This is my conversation with Quintus Kilbourn, researcher at Flashbots and currently working on Trusted Execution Environments (TEEs).
Timestamps:
(00:00:00) - intro
(00:01:06) - what is a TEE
(00:12:23) - TEE use cases: one-shot transactions, autonomous AI agents
(00:25:27) - unbreakable hardware enclaves
(00:41:14) - physical hardware access as a threat vector
(00:47:20) - sponsor: Splits
(00:48:04) - defending against physical attacks
(00:55:57) - resources focused on TEEs
(01:10:25) - defending against supply chain attacks
(01:19:34) - hardware imaging
(01:28:48) - the roadmap
(01:32:53) - outro
Links:
- Quintus on X: https://x.com/0xQuintus
- Flashbots: https://www.flashbots.net/
- ZTEE: https://writings.flashbots.net/ZTEE
Thank you to our sponsor for making this podcast possible:
- Splits: https://splits.org
Into the Bytecode:
- Sina Habibian on X: https://twitter.com/sinahab
- Sina Habibian on Farcaster - https://warpcast.com/sinahab
- Into the Bytecode: https://intothebytecode.com
Disclaimer: this podcast is for informational purposes only. It is not financial advice nor a recommendation to buy or sell securities. The host and guests may hold positions in the projects discussed.
More episodes from "Into the Bytecode"
Don't miss an episode of “Into the Bytecode” and subscribe to it in the GetPodcast app.