Content
@
0 reply
0 recast
0 reaction
EmpiricalLagrange
@eulerlagrange.eth
Great thread on mpc-tls Sometimes there are better solutions than ZK 😉😎 https://x.com/euler__lagrange/status/1875046837708554434?s=46
1 reply
2 recasts
6 reactions
avi
@avichalp
> For the proxy architecture, some node signs what ciphertext they saw go through the pipe. This node can sign whatever they want. can’t you restrict what proxy signs using TEEs?
1 reply
0 recast
0 reaction
EmpiricalLagrange
@eulerlagrange.eth
TEE would solve that problem under that security assumption. One thing to note is you can still fake proofs with a TEE without breaking the TEE. You can configure the network adapter outside the TEE to route traffic through a malicious node that will swap out the transmission after the TEE signs. https://x.com/euler__lagrange/status/1875616265441562996?s=46 Some tweets linked in this thread that explain
0 reply
0 recast
1 reaction