Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
TV & Film
History
Technology
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/d4/02/a5/d402a5ab-7153-7db9-2476-2ed742ba4577/mza_13277582984184660621.jpg/600x600bb.jpg
Blackbox Podcast
Blackbox Podcast
7 episodes
1 week ago
The Blackbox Podcast is where builders of the future come to talk shop — no fluff, no hype, just real technical insight. Whether you’re a solo creator, startup innovator, or enterprise architect, we want your perspective on the systems shaping confidential computing and SAFE AGI. Each episode dives into the architectures that matter — from TEE CPU/GPU deployments (SGX, TDX, SEV, etc.) to Zero Trust frameworks and privacy-first design principles. We’re here to explore how these technologies actually work in practice, and to spotlight the visions driving them forward.
Show more...
Technology
RSS
All content for Blackbox Podcast is the property of Blackbox Podcast and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
The Blackbox Podcast is where builders of the future come to talk shop — no fluff, no hype, just real technical insight. Whether you’re a solo creator, startup innovator, or enterprise architect, we want your perspective on the systems shaping confidential computing and SAFE AGI. Each episode dives into the architectures that matter — from TEE CPU/GPU deployments (SGX, TDX, SEV, etc.) to Zero Trust frameworks and privacy-first design principles. We’re here to explore how these technologies actually work in practice, and to spotlight the visions driving them forward.
Show more...
Technology
Episodes (7/7)
Blackbox Podcast
E07 — Peyman Momeni: Confidential Intents & DeFi’s Trust Layer

In E07 — Peyman Momeni: Confidential Intents & DeFi’s Trust Layer, Dylan sits down with Peyman Momeni, CEO & Founder of Fairblock, to ask what happens if crypto doesn’t have to be an open book. Today’s stablecoins leak salaries, treasury moves, and trading strategies to anyone watching the chain. Peyman explains how Fairblock uses confidential stablecoins and confidential intents so amounts and orders stay encrypted while the network can still verify that every rule was followed. (docs.fairblock.network)

They walk through how Fairblock’s stack—homomorphic encryption plus threshold identity-based encryption and conditional decryption—enables pre-execution privacy, sealed auctions, and protected trading, without handing control back to a centralized middleman. (docs.fairblock.network) The conversation also looks ahead to AI agents routing orders on-chain, the role of TEEs and Phala’s dstack as an “anti-hack” trust layer, and why programmable privacy is becoming table stakes for serious DeFi and institutional flows. (fairblock.network)

In this episode, we cover:

  • What confidential intents are, and how conditional decryption lets you plan and execute trades privately, then reveal only what’s needed to prove they were valid. (docs.fairblock.network)

  • How confidential stablecoins encrypt amounts and balances while keeping addresses auditable for compliance and reporting. (docs.fairblock.network)

  • Sealed, leaderless auctions that use Fairblock’s FairyRing chain to cut slippage and MEV without losing verifiability. (docs.fairblock.network)

  • The growing set of Fairblock cApps across stablecoins, protected trading, and confidential AI data markets. (fairblock.network)

  • Why DeFi AI agents need hardware-backed guarantees, and how Phala + dstack provide verifiable confidential compute as the trust layer underneath. (phala.com)

Links & resources:

  • Fairblock – encrypted stablecoins & protected trading:
    https://www.fairblock.network/ (fairblock.network)

  • Fairblock docs hub:
    https://docs.fairblock.network/ (docs.fairblock.network)

  • Confidential Stablecoins (Stabletrust):
    https://docs.fairblock.network/docs/ConfidentialStablecoins (docs.fairblock.network)

  • Fairblock & cryptography (HE, tIBE, conditional decryption):
    https://docs.fairblock.network/docs/learn/Fairblock%20and%20Cryptography (docs.fairblock.network)

  • Sealed-bid, leaderless auctions:
    https://docs.fairblock.network/docs/build/Arbitrum/sealedbid_auction (docs.fairblock.network)

  • Phala dstack – confidential AI & TEE orchestration:
    https://phala.com/dstack (phala.com)

  • dstack docs overview:
    https://docs.phala.com/dstack/overview (docs.phala.com)

To apply as a guest—or bring your team on to talk AI, privacy, or confidential systems—visit https://blackboxpodcast.com, fill out the form, and leave your best contact so the Blackbox media team can follow up with pre-interview questions.

Show more...
1 month ago
1 hour 18 minutes 9 seconds

Blackbox Podcast
E06 with Jens Groth: Scaling Zero-Knowledge Proofs with Instruction Sorting

In this episode, Dylan sat down with Jens Groth (pronounced “Yens”)—Chief Scientist at Nexus, creator of the Groth16 SNARK—to map how verifiable computation reaches internet scale. We unpack Nexus’s zkVM (RISC-V), its distributed prover network (orchestrator + workers) for low-latency proving, and why proofs-of-proofs are the practical path to tiny, fast-verifying artifacts. Jens explains the coming shift to instruction sorting—bucketing additions/XORs/etc. to cut redundant constraints—and where privacy fits when you parallelize proving. We also compare ZK vs TEE vs FHE in real systems, talk formal verification on the verifier path, and preview Nexus’s L1 that makes proofs first-class citizens for DeFi and beyond.

  • How a zkVM compiles, executes, and emits an extended witness + proof—and what the verifier actually checks.

  • Why a centralized orchestrator plus many workers wins on latency today, and where that clashes with privacy.

  • The real trade-offs between TEEs (TDX/SEV) for speed, ZK for public verifiability, and FHE/MPC for data-in-use privacy.

  • Instruction sorting: reordering the execution trace into per-op buckets to shrink constraints—an orders-of-magnitude lever when combined with proof composition.

  • What “maturity” looks like in ZK stacks: open source, audits, formal verification for verifiers, supply-chain discipline, and reproducible builds.

  • Nexus — zkVM v3 overview, distributed prover network, and blog updates:
    https://specification.nexus.xyz/ • https://docs.nexus.xyz/zkvm • https://blog.nexus.xyz/nexus-zkvm-3/ • https://blog.nexus.xyz/nexus-launches-worlds-first-open-prover-network/

  • Phala Network docs — confidential computing stack & TDX direction:
    https://docs.phala.com/overview/phala-network

  • dstack-TEE — builder notes for attested, policy-driven confidential compute:
    https://phalanetwork.mintlify.app/docs/overview/what-is-dstack

  • RISC-V ISA resources (for how zkVMs model CPU steps):
    https://riscv.org/specifications/ratified/

  • STARK proving system background (why many zk stacks compose proofs):
    https://starkware.co/stark-101/ • https://starkware.co/stark/

If you’re building rollups, privacy-first apps, or just need verifiable backends, this one’s a blueprint: start efficient at the base proof, compose downward, verify in milliseconds, and use privacy where it truly survives distribution.

Show more...
2 months ago
1 hour 12 minutes 25 seconds

Blackbox Podcast
E05 with Blormmy: Private AI Agent for Finance

In this episode of Black Box, the discussion centers on Blormmy, an AI-powered wallet system that merges artificial intelligence, crypto infrastructure, and confidential computing. The conversation explores how Blormmy enables users to perform on-chain actions simply by expressing intent—transforming the wallet from a manual interface into an autonomous agent that acts securely on behalf of the user.The founders describe Blormmy as both infrastructure and application: a system where AI interprets user commands, determines the right blockchain actions, and executes them through smart wallets. The project aims to eliminate the friction and complexity of crypto interactions, replacing seed phrases, pop-ups, and manual signing with a conversational interface that feels natural and intuitive.Blormmy is built on Solana and uses Phala Network’s confidential computing stack for deterministic key generation. Through CrossMint’s smart wallet integration, users can onboard with just an email and delegate actions to the AI agent, which operates within strict, user-defined parameters like spending caps or session limits. This combination of autonomy and control forms the foundation of Blormmy’s security model. The result is a wallet that behaves more like an AI assistant—capable of executing swaps, bridging assets, or even buying real-world items such as Amazon products using stablecoins.Ultimately, Blormmy represents a broader vision for the future of Web3—where AI agents can autonomously perform blockchain state changes, making crypto accessible to anyone without the usual technical barriers.Blormmy Docs: https://docs.blormmy.comPhala Docs: https://docs.phala.com/?utm_source=phala.network&utm_medium=site-nav

Show more...
2 months ago
55 minutes 32 seconds

Blackbox Podcast
E04 with Andrew Miller: "Your Al is Weak, Until You Add Zero Trust."

This is the Blackbox Podcast — where we peel back the hidden layers of technology, society, and the human psyche to unravel the forces shaping confidential AI.


In this episode, host Dylan Kawalec sits down with researcher and entrepreneur Andrew Miller for a deep dive into confidential computing, trusted execution environments (TEEs), and the future of private AI.


Andrew has been at the forefront of cryptography and decentralized systems, from early Bitcoin scripting experiments to Ethereum, MPC, and zero-knowledge proofs. As a key architect behind Flashbots and dstack, he’s redefining how we think about secure, verifiable computation in a world where AI is becoming ever more powerful—and ever more in need of unbreakable safeguards.


Through the lens of auctions, Andrew explains how trust models evolve, why combining TEEs and MPC strengthens guarantees, and how confidential containers may become the new smart contracts. He then connects these ideas to AI, reputation, and agent-to-agent protocols—making the case for “prove what, not who” as a guiding principle for building trustworthy systems.


Along the way, he demos sandboxed TikTok sessions inside a TEE, critiques reputation models for autonomous agents, and explores how confidential compute enables rivals to collaborate securely through projects like BuilderNet—reshaping the future of decentralized infrastructure.


Now here is E04 of the Blackbox Podcast, hosted by Dylan Kawalec and brought to you by Phala Network.


Phala Docs: https://docs.phala.com/

Flashbots Docs: https://docs.flashbots.net

Show more...
3 months ago
1 hour 55 minutes 51 seconds

Blackbox Podcast
E03 with zkVerify: Proving the Prover

In this deep-dive episode, our host Dylan Kawalec sits down with Arman Aurobindo from zkVerify to explore the cutting-edge intersection of zero-knowledge proofs and trusted execution environments (TEEs).zkVerify handles verification for all major proof types (Groth16, RISC Zero, SP1) while eliminating the expensive 20-30% proof wrapping overhead and reducing verification costs by over 90% compared to native EVM verification. We dive into their integration with Phala's trusted execution environments and explore practical applications from ZK gaming to AI-powered DeFi trading agents.Arman explains why ZK proofs alone aren't enough for complete privacy, how TEEs fill the gaps, and their vision for bridging Web2 services with Web3 verification. We also discuss the future of ZK-AI applications, identity systems for underserved populations, and why the combination of ZK + TEE is the optimal approach for privacy-preserving applications.This conversation covers technical architecture, developer experience improvements, and the practical path to making privacy-preserving applications economically viable.Phala Docs: https://docs.phala.networkzkVerify Docs: https://docs.zkverify.io

Show more...
3 months ago
1 hour 17 minutes 38 seconds

Blackbox Podcast
E02 with Spout Finance: Coprocessing RWAs

In this episode of the Black Box Podcast, we dive into the architecture of private rails for real-world assets. Paul Mierlo, co-founder of Spout Finance, explains how corporate bond ETFs like LQD are mirrored on Ethereum as permissioned ERC-3643 tokens backed by on-chain identities.


We explore the full pipeline: identity verification, eligibility minting, permissioned tokens, encrypted order flow, and confidential settlement using Intel TDX. Paul breaks down why corporate bonds were chosen first, how proof-of-reserve and audits map to chain, and how CeFi liquidity can meet DeFi programmability—without leaking balances or order flow.


If you’re building private infrastructure for RWAs or curious how zero trust finance actually works, this episode offers a detailed look at the design choices shaping the next generation of financial rails.


Phala Docs: https://docs.phala.network

Spout Finance Docs: https://drive.google.com/file/d/1fklbqmZhgxzIzXN0aEjsf2NFat2QdpFp/view

Show more...
4 months ago
1 hour 13 minutes 39 seconds

Blackbox Podcast
E01 with Gaia: Building Privacy and Trust in AI

In this episode, we dive into the architecture of decentralized AI systems and what it takes to build privacy-preserving infrastructure at scale. Harish Kotra, Head of Developer Relations at Gaia Network, walks us through the technical pieces behind training safe AI—from vector databases and inference nodes to tool-calling and domain design. We explore why centralization creates risks for privacy, resilience, and developer autonomy, and how concepts like sovereignty, transparency, and accessibility shape the future of confidential AI.


Phala Docs: https://docs.phala.network

Gaia Docs: https://docs.gaianet.ai/?ref=blackboxpodcast

Run Gaia Nodes on Phala’s TEE: https://dev.to/gaiaai/running-gaia-ai-nodes-on-phalas-trusted-execution-environment-3cf2

Show more...
4 months ago
41 minutes 35 seconds

Blackbox Podcast
The Blackbox Podcast is where builders of the future come to talk shop — no fluff, no hype, just real technical insight. Whether you’re a solo creator, startup innovator, or enterprise architect, we want your perspective on the systems shaping confidential computing and SAFE AGI. Each episode dives into the architectures that matter — from TEE CPU/GPU deployments (SGX, TDX, SEV, etc.) to Zero Trust frameworks and privacy-first design principles. We’re here to explore how these technologies actually work in practice, and to spotlight the visions driving them forward.