Another set of related topics from a discussion with @vveiln @degregat:
- Figure out what to do with proof conversion e.g. upgrade to ZK, downgrade from ZK, how this relates to information flow control, observer-dependent verify function (e.g. given known trust, transparent proofs can be replaced with signatures), etc.
- This should be analyzed in tandem with information flow control for transactions.
- Figure out information revelation (e.g. choosing to reveal resources, keys, etc. to various parties)