See all Parallel Polis transcripts on Youtube

youtube thumbnail

Towards Validator Privacy and Private Information Retrieval / Dr. Marina Steinkirch

15 minutes 13 seconds

Speaker 1

00:00:05 - 00:00:33

I'm Dr. Marina von Steintusch, also known as BIA or Bite Girl. And the doctor comes from a PhD in computational astrophysics from the University of New York. In the next 15 minutes I'll be talking about the following. First I'm gonna introduce myself so you have an idea of my background and why I'm interested in these problems and perhaps you are interested as well and you can join us or collaborate in some capacity.

Speaker 1

00:00:34 - 00:00:59

Then I give you a summary about my research at the Privacy Skilling Solutions Group at Ethereum Foundation. And after that, I wish you a great weekend. I hope you have a lot of fun in Prague, the alchemist city. So let's begin. So this is the TLDR of my story.

Speaker 2

00:00:59 - 00:01:08

I was born in Brazil and since early age, 6 or 7 years old, I started playing with computers. My parents didn't have much money so I would

Speaker 1

00:01:08 - 00:01:38

sneak out my uncle's computer when he was not home. Later on, my mom was able to get me a painting too, and then the story began. I started coding and playing with several Linux distributions during my teens, but I was also very keen on physics and math. Even though I went to public schools my entire life

Speaker 2

00:01:38 - 00:01:41

in Brazil, I studied my ass off and

Speaker 1

00:01:41 - 00:02:14

I was able to be accepted at this top program, the engineering program at the University of Sao Paulo, the best university in Brazil. Right after that I got a full scholarship for a PhD in Stony Brook and in my last year of college in Brazil I also got a summer scholarship to spend a summer researching NASA, Golder Center in Washington, DC. When I moved to the

Speaker 2

00:02:14 - 00:02:17

US by myself, I bet in

Speaker 1

00:02:17 - 00:02:24

the hope of finding a better life than I had in Brazil and that was right after my dad was murdered

Speaker 2

00:02:24 - 00:02:28

in Brazil. In New York I took all the classes

Speaker 1

00:02:28 - 00:02:35

I could in theoretical physics, some math, grad courses and a lot of computer science courses.

Speaker 2

00:02:36 - 00:02:39

I wrote several papers. I wrote academic books on

Speaker 1

00:02:39 - 00:02:47

group theory, quantum theory, and quantum information. I researched and published papers in Los Alamos National

Speaker 2

00:02:48 - 00:02:50

Lab and the Brookhaven National Labs.

Speaker 1

00:02:51 - 00:03:22

And I also wrote a book on Python algorithms and data structures. I got really into code machine learning and hacking, So I decided to turn down an offer of postdoc at the Los Alamos Laboratory to get a job as a backend engineer at the security team at Yelp in San Francisco. That was when my career as an engineer started. Right after that, I worked at Apple

Speaker 2

00:03:23 - 00:03:23

in the

Speaker 1

00:03:24 - 00:03:32

CoreOS team. And then after a year in Cupertino, I became a nomad working at the Secure and Crowd team at Axie.

Speaker 2

00:03:33 - 00:03:36

At some point after that, I realized

Speaker 1

00:03:36 - 00:04:11

I need to find some personal answers regarding the meaning of life or myself and my existence. So I took a little gap time to travel the world as a nomad and I learned to surf. I went to places, awesome places to snowboard. I took a lot of pictures and I made some abstract droning videos of the places I visit. Even though the concept of home was always diffused for me, being officially homeless was most liberating and changed me forever.

Speaker 1

00:04:12 - 00:04:19

When it was back to my passion of being a scientist and an engineer, I knew I could only work with purpose.

Speaker 2

00:04:20 - 00:04:22

I would choose where to work wisely.

Speaker 1

00:04:27 - 00:04:40

I joined Shopify during the pandemic because I admire Tobii and the impact that they had in the world. With Shopify, anyone could have their own business.

Speaker 2

00:04:41 - 00:04:47

And if my dad had those resources in Brazil when I was growing up, our lives would probably be different.

Speaker 1

00:04:47 - 00:05:02

At Shopify, I was 1 of the founders of the blockchain team and I became, informally, the head of blockchain engineer, helping to oversee NFT drops to some big partners and educating everyone regarding blockchains. Everyone regarding blockchains.

Speaker 2

00:05:07 - 00:05:09

I left that well-regarded position at

Speaker 1

00:05:09 - 00:05:12

the end of 2021 to go to the wild.

Speaker 2

00:05:13 - 00:05:16

I saw the decentralization and self-sovereign movement

Speaker 1

00:05:16 - 00:05:20

that we are creating, and I wanted to be part of it.

Speaker 2

00:05:21 - 00:05:31

Even though, if that meant go back to square 0. Since then, I worked at the

Speaker 1

00:05:31 - 00:05:38

field house, I developed MEV searchers, I learn smart contract security at

Speaker 2

00:05:38 - 00:05:43

the E-Money Phi. I trained the Phi agents with reinforcement learning.

Speaker 1

00:05:44 - 00:06:24

I support my own personal infrastructure for projects I care about. And most recently, I joined the great community at the Terrier Foundation with the Privacy and Scaling Solutions Group. Now at EF, I'm leading 2 projects. 1 is the validator privacy research, which I will be talking a little bit in the next minutes. And the other is on private information retrieval, the research of a protocol with cryptographic primitives that allow a user to

Speaker 2

00:06:24 - 00:06:29

retrieve information from database, from server, without revealing what

Speaker 1

00:06:29 - 00:06:54

they are trying to retrieve. Even though it's fascinating, I won't be able to discuss PIR in this talk, but I invite you to follow my work and follow the PSE group for future outreach in the subject. Now let's take the next minutes

Speaker 2

00:06:54 - 00:07:00

to actually talk about the research on validator privacy. Thank you

Speaker 1

00:07:01 - 00:07:03

and let's move on to my presentation.

Speaker 2

00:07:09 - 00:07:53

Hi, in this presentation I will give you the TLDR of our research on Validated Privacy at the Ethereum Foundation. With the advent of the merge in September of last year, the Ethereum network moved away from its original Proof-of-Work consensus mechanism to the implementation of Proof-of-Stake. Consequently, the chain was split into execution layer represented by the execution client and the beacon node, and the constants layer, represented by a constants client and a validator node. However, even though both clients are logically separate, they can still be run on the same machine and network address. 1 of the most significant consequences of this update was highlighting the role of validator stakers.

Speaker 2

00:07:54 - 00:07:55

There are over

Speaker 1

00:07:55 - 00:07:55

6, 100

Speaker 2

00:07:57 - 00:09:18

active validators in the Ethereum network at the time of this writing, holding over 90 million stake-in rewards. While stake-in rewards have significantly shifted to enterprise solutions such as validators of service, LSDs, staking pools, and centralized exchanges, solid-stakers contributions are essential to help preserve the sovereign and the decentralization ethos of the Ethereum project. The Ethereum 2.0 Biacon Chain, a ledger of accounts that coordinates how new blocks are created and validated in the chain, provides the heartbeat to Ethereum's consensus and introduces the network's consensus logic and block gossip protocol. While the validated client is responsible for credentials and consensus message, bringing the network to a consensus and a finalized state, the execution client is responsible for participating in the blockchain P2P network by subscribing and publishing message to gossipy sub topics and storing blockchain data. In this new paradigm, every 12 seconds a validator is randomly chosen to propose a block through a new slot.

Speaker 2

00:09:19 - 00:10:04

The total number of validators is split up into committees and 1 or more individual committees are responsible for attesting to each slot. 1 validator from the committee is chosen to be the aggregator while the other 127 validators are just attesting. After each epoch defined by 32 slots or 6.4 minutes, the validators are mixed and merged in the new committees. Since the POS validation scheme requires validator public keys on the back-end chain to be known to everyone ahead of time, the validator ordering for slots is known by the network within the APOC. In other words, block proposals from APOC are revealed in that advance.

Speaker 2

00:10:09 - 00:11:47

Why IP address revealing at the execution layer is inevitable? Attestation in blocks from validator nodes can leak information that allows an attacker to associate a validator ID with an IP address unless operators are using sophisticated measures. In addition, even though a validator can submit the consensus message to multiple background nodes, there is still risks of metadata analysis attacks, including the size of the message, frequency of broadcasting message, the timing of the message, joining or leaving subnet events, and packet or data size difference between attestation and other messages. If the validator IDs or wallet addresses on the consensus layers can be linked to the back on IP address, the validator operator could be anonymized, permitting consequences such as destabilizing the network, denial of service of block producers through things such as validators, sniping and solid stigmas disenfranchisement due to government government sanctions, for example, of FAC, or even owing of having their device stolen. A popular scenario discussed among researchers is of an attacker watching the Biacon chain network by running a node modified to gather the IP address of all connected peers when they broadcast at the stations.

Speaker 2

00:11:48 - 00:12:38

The attacker can then create a database of IPs and public keys and with this information they could take the validator offline when it becomes a block proposal. In a sophisticated way, The attacker controls the next validator proposer, taking all the MEV opportunities, for example. In summary, no adversary should be able to link personally identifiable information to staking activities. So we care about obfuscating the connection between a validator and its IP address. For instance, stakers of a non-key-OSC wallet should have plausibility and ability in controlling a validator that proposes or attests to a particular block, for example, UFOFAQ restrictions.

Speaker 2

00:12:41 - 00:13:25

How can the validator's sign-and-produce message be disassociated from the background node it originated? Like everything in security, resolutions are found with many layers. A comprehensive solution would include a mechanism of validator-proposer elections that protects the identity of the next proposer. A network anonymity mechanism that doesn't mess with the current block proposing latency. Zero-knowledge proof mechanisms like ZKSNARKs prove message credibility and spam protection, even to verify the legitimacy of a validator.

Speaker 2

00:13:26 - 00:13:55

For instance, prove that they are unique and valid without revealing more information. Ethereum Validator Privacy is an active area of research and discussion and the definitive answer still needs to be defined. In addition, While some improvements might be shipped in protocol in the subsequent Ethereum updates, we are also considering implementing a consensus client opt-in obfuscation add-on.

Speaker 1

00:13:58 - 00:13:59

If you are interested

Speaker 2

00:13:59 - 00:14:45

in learning more, I invite you to look at this paper I will be publishing in the next days, where I'm summarizing the research on Ethereum Validator Privacy over the last years. This document intends to be an overview of the many efforts from many talented researchers in these last years and some discussion of what could be next. Here's a sneak peek of the paper. Finally, for updates Regarding this research and more, I invite you to follow me on my GitHub or Twitter. For general scaling and privacy research IEF, mostly focused on ZKP applications, I suggest you to follow the PSC group on their GitHub, Twitter or Twitter.

Speaker 2

00:14:45 - 00:14:54

Finally, if you're particularly interested in this research, feel free to leave any comment below in this case. I'll take a look later on and I might respond accordingly.

Speaker 1

00:15:00 - 00:14:54

Thank you.