# Ecosystem Overview

Enhancing Network Security with zk-SNARK-based Verification for Node Operators

## Node Operator Proof Generation / Validation

**Software Integrity Check**

**Software Integrity Check**

The node operator software on the device performs a self-check to ensure its integrity. This could involve calculating a cryptographic hash of its core components.

**zk-SNARK Proof Generation**

**zk-SNARK Proof Generation**

Using the private key corresponding to the signed software and the zk-SNARK proving system, the node operator software generates a zk-SNARK proof.

This proof demonstrates, without revealing the actual code or the private key, that:

The software hash matches the expected hash of the genuine signed software.

The software possesses the necessary functionalities for dVPN and dWiFi operation within the network.

### Network Verification

**Proof Submission:**

The node operator software submits the zk-SNARK proof to the Erebrus Network along with its public key.

**Proof Verification:**

The network uses the publicly available verification key to verify the zk-SNARK proof submitted by the node operator.

If the verification succeeds, it confirms that the software used by the node operator is indeed genuine and possesses the required functionalities.