Cassie Heart
@cassie
Been a while since I took the time to write a threadoor essay, but I feel like there's been an alarming trend that warrants discussion: the rise of "MPC" protocols which are actually glorified networks of trusted operators.
4 replies
8 recasts
39 reactions
Cassie Heart
@cassie
What is a trusted operator? In the context of protocols, a network's design can require the participants are trusted – that is, vetted and approved, or trustless – the protocol is inherently secure against participants behaving maliciously.
1 reply
0 recast
0 reaction
Cassie Heart
@cassie
This applies to everything from a blockchain (Bitcoin, for example, is trustless, whereas the current iteration of Optimism is trusted/single sequencer) to file sharing (BitTorrent is trustless, an SFTP server is trusted).
1 reply
0 recast
2 reactions
Cassie Heart
@cassie
In MPC, a common trusted operator would be a Trusted Execution Environment (TEE), e.g. Intel SGX, Amazon Nitro. These environments create a chain of custody asserting the code executed in the TEE is only what was intended and the only extractible information is the output intended to be delivered from the TEE.
1 reply
0 recast
2 reactions