AZTEC Protocol – What are ways trusted setup can be compromised?

So who exactly are we trusting with the setup and how can it get compromised?
Why not use a method that doesn't require trusted setup?

Submitted December 21, 2018 at 06:53PM }
via reddit http://bit.ly/2R9OgxI

Advertisements