Skip to content

Commit

Permalink
Add forum link to ZTEE2 (#198)
Browse files Browse the repository at this point in the history
* Update 2024-11-08-ZTEE2.mdx

* added forum link
  • Loading branch information
quintuskilbourn authored Nov 9, 2024
1 parent 67ee359 commit 6e7aeec
Showing 1 changed file with 2 additions and 1 deletion.
3 changes: 2 additions & 1 deletion content/2024-11-08-ZTEE2.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -4,6 +4,7 @@ title: ZTEE - Trustless Supply Chains
authors: [quintus, sbellem, bunnie, michaelgao]
tags: [ZTEE, hardware, TEE]
hide_table_of_contents: false
forum_link: https://collective.flashbots.net/t/ztee-trustless-supply-chains/4033
---

Every distributed cryptographic protocol, key management system or wallet runs on opaque hardware. In almost all cases, we do not know with any certainty that our hardware is executing the expected program and that it is not actually acting against us. [Many cases](https://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969.html) of [exactly](https://web.archive.org/web/20230721093448/https://www.bloomberg.com/features/2021-supermicro/) this kind of [betrayal](https://eprint.iacr.org/2024/1275) have been [uncovered](https://arstechnica.com/tech-policy/2014/05/photos-of-an-nsa-upgrade-factory-show-cisco-router-getting-implant/). The [latest](https://www.aljazeera.com/economy/2024/9/19/lebanon-blasts-raise-alarm-about-supply-chain-security-tech-safety) proved deadly. This precedent suggests the likely existence of undetected malicious hardware in use today.
Expand Down Expand Up @@ -209,7 +210,7 @@ The next post will look at attacks on complete chips in more detail.
# Where does this leave us?
![Overview](/img/ZTEE/overview.png)

We believe the techniques described above illustrate that a supply chain with far better trust assumptions is within reach. Our writing should not be taken as an exhaustive survey - there may be much better techniques for achieving the same goals. If your favourite or newly invented approach is better, please let us know. If you’re reading this on the Flashbots website there should be a “leave a reply” button at the top.
We believe the techniques described above illustrate that a supply chain with far better trust assumptions is within reach. Our writing should not be taken as an exhaustive survey - there may be much better techniques for achieving the same goals. If your favourite or newly invented approach is better, [please let us know](https://collective.flashbots.net/t/ztee-trustless-supply-chains/4033).

We have also touched on several open problems and challenges, which would be a great we to get involved. Stated at a high level:

Expand Down

0 comments on commit 6e7aeec

Please sign in to comment.