ZTEE - Trustless Supply Chains

·Flashbots··

Every distributed cryptographic protocol, key management system or wallet runs on opaque hardware. In almost all cases, we do not know with any certainty that our hardware is executing the expected program and that it is not actually acting against us. Many cases of exactly this kind of betrayal have been uncovered. The latest proved deadly. This precedent suggests the likely existence of undetected malicious hardware in use today.

Read full article →

Related Articles

How Monero’s proof of work works
alcazar · Hacker News · 17d ago
A shallow dive into formal verification
Vitalik Buterin · Vitalik Buterin · 3d ago
PACTs: Protecting Your Bitcoin From a Quantum Sunset
Paradigm · Paradigm · 20d ago
Stablecoin sentences to ponder
Tyler Cowen · Marginal Revolution · 21d ago
Mind the Gap - Where TEE Attestations Fall Short and Why Do TEEs Need Proof of Cloud
Jonathan Passerat-Palmbach · Flashbots · 1mo ago