Tudor Malene·PinnedIntel SGX demystified part 2: understanding CPUs and their vulnerabilitiesWhen I first heard about researchers "breaking into" secure enclaves, I imagined a "Mission Impossible" style operation where the researcher dodges laser beams, breaks some cryptography, and runs away with the top-secret list of undercover agents. It turns out that the researchers are CPU geeks with a deep knowledge of…Sgx16 min readSgx16 min read
Tudor Malene·PinnedIntel SGX demystified part 1When I started reading about Intel SGX a few years ago, I felt intimidated. On the one hand, there was a lot of scary-sounding terminology; on the other hand, the results seemed magic. In this article, I will break it down into non-scary concepts, something which would have helped past-me…Sgx11 min readSgx11 min read
Bl4ck.box·PinnedProgrammable Privacy as it applies to DeFiBlockchain world enables personal privacy. You do not have a name assigned to your wallet; you have a random number. You do not exchange individual signatures (as in your passport) to make transactions; you sign the decrypted message by clicking the button. On-chain your name is unidentified indeed. Though… if…Blockchain6 min readBlockchain6 min read
Polo·PinnedEnlightening the spectrum of privacy with ObscuroI will start with a little story about decentralization. Back in 2020 we had the so called “Defi summer” which kickstarted a massive crypto bullrun. It took its roots on Ethereum with protocols like Uniswap, Yearn finance, Aave, Balancer, Compound and so on. For the Ethereum enthusiasts, myself included, it…Cryptocurrency7 min readCryptocurrency7 min read
Tudor Malene·PinnedA journey towards privacy. The usability.Since the beginning of time in 2008, privacy and security have been in constant battle with usability. You know the drill: “Not your keys, not your coin”. This problem has grown more significant with the advent of blockchains that promise computational privacy. In this post, I will share how we…Blockchain11 min readBlockchain11 min read
Bl4ck.box·PinnedValue of Confidentiality over TimeThe world is all about data. When we send a message, we potentially expect it to be saved on some unknown server. When we play an online game, we mentally cope with the fact that third parties might use certain information. When we buy something online, we are inclined to…Web35 min readWeb35 min read
Polo·PinnedThe 40 IQ guide to ObscuroObscuro Community blog post. My fellow apes, Obscuro is an inclusive community. As such, we don’t forget the 40 IQ degens and apes out there. I’ll do my best to explain Obscuro with nice pictures and colors so you can make an educated apeing. To do so, I will answer…Cryptocurrency5 min readCryptocurrency5 min read
Polo·PinnedChallenges of crypto-native gamingBlockchain gaming has seen a huge interest in the last couple of years, but it can be noted that the most popular games like Axie Infinity, Splinterland, Crabada, actually have very few on-chain components. Community translations: French, Italian, Japanese, Russian, Turkish, Vietnamese They often use blockchain to represent in-game assets…Ethereum5 min readEthereum5 min read
Cais Manai·PinnedHow Obscuro will revolutionize Web3.0 gamingWe’re just scratching the surface of what Web3.0 will enable in gaming. In this post, I’ll explore a single idea of a game that could be built on Obscuro and show you how an entirely new dimension of gameplay is added. Let's begin by imagining a turn-based strategy game like…Blockchain4 min readBlockchain4 min read
Cais Manai·PinnedComputational Privacy and Web 3.0In this post, I’ll explain what computational privacy is and how it’ll unleash a whole new wave of applications for Web 3.0. Let’s start with where it all began. …Blockchain5 min readBlockchain5 min read