Replies: 3 comments 2 replies
-
Can you point out the link to your quote "putting the result on chain after the computation so it will be useless for the hacker to do the hacking". Without the context, I can guess the meaning of that sentence. It means the computation happened inside enclave which is supposed to very hard to hack. So once the result is confirmed, it is safe to store on chain, and the chain (layer1) is supposed to be tamper-proof storage. Once I have the context, I may update my answer. |
Beta Was this translation helpful? Give feedback.
-
|
Beta Was this translation helpful? Give feedback.
-
BTW, TPM is not enclave. TPM doesn't run any customer's code. It is enclave that execute the code. TPM is used to protect the enclave and make the enclave "verifiable" |
Beta Was this translation helpful? Give feedback.
-
Hi again,
I am having hard time to understand the abstraction on "putting the result on chain after the computation so it will be useless for the hacker to do the hacking" from the TPM function, do you have an example/ a link to help me understand this concept from Tea Project's perspective?
Thank you:)
Beta Was this translation helpful? Give feedback.
All reactions