Articles by Tag #tee

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

Throwing The TEE Gauntlet - A Turnabout Security Challenge

Much talk has gone around after recent TEE (Trusted Execution Environment) attacks tested by...

Learn More 3 7Oct 21

When TEEs Fail Gracefully: How Oasis Survived the Battering RAM and Wiretap Attacks

In early October, 2025, two new physical attacks - Battering RAM and Wiretap, broke open the latest...

Learn More 2 3Oct 23

Trusting AI Models With TEEs - Private, Decentralized, Verified Part 2

In the first part, I referenced DeAI and how Oasis suggests a combination of RONL (runtime on-chain...

Learn More 3 5Nov 19

Trusting AI Models With TEEs - Private, Decentralized, Verified Part 1

This is the age of AI, and I am here to do another examination of decentralized AI (DeAI). Today,...

Learn More 4 5Nov 19

Essential Ingredient in Making TEEs Truly Secure? Remote Attestation.

Privacy was a blockchain paradox for a long time after the technology was first introduced. But as...

Learn More 2 8Mar 26

Smart Privacy & TEEs Unlocking Next-gen Web3: The Oasis Way

Those days are gone when the blockchain trilemma, saying only two of its three pillars of...

Learn More 1 0Feb 27

Why I Think Decentralized AI Can Be A Game Changer For The Future Of AI

I admit I am a blockchain and web3 enthusiast, not an AI expert. Yet, the idea of AI and blockchain...

Learn More 1 3Jun 27