Today the world has become heavily digital-first even as AI and AI-adjacent integrations impact all our interactions and experiences. Privacy and security concerns have become more pressing now than ever before. Among the emerging technologies that address and try to deal with all this, Zero-Knowledge Transport Layer Security or zkTLS has caught the attention. Let’s take a deep dive. What is zkTLS? As the name suggests this is a hybrid protocol combining two components: zk: Refers to one of the most popular and highly effective privacy-preserving technique in use in blockchain technology — zero-knowledge proofs (ZKPs). It is a cryptographic method involving two parties, where the prover convinces the verifier that a piece of information is known without having to reveal it. TLS: Refers to a critical part of HTTPS (Hypertext Transfer Protocol Secure) providing encryption and authentication mechanisms to secure data transmission between client and server. Fun fact: Not all implementations of TLS attestations use ZKPs as focus is on verifiability rather than mere privacy, but still the name zkTLS has etched its name as one of crypto’s newest privacy primitives. Bottomline: In tandem with confidential computing, zkTLS enables data provenance and encryption, even tapping into previously unusable data. Oasis, with a focused privacy-first approach and production-ready confidential EVM, Sapphire, has been working with leading zkTLS projects, including PoCs, e.g. onboarding Reclaim Protocol with its ecosystem. How zkTLS works? In simple terms, it allows a user or a server to demonstrate that data fetched via a TLS-secured connection, like an API call to a bank’s server, is authentic, and no extra information is exposed in the process. So, zkTLS will generate a proof like zk-SNARK confirming that data was fetched from a specific server (identified by its public key and domain) via a legitimate TLS session, without exposing the session key or plaintext data. The process flow is something like this: The client and the server connect over TLS (“TLS handshake”), establishing a secure session with encryption and server authentication. zkTLS captures session details (e.g., encrypted data and server certificate) and processes them in a zk-SNARK circuit tailored to TLS constraints. The circuit output will produce the proof verifying the data’s authenticity and source, keeping sensitive details hidden. This proof is recorded on a blockchain for decentralized verification. Let’s now take a quick look at the models. MPC-based Here, zkTLS modifies the standard TLS handshake by introducing a network of nodes that collaborate to produce a multi-party key replacing the browser-generated key. With browser consulting these nodes to generate a shared key through an MPC protocol, it is ensured no single party knows the entire key. The shared key is used for encrypting and decrypting requests and responses as the browser and all nodes cooperate on every instances of operation. This model enhances security but the the trade-off is networking complexity and overhead due to persistent node coordination. TEE-based Here, zkTLS leverages Trusted Execution Environments — tamper-proof secure enclaves within CPUs that act like a black box and can securely handle HTTPS requests. All sensitive data such as authentication tokens are encrypted and sent to the service provider’s TEE, where decryption happens internally without any exposure to the provider or external systems. The TEE logs in on behalf of the user and securely processes the response, providing cryptographic guarantees about the integrity of the request and response. This model is very efficient but the trade-off is dependency on TEE hardware and trust reliance on manufacturer security, e.g. Intel SGX or TDX. Proxy-based Here, zkTLS uses HTTPS proxies as intermediaries which forward encrypted traffic between the browser and the website, and then observe the data exchange. It is the proxy that provides attestations about the encrypted requests and responses, confirming they originated from the browser or the website. Finally, the browser generates a ZKP allowing decryption of the received data, and since the shared key is not revealed, privacy is ensured. This model eliminates the trade-offs of the other two models but has its own challenge — having to trust that the proxy is not malicious. Key takeaways of zkTLS zkTLS is a game-changer for web3 and its implications are best understood when we understand the two-pronged problem is solves. For a web2 user, HTTPS means there is end-to-end encryption. However, this isn’t provable. Also, TLS itself is unverifiable. And, no privacy is guaranteed. zkTLS brings verifiability to the table as the proof it generates validates the data or its origin and verifies the transfer. Another benefit of this technology is data privacy. To those who are thinking this is just like pulling API data and putting it on-chain, the distinction is tangible. APIs can be easily disabled, but with an ongoing HTTPS connection, zkTLS ensures continuous data access. Simply stated, this enables any web2 data to be used on a blockchain in a verifiable and permissionless way. Key use cases of zkTLS in crypto DeFi Lending Real world example: 3Jane Identity Verification Real world example: Nosh Privacy-Preserving Oracles Real world example: TLS Notary Verifiable Airdrops Real world example: ZKON Final word on zkTLS is that its design space is vast and full of potential as it evolves by solving current challenges like scalability, compatibility with varied web systems, and dependence on existing oracle networks. But the promise is real as indicated by the various real world examples, already in production with many more being explored. And the result we have been seeing and, as the space grows and evolves, look forward to gives hope that web2 — web3 interactions between the internet and the blockchain would also drive mass adoption. Resources: Oasis blog Reclaim blog Oasis x Reclaim Originally published at https://dev.to on September 23, 2025. Exploring zkTLS As A Way To Build A Verifiable and Private Web3 was originally published in Coinmonks on Medium, where people are continuing the conversation by highlighting and responding to this storyToday the world has become heavily digital-first even as AI and AI-adjacent integrations impact all our interactions and experiences. Privacy and security concerns have become more pressing now than ever before. Among the emerging technologies that address and try to deal with all this, Zero-Knowledge Transport Layer Security or zkTLS has caught the attention. Let’s take a deep dive. What is zkTLS? As the name suggests this is a hybrid protocol combining two components: zk: Refers to one of the most popular and highly effective privacy-preserving technique in use in blockchain technology — zero-knowledge proofs (ZKPs). It is a cryptographic method involving two parties, where the prover convinces the verifier that a piece of information is known without having to reveal it. TLS: Refers to a critical part of HTTPS (Hypertext Transfer Protocol Secure) providing encryption and authentication mechanisms to secure data transmission between client and server. Fun fact: Not all implementations of TLS attestations use ZKPs as focus is on verifiability rather than mere privacy, but still the name zkTLS has etched its name as one of crypto’s newest privacy primitives. Bottomline: In tandem with confidential computing, zkTLS enables data provenance and encryption, even tapping into previously unusable data. Oasis, with a focused privacy-first approach and production-ready confidential EVM, Sapphire, has been working with leading zkTLS projects, including PoCs, e.g. onboarding Reclaim Protocol with its ecosystem. How zkTLS works? In simple terms, it allows a user or a server to demonstrate that data fetched via a TLS-secured connection, like an API call to a bank’s server, is authentic, and no extra information is exposed in the process. So, zkTLS will generate a proof like zk-SNARK confirming that data was fetched from a specific server (identified by its public key and domain) via a legitimate TLS session, without exposing the session key or plaintext data. The process flow is something like this: The client and the server connect over TLS (“TLS handshake”), establishing a secure session with encryption and server authentication. zkTLS captures session details (e.g., encrypted data and server certificate) and processes them in a zk-SNARK circuit tailored to TLS constraints. The circuit output will produce the proof verifying the data’s authenticity and source, keeping sensitive details hidden. This proof is recorded on a blockchain for decentralized verification. Let’s now take a quick look at the models. MPC-based Here, zkTLS modifies the standard TLS handshake by introducing a network of nodes that collaborate to produce a multi-party key replacing the browser-generated key. With browser consulting these nodes to generate a shared key through an MPC protocol, it is ensured no single party knows the entire key. The shared key is used for encrypting and decrypting requests and responses as the browser and all nodes cooperate on every instances of operation. This model enhances security but the the trade-off is networking complexity and overhead due to persistent node coordination. TEE-based Here, zkTLS leverages Trusted Execution Environments — tamper-proof secure enclaves within CPUs that act like a black box and can securely handle HTTPS requests. All sensitive data such as authentication tokens are encrypted and sent to the service provider’s TEE, where decryption happens internally without any exposure to the provider or external systems. The TEE logs in on behalf of the user and securely processes the response, providing cryptographic guarantees about the integrity of the request and response. This model is very efficient but the trade-off is dependency on TEE hardware and trust reliance on manufacturer security, e.g. Intel SGX or TDX. Proxy-based Here, zkTLS uses HTTPS proxies as intermediaries which forward encrypted traffic between the browser and the website, and then observe the data exchange. It is the proxy that provides attestations about the encrypted requests and responses, confirming they originated from the browser or the website. Finally, the browser generates a ZKP allowing decryption of the received data, and since the shared key is not revealed, privacy is ensured. This model eliminates the trade-offs of the other two models but has its own challenge — having to trust that the proxy is not malicious. Key takeaways of zkTLS zkTLS is a game-changer for web3 and its implications are best understood when we understand the two-pronged problem is solves. For a web2 user, HTTPS means there is end-to-end encryption. However, this isn’t provable. Also, TLS itself is unverifiable. And, no privacy is guaranteed. zkTLS brings verifiability to the table as the proof it generates validates the data or its origin and verifies the transfer. Another benefit of this technology is data privacy. To those who are thinking this is just like pulling API data and putting it on-chain, the distinction is tangible. APIs can be easily disabled, but with an ongoing HTTPS connection, zkTLS ensures continuous data access. Simply stated, this enables any web2 data to be used on a blockchain in a verifiable and permissionless way. Key use cases of zkTLS in crypto DeFi Lending Real world example: 3Jane Identity Verification Real world example: Nosh Privacy-Preserving Oracles Real world example: TLS Notary Verifiable Airdrops Real world example: ZKON Final word on zkTLS is that its design space is vast and full of potential as it evolves by solving current challenges like scalability, compatibility with varied web systems, and dependence on existing oracle networks. But the promise is real as indicated by the various real world examples, already in production with many more being explored. And the result we have been seeing and, as the space grows and evolves, look forward to gives hope that web2 — web3 interactions between the internet and the blockchain would also drive mass adoption. Resources: Oasis blog Reclaim blog Oasis x Reclaim Originally published at https://dev.to on September 23, 2025. Exploring zkTLS As A Way To Build A Verifiable and Private Web3 was originally published in Coinmonks on Medium, where people are continuing the conversation by highlighting and responding to this story

Exploring zkTLS As A Way To Build A Verifiable and Private Web3

2025/09/24 15:45
5 min read

Today the world has become heavily digital-first even as AI and AI-adjacent integrations impact all our interactions and experiences. Privacy and security concerns have become more pressing now than ever before. Among the emerging technologies that address and try to deal with all this, Zero-Knowledge Transport Layer Security or zkTLS has caught the attention. Let’s take a deep dive.

What is zkTLS?

As the name suggests this is a hybrid protocol combining two components:

  • zk: Refers to one of the most popular and highly effective privacy-preserving technique in use in blockchain technology — zero-knowledge proofs (ZKPs). It is a cryptographic method involving two parties, where the prover convinces the verifier that a piece of information is known without having to reveal it.
  • TLS: Refers to a critical part of HTTPS (Hypertext Transfer Protocol Secure) providing encryption and authentication mechanisms to secure data transmission between client and server.

Fun fact: Not all implementations of TLS attestations use ZKPs as focus is on verifiability rather than mere privacy, but still the name zkTLS has etched its name as one of crypto’s newest privacy primitives.

Bottomline: In tandem with confidential computing, zkTLS enables data provenance and encryption, even tapping into previously unusable data.

Oasis, with a focused privacy-first approach and production-ready confidential EVM, Sapphire, has been working with leading zkTLS projects, including PoCs, e.g. onboarding Reclaim Protocol with its ecosystem.

How zkTLS works?

In simple terms, it allows a user or a server to demonstrate that data fetched via a TLS-secured connection, like an API call to a bank’s server, is authentic, and no extra information is exposed in the process. So, zkTLS will generate a proof like zk-SNARK confirming that data was fetched from a specific server (identified by its public key and domain) via a legitimate TLS session, without exposing the session key or plaintext data.

The process flow is something like this:

  1. The client and the server connect over TLS (“TLS handshake”), establishing a secure session with encryption and server authentication.
  2. zkTLS captures session details (e.g., encrypted data and server certificate) and processes them in a zk-SNARK circuit tailored to TLS constraints.
  3. The circuit output will produce the proof verifying the data’s authenticity and source, keeping sensitive details hidden.
  4. This proof is recorded on a blockchain for decentralized verification.

Let’s now take a quick look at the models.

MPC-based

Here, zkTLS modifies the standard TLS handshake by introducing a network of nodes that collaborate to produce a multi-party key replacing the browser-generated key.
With browser consulting these nodes to generate a shared key through an MPC protocol, it is ensured no single party knows the entire key. The shared key is used for encrypting and decrypting requests and responses as the browser and all nodes cooperate on every instances of operation.
This model enhances security but the the trade-off is networking complexity and overhead due to persistent node coordination.

TEE-based

Here, zkTLS leverages Trusted Execution Environments — tamper-proof secure enclaves within CPUs that act like a black box and can securely handle HTTPS requests.
All sensitive data such as authentication tokens are encrypted and sent to the service provider’s TEE, where decryption happens internally without any exposure to the provider or external systems.
The TEE logs in on behalf of the user and securely processes the response, providing cryptographic guarantees about the integrity of the request and response.
This model is very efficient but the trade-off is dependency on TEE hardware and trust reliance on manufacturer security, e.g. Intel SGX or TDX.

Proxy-based

Here, zkTLS uses HTTPS proxies as intermediaries which forward encrypted traffic between the browser and the website, and then observe the data exchange.
It is the proxy that provides attestations about the encrypted requests and responses, confirming they originated from the browser or the website.
Finally, the browser generates a ZKP allowing decryption of the received data, and since the shared key is not revealed, privacy is ensured.
This model eliminates the trade-offs of the other two models but has its own challenge — having to trust that the proxy is not malicious.

Key takeaways of zkTLS

zkTLS is a game-changer for web3 and its implications are best understood when we understand the two-pronged problem is solves.

For a web2 user, HTTPS means there is end-to-end encryption. However, this isn’t provable. Also, TLS itself is unverifiable. And, no privacy is guaranteed.

zkTLS brings verifiability to the table as the proof it generates validates the data or its origin and verifies the transfer. Another benefit of this technology is data privacy.

To those who are thinking this is just like pulling API data and putting it on-chain, the distinction is tangible. APIs can be easily disabled, but with an ongoing HTTPS connection, zkTLS ensures continuous data access. Simply stated, this enables any web2 data to be used on a blockchain in a verifiable and permissionless way.

Key use cases of zkTLS in crypto

  • DeFi Lending Real world example: 3Jane
  • Identity Verification Real world example: Nosh
  • Privacy-Preserving Oracles Real world example: TLS Notary
  • Verifiable Airdrops Real world example: ZKON

Final word on zkTLS is that its design space is vast and full of potential as it evolves by solving current challenges like scalability, compatibility with varied web systems, and dependence on existing oracle networks. But the promise is real as indicated by the various real world examples, already in production with many more being explored. And the result we have been seeing and, as the space grows and evolves, look forward to gives hope that web2 — web3 interactions between the internet and the blockchain would also drive mass adoption.

Resources:
Oasis blog
Reclaim blog
Oasis x Reclaim

Originally published at https://dev.to on September 23, 2025.


Exploring zkTLS As A Way To Build A Verifiable and Private Web3 was originally published in Coinmonks on Medium, where people are continuing the conversation by highlighting and responding to this story.

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Momentous Grayscale ETF: GDLC Fund’s Historic Conversion Set to Trade Tomorrow

Momentous Grayscale ETF: GDLC Fund’s Historic Conversion Set to Trade Tomorrow

BitcoinWorld Momentous Grayscale ETF: GDLC Fund’s Historic Conversion Set to Trade Tomorrow Get ready for a significant shift in the world of digital asset investing! A truly momentous event is unfolding as Grayscale’s Digital Large Cap Fund (GDLC) makes its highly anticipated transition into a spot crypto exchange-traded fund. This isn’t just a name change; it’s a pivotal moment for the broader cryptocurrency market, bringing a new era of accessibility and institutional participation through the Grayscale ETF. What’s Happening with the Grayscale ETF Conversion? Tomorrow marks a historic day for Grayscale’s Digital Large Cap Fund (GDLC). This existing spot crypto basket is officially scheduled to begin trading under its new identity: the Grayscale CoinDesk Crypto5 ETF. This exciting development comes directly after the U.S. Securities and Exchange Commission (SEC) gave its stamp of approval to Grayscale’s application for this conversion. As Bloomberg ETF analyst Eric Balchunas highlighted, this move has been keenly watched. The approval and subsequent launch underscore a growing acceptance of crypto-backed financial products within traditional markets. For investors, this conversion of the Grayscale ETF represents a more streamlined and regulated way to gain exposure to a diversified basket of large-cap digital assets. Why is the Grayscale ETF a Game-Changer for Investors? The conversion of GDLC into a Grayscale ETF offers several compelling benefits, fundamentally changing how investors can access the crypto market. Firstly, ETFs are known for their ease of trading. They can be bought and sold on traditional stock exchanges, just like company shares, making them incredibly accessible to a wider range of investors who might be hesitant to directly hold cryptocurrencies. Consider these key advantages: Enhanced Accessibility: Investors can gain exposure to a diversified crypto portfolio without needing to set up crypto wallets or manage private keys. Increased Liquidity: Trading on major exchanges typically means higher liquidity, allowing for easier entry and exit points. Regulatory Oversight: As an SEC-approved product, the Grayscale ETF operates under a regulated framework, potentially offering greater investor protection and confidence. Diversification: The Grayscale CoinDesk Crypto5 ETF tracks a basket of large-cap cryptocurrencies, offering immediate diversification rather than exposure to a single asset. This development is a strong indicator of the maturation of the digital asset space. It signals a bridge between the innovative world of crypto and the established financial system. Navigating the New Grayscale ETF Landscape While the launch of the Grayscale CoinDesk Crypto5 ETF brings exciting opportunities, it’s also important for investors to understand its implications. The shift from a closed-end fund structure (GDLC) to an open-ended ETF means that the fund’s shares can now be created and redeemed daily. This mechanism helps keep the ETF’s market price closely aligned with the net asset value (NAV) of its underlying holdings. Historically, closed-end funds like GDLC could trade at significant premiums or discounts to their NAV. The ETF structure is designed to mitigate these discrepancies, providing a more efficient pricing mechanism. This change offers a more transparent and potentially less volatile investment experience for those looking to invest in a Grayscale ETF. What’s Next for Crypto ETFs and Grayscale? The successful conversion and launch of the Grayscale CoinDesk Crypto5 ETF could pave the way for similar transformations of other Grayscale products. It also sets a precedent for how existing crypto investment vehicles might evolve to meet market demand for regulated, accessible products. The increasing number of spot crypto ETFs, including this new Grayscale ETF, reflects a growing institutional appetite for digital assets. This trend suggests a future where cryptocurrency investing becomes an even more integrated part of mainstream financial portfolios. As regulatory clarity continues to improve, we can anticipate further innovation and expansion in the crypto ETF landscape, offering investors diverse options to participate in the digital economy. The launch of the Grayscale CoinDesk Crypto5 ETF is more than just a new product; it’s a testament to the persistent efforts to bring digital assets into the mainstream financial fold. By offering a regulated, accessible, and diversified investment vehicle, Grayscale is not only expanding opportunities for investors but also reinforcing the legitimacy and staying power of the crypto market. This momentous step truly reshapes the investment landscape, making it easier for a broader audience to engage with the exciting potential of cryptocurrencies through a trusted Grayscale ETF. Frequently Asked Questions (FAQs) What is the Grayscale CoinDesk Crypto5 ETF? The Grayscale CoinDesk Crypto5 ETF is the new name and structure for Grayscale’s former Digital Large Cap Fund (GDLC). It’s a spot crypto basket that holds a diversified portfolio of large-cap digital assets, now trading as an exchange-traded fund. When will the Grayscale ETF begin trading? The Grayscale CoinDesk Crypto5 ETF is scheduled to begin trading tomorrow, following its approval by the U.S. Securities and Exchange Commission (SEC). How does an ETF differ from the previous GDLC fund? As an ETF, the fund’s shares can be created and redeemed daily, which helps keep its market price closely aligned with the value of its underlying assets. The previous GDLC fund was a closed-end fund that could trade at significant premiums or discounts to its net asset value. What are the benefits of investing in the Grayscale ETF? Benefits include enhanced accessibility (trading on traditional exchanges), increased liquidity, regulatory oversight by the SEC, and immediate diversification into a basket of large-cap cryptocurrencies. Is the Grayscale ETF suitable for all investors? While the Grayscale ETF offers a regulated and accessible way to invest in crypto, all investments carry risks. Investors should conduct their own research and consider their financial goals and risk tolerance before investing in any ETF, including this Grayscale ETF. Did you find this article informative? Share this exciting news about the Grayscale ETF conversion with your friends, family, and fellow investors on social media to keep them informed about the latest developments in the crypto world! To learn more about the latest crypto market trends, explore our article on key developments shaping Bitcoin and Ethereum price action. This post Momentous Grayscale ETF: GDLC Fund’s Historic Conversion Set to Trade Tomorrow first appeared on BitcoinWorld.
Share
Coinstats2025/09/19 17:45
The UA Sprinkler Fitters Local 669 JATC – Notice of Privacy Incident

The UA Sprinkler Fitters Local 669 JATC – Notice of Privacy Incident

Landover, Maryland, February 6, 2026– The UA Sprinkler Fitters Local 669 Joint Apprenticeship and Training Committee (“JATC”) is providing notice of an event that
Share
AI Journal2026/02/07 07:30
Vitalik Buterin Reveals Ethereum’s (ETH) Future Plans – Here’s What’s Planned

Vitalik Buterin Reveals Ethereum’s (ETH) Future Plans – Here’s What’s Planned

The post Vitalik Buterin Reveals Ethereum’s (ETH) Future Plans – Here’s What’s Planned appeared on BitcoinEthereumNews.com. Ethereum founder Vitalik Buterin presented the network’s new roadmap, which includes its short-, medium-, and long-term goals, at the Developer Conference held in Japan today. Scalability, cross-layer compatibility, privacy, and security were the prominent topics in Buterin’s speech. Buterin stated that the short-term focus will be on increasing gas limits on the Ethereum mainnet (L1). He said that tools such as block-level access lists, ZK-EVMs, gas price restructuring, and slot optimization will be used in this context. The goal is to maintain the network’s decentralization while increasing scalability. The medium-term goal is to enable trustless asset transfers between Layer-2 (L2) networks and achieve faster transaction finality. In this context, “Stage 2 Rollup” solutions, proof-of-conduct combinations, and optimizations for reading data from L1 are on the agenda. Furthermore, network optimizations such as shortening slot times, fast finality protocols, and erasure coding are planned to improve user experience and security. Buterin emphasized that privacy is a priority for both the short and medium term. Zero-knowledge (ZK) proofs, anonymous pools, encrypted voting, and scrambling network solutions are highlighted to protect the privacy of users’ on-chain payments, voting, DeFi transactions, and account changes. Furthermore, secure execution environments, secret query techniques, and the ability to conceal fraudulent requests and data access patterns are also targeted when reading data from the chain. Buterin’s long-term vision highlights a minimalist, secure, and simple Ethereum. This roadmap includes resistance to the risks posed by quantum computers, securing the protocol with mathematical methods (formal verification), and transitioning to ideal cryptographic solutions. Buterin stated that these strategic steps will transform Ethereum into a more scalable, user-friendly, and secure infrastructure. With the strengthening of L2 networks, more users will be able to use Ethereum with less trust assumptions. The ultimate goal is for Ethereum to become a reliable foundational infrastructure for global…
Share
BitcoinEthereumNews2025/09/18 15:57