This is my conversation with Quintus Kilbourn, researcher at Flashbots and currently working on Trusted Execution Environments (TEEs).
Timestamps:
(00:00:00) - intro
(00:01:06) - what is a TEE
(00:12:23) - TEE use cases: one-shot transactions, autonomous AI agents
(00:25:27) - unbreakable hardware enclaves
(00:41:14) - physical hardware access as a threat vector
(00:47:20) - sponsor: Splits
(00:48:04) - defending against physical attacks
(00:55:57) - resources focused on TEEs
(01:10:25) - defending against supply chain attacks
(01:19:34) - hardware imaging
(01:28:48) - the roadmap
(01:32:53) - outro
Links:
- Quintus on X: https://x.com/0xQuintus
- Flashbots: https://www.flashbots.net/
- ZTEE: https://writings.flashbots.net/ZTEE
Thank you to our sponsor for making this podcast possible:
- Splits: https://splits.org
Into the Bytecode:
- Sina Habibian on X: https://twitter.com/sinahab
- Sina Habibian on Farcaster - https://warpcast.com/sinahab
- Into the Bytecode: https://intothebytecode.com
Disclaimer: this podcast is for informational purposes only. It is not financial advice nor a recommendation to buy or sell securities. The host and guests may hold positions in the projects discussed.
Altri episodi di "Into the Bytecode"
Non perdere nemmeno un episodio di “Into the Bytecode”. Iscriviti all'app gratuita GetPodcast.