"The Shield Powered By Zk" What Zk-Snarks Protect Your Ip And Personal Information From The Public In the past, privacy applications have operated on a model of "hiding in the crowd." VPNs direct you through a server, and Tor helps you bounce around the nodes. These can be effective, but they are in essence obfuscation. They conceal the origin by