Don't trust, verify (an untrusted host)

For future reference to readers of this forum post (which is linked from the grants blog post), Informal Systems are building tools that should be useful for this work. Specifically tendermint-rs and ibc-rs:

2 Likes

I don’t know too much about the protocol, but what happens if someone gets an SGX key?
They could fake attestations and instead of running code in the enclave, an attacker node could probably just emulate it and then privacy is broken

not a cryptographer

1 Like