This is my conversation with Quintus Kilbourn, researcher at Flashbots and currently working on Trusted Execution Environments (TEEs).
Timestamps:
(00:00:00) - intro
(00:01:06) - what is a TEE
(00:12:23) - TEE use cases: one-shot transactions, autonomous AI agents
(00:25:27) - unbreakable hardware enclaves
(00:41:14) - physical hardware access as a threat vector
(00:47:20) - sponsor: Splits
(00:48:04) - defending against physical attacks
(00:55:57) - resources focused on TEEs
(01:10:25) - defending against supply chain attacks
(01:19:34) - hardware imaging
(01:28:48) - the roadmap
(01:32:53) - outro
Links:
- Quintus on X: https://x.com/0xQuintus
- Flashbots: https://www.flashbots.net/
- ZTEE: https://writings.flashbots.net/ZTEE
Thank you to our sponsor for making this podcast possible:
- Splits: https://splits.org
Into the Bytecode:
- Sina Habibian on X: https://twitter.com/sinahab
- Sina Habibian on Farcaster - https://warpcast.com/sinahab
- Into the Bytecode: https://intothebytecode.com
Disclaimer: this podcast is for informational purposes only. It is not financial advice nor a recommendation to buy or sell securities. The host and guests may hold positions in the projects discussed.
Flere episoder fra "Into the Bytecode"
Gå ikke glip af nogen episoder af “Into the Bytecode” - abonnér på podcasten med gratisapp GetPodcast.