PinnedPublished inTEN ProtocolIntel SGX demystifiedA first-principles guide for developersJan 9, 2024Jan 9, 2024
Published inTEN ProtocolIntroducing Smart TransparencyHow Access control through Smart Transparency is the missing piece for mainstream Web3 adoption.Sep 18, 2024Sep 18, 2024
Published inTEN ProtocolAccount Abstraction DemystifiedAn objective overview of EIP-4377 — Account Abstraction, with real examplesAug 23, 2024Aug 23, 2024
Published inTEN ProtocolTEN Introduces Confidential Smart ContractsTen launches its Ethereum L2 Testnet that introduces smart contracts with private shared states4d agoA response icon44d agoA response icon4
Published inTEN ProtocolDemystifying SGX part 4— Secure hardwareLearn how secure hardware is used to protect the data on your phone, and how it allows you to watch high-quality movies at home.Jan 9, 2024Jan 9, 2024
Published inTEN ProtocolDemystifying SGX part 3 —The enclave programLearn about the architecture of an SGX enclave and how the CPU executes it.Jan 9, 2024Jan 9, 2024
Published inTEN ProtocolThe Encrypted Layer 2Key challenges to address by a general-purpose encrypted Layer 2Dec 3, 2024Dec 3, 2024
Published inTEN ProtocolBuilding a confidential Web ServiceIntroducing a technique to solve the UX problem of Confidential ComputingJan 15, 2024Jan 15, 2024
Published inTEN ProtocolIntel SGX demystified part 2: understanding CPUs and their vulnerabilitiesAn intuitive description of the most significant recent CPU attacks, to prepare for the SGX vulnerabilitiesJan 9, 2024Jan 9, 2024
Published inTEN ProtocolA journey towards encryption. The usability.Bringing the UX of web2 to decentralised blockchains.Dec 3, 2024Dec 3, 2024