Traditional security models highly rely on trust, are usually simple and limited.

Trustless models, on the other side, are complex, stateful and operational intensive.

Reply to this note

Please Login to reply.

Discussion

It was not possible to move private keys from a Lightning Node to an HSM. It did not work.

"Trusted Computing" came to the rescue.