9️⃣Security Infrastructure

Our product is encrypted by state of art encryption tools and deployed on a confidential VM (CVM) hosted into a TEE (Trusted Execution Environment). Below you can find the detailed setup of the TEE provided from Phala Network: https://trust.phala.com/app/435b3f0fc556133abb7b37d226afebc4545df43e?selected=app-code

 Fig 1.1 Decentralized Root of Trust

Fig 1.1 Decentralized Root of Trust

Fig 1.2 Verifiable DeRoT and Key Chain

Last updated