Trusted Execution Environments (TEEs) are designed to ensure secure remote computation, but their “security by obscurity” and hardware vulnerabilities raise concerns about confidentiality and trust. Attacks like Foreshadow expose flaws in Intel SGX and ARM TrustZone, while open-source alternatives like Keystone still depend on manufacturer integrity. Encointer’s blockchain ecosystem uses TEEs for proof-of-personhood and universal basic income but acknowledges scalability and trust limitations, pledging transparency through community governance.Trusted Execution Environments (TEEs) are designed to ensure secure remote computation, but their “security by obscurity” and hardware vulnerabilities raise concerns about confidentiality and trust. Attacks like Foreshadow expose flaws in Intel SGX and ARM TrustZone, while open-source alternatives like Keystone still depend on manufacturer integrity. Encointer’s blockchain ecosystem uses TEEs for proof-of-personhood and universal basic income but acknowledges scalability and trust limitations, pledging transparency through community governance.

Inside Trusted Execution Environments: How Secure Are Your Crypto Transactions?

2025/10/06 04:47

Abstract and I. Motivation

II. Local Currencies

III. Unique Pop Ceremonies

IV. Monetary Policy

V. Purchasing-Power Adjusted Transaction Fees

VI. Architecture

VII. Trusted Execution Environment Security

VIII. Encointer Association

IX. Known Limitations

X. Conclusion and References

VII. TRUSTED EXECUTION ENVIRONMENT SECURITY

TEEs aim to provide the necessary guarantees for secure remote computation. They should provide integrity and confidentiality guarantees when executing software on a computer maintained by an untrusted party. The most recent TEEs rely on software attestation, a process that guarantees the user that she’s communicating with a known piece of code running inside a secure container on a genuine trusted hardware by means of a manufacturer signature.

\ As criticized in [14], manufacturers seem to follow a security by obscurity principle not disclosing design internals necessary for a proper security review. Their in dubio contra reum analysis of Intel SGX shows vulnerabilities to cache timing and sidechannel attacks. Foreshadow [15] falsified confidentiality as well as integrity claims for SGX but the attack is mitigated for now. ARM TrustZone on the other hand is only an IP core and design details are left to the manufacturer, equally reluctant to disclose details.

\ Since at least the post-Snowden era, one also has to be concerned about manufacturers being forced by their state to introduce deliberate backdoors. Even if open-source TEEs like Keystone [22] might soon deliver devices, one would still have to trust the manufacturer not to tamper with the design.

\ While all this is disturbing, it should be put in perspective. Information security is a never-ending race. All blockchain solutions are software running by large part on Intel CPUs. While hardware wallets may give us some comfort concerning our funds private keys, there’s no guarantee on confidentiality when considering sidechannel attacks.

\ The Encointer association will follow developments closely and maintain an up to date list of accepted TEE manufacturers’ attestation keys.

\

VIII. Encointer ASSOCIATION

The Encointer association is a not-for-profit association under Swiss law. Its purpose is to govern the Encointer ecosystem during its initial phase. It fulfills the following tasks

\ • community bootstrapping

\ • protocol updates

\ • maintain list of accepted TEE attestation service keys

\ All changes are subject to a referendum by the community.

\

IX. KNOWN LIMITATIONS

A. Scalability

\ The proposed Encointer protocol assumes that the entire state for a local community can fit into secure memory within a TEE. This limits the number of accounts that can be registered per community.

\

X. CONCLUSION

A novel cryptocurrency system has been introduced in conceptual detail. Main contributions are

\ • A novel approach to monetary policy supporting equal opportunity globally with a universal basic income (UBI) in local community currencies.

\ • A novel protocol for trustless pseudonym key signing parties for proof-of-personhood (PoP)

\ • Private transactions with purchasing-power adjusted fees.

REFERENCES

[1] Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system, http://bitcoin.org/bitcoin.pdf, 2008

\ [2] Richard Cantiollon. Essai sur la Nature du Commerce en Gen´ eral, 1755 ´

\ [3] Thomas Piketty. Capital in the Twenty-First Century, 2013

\ [4] Bryan Ford. Pseudonym Parties: An Offline Foundation for Online Accountability, 2008

\ [5] Maria Borge et al. Proof-of-Personhood: Redemocratizing Permissionless Cryptocurrencies

\ [6] Silvio Gesell, The Natural Economic Order, 1958

\ [7] Bernard Lietaer at al., People Money: The Promise of Regional Currencies, 2012

\ [8] Sunny King, Scott Nadal. PPCoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake, 2012

\ [9] Gavin Wood, Polkadot: Vision for a Heterogeneous Multi-Chain Framework

\ [10] Fergal Reid. An Analysis of Anonymity in the Bitcoin System, Security and Privacy in Social Networks, 2012

\ [11] Nicolas van Saberhagen, CryptoNote v 2.0, https://cryptonote.org/whitepaper.pdf, 2014

\ [12] Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, Madars Virza, Zerocash: Decentralized Anonymous Payments from Bitcoin, proceedings of the IEEE Symposium on Security & Privacy (Oakland) 2014, 459-474, IEEE, 2014

\ [13] Hyperledger Sawtooth Private Data Objects. https://github.com/hyperledger-labs/private-data-objects

\ [14] V. Costan S. Devadas. Intel SGX Explained. Tech. rep., Cryptology ePrint Archive, 2016.

\ [15] Jo Van Bulck et.al. Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution, 2018

\ [16] Introducing ARM TrustZone. https://developer.arm.com/technologies/trustzone

\ [17] www.substratee.com Historical Economics in Honour of Joseph Schumpeter, Princeton University Press, 1972

\ [18] Poon, Joseph. The Bitcoin Lightning Network: Scalable Off-Chain Instant Payments, 2015

\ [19] J. Lind, I. Eyal, P. Pietzuch, E. Gun Sirer. Teechan: Payment Channels ¨ Using Trusted Execution Environments

\ [20] Serguey Popov. The Tangle, http://iotatoken.com/IOTA Whitepaper.pdf, 2016

\ [21] Colin LeMahieu. Nano: A Feeless Distributed Cryptocurrency Network, 2016

\ [22] Keystone Project, https://keystone-enclave.github.io/

\ [23] https://en.wikipedia.org/wiki/List of cities by population density, sampled Nov. 2018

\ [24] Stodder, J., Complementary Credit Networks and Macro-Economic Stability: Switzerland’s Wirtschaftsring, Journal of Economic Behavior and Organization, 2009

\ [25] Gelleri, Chiemgauer Regiomoney: Theory and Proctise of Regional Currencies, 2009

\ [26] Freicoin: https://freico.in

\

:::info Author:

(1) Alain Brenzikofer (alain@encointer.org).

:::


:::info This paper is available on arxiv under CC BY-NC-SA 4.0 DEED license.

:::

\

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

SEC urges caution on crypto wallets in latest investor guide

SEC urges caution on crypto wallets in latest investor guide

The SEC’s Office of Investor Education and Assistance issued a bulletin warning retail investors about crypto asset custody risks. The guidance covers how investors
Share
Crypto.news2025/12/15 01:45
A Netflix ‘KPop Demon Hunters’ Short Film Has Been Rated For Release

A Netflix ‘KPop Demon Hunters’ Short Film Has Been Rated For Release

The post A Netflix ‘KPop Demon Hunters’ Short Film Has Been Rated For Release appeared on BitcoinEthereumNews.com. KPop Demon Hunters Netflix Everyone has wondered what may be the next step for KPop Demon Hunters as an IP, given its record-breaking success on Netflix. Now, the answer may be something exactly no one predicted. According to a new filing with the MPA, something called Debut: A KPop Demon Hunters Story has been rated PG by the ratings body. It’s listed alongside some other films, and this is obviously something that has not been publicly announced. A short film could be well, very short, a few minutes, and likely no more than ten. Even that might be pushing it. Using say, Pixar shorts as a reference, most are between 4 and 8 minutes. The original movie is an hour and 36 minutes. The “Debut” in the title indicates some sort of flashback, perhaps to when HUNTR/X first arrived on the scene before they blew up. Previously, director Maggie Kang has commented about how there were more backstory components that were supposed to be in the film that were cut, but hinted those could be explored in a sequel. But perhaps some may be put into a short here. I very much doubt those scenes were fully produced and simply cut, but perhaps they were finished up for this short film here. When would Debut: KPop Demon Hunters theoretically arrive? I’m not sure the other films on the list are much help. Dead of Winter is out in less than two weeks. Mother Mary does not have a release date. Ne Zha 2 came out earlier this year. I’ve only seen news stories saying The Perfect Gamble was supposed to come out in Q1 2025, but I’ve seen no evidence that it actually has. KPop Demon Hunters Netflix It could be sooner rather than later as Netflix looks to capitalize…
Share
BitcoinEthereumNews2025/09/18 02:23
Fed rate decision September 2025

Fed rate decision September 2025

The post Fed rate decision September 2025 appeared on BitcoinEthereumNews.com. WASHINGTON – The Federal Reserve on Wednesday approved a widely anticipated rate cut and signaled that two more are on the way before the end of the year as concerns intensified over the U.S. labor market. In an 11-to-1 vote signaling less dissent than Wall Street had anticipated, the Federal Open Market Committee lowered its benchmark overnight lending rate by a quarter percentage point. The decision puts the overnight funds rate in a range between 4.00%-4.25%. Newly-installed Governor Stephen Miran was the only policymaker voting against the quarter-point move, instead advocating for a half-point cut. Governors Michelle Bowman and Christopher Waller, looked at for possible additional dissents, both voted for the 25-basis point reduction. All were appointed by President Donald Trump, who has badgered the Fed all summer to cut not merely in its traditional quarter-point moves but to lower the fed funds rate quickly and aggressively. In the post-meeting statement, the committee again characterized economic activity as having “moderated” but added language saying that “job gains have slowed” and noted that inflation “has moved up and remains somewhat elevated.” Lower job growth and higher inflation are in conflict with the Fed’s twin goals of stable prices and full employment.  “Uncertainty about the economic outlook remains elevated” the Fed statement said. “The Committee is attentive to the risks to both sides of its dual mandate and judges that downside risks to employment have risen.” Markets showed mixed reaction to the developments, with the Dow Jones Industrial Average up more than 300 points but the S&P 500 and Nasdaq Composite posting losses. Treasury yields were modestly lower. At his post-meeting news conference, Fed Chair Jerome Powell echoed the concerns about the labor market. “The marked slowing in both the supply of and demand for workers is unusual in this less dynamic…
Share
BitcoinEthereumNews2025/09/18 02:44