Global Feed Post Login
Replying to Avatar Marks

We use confidential computing. Secure enclaves provide cryptographic proofs of the code running on them. A user can build the open source code and compare the fingerprint to the secure enclave.

Lots of details in our tech primer here https://blog.opensecret.cloud/opensecret-technicals/

Avatar
MoMeezy ϟ 𓅦 ₿ 5mo ago

perfect. thanks for the reply/link.

Reply to this note

Please Login to reply.

Discussion

No replies yet.