emo.eth
@emo.eth
what are security implications or trade offs of TEE based signers like turnkey? how much more / less secure are they than a traditional multisig? a hardware wallet? what about once you export the private key (switching service providers or they go out of business)?
3 replies
0 recast
6 reactions
Buck
@rollbit
Think there is a very large convo and happy to DM on telegram (@buckontelegram). Would recommend checking out http://whitepaper.turnkey.com for the full debrief of our approach! Biggest call-out here is that Turnkey leverages TEE’s to protect ANY sensitive actions that could touch funds (e.g., tx parsing, policy evaluation, auth) & is not soley focused on protecting the private key. This ensures a much more holistic model & helps avoid ByBit-style MITM attacks. We also leverage our custom OS, QuorumOS (QOS), for deployments into these enclaves, which eliminates single points of failure by ensuring that a quorum of Turnkey Operators is required for any deployment. We’ve built these applications to be verifiable down to the builds.
1 reply
0 recast
2 reactions
Buck
@rollbit
Remote attestation can be used to verify that the code we think is running is what’s ACTUALLY running at any point in time. Finally, a big advantage is that you hold authenticators (not private key material) that are gated by our policy engine — this allows you to tightly scope access (e.g., allowed contract calls, multi-party approvals, etc.), and even roll the authenticators if they’re ever exposed. All in this gets you a very holistic security model, high performance (2000+ TPS, 50-100ms signging latency), and a ton of flexibility in your implementation that you wouldn’t have elsewhere. Turnkey is really the only option on the market that makes sense for high value use cases.
1 reply
0 recast
1 reaction