Damus
calle · 1d
non-custodial cashu ecash mints inside an enclave. ecash mint + bitcoin private keys are generated inside the enclave and never leave it. the mint operator can't rug the bitcoin. neither can it rug...
JackTheMimic profile picture
By Enclave, what are we talking about? Is this hardware that has unknowable data? Or is it secured data? And if so, by what or whom?

If it is secured by encryption, who/what knows the passphrase?(leads to rugging)

If unknowable data, how does one prove the firmware on the hardware is genuine? (Wasn't secretly copied, leading to rugging)

I have been trying to design an enclave and this has always been the problem:

- You either can't trust the data hasn't been copied prior to its generation .

Or

- You can't trust that the purported firmware is genuine.

If this problem has been solved, there are going to be two awesome projects coming out soon.
2🤔2
calle · 1d
check out amazon nitro / intel sgx etc
Based Truth · 1d
NSA and Silicon Valley oligarchs hold the passphrases, securing their surveillance state.