 So, yeah, I joined the University of Edinburgh as a senior lecturer in January. Before that I was in RPI, Rensselaer Polytechnic Institute in Upstate New York. I was an assistant professor there. And prior to that I worked as a senior researcher as a postdoc before that in ETH in Zurich and UCLA and University of Maryland in the States. So my research is on security and privacy, that's my position here. I work mainly on cryptography with focus on multi-party computation, provable security and particular composable security. Security models that we can use to capture the assumptions that we make in a cryptographic proof and then prove the security of protocols. I've done some work on blockchain as well and mainly on the foundation side of blockchain, so basic research on blockchain. And I've also worked on rational cryptography, so instead of considering an adversary who is trying to break the system without a reason, considering adversaries that are trying to get something out of breaking the system, which you can imagine is very, very related to what happens in the blockchain and the blockchain effectively, you're going to attack the blockchain if you can make something out of it. If it's a cryptocurrency you're trying to make money, for example. So there is something which is kind of a folklore in the crypto community, so you can think of the blockchain as an application actually of MPC. So people think of MPC usually as something that needs to enforce privacy, but in general security has many aspects, so authenticity is one of them being able to maintain something in a distributed way. That's what MPC is about. The more classical applications of MPC are trying for, what is MPC? Let's start with that first of all. So MPC allows a set of parties, each party has its local data. It allows them to perform a joint computation on this data. This is why I said before that blockchain is a special case. So the data are the transactions that we're getting and what we're trying to do is establish and maintain a common view, achieve what we say consensus on this data. Now the more classical applications are auctions. You can do decentralized auctions. You don't need a trusted party. The auctions, the same way as the blockchain is maintained, assuming a majority of some resource, for example in Bitcoin, majority of the computing power is held by honest parties. You can make similar assumptions saying that we are trying, we are 10 people are trying to run an auction. If half of us are honest, then we can guarantee that the auction is run exactly as securely as we would have a fully trusted private and very, very secure party that performs the auctioneer. So we can actually remove the auctioneer from the picture, simulates him. Electronic voting is a special case of MPC because once again what we have is our votes being our private data and what we are trying to do is make a computation if you think of just elections, what we're trying to do is majority. We take the data and we try to do the majority of the votes and we want to do it in a secure way, as if there was someone that was doing the voting for us, but we're really amongst us. Again, under assumptions similar to the ones I made before, like majority or some other assumptions. You can even think of a decentralized version of a bank. So the bank is a centralized entity that performs some computation. So you go as a client, you register with it, whenever you want to transact, somehow you communicate, even like the existing financial mechanisms could be thought of as being decentralized. So MPC is a general concept that allows you to remove trust from a single entity, think of the Swift servers, if you want to think of a more concrete financial scenario. You can take trust out of those single entities and distribute it to the users of the system. I actually, you know, come from the same line of Greek cryptographers, which Aguilos is part, if not the root of. I was a young undergraduate in the National Technical University in Athens when I first met Aguilos. At that time, he was a professor in the States. And he's actually one of the first people that I met in the first conference I went. It was in New York, so that's where he was located. And he's been an inspiration for me in general from the beginning. So we've been friends for many, many years. We had our first paper collaboration in, I think it was 2012, which was on decentralizing trust. That's kind of pre the Bitcoin boom. It was not related to the blockchain, but it was a question about having different trusted authorities. And how can you still use them if some of them might be compromised? And then we continued working on some more blockchain related topics. This is also how I got to know IOHK. So I've been involved in the IOHK research for a while. Actually, IOHK has funded some of my research when I was at RPI prior to coming to University of Edinburgh. And it's not only a very excited topic, but it's a very excited process to work with IOHK because although they are an industry, they are actually very interested in basic research. And that's something that interests me too. So what we want to do, and so maybe this is a good point to say that I'm the Vice Director of the Blockchain Technology Lab. So we're actually administering together with Aguilos, which is located in the University of Edinburgh. The seed for the Blockchain Technology Lab was planted by IOHK. The lab currently is funded both by IOHK as well as other industry partners, Huawei, which we might discuss in a while about, as well as research grants, for example, from the European Union. So our primary focus here is being researchers and educators. So we want to train the next generation of security researchers, security engineers. And in this lab, we have focus on blockchain. So we do believe that this process of creating such a big core of people that are working on blockchain is instrumental for the future of this ecosystem. So producing highly trained researchers and engineers is very important for this technology. And I'm personally very, very excited to be part of this lab and I'm very, very excited to see this lab working with industrial partners that give us both the resources, of course. That's always exciting. But also directions in doing basic research that has applications. So in the lab, we can see problems from their foundations, from their goals to their security modeling, security proof, application product. And this is pretty unique in this area.