<aside> <img src="/icons/book-closed_purple.svg" alt="/icons/book-closed_purple.svg" width="40px" />
</aside>
The TEE Coprocessor tech stack is a comprehensive, easy-to-integrate solution designed for secure, isolated data handling. Ideal for Web3 developers, it brings powerful privacy and verifiable computations essential for confidential AI, DeFi protocols, and Layer 2 solutions, ensuring robust security against unauthorized access.
TEE provides enhanced privacy, trust minimization, and security by integrating a trusted, isolated environment into Web3 and blockchain components, enabling more secure smart contracts, DeFi protocols, and Layer 2 solutions like Validium, while making decentralized applications more reliable and resilient to attacks or tampering.
If you put a Smart Contract in a TEE, it gets upgraded with programmable privacy
Smart Contract VMs + TEE =
Programmable Privacy
DeFi Lending + TEE = Snipe-resistant Lending
If you put a builder in a TEE, it comes out trust minimized
Block Builder + TEE = Simulation and ordering rules are followed
Bidding/refund rules are followed
Pre-trade and failed-trade privacy respected
If you put an unfinished L2 sequencer in a TEE, it comes out a validium with proactive security
ZK Prover + TEE = 2FA prove
MPC + TEE =
Collusion resistant MPC
If you put a web2 in TEE it comes out web3
Frontends + TEE = Decentralized and unhinged web3 application
Backends + TEE = “Liquefy” and fractionalize legacy accounts
<aside> <img src="/icons/book-closed_purple.svg" alt="/icons/book-closed_purple.svg" width="40px" /> The TEE tech stack offers a secure, zero-trust environment for computations, designed to simplify integration for Web3 and blockchain developers. Ideal for projects that require protected data processing, verifiable computations, and smooth workflows, this stack is crucial for building privacy-focused, reliable applications that prioritize both security and developer efficiency.
</aside>
TEEs unlock advanced applications that seamlessly combine privacy with usability, providing a more efficient and secure alternative to traditional cryptographic techniques like ZK and FHE. They are well-suited for developers working on privacy-sensitive Web3 projects.
TEEs simplify integration, optimizing the developer experience and aligning naturally with multi-prover rollup designs. Emerging technologies like Intel TDX will further expand TEE capabilities.
The future of TEE lies not only in execution security but in refining a broader framework for safe, private smart contracts. Educating developers on pitfalls, mitigations, and proactive security practices will shape the next generation of secure applications.
<aside> <img src="/icons/book-closed_purple.svg" alt="/icons/book-closed_purple.svg" width="40px" /> Powered by Flashbots 🤖, Phala Network 🍵, Automata⚙️, Clique 🐬, Fabric 💻
</aside>
We collaborate with leading industry partners such as Flashbots, Phala, Clique, and Automata to deliver state-of-the-art TEE coprocessor solutions.
With tools like Dstack (a Docker-based SDK), you gain easy access to modular components, including Web3 attestations, TEE explorers, KMS, block-building templates, and Layer 2 integrations.
Built to meet Web3's demanding privacy and security requirements, TaaS (TEE-as-a-Service) offers top-tier protection for your decentralized applications.
Get easy, on-demand access to TEE nodes as a service, eliminating the need for extensive infrastructure management.
We are not a company.
Our focus is on building a vibrant community of solution providers and open-source developers. We also contribute high-quality research and EIPs to the Ethereum ecosystem.
Our vision is to create open-source, self-producible TEE hardware, reducing reliance on Intel, AMD, or Nvidia.
The 5 levels of TEE represent a journey toward a fully secure, collaborative architecture. Each level advances in complexity, flexibility, and security, starting from basic CPU enclaves and moving toward highly sophisticated, interconnected cryptographic environments.
Examples like Intel SGX enable basic secure computing for non-stateful workloads, using proprietary security with remote attestation.
Uses Intel SGX with software like Gramine to enable features like OAuth. Security relies on obfuscation.
Emerging solutions like Keystore aim to support identity and private machine learning with open instruction sets, though hardware remains vulnerable.
Examples include Intel TDX, supporting distributed machine learning and blockchain functions with minimal performance overhead, though cloud-based security is limited.