via Edgar to Bob; but Edgar is unable to read the message and Bob is. Authentication guarantees the authority of a system, i.e. Alice can prove to Bob that she isn’t being impersonated as it relates to non-repudiation. Programmable Cryptography is a wider technology movement that aims to provide general purpose cryptographic primitives that offer cryptographic guarantees unbounded by the limitations of special-purpose cryptography: Fully-homomorphic Encryption allows Alice to execute a program over Bob’s data without Alice learning anything about the content of the data or the output of the program. Multi-party computation allows Alice to execute a program over Bob, Charlie and David’s data without Alice learning anything about the content of the data, however Alice can see the output of the program. ZKSNARKs allows Alice to prove that a discrete unit of code was executed on some secret inputs without revealing anything about those inputs. Witness Encryption allows a message to be encrypted to a program (i.e. a bit of code). Obfuscation allows a program to be scrambled in such a way that it can still be executed but they can’t decompile the program to understand how it works or what it’s internal state is. Programmable Cryptography can be considered in a similar way to the transition from special-purpose integrated circuits for washing machines towards the use of the now ubiquitous 8086-compatible processors found in many modern appliances. PODs in EVE Frontier CCP have told us that Provable Object Datatypes within EVE Frontier can be used by both CCP by implementing well-known, to EVE Frontier, datatypes for interoperability. They are also available to 3rd-party developers to implement their own capabilities.</description>
    </item>
  </channel>
</rss>