 Welcome to our demo. So we'll demo our Time Lock Encryption, Peter, who are bringing using the different League of Entrepreneurs Network. That's a work of the different team. So together with Patrick, mostly, maybe briefly. Time Lock Encryption is the capability of being able to encrypt something toward the future. So the idea was initially submitted in 1993 on a cyberpunk mailing list. And at the time, the only way to achieve that was to rely on trusted third parties, such as notaries to which you would give the encryption key seal, and they would unseal it when the time has come. Since then, there has been a lot of research on the topic. But most of the solutions were either relying on proof of work, a bit like Bitcoin and so on. Or they needed something such as a trusted third party or a reference clock. And Time Lock Encryption is really interesting because it can help reduce front-running, mitigate math, and so on. It's also possible to encrypt your Bitcoin private key towards the future, let's say, in two years, so that if you die, your successors would be able to decrypt it in two years if they got the encryption. And if you're still alive, you could just transfer the Bitcoin to a new address. And it's not plus. Our solution to achieve Time Lock Encryption is to rely on the existing League of Entropy Deer Run Network as a reference clock. So the Deer Run Network that is being run by the League of Entropy is made of over 20 nodes, or roughly 23 nodes currently, run by 16 unrelated parties, including big names such as CloudSplat, Thermal Foundation, and so on. And the nice thing is that Deer Run is building a threshold network which we can trust. So here we can see, oh, Deer Run Beacons are mapping to a given time. So each 30 seconds currently, the League of Entropy is issuing a new round. And this is perfectly deterministic. So we can say, in five minutes, there will have been 10 rounds and so on. The security of the whole thing is relying on the BLS signature scheme which Deer Run uses. And the nice thing with BLS is that it's a pairing-based cryptography crypto system. And that's compatible with identity-based encryption. We use identity-based encryption to basically say, OK, we use the signature, the Deer Run signature, in the future as the secret key. And we use the message that is going to be signed in the future as the public key. So anybody who knows the message is the run number. But to know the secret key, you need to wait until the network issues the signature for that round. And so we are building on top of that to achieve a time lock encryption. So we already have a Go Client which is working and a Go Libra read. So the CLI tool, I think Patrick can demonstrate it now. So yeah, as Yolan alluded to, we've got a Go library, a CLI with which we can encrypt and decrypt things for the future. Some points to note here, it supports multiple networks. You can input the duration. You can also fiddle a bit with the output format that you would like. So let's first take some plain text message that we like to encrypt. So I guess, hello, critical labs. Yeah, very simply, the default settings here will use the test net for D-Round to encrypt for us. So let's encrypt our file here. And let's set a time, I suppose, of five seconds. We can decrypt it nice and easily in a moment. And our output file, we're going to put in decrypt the data, which I guess I'll show you that's nice and empty, so no one thinks I'm cheating. And let's input our data of text that we have to do. After a brief second, we'll see now in encrypted data here, we have a payload. We can also turn that into armor, which some of you may recognize from some other schemes, such as PGP. If we are then to decrypt that as well with the CLI, it's also possible. We pass in our encrypted data and we put this somewhere else. So let's say decrypt the data here. We're going to pass in our encrypted data. And hopefully the output of our decrypt the data will be exactly as we hoped. Additionally, hot author press, in fact, finished earlier today. We've also worked on a pure TypeScript implementation of time of encryption. So now you can do this fully in browser as well. So if we copy the ciphertext we got over there, hopefully demo God's willing. We were able to decrypt that. Demo God's not willing, it seems. There you go. We can also encrypt and decrypt using any of the press cache. Last not. We can also do some encryption and decryption just around. Hopefully, we will be able to decrypt this using time lock. And let's also clear our decrypted data. That's awkward. Unfortunately, the demo God's have not been kind in this day. But very shortly, these two libraries will be compatible. And you'll be able to encrypt in one and decrypt in the other. That's all I have on the demo side for now. Yeah. And so the TLE tool is also compatible with just like PGP. So you can use it to pipe data into its supporting streaming interfaces. So you can pipe data into it. You can pipe it into other commands and so on. So it should be fairly easy to use. And behind the TLE command line tool, there is the T-lock library, which is a Go library that you can use in your projects and that allows you to achieve the same functionalities basically. So the whole thing will be made public next week on the 12th of August for DEF CON, because we have a talk that was accepted there. So by then, the UI should have changed a bit. I can turn my screen again. So by then, the UI should have changed a bit to look maybe more like that. And the library, the JS library and the Go library will both be released. It's currently running a test net on the DRUN test net. But we are planning to launch a new unshade network for DRUN main net for the legal entropy main net in September, mid-September. So starting mid-September, you should be able to use time lock encryption in a way that is secure because the test net is maybe three, four parties. So it's not super secure as a threshold network. The main net instead is a threshold of 13 over 23 nodes. So it's fairly secure. You need to compromise 13 nodes to be able to decrypt anything earlier, which is quite difficult to achieve in practice normally. That's it.