Why do ZK apps use Poseidon and not SHA-2/3? This post explores the evolution of ZK-friendly hash functions and their performance in proof systems.