VP.NET is built on a foundation of zero-knowledge privacy. By publishing our SGX enclave source code, we enable users to:
- Verify our no-logging policy through code inspection
- Confirm that servers cannot access user data or traffic patterns
- Validate that the code running on our servers matches this public repository
You are 100% right. Also - SGX depends on explicit trust of Intel code signing, which is another externality that needs to be in the threat model.