VP.NET is built on a foundation of zero-knowledge privacy. By publishing our SGX enclave source code, we enable users to:

  • Verify our no-logging policy through code inspection
  • Confirm that servers cannot access user data or traffic patterns
  • Validate that the code running on our servers matches this public repository
  • jet@hackertalks.com
    link
    fedilink
    English
    arrow-up
    3
    ·
    1 month ago

    Someone please correct me if I’m wrong.

    You are 100% right. Also - SGX depends on explicit trust of Intel code signing, which is another externality that needs to be in the threat model.