TEE security discussion heating up: @zama showing Battering RAM/WireTap exploits on Intel SGX (~$50 hardware cost for memory aliasing attacks) Meanwhile, 4 new TEE implementations launched this week: 🧵
• @tenprotocol: 500M+ testnet transactions in SGX/TDX • @oasisprotocol ROFL: Off-chain compute in Intel TDX • @zk_agi: SGX/SEV for federated training • Cap's AVS: Certora audit complete (no critical issues)
The debate: Math-based proofs (FHE, ZK) vs. hardware trust (TEE enclaves)
@Gaianet_AI AVS approach: Cryptoeconomic validation layer ✅Not choosing between TEE and proofs ✅Economic slashing for incorrect verification ✅Works with any compute substrate
Built on @eigenlayer restaking. Validator set securing inference quality through staked capital, not just attestations. Live with real validation data. Not picking sides in FHE vs. TEE - we're adding economic accountability to both.
4.46K