diff --git a/content/2024-11-08-ZTEE2.mdx b/content/2024-11-08-ZTEE2.mdx index 4044219a..3fe5ad82 100644 --- a/content/2024-11-08-ZTEE2.mdx +++ b/content/2024-11-08-ZTEE2.mdx @@ -4,6 +4,7 @@ title: ZTEE - Trustless Supply Chains authors: [quintus, sbellem, bunnie, michaelgao] tags: [ZTEE, hardware, TEE] hide_table_of_contents: false +forum_link: https://collective.flashbots.net/t/ztee-trustless-supply-chains/4033 --- Every distributed cryptographic protocol, key management system or wallet runs on opaque hardware. In almost all cases, we do not know with any certainty that our hardware is executing the expected program and that it is not actually acting against us. [Many cases](https://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969.html) of [exactly](https://web.archive.org/web/20230721093448/https://www.bloomberg.com/features/2021-supermicro/) this kind of [betrayal](https://eprint.iacr.org/2024/1275) have been [uncovered](https://arstechnica.com/tech-policy/2014/05/photos-of-an-nsa-upgrade-factory-show-cisco-router-getting-implant/). The [latest](https://www.aljazeera.com/economy/2024/9/19/lebanon-blasts-raise-alarm-about-supply-chain-security-tech-safety) proved deadly. This precedent suggests the likely existence of undetected malicious hardware in use today. @@ -209,7 +210,7 @@ The next post will look at attacks on complete chips in more detail. # Where does this leave us? ![Overview](/img/ZTEE/overview.png) -We believe the techniques described above illustrate that a supply chain with far better trust assumptions is within reach. Our writing should not be taken as an exhaustive survey - there may be much better techniques for achieving the same goals. If your favourite or newly invented approach is better, please let us know. If you’re reading this on the Flashbots website there should be a “leave a reply” button at the top. +We believe the techniques described above illustrate that a supply chain with far better trust assumptions is within reach. Our writing should not be taken as an exhaustive survey - there may be much better techniques for achieving the same goals. If your favourite or newly invented approach is better, [please let us know](https://collective.flashbots.net/t/ztee-trustless-supply-chains/4033). We have also touched on several open problems and challenges, which would be a great we to get involved. Stated at a high level: