02:36
Vitalik: ZK cannot provide coercion resistance and needs to be combined with techniques like FHE for layered use.
c-node indicates that MPC, tFHE, and TEEs can achieve privacy applications that ZK cannot provide, but their privacy strength is weaker. It is recommended to prioritize pure ZK in payments, transfers, and voting. Vitalik Buterin emphasizes that ZK alone cannot independently provide coercion resistance and needs to be combined with other technologies to enhance system security.
- 1

