Skip to content

Commit 6e7aeec

Browse files
Add forum link to ZTEE2 (#198)
* Update 2024-11-08-ZTEE2.mdx * added forum link
1 parent 67ee359 commit 6e7aeec

File tree

1 file changed

+2
-1
lines changed

1 file changed

+2
-1
lines changed

content/2024-11-08-ZTEE2.mdx

+2-1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ title: ZTEE - Trustless Supply Chains
44
authors: [quintus, sbellem, bunnie, michaelgao]
55
tags: [ZTEE, hardware, TEE]
66
hide_table_of_contents: false
7+
forum_link: https://collective.flashbots.net/t/ztee-trustless-supply-chains/4033
78
---
89

910
Every distributed cryptographic protocol, key management system or wallet runs on opaque hardware. In almost all cases, we do not know with any certainty that our hardware is executing the expected program and that it is not actually acting against us. [Many cases](https://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969.html) of [exactly](https://web.archive.org/web/20230721093448/https://www.bloomberg.com/features/2021-supermicro/) this kind of [betrayal](https://eprint.iacr.org/2024/1275) have been [uncovered](https://arstechnica.com/tech-policy/2014/05/photos-of-an-nsa-upgrade-factory-show-cisco-router-getting-implant/). The [latest](https://www.aljazeera.com/economy/2024/9/19/lebanon-blasts-raise-alarm-about-supply-chain-security-tech-safety) proved deadly. This precedent suggests the likely existence of undetected malicious hardware in use today.
@@ -209,7 +210,7 @@ The next post will look at attacks on complete chips in more detail.
209210
# Where does this leave us?
210211
![Overview](/img/ZTEE/overview.png)
211212

212-
We believe the techniques described above illustrate that a supply chain with far better trust assumptions is within reach. Our writing should not be taken as an exhaustive survey - there may be much better techniques for achieving the same goals. If your favourite or newly invented approach is better, please let us know. If you’re reading this on the Flashbots website there should be a “leave a reply” button at the top.
213+
We believe the techniques described above illustrate that a supply chain with far better trust assumptions is within reach. Our writing should not be taken as an exhaustive survey - there may be much better techniques for achieving the same goals. If your favourite or newly invented approach is better, [please let us know](https://collective.flashbots.net/t/ztee-trustless-supply-chains/4033).
213214

214215
We have also touched on several open problems and challenges, which would be a great we to get involved. Stated at a high level:
215216

0 commit comments

Comments
 (0)