TEE security discussion heating up:
@zama showing Battering RAM/WireTap exploits on Intel SGX (~$50 hardware cost for memory aliasing attacks)
Meanwhile, 4 new TEE implementations launched this week: 🧵

• @tenprotocol: 500M+ testnet transactions in SGX/TDX
• @oasisprotocol ROFL: Off-chain compute in Intel TDX
• @zk_agi: SGX/SEV for federated training
• Cap's AVS: Certora audit complete (no critical issues)
The debate: Math-based proofs (FHE, ZK) vs. hardware trust (TEE enclaves)
@Gaianet_AI AVS approach: Cryptoeconomic validation layer
✅Not choosing between TEE and proofs
✅Economic slashing for incorrect verification
✅Works with any compute substrate

Built on @eigenlayer restaking. Validator set securing inference quality through staked capital, not just attestations.
Live with real validation data. Not picking sides in FHE vs. TEE - we're adding economic accountability to both.
3,089
66
本页面内容由第三方提供。除非另有说明,欧易不是所引用文章的作者,也不对此类材料主张任何版权。该内容仅供参考,并不代表欧易观点,不作为任何形式的认可,也不应被视为投资建议或购买或出售数字资产的招揽。在使用生成式人工智能提供摘要或其他信息的情况下,此类人工智能生成的内容可能不准确或不一致。请阅读链接文章,了解更多详情和信息。欧易不对第三方网站上的内容负责。包含稳定币、NFTs 等在内的数字资产涉及较高程度的风险,其价值可能会产生较大波动。请根据自身财务状况,仔细考虑交易或持有数字资产是否适合您。

