Blackbox Podcast

Blackbox Podcast

The Blackbox Podcast is where builders of the future come to talk shop — no fluff, no hype, just real technical insight. Whether you’re a solo creator, startup innovator, or enterprise architect, we want your perspective on the systems shaping confidential computing and SAFE AGI. Each episode dives into the architectures that matter — from TEE CPU/GPU deployments (SGX, TDX, SEV, etc.) to Zero Trust frameworks and privacy-first design principles. We’re here to explore how these technologies actually work in practice, and to spotlight the visions driving them forward.

Episodes

  1. E07 — Peyman Momeni: Confidential Intents & DeFi’s Trust Layer

    11/14/2025

    E07 — Peyman Momeni: Confidential Intents & DeFi’s Trust Layer

    In E07 — Peyman Momeni: Confidential Intents & DeFi’s Trust Layer, Dylan sits down with Peyman Momeni, CEO & Founder of Fairblock, to ask what happens if crypto doesn’t have to be an open book. Today’s stablecoins leak salaries, treasury moves, and trading strategies to anyone watching the chain. Peyman explains how Fairblock uses confidential stablecoins and confidential intents so amounts and orders stay encrypted while the network can still verify that every rule was followed. (docs.fairblock.network) They walk through how Fairblock’s stack—homomorphic encryption plus threshold identity-based encryption and conditional decryption—enables pre-execution privacy, sealed auctions, and protected trading, without handing control back to a centralized middleman. (docs.fairblock.network) The conversation also looks ahead to AI agents routing orders on-chain, the role of TEEs and Phala’s dstack as an “anti-hack” trust layer, and why programmable privacy is becoming table stakes for serious DeFi and institutional flows. (fairblock.network) In this episode, we cover: What confidential intents are, and how conditional decryption lets you plan and execute trades privately, then reveal only what’s needed to prove they were valid. (docs.fairblock.network) How confidential stablecoins encrypt amounts and balances while keeping addresses auditable for compliance and reporting. (docs.fairblock.network) Sealed, leaderless auctions that use Fairblock’s FairyRing chain to cut slippage and MEV without losing verifiability. (docs.fairblock.network) The growing set of Fairblock cApps across stablecoins, protected trading, and confidential AI data markets. (fairblock.network) Why DeFi AI agents need hardware-backed guarantees, and how Phala + dstack provide verifiable confidential compute as the trust layer underneath. (phala.com) Links & resources: Fairblock – encrypted stablecoins & protected trading:https://www.fairblock.network/ (fairblock.network) Fairblock docs hub:https://docs.fairblock.network/ (docs.fairblock.network) Confidential Stablecoins (Stabletrust):https://docs.fairblock.network/docs/ConfidentialStablecoins (docs.fairblock.network) Fairblock & cryptography (HE, tIBE, conditional decryption):https://docs.fairblock.network/docs/learn/Fairblock%20and%20Cryptography (docs.fairblock.network) Sealed-bid, leaderless auctions:https://docs.fairblock.network/docs/build/Arbitrum/sealedbid_auction (docs.fairblock.network) Phala dstack – confidential AI & TEE orchestration:https://phala.com/dstack (phala.com) dstack docs overview:https://docs.phala.com/dstack/overview (docs.phala.com) To apply as a guest—or bring your team on to talk AI, privacy, or confidential systems—visit https://blackboxpodcast.com, fill out the form, and leave your best contact so the Blackbox media team can follow up with pre-interview questions.

    1h 18m
  2. E06 with Jens Groth: Scaling Zero-Knowledge Proofs with Instruction Sorting

    10/25/2025

    E06 with Jens Groth: Scaling Zero-Knowledge Proofs with Instruction Sorting

    In this episode, Dylan sat down with Jens Groth (pronounced “Yens”)—Chief Scientist at Nexus, creator of the Groth16 SNARK—to map how verifiable computation reaches internet scale. We unpack Nexus’s zkVM (RISC-V), its distributed prover network (orchestrator + workers) for low-latency proving, and why proofs-of-proofs are the practical path to tiny, fast-verifying artifacts. Jens explains the coming shift to instruction sorting—bucketing additions/XORs/etc. to cut redundant constraints—and where privacy fits when you parallelize proving. We also compare ZK vs TEE vs FHE in real systems, talk formal verification on the verifier path, and preview Nexus’s L1 that makes proofs first-class citizens for DeFi and beyond. How a zkVM compiles, executes, and emits an extended witness + proof—and what the verifier actually checks. Why a centralized orchestrator plus many workers wins on latency today, and where that clashes with privacy. The real trade-offs between TEEs (TDX/SEV) for speed, ZK for public verifiability, and FHE/MPC for data-in-use privacy. Instruction sorting: reordering the execution trace into per-op buckets to shrink constraints—an orders-of-magnitude lever when combined with proof composition. What “maturity” looks like in ZK stacks: open source, audits, formal verification for verifiers, supply-chain discipline, and reproducible builds. Nexus — zkVM v3 overview, distributed prover network, and blog updates:https://specification.nexus.xyz/ • https://docs.nexus.xyz/zkvm • https://blog.nexus.xyz/nexus-zkvm-3/ • https://blog.nexus.xyz/nexus-launches-worlds-first-open-prover-network/ Phala Network docs — confidential computing stack & TDX direction:https://docs.phala.com/overview/phala-network dstack-TEE — builder notes for attested, policy-driven confidential compute:https://phalanetwork.mintlify.app/docs/overview/what-is-dstack RISC-V ISA resources (for how zkVMs model CPU steps):https://riscv.org/specifications/ratified/ STARK proving system background (why many zk stacks compose proofs):https://starkware.co/stark-101/ • https://starkware.co/stark/ If you’re building rollups, privacy-first apps, or just need verifiable backends, this one’s a blueprint: start efficient at the base proof, compose downward, verify in milliseconds, and use privacy where it truly survives distribution.

    1h 12m
  3. E05 with Blormmy: Private AI Agent for Finance

    10/10/2025

    E05 with Blormmy: Private AI Agent for Finance

    In this episode of Black Box, the discussion centers on Blormmy, an AI-powered wallet system that merges artificial intelligence, crypto infrastructure, and confidential computing. The conversation explores how Blormmy enables users to perform on-chain actions simply by expressing intent—transforming the wallet from a manual interface into an autonomous agent that acts securely on behalf of the user.The founders describe Blormmy as both infrastructure and application: a system where AI interprets user commands, determines the right blockchain actions, and executes them through smart wallets. The project aims to eliminate the friction and complexity of crypto interactions, replacing seed phrases, pop-ups, and manual signing with a conversational interface that feels natural and intuitive.Blormmy is built on Solana and uses Phala Network’s confidential computing stack for deterministic key generation. Through CrossMint’s smart wallet integration, users can onboard with just an email and delegate actions to the AI agent, which operates within strict, user-defined parameters like spending caps or session limits. This combination of autonomy and control forms the foundation of Blormmy’s security model. The result is a wallet that behaves more like an AI assistant—capable of executing swaps, bridging assets, or even buying real-world items such as Amazon products using stablecoins.Ultimately, Blormmy represents a broader vision for the future of Web3—where AI agents can autonomously perform blockchain state changes, making crypto accessible to anyone without the usual technical barriers.Blormmy Docs: https://docs.blormmy.comPhala Docs: https://docs.phala.com/?utm_source=phala.network&utm_medium=site-nav

    56 min
  4. 09/22/2025

    E04 with Andrew Miller: "Your Al is Weak, Until You Add Zero Trust."

    This is the Blackbox Podcast — where we peel back the hidden layers of technology, society, and the human psyche to unravel the forces shaping confidential AI. In this episode, host Dylan Kawalec sits down with researcher and entrepreneur Andrew Miller for a deep dive into confidential computing, trusted execution environments (TEEs), and the future of private AI. Andrew has been at the forefront of cryptography and decentralized systems, from early Bitcoin scripting experiments to Ethereum, MPC, and zero-knowledge proofs. As a key architect behind Flashbots and dstack, he’s redefining how we think about secure, verifiable computation in a world where AI is becoming ever more powerful—and ever more in need of unbreakable safeguards. Through the lens of auctions, Andrew explains how trust models evolve, why combining TEEs and MPC strengthens guarantees, and how confidential containers may become the new smart contracts. He then connects these ideas to AI, reputation, and agent-to-agent protocols—making the case for “prove what, not who” as a guiding principle for building trustworthy systems. Along the way, he demos sandboxed TikTok sessions inside a TEE, critiques reputation models for autonomous agents, and explores how confidential compute enables rivals to collaborate securely through projects like BuilderNet—reshaping the future of decentralized infrastructure. Now here is E04 of the Blackbox Podcast, hosted by Dylan Kawalec and brought to you by Phala Network. Phala Docs: https://docs.phala.com/ Flashbots Docs: https://docs.flashbots.net

    1h 56m

About

The Blackbox Podcast is where builders of the future come to talk shop — no fluff, no hype, just real technical insight. Whether you’re a solo creator, startup innovator, or enterprise architect, we want your perspective on the systems shaping confidential computing and SAFE AGI. Each episode dives into the architectures that matter — from TEE CPU/GPU deployments (SGX, TDX, SEV, etc.) to Zero Trust frameworks and privacy-first design principles. We’re here to explore how these technologies actually work in practice, and to spotlight the visions driving them forward.