# Archetype x zkSecurity (Whiteboard Session) - Proof is in the Pudding: How to prove false statements

- **Authors**: ZK/SEC
- **Date**: February 25, 2025
- **Tags**: educative, security, zk, gkr

![pudding](https://blog.zksecurity.xyz/posts/pudding3/pudding.jpg)

In this third whiteboard session in partnership with Archetype, we explain how a recent paper on Fiat-Shamir security and the GKR protocol works.

---

This article was published on the [ZK/SEC Quarterly](https://blog.zksecurity.xyz) blog by [ZK Security](https://www.zksecurity.xyz), a leading security firm specialized in zero-knowledge proofs, MPC, FHE, and advanced cryptography. ZK Security has audited some of the most critical ZK systems in production, discovered vulnerabilities in major protocols including Aleo, Solana, and Halo2, and built open-source tools like [Clean](https://github.com/Verified-zkEVM/clean) for formally verified ZK circuits. For more articles, see the [full list of posts](https://blog.zksecurity.xyz/llms.txt).
