ZTEE - Trustless Supply Chains

·Flashbots··

Every distributed cryptographic protocol, key management system or wallet runs on opaque hardware. In almost all cases, we do not know with any certainty that our hardware is executing the expected program and that it is not actually acting against us. Many cases of exactly this kind of betrayal have been uncovered. The latest proved deadly. This precedent suggests the likely existence of undetected malicious hardware in use today.

Read full article →

Related Articles

Stablecoin sentences to ponder
Tyler Cowen · Marginal Revolution · 8d ago
Mind the Gap - Where TEE Attestations Fall Short and Why Do TEEs Need Proof of Cloud
Jonathan Passerat-Palmbach · Flashbots · 27d ago
Network Anonymized Mempools
Flashbots · Flashbots · 2mo ago
MEV and the Limits of Scaling
Flashbots · Flashbots · 10mo ago
Scalable Oblivious Accesses to Blockchain Data
Afonso Tinoco · Flashbots · 11mo ago