Global Feed Post Login
Replying to Avatar JOE2o

The enclave approach would be close to that, the operator could obviously know what's on the relay, because anyone can query the relay, and the notes are not encrypted. But the op wouldn't be able to do anything with this knowledge, because to change the code of the relay would require breaking the attestation and being booted from protocol compliance. So code-enforced not caring, in a way.

Avatar
Ben Weeks ⚡ 2w ago

Interesting!

Reply to this note

Please Login to reply.

Discussion

No replies yet.