Skip to content

Commit abbd687

Browse files
committed
fix
1 parent 8c88d2a commit abbd687

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

src/pages/zktls-day/index.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ Talks will take place in the main stage room from **10:00 to 17:00**.
7171
| ----------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -------------------------- |
7272
| 09:30–10:00 | Doors open | |
7373
| 10:00–10:10 | Welcome | |
74-
| 10:10–10:50 | [zkTLS fundamentals](#zktls-fundamentals-sinu-tlsnotary) (Thomas, TLSNotary) | |
74+
| 10:10–10:50 | [zkTLS fundamentals](#zktls-fundamentals-thomas-tlsnotary) (Thomas, TLSNotary) | |
7575
| 10:50–11:00 | Workshops pitch | Workshop teams pitch |
7676
| 11:00–11:35 | [Building Online Trust, On-Chain](#building-online-trust-on-chain-maciek-kalka-vlayer) (Maciek Kalka, vlayer) | Workshops open |
7777
| 11:35–12:10 | [Cryptography of zkTLS](#cryptography-of-zktls-xiang-xie-primus-labs) (Xiang Xie, Primus Labs) | Workshops continue |
@@ -84,7 +84,7 @@ Talks will take place in the main stage room from **10:00 to 17:00**.
8484

8585
## Talk details
8686

87-
### zkTLS fundamentals (Sinu, TLSNotary)
87+
### zkTLS fundamentals (Thomas, TLSNotary)
8888
Start your zkTLS journey with a foundational session led by Thomas, a key contributor to EF's TLSNotary project.
8989
This talk traces the evolution of zkTLS and breaks down its core concepts, from proofs vs. attestations to the trade-offs between TEE-, proxy-, and MPC-based approaches.
9090
You’ll learn how different trust models, privacy techniques, and verification methods shape the landscape of zkTLS, and gain a clear understanding of the performance and security considerations behind each design.

0 commit comments

Comments
 (0)