8️⃣Security Infrastructure

Our product is encrypted by state of art encryption tools and deployed on a confidential VM hosted into a TEE (Trusted Execution Environment). Below you can find the detailed setup of the TEE provided form Phala Network:

 Fig 1.1 Decentralized Root of Trust

Fig 1.1 Decentralized Root of Trust

Fig 1.2 Verifiable DeRoT and Key Chain

Last updated