8️⃣Security Infrastructure
Our product is encrypted by state of art encryption tools and deployed on a confidential VM hosted into a TEE (Trusted Execution Environment). Below you can find the detailed setup of the TEE provided form Phala Network:

Fig 1.1 Decentralized Root of Trust

Fig 1.2 Verifiable DeRoT and Key Chain
Last updated