logo
Confidential Computing Part - 2: Remote Attestation Transport Layer Security (RA-TLS)Clock Icon20 min readCalendar Icon10 May 2025
This technical analysis explores the foundations, communication components, and verification mechanisms of Remote Attestation obtained from Trusted Execution Environments (TEEs).
Blog Image
Confidential Computing: Dstack SDK and TEEs Part - 1Clock Icon8 min readCalendar Icon17 March 2025
Trusted Execution Environments (TEEs) are revolutionizing blockchain privacy by enabling secure, confidential computing with hardware-backed isolation and remote attestation. Unlike cryptographic solutions like Fully Homomorphic Encryption (FHE) or Multi-Party Computation (MPC), which suffer from high computational overhead, TEEs offer near-native performance while ensuring data integrity and privacy.
Blog Image
Why Privacy in Bitcoin MattersClock Icon8 min readCalendar Icon07 Feb 2025
Bitcoin is often praised for being decentralized and censorship-resistant, but its public ledger creates a serious problem—lack of privacy. Every transaction is permanently recorded, meaning anyone can trace wallet addresses, balances, and transaction history. This poses risks for individuals, businesses, and institutions, making privacy a necessity rather than a luxury.
Blog Image
Overview of Distributed Key Generation from Pseudo-Random Secret Sharing (PRSS)Clock Icon8 min readCalendar Icon29 Jan 2025
Key management is a critical part of programmable privacy systems. Pseudo-Random Secret Sharing (PRSS) enables deterministic and secure distributed key generation using shared randomness, eliminating the need for a trusted dealer.
Blog Image
Encifher x Chainsight: Bringing Privacy to On-Chain DataClock Icon5 min readCalendar Icon28 Jan 2025
Encifher is teaming up with Chainsight to bring privacy to on-chain data. This collaboration will enable dApps to use encrypted data feeds while ensuring security and confidentiality. By leveraging Private Shared State technology, sensitive information remains private while still being utilized for computations and decision-making.
Blog Image
Private Shared State for DummiesClock Icon12 min readCalendar Icon22 Jan 2025
Private shared state introduces a privacy-preserving mechanism in blockchain by allowing sensitive state data to be selectively shared or encrypted. This guide explains the concept of shared state, its challenges, and how private shared state enhances security and composability.
Blog Image
Encifher x Rabble: Private Transactions, Made SimpleClock Icon5 min readCalendar Icon14 Jan 2025
Encifher is teaming up with Rabble to enable private transactions for users on Arbitrum. Sending money on-chain no longer means exposing transaction history to the world. With Encifher’s privacy technology, users can send funds confidentially and securely with just a few clicks.
Blog Image
An Incomplete Guide to Encrypted ERC20Clock Icon10 min readCalendar Icon13 Jan 2025
Encrypted ERC20 tokens extend the ERC20 standard by introducing privacy-preserving mechanisms through encryption. This guide explores how encryption works, the architecture of encrypted tokens, and their benefits.
Blog Image