Profile banner
Jens Ernstberger

Jens Ernstberger

Cryptography and computer security researcher and entrepreneur

Munich, Germany
Joined August 2025

Network

308 connections
💰
Venture Capital Investors
🤖
AI Deep Tech Founders
⚖️
Startup Legal Counsel
🏦
Startup Financial Services
🔒
Cybersec
☁️
Google AI
🕸️
Andreessen Horowitz Network

Summary

Research-focused cryptographer working on practical zero-knowledge proofs and SNARKs, with a record of systematization and applied cryptography. arxiv+2
Bridges academia and industry: held visiting researcher positions (Simons Institute, UC Berkeley), completed a research internship at a16z crypto, and transitioned into entrepreneurship as a co-founder of Kontext.dev. ernstberger+2
Writes and communicates technical ideas for both research and practitioner audiences — author of conference papers, arXiv preprints, a16z research posts, and in-depth blog posts on agent security and authorization. ernstberger+2
Active contributor to community resources and benchmarks in the ZK/SNARK space, producing SoK-style analyses and tools that evaluate implementations and identify real-world vulnerabilities. arxiv+1

Work

Education

Projects

Writing

The API Key is Dead: A Blueprint for Agent Identity in the age of MCP

November 1, 2025

Kontext blog post arguing for transitioning agents from static API keys to standards-based, dynamic authorization (OAuth/OIDC) for safer agent identity and delegation in MCP ecosystems.

Favicon imagekontext.dev

Manipulated signals in DePIN protocols

June 1, 2025

Article summarizing research and implications for decentralized physical infrastructure networks (DePIN), discussing manipulation and self-dealing challenges and design lessons for DePIN protocol designers.

Favicon imagea16zcrypto.com

Incentive-Compatible Recovery from Manipulated Signals, with Applications to Decentralized Physical Infrastructure

January 1, 2025

Formal model for eliciting unverifiable information from sources with implicit signals from observers; establishes conditions (source identifiability) necessary for truthful mechanisms and applies framework to DePIN applications like proving location and bandwidth.

Favicon imagearxiv.org

Zero-Knowledge Location Privacy via Accurate Floating-Point SNARKs

January 1, 2024

Introduces Zero-Knowledge Location Privacy (ZKLP) and floating-point SNARK circuits compliant with IEEE 754 to enable proving proximity or region-membership without revealing exact coordinates; demonstrates performance and practical protocols for privacy-preserving proximity testing.

Favicon imagearxiv.org

ORIGO: Proving Provenance of Sensitive Data with Constant Communication

January 1, 2024

Presents ORIGO, a system for proving provenance of sensitive data with constant communication complexity.

Favicon imageeprint.iacr.org

SoK: What don't we know? Understanding Security Vulnerabilities in SNARKs

January 1, 2024

Systematization of Knowledge (SoK) analyzing end-to-end security properties and 141 vulnerabilities in SNARK implementations, providing a taxonomy and recommendations for improving SNARK-based systems.

Favicon imagearxiv.org

Selected blog posts (personal site)

Technical posts on decentralized onboarding, AWS Nitro attestation, elliptic curves and recursive SNARKs, and agent authorization published on the author's personal site.

Favicon imageernstberger.xyz