Rubber Hose

The Rubber Hose team showing off their hard work!

Rubber Hose partitions the storage space of a secret contract so that different passwords unlock different sections of the secret contract’s storage. The name “rubber hose” refers to a scenario where a user is kidnapped and forced to give up their password. This application would enable the subject to comply with coercion but still conceal the sensitive data.

Our team was impressed by this project, and we think the use-case for this type of access-control will be very useful (even in situations less extreme than kidnapping!) We can certainly imagine enterprise users seeking this type of functionality. We were also impressed by their efficient use of Enigma’s secret state feature!

Fonduels

The Fonduels wizards themselves.

Fonduels (get it?!) uses Enigma to accelerate the gameplay for Cheeze Wizards, a game from Dapper Labs. The Fonduel team had previously built visualizers and simulation tools for Cheeze Wizards, working with Dapper Labs, and they were excited to see how they could improve the gameplay process through Enigma.

Fonduels duplicates the Cheeze Wizards contract, then leverages Enigma Secret Contracts to execute the game logic and user moves. This completely removes the “reveal” stage of a duel, reducing the time that each game takes to complete by as much as 2.5 hours! We were impressed by their ability to achieve this in one weekend.

“Using the Enigma protocol, we handle both blocks (turn commitments and reveal commitment) within a single a block resolution; this creates a dueling experience that is at least 50% faster for the players!”

uFlo

uFlo getting into flow.

Possibly the most ambitious weekend project, uFlo used military-grade EEG headsets to pick up on user brain activity, with the goal of monitoring when that user was in a “flow” state. The team was interested in using Enigma so that the effectiveness of various stimuli on “flow state” (such as audio) can be tracked without exposing sensitive user data.

“We use private machine learning inside an Enigma secret contract to detect which types of ambient conditions & stimuli (namely audio here) are most effective at inducing a flow state, and also when a user has exited flow.”

Lootbox Token

Lootbox Token showing off the goods.

Lootbox Token showcases how you can create a “lootbox” — an NFT with unknown contents — on Ethereum. Like a sealed collectible card deck, you can buy this lootbox and resell it without ever seeing the contents inside.

This team took it a step further and created a game mechanism almost like a lottery bonding curve. Imagine this “lootbox” contains one winning card. Every time someone “draws” an NFT from the lootbox, the value of the subsequent draw becomes more expensive (because it is more likely to be the winner!) A very cool mechanic.

Enigmachine Learning

These guys are the real Enigmachines.

This team of two from Consensys used the hackathon to experiment with Enigma’s machine learning capability, and they made significant progress in identifying how Enigma could better support existing ML libraries. Their use-case was directed at identifying specific health risk factors by analyzing all EMR data for a user, without revealing that user’s sensitive data. We’re looking forward to continuing the conversation!