vizimnokhPhala Network Hackathon at ETHGlobal Bangkok 2024: Top 5 projectsETHGlobal Bangkok 2024 was a big event where developers from around the world came together to build new and exciting blockchain projects…Dec 6
InIntegritee NetworkbyIntegritee NetworkAI & Confidential Computing: Building Trustworthy AI Applications with TEEsIn today’s digital landscape, Artificial Intelligence (AI) is driving innovation across industries, from healthcare and finance to…Sep 12
InsoftAai Blogsbyamol pawarHow TEE-Backed Fingerprint Authentication Works in Android for Enhanced SecurityFingerprint authentication has become a widely used method for securing mobile devices and applications. In Android, fingerprint…Nov 10Nov 10
Konstantinos PatronasLinux: The pee command, redirect stdin to multiple command pipelinesThe Linux pee command will split your stdout to two or more streams which can be super handy in situations where stdin data processing in…Jun 24, 20221Jun 24, 20221
RocketMe Up CybersecurityExploiting Trusted Execution Environments (TEEs) — Techniques and Defense MechanismsUncovering the exploitation techniques of Trusted Execution Environments and effective defense mechanisms to enhance security.Nov 2Nov 2
vizimnokhPhala Network Hackathon at ETHGlobal Bangkok 2024: Top 5 projectsETHGlobal Bangkok 2024 was a big event where developers from around the world came together to build new and exciting blockchain projects…Dec 6
InIntegritee NetworkbyIntegritee NetworkAI & Confidential Computing: Building Trustworthy AI Applications with TEEsIn today’s digital landscape, Artificial Intelligence (AI) is driving innovation across industries, from healthcare and finance to…Sep 12
InsoftAai Blogsbyamol pawarHow TEE-Backed Fingerprint Authentication Works in Android for Enhanced SecurityFingerprint authentication has become a widely used method for securing mobile devices and applications. In Android, fingerprint…Nov 10
Konstantinos PatronasLinux: The pee command, redirect stdin to multiple command pipelinesThe Linux pee command will split your stdout to two or more streams which can be super handy in situations where stdin data processing in…Jun 24, 20221
RocketMe Up CybersecurityExploiting Trusted Execution Environments (TEEs) — Techniques and Defense MechanismsUncovering the exploitation techniques of Trusted Execution Environments and effective defense mechanisms to enhance security.Nov 2
BlockchainerTEEs: Boosting Privacy and Security in Web3As Web3 technologies gain momentum and are developed by creative people, the need for scalable, private, and secure infrastructures has…Nov 17
InSQD BlogbySQD (previously Subsquid)Exploring the potential of TEEsICYMI, TEEs are the latest crypto craze after dunking on 100 million dollar raises and the complicated social relationships between the ETH…Sep 17
InIntegritee NetworkbyIntegritee NetworkTEE 101: How Intel SGX works and why we use it at IntegriteeIntegritee uses a technology known as trusted execution environments (TEEs) to process sensitive data off-chain. But what exactly are TEEs…Feb 23, 2022