Damus
HODL · 32w
I’m not sure, but I’m sure nostr:nprofile1qqsgafy9ye4j9p2x8vfmlq6equtpcg4m8ks7v545g0d3f7wwueeq5scprfmhxue69uhhyetvv9ujumn0wd68ycmgv43kktndv5hsz9mhwden5te0wfjkccte9ec8y6tdv9kzumn9wshssdt5n3 can answer
Marks · 32w
We use confidential computing. Secure enclaves provide cryptographic proofs of the code running on them. A user can build the open source code and compare the fingerprint to the secure enclave. Lots of details in our tech primer here https://blog.opensecret.cloud/opensecret-technicals/