Andrew Miller pfp

Andrew Miller

@socrates1024

226 Following
350 Followers


Andrew Miller pfp
Andrew Miller
@socrates1024
this is a cool paper on forking/cloning/rollback attacks on TEE based blockchains. They spotted three new vulns in Secret, Phala, and Ten. for secret, the issue is the io consensus key can be the same across different contracts if they share the same code https://cloning-tee-blockchains.github.io/case_studies/
1 reply
1 recast
9 reactions

Andrew Miller pfp
Andrew Miller
@socrates1024
No one yeets anymore
0 reply
0 recast
1 reaction

Andrew Miller pfp
Andrew Miller
@socrates1024
morning is for infra slop autist grind shipping, evening is for premium normie vibe app yapping
0 reply
0 recast
2 reactions

Andrew Miller pfp
Andrew Miller
@socrates1024
"statistically correct" is only the sixth or seventh best kind of correct
1 reply
0 recast
2 reactions

Andrew Miller pfp
Andrew Miller
@socrates1024
scheduled send 5am
0 reply
0 recast
2 reactions

Andrew Miller pfp
Andrew Miller
@socrates1024
firefly is kind of an "authentication methods" playground, android app is my favorite though
0 reply
0 recast
5 reactions

Andrew Miller pfp
Andrew Miller
@socrates1024
human instrumentality convergence
0 reply
0 recast
0 reaction

Andrew Miller pfp
Andrew Miller
@socrates1024
test firefly
1 reply
0 recast
1 reaction

Andrew Miller pfp
Andrew Miller
@socrates1024
https://x.com/albicodes/status/1872432443153625096?t=K9vjLc1gJF0Fz7ohKn04bg&s=09 We recently saw a TEE based agent fair-launch its own memecoin. But where's its remote attestation? Commentary from teleport team @albicodes on what to look for in TEE agents!
0 reply
2 recasts
16 reactions

Andrew Miller pfp
Andrew Miller
@socrates1024
attested logfile updates for the teeheehe provably-autonomous twitter bot forms a linked list hashchain of log files, each with a remote attestation. General purpose, since it operates at the logfile level also the logfiles can be redacted (but committed) so you could sell access to a more complete logfile if desired https://x.com/socrates1024/status/1870237696813085097
1 reply
2 recasts
6 reactions

Andrew Miller pfp
Andrew Miller
@socrates1024
How is @anoncast not broken by fractionalizing, the marginal cost to let someone else post via sharing an account w enough $anon should be near zero?
1 reply
0 recast
2 reactions

Andrew Miller pfp
Andrew Miller
@socrates1024
Xyn is on twitter livecasting how to make an $ANON-gated shared account on twitter using teleport.best https://x.com/i/broadcasts/1lPKqOdQNedJb
1 reply
0 recast
5 reactions

Andrew Miller pfp
Andrew Miller
@socrates1024
https://x.com/ns123abc/status/1856054462109851717?t=b1lpvTy6Jy-9cUKtC9OkDw&s=19 https://m.youtube.com/watch?v=xjH2B_sE_RQ
1 reply
1 recast
0 reaction

Andrew Miller pfp
Andrew Miller
@socrates1024
3 replies
9 recasts
15 reactions

Andrew Miller pfp
Andrew Miller
@socrates1024
1 reply
1 recast
8 reactions

Andrew Miller pfp
Andrew Miller
@socrates1024
I think we aren't utilizing the "one shot signature" feature of TEEs to their fullest. Here's a sketch of "Kettle Cash", based on replacing "Quantum" with "TEE" from the e-check scheme from Sattah and Ben-David https://collective.flashbots.net/t/request-for-suapp-kettle-cash/3614/1 https://quantum-journal.org/papers/q-2023-01-19-901/pdf/
2 replies
1 recast
8 reactions

Andrew Miller pfp
Andrew Miller
@socrates1024
Missing @bhgomes
1 reply
3 recasts
5 reactions

Andrew Miller pfp
Andrew Miller
@socrates1024
suappppppp
0 reply
0 recast
6 reactions

Andrew Miller pfp
Andrew Miller
@socrates1024
PoC of a frame that's backed by a SGX. Made by hacking the Sirrah SGX-based light client and EVM. What's surprising is it's a *permissionless decentarlized TLS service*.... it shares the TLS private with any SGX node that joins, so anyone who can set up SGX could serve it https://173-230-135-104-000005.k37713.xyz:5001
1 reply
6 recasts
15 reactions

Andrew Miller pfp
Andrew Miller
@socrates1024
lets make a frame that controls the cyperphysical infrastructure
0 reply
3 recasts
2 reactions