<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Manav</title>
    <description>The latest articles on Forem by Manav (@caerlower).</description>
    <link>https://forem.com/caerlower</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1278424%2Fa7510fed-1734-4c05-9b31-467e2c9fed5c.jpeg</url>
      <title>Forem: Manav</title>
      <link>https://forem.com/caerlower</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/caerlower"/>
    <language>en</language>
    <item>
      <title>Building Privacy-First Web3 &amp; AI Apps with Oasis Sapphire and GetBlock</title>
      <dc:creator>Manav</dc:creator>
      <pubDate>Sun, 25 Jan 2026 16:10:00 +0000</pubDate>
      <link>https://forem.com/caerlower/building-privacy-first-web3-ai-apps-with-oasis-sapphire-and-getblock-4il9</link>
      <guid>https://forem.com/caerlower/building-privacy-first-web3-ai-apps-with-oasis-sapphire-and-getblock-4il9</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmww17rxn521kz1jf2kcq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmww17rxn521kz1jf2kcq.png" alt="oasis protocol" width="800" height="398"&gt;&lt;/a&gt;&lt;br&gt;
As AI-driven applications move onchain, one issue keeps resurfacing: &lt;strong&gt;how do you handle sensitive data without breaking decentralization or compliance?&lt;/strong&gt; Most EVM chains expose all state by default, which makes them a poor fit for identity, AI agents, and regulated DeFi.&lt;/p&gt;

&lt;p&gt;This is where &lt;strong&gt;Oasis Network&lt;/strong&gt; and &lt;strong&gt;GetBlock&lt;/strong&gt; come together.&lt;/p&gt;

&lt;p&gt;GetBlock now supports &lt;strong&gt;&lt;a href="//oasis.net/sapphire"&gt;Oasis Sapphire&lt;/a&gt;&lt;/strong&gt;, Oasis’s confidential EVM runtime, making it easier for developers to deploy privacy-aware smart contracts and AI-enabled applications using familiar tooling.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why Oasis Sapphire Is Different
&lt;/h2&gt;

&lt;p&gt;Oasis Sapphire is a production EVM with &lt;strong&gt;programmable privacy&lt;/strong&gt; built in. Developers can choose which parts of state or execution are confidential, instead of forcing everything to be public or fully private.&lt;/p&gt;

&lt;p&gt;Key technical properties:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Smart contracts run inside Trusted Execution Environments (TEEs)&lt;/li&gt;
&lt;li&gt;Sensitive inputs and state remain encrypted end-to-end&lt;/li&gt;
&lt;li&gt;Privacy is optional and composable, not all-or-nothing&lt;/li&gt;
&lt;li&gt;Solidity-compatible, no custom language required&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This makes Sapphire particularly well-suited for:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;AI agents handling proprietary strategies or user data&lt;/li&gt;
&lt;li&gt;Identity and access control systems&lt;/li&gt;
&lt;li&gt;Compliance-aware DeFi&lt;/li&gt;
&lt;li&gt;Applications that require private logic but public settlement&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  What GetBlock Adds for Developers
&lt;/h2&gt;

&lt;p&gt;With GetBlock’s Oasis support, developers don’t need to self-host or manage infrastructure to get started.&lt;/p&gt;

&lt;p&gt;You get:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;JSON-RPC and WebSocket endpoints&lt;/li&gt;
&lt;li&gt;Mainnet and Testnet access&lt;/li&gt;
&lt;li&gt;Shared or dedicated nodes&lt;/li&gt;
&lt;li&gt;Archive data support&lt;/li&gt;
&lt;li&gt;99.9%+ uptime SLA&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;From a workflow perspective, this means you can plug Oasis Sapphire into existing tooling (Hardhat, Foundry, wallets, indexers) the same way you would with any other EVM chain.&lt;/p&gt;

&lt;h2&gt;
  
  
  Privacy Meets UX and Security
&lt;/h2&gt;

&lt;p&gt;Oasis’s privacy model also extends to user authentication. Sapphire supports modern security patterns like:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Passkeys&lt;/li&gt;
&lt;li&gt;TouchID / biometric auth&lt;/li&gt;
&lt;li&gt;TOTP-based 2FA&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This makes it possible to build applications where users don’t need to choose between usability, privacy, and compliance.&lt;/p&gt;

&lt;h2&gt;
  
  
  When Does This Matter?
&lt;/h2&gt;

&lt;p&gt;If your application:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;processes sensitive user inputs&lt;/li&gt;
&lt;li&gt;runs AI or agent logic onchain&lt;/li&gt;
&lt;li&gt;needs selective disclosure instead of full transparency&lt;/li&gt;
&lt;li&gt;targets enterprise or regulated environments&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;then a confidential EVM is no longer a “nice-to-have,” it’s infrastructure.&lt;/p&gt;

&lt;p&gt;With GetBlock providing managed access to Oasis Sapphire, the barrier to building these systems drops significantly.&lt;/p&gt;

&lt;h2&gt;
  
  
  Final Thoughts
&lt;/h2&gt;

&lt;p&gt;Web3 and AI are converging quickly, but most onchain environments were never designed for private computation. Oasis Sapphire fills that gap by bringing confidentiality to the EVM itself, and GetBlock makes it accessible without operational overhead.&lt;/p&gt;

&lt;p&gt;For developers building the next generation of AI-driven, privacy-aware dApps, this combination is worth a serious look.&lt;/p&gt;

&lt;p&gt;Docs and RPC access are available directly via GetBlock’s Oasis integration.&lt;/p&gt;

&lt;p&gt;checkout more about it here: &lt;a href="https://getblock.io/nodes/oasis/" rel="noopener noreferrer"&gt;https://getblock.io/nodes/oasis/&lt;/a&gt;&lt;/p&gt;

</description>
      <category>programming</category>
      <category>web3</category>
      <category>ai</category>
      <category>blockchain</category>
    </item>
    <item>
      <title>Why Portable AI Memory Needs Confidential Compute?</title>
      <dc:creator>Manav</dc:creator>
      <pubDate>Sun, 25 Jan 2026 16:00:14 +0000</pubDate>
      <link>https://forem.com/caerlower/why-portable-ai-memory-needs-confidential-compute-3b73</link>
      <guid>https://forem.com/caerlower/why-portable-ai-memory-needs-confidential-compute-3b73</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftpbfygcf31j2d5ikow4a.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftpbfygcf31j2d5ikow4a.png" alt="ai" width="800" height="457"&gt;&lt;/a&gt;&lt;br&gt;
AI models are getting better at reasoning, but their memory model is still fundamentally broken. Context is siloed per provider, tied to proprietary storage, and lost the moment you switch tools. For developers working across agents, IDEs, and models, this isn’t just annoying, it’s a hard architectural limit.&lt;/p&gt;

&lt;p&gt;Crypto-native infrastructure offers a way out, and this is where &lt;strong&gt;Oasis Network&lt;/strong&gt; becomes particularly relevant.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Structural Problem: Stateless Intelligence
&lt;/h2&gt;

&lt;p&gt;Most LLMs are effectively stateless. They infer from a bounded context window and discard everything else. Increasing context size helps marginally, but doesn’t solve the core issue: there’s no durable, user-owned memory layer that models can safely and selectively access.&lt;/p&gt;

&lt;p&gt;Instead, memory is emulated via:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;chat logs&lt;/li&gt;
&lt;li&gt;proprietary retrieval systems&lt;/li&gt;
&lt;li&gt;provider-controlled embeddings&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;From a systems perspective, this creates tight coupling between &lt;strong&gt;memory, model, and vendor&lt;/strong&gt; which kills portability and composability.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why Centralized AI Memory Fails
&lt;/h2&gt;

&lt;p&gt;Treating memory as a platform feature introduces several problems developers already recognize:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Lock-in&lt;/strong&gt;: memory only works inside one provider’s ecosystem&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Opaque access&lt;/strong&gt;: no clear guarantees on how memory is processed&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Compliance risk&lt;/strong&gt;: centralized storage becomes a liability&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;No interoperability&lt;/strong&gt;: switching models resets accumulated context&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;For agents or long-lived workflows (trading strategies, coding styles, research context), this is a dead end.&lt;/p&gt;

&lt;h2&gt;
  
  
  Reframing Memory as Confidential Infrastructure
&lt;/h2&gt;

&lt;p&gt;The real challenge isn’t storing memory, it’s &lt;strong&gt;processing it safely&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;A usable AI memory layer must support:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;user ownership of data&lt;/li&gt;
&lt;li&gt;selective disclosure&lt;/li&gt;
&lt;li&gt;confidentiality during inference&lt;/li&gt;
&lt;li&gt;verifiable execution&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This is exactly the problem space Oasis was designed for.&lt;/p&gt;

&lt;p&gt;Oasis provides &lt;strong&gt;confidential compute&lt;/strong&gt;, where data remains encrypted not just at rest, but &lt;em&gt;during execution&lt;/em&gt;. Memory can be processed inside trusted execution environments (TEEs) without being exposed to the host, operator, or even the application developer.&lt;/p&gt;

&lt;h2&gt;
  
  
  Where Oasis Fits Technically
&lt;/h2&gt;

&lt;p&gt;On Oasis, memory doesn’t have to live inside the model provider at all.&lt;/p&gt;

&lt;p&gt;Using &lt;a href="//oasis.net/sapphire"&gt;Sapphire&lt;/a&gt; and &lt;strong&gt;&lt;a href="http://docs.oasis.io/build/rofl/" rel="noopener noreferrer"&gt;ROFL&lt;/a&gt;&lt;/strong&gt;, developers can:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;store sensitive memory encrypted&lt;/li&gt;
&lt;li&gt;process it inside TEEs&lt;/li&gt;
&lt;li&gt;enforce access rules programmatically&lt;/li&gt;
&lt;li&gt;generate attestations proving how memory was used&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This decouples three layers that are currently entangled:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;memory&lt;/strong&gt; (user-owned, portable)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;models&lt;/strong&gt; (replaceable, routable)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;execution&lt;/strong&gt; (verifiable, confidential)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;An agent running on ROFL can query memory, reason over it, and act—without leaking raw context to the model provider or infrastructure operator.&lt;/p&gt;

&lt;h2&gt;
  
  
  What This Enables
&lt;/h2&gt;

&lt;p&gt;With a confidential, portable memory layer:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;switching AI models doesn’t reset context&lt;/li&gt;
&lt;li&gt;agents can operate across tools without loss of state&lt;/li&gt;
&lt;li&gt;long-term strategies compound instead of reset&lt;/li&gt;
&lt;li&gt;curated memory becomes a reusable asset&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This is especially relevant for crypto-native agents, where memory often encodes real economic behavior and competitive edge.&lt;/p&gt;

&lt;h2&gt;
  
  
  Closing Thought
&lt;/h2&gt;

&lt;p&gt;Bigger models won’t fix AI’s memory problem. Better architecture will.&lt;/p&gt;

&lt;p&gt;By separating memory from models and anchoring it in confidential, verifiable compute, platforms like Oasis make persistent AI context technically feasible without sacrificing privacy or control.&lt;/p&gt;

&lt;p&gt;For developers building agents, tools, or workflows that need continuity over time, portable memory isn’t a nice-to-have, it’s infrastructure.&lt;/p&gt;

&lt;p&gt;Check out this Article by Marko Stokić: &lt;a href="https://www.forbes.com/sites/digital-assets/2025/12/12/why-crypto-needs-portable-ai-memory/" rel="noopener noreferrer"&gt;https://www.forbes.com/sites/digital-assets/2025/12/12/why-crypto-needs-portable-ai-memory/&lt;/a&gt;&lt;/p&gt;

</description>
      <category>privacy</category>
      <category>web3</category>
      <category>blockchain</category>
      <category>confidential</category>
    </item>
    <item>
      <title>Remote Attestation Is a Signal, Not a Trust Model</title>
      <dc:creator>Manav</dc:creator>
      <pubDate>Sun, 25 Jan 2026 15:27:19 +0000</pubDate>
      <link>https://forem.com/caerlower/remote-attestation-is-a-signal-not-a-trust-model-2664</link>
      <guid>https://forem.com/caerlower/remote-attestation-is-a-signal-not-a-trust-model-2664</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1cg25s2l4uh12j4s6opc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1cg25s2l4uh12j4s6opc.png" alt="attestation is not enough " width="800" height="450"&gt;&lt;/a&gt;&lt;br&gt;
Trusted Execution Environments (TEEs) are increasingly used as building blocks for confidential smart contracts, off-chain agents, and privacy-preserving infrastructure. Most designs lean heavily on &lt;strong&gt;remote attestation&lt;/strong&gt; as the mechanism that “proves” correctness.&lt;/p&gt;

&lt;p&gt;This is a category error.&lt;/p&gt;

&lt;p&gt;Remote attestation is useful, but it is not sufficient. Treating it as a trust primitive rather than a &lt;em&gt;low-level signal&lt;/em&gt; leads to fragile systems that appear verifiable but fail under real adversarial conditions.&lt;/p&gt;

&lt;p&gt;This post looks at attestation from a systems perspective: what it actually guarantees, where it fundamentally stops, and what additional structure is required to make it operationally meaningful.&lt;/p&gt;

&lt;h2&gt;
  
  
  What Attestation Actually Gives You
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fr626juxrbj4hhvpdjww6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fr626juxrbj4hhvpdjww6.png" alt="infographic" width="800" height="376"&gt;&lt;/a&gt;&lt;br&gt;
At its core, a TEE provides:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Isolated execution&lt;/strong&gt;: memory confidentiality and integrity enforced by hardware&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;A hardware root of trust&lt;/strong&gt;: per-CPU cryptographic material&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;A signed statement&lt;/strong&gt;: a quote asserting &lt;code&gt;(measurement, platform state, signer)&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;That signed statement, remote attestation is often interpreted as &lt;em&gt;“this application is trustworthy.”&lt;/em&gt;&lt;br&gt;
Formally, it is nothing more than &lt;em&gt;evidence&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;Given an attestation, a verifier can conclude:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;At time t, code hash H executed on CPU C, under TCB version V, and this claim was signed by the manufacturer.&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Nothing in that statement implies:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;correctness over time&lt;/li&gt;
&lt;li&gt;freshness of state&lt;/li&gt;
&lt;li&gt;operator accountability&lt;/li&gt;
&lt;li&gt;alignment with an application’s threat model&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Those properties must come from somewhere else.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Verification Burden Is Misplaced
&lt;/h2&gt;

&lt;p&gt;In most TEE-based systems today, verification is pushed to the edge:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;clients parse raw quotes&lt;/li&gt;
&lt;li&gt;security logic is embedded in SDKs&lt;/li&gt;
&lt;li&gt;users are expected to trust dashboards or static attestations&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This is backwards.&lt;/p&gt;

&lt;p&gt;Quote verification is not only complex (TCB interpretation, collateral validation, revocation checks), it is &lt;strong&gt;context-free&lt;/strong&gt;. A quote does not encode:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;acceptable CPU generations&lt;/li&gt;
&lt;li&gt;acceptable upgrade paths&lt;/li&gt;
&lt;li&gt;acceptable re-attestation frequency&lt;/li&gt;
&lt;li&gt;acceptable operator behavior&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Without a policy layer, attestation is ambiguous. Two verifiers with different assumptions can reach opposite conclusions from the same quote.&lt;/p&gt;

&lt;h2&gt;
  
  
  Attestation Fails at the System Boundary
&lt;/h2&gt;

&lt;p&gt;Most failures arise not inside the enclave, but &lt;em&gt;around it&lt;/em&gt;.&lt;/p&gt;

&lt;h3&gt;
  
  
  State is not attested
&lt;/h3&gt;

&lt;p&gt;Attestation covers code, not data. Without an external anchor, an enclave can be restarted with stale encrypted state and still produce a valid quote. From the verifier’s perspective, rollback is indistinguishable from normal execution.&lt;/p&gt;

&lt;h3&gt;
  
  
  Time is not attested
&lt;/h3&gt;

&lt;p&gt;Freshness is not inherent. Quotes do not expire unless the system enforces expiration. Replay attacks are trivial unless liveness is continuously checked.&lt;/p&gt;

&lt;h3&gt;
  
  
  Identity is not attested
&lt;/h3&gt;

&lt;p&gt;Attestation identifies hardware, not operators. Without binding enclaves to slashable identities, misbehavior carries no economic consequence.&lt;/p&gt;

&lt;h3&gt;
  
  
  History is not attested
&lt;/h3&gt;

&lt;p&gt;Even a perfectly attested enclave today says nothing about what ran yesterday. If an earlier version leaked secrets, current correctness is irrelevant.&lt;/p&gt;

&lt;p&gt;These are not implementation bugs. They are &lt;strong&gt;structural limitations&lt;/strong&gt; of attestation as a primitive.&lt;/p&gt;

&lt;h2&gt;
  
  
  Trust Requires Coordination, Not Quotes
&lt;/h2&gt;

&lt;p&gt;To make TEEs usable in adversarial environments, attestation must be embedded into a larger verification system.&lt;/p&gt;

&lt;p&gt;A robust design has three properties:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Continuous verification&lt;/strong&gt;&lt;br&gt;
Attestations are checked repeatedly, not once.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Policy-driven validation&lt;/strong&gt;&lt;br&gt;
Security assumptions are explicit, versioned, and enforced automatically.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Shared agreement&lt;/strong&gt;&lt;br&gt;
Verification outcomes are determined by a fault-tolerant set of economically aligned verifiers, not individual clients.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;In other words: attestation must feed into &lt;strong&gt;consensus&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Instead of asking every client to interpret hardware evidence, a verifier network does the hard work:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;validating TCB status&lt;/li&gt;
&lt;li&gt;enforcing freshness and rollback protection&lt;/li&gt;
&lt;li&gt;binding enclaves to operators&lt;/li&gt;
&lt;li&gt;tracking upgrade history and code provenance&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The result is a &lt;em&gt;consensus-signed statement&lt;/em&gt; that represents a collective judgment:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;“This enclave is valid under current network policy.”&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;This turns attestation from an opaque artifact into a usable on-chain signal.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why This Matters for Crypto Systems
&lt;/h2&gt;

&lt;p&gt;Blockchains already solve one half of the problem: &lt;strong&gt;global agreement under adversarial conditions&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;When TEEs are integrated into that model rather than treated as standalone trust anchors, they become far more powerful:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;enclaves can be time-bound to chain state&lt;/li&gt;
&lt;li&gt;operators can be held accountable&lt;/li&gt;
&lt;li&gt;policies can evolve without breaking trust&lt;/li&gt;
&lt;li&gt;users can verify outcomes without understanding hardware internals&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Systems like &lt;strong&gt;&lt;a href="//oasis.net"&gt;Oasis Network&lt;/a&gt;&lt;/strong&gt; take this approach by embedding attestation verification, operator governance, and policy enforcement into protocol consensus. Its &lt;strong&gt;ROFL&lt;/strong&gt; extends this model to off-chain execution, where correctness and privacy must coexist.&lt;/p&gt;

&lt;p&gt;The key insight is not Oasis-specific:&lt;br&gt;
&lt;strong&gt;attestation is only meaningful when interpreted by a trusted process, and in decentralized systems, that process must itself be decentralized.&lt;/strong&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Closing Thought
&lt;/h2&gt;

&lt;p&gt;Remote attestation answers a narrow question: &lt;em&gt;“What ran, where, and when?”&lt;/em&gt;&lt;br&gt;
Trust systems ask a much broader one: &lt;em&gt;“Why should anyone believe this result?”&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Bridging that gap requires more than quotes. It requires policies, incentives, history, and agreement.&lt;/p&gt;

&lt;p&gt;Until those pieces exist, attestation remains a low-level signal—powerful, but incomplete.&lt;/p&gt;

</description>
      <category>privacy</category>
      <category>web3</category>
      <category>blockchain</category>
      <category>programming</category>
    </item>
    <item>
      <title>Verifiable Compute for Onchain Prop Trading: How Carrotfunding Uses ROFL</title>
      <dc:creator>Manav</dc:creator>
      <pubDate>Thu, 25 Dec 2025 15:33:38 +0000</pubDate>
      <link>https://forem.com/caerlower/verifiable-compute-for-onchain-prop-trading-how-carrotfunding-uses-rofl-38j2</link>
      <guid>https://forem.com/caerlower/verifiable-compute-for-onchain-prop-trading-how-carrotfunding-uses-rofl-38j2</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkh1muxit4fbpyj49a9wu.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkh1muxit4fbpyj49a9wu.png" alt="Prop Trading" width="800" height="450"&gt;&lt;/a&gt;&lt;br&gt;
Onchain prop trading has always promised transparency, but in practice most platforms still rely on &lt;strong&gt;opaque offchain engines&lt;/strong&gt; for order execution, trader evaluation, and payout logic. Capital may be secured onchain, yet the most critical decisions, &lt;em&gt;who gets funded, how performance is measured, and when payouts trigger&lt;/em&gt;, often happen in black-box infrastructure.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href="http://carrotfunding.io/" rel="noopener noreferrer"&gt;Carrotfunding.io&lt;/a&gt;&lt;/strong&gt; is taking a concrete step to eliminate that gap by integrating &lt;strong&gt;ROFL&lt;/strong&gt;, bringing cryptographically verifiable compute into its trading and evaluation pipeline.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Trust Gap in Prop Trading
&lt;/h2&gt;

&lt;p&gt;Traditional prop firms are built on trust: traders trust execution, firms trust evaluation logic, and investors trust payout calculations. Even many “onchain” platforms replicate this model by anchoring capital onchain while keeping decision logic offchain.&lt;/p&gt;

&lt;p&gt;Carrot already minimizes several of these assumptions:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Capital is secured using &lt;strong&gt;rethink.finance&lt;/strong&gt; vaults&lt;/li&gt;
&lt;li&gt;Trades are executed via &lt;strong&gt;gTrade&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The remaining trust dependency lies in the &lt;strong&gt;AWS-based engine&lt;/strong&gt; responsible for:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;order orchestration&lt;/li&gt;
&lt;li&gt;trader performance evaluation&lt;/li&gt;
&lt;li&gt;risk metrics&lt;/li&gt;
&lt;li&gt;payout calculation&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This is exactly where ROFL is being introduced.&lt;/p&gt;

&lt;h2&gt;
  
  
  How the ROFL Integration Works
&lt;/h2&gt;

&lt;p&gt;Instead of replacing its existing infrastructure immediately, Carrot is deploying ROFL as a &lt;strong&gt;parallel verification layer&lt;/strong&gt;.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The production engine continues to run for performance and latency reasons.&lt;/li&gt;
&lt;li&gt;A ROFL instance independently re-executes the same computations inside a &lt;strong&gt;Trusted Execution Environment (TEE)&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;ROFL produces cryptographic attestations that prove:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;which code was executed&lt;/li&gt;
&lt;li&gt;which inputs were used&lt;/li&gt;
&lt;li&gt;what outputs were produced&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;/ul&gt;

&lt;p&gt;These attestations are posted onchain, allowing traders and capital providers to verify that:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;evaluation rules were applied exactly as defined&lt;/li&gt;
&lt;li&gt;no discretionary changes were made&lt;/li&gt;
&lt;li&gt;payouts were calculated deterministically&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Over time, this architecture supports a gradual path toward &lt;strong&gt;ROFL-only execution&lt;/strong&gt;, without sacrificing system reliability today.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why This Matters Technically
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://docs.oasis.io/build/rofl/" rel="noopener noreferrer"&gt;ROFL&lt;/a&gt; provides properties that standard offchain infrastructure cannot:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Execution integrity&lt;/strong&gt;: Code runs in hardware-isolated enclaves.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Reproducibility&lt;/strong&gt;: Identical inputs produce provable outputs.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Auditability&lt;/strong&gt;: Verification happens onchain, not via logs or dashboards.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Key isolation&lt;/strong&gt;: Sensitive keys never leave the enclave.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;For a prop trading system, this means trader scoring, drawdown checks, and payout logic become &lt;strong&gt;provable protocol behavior&lt;/strong&gt;, not operator promises.&lt;/p&gt;

&lt;h2&gt;
  
  
  Implications for Traders and Capital Providers
&lt;/h2&gt;

&lt;p&gt;For traders:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Evaluation criteria become transparent and verifiable.&lt;/li&gt;
&lt;li&gt;Disputes can be resolved cryptographically, not socially.&lt;/li&gt;
&lt;li&gt;Funding decisions are no longer subjective or opaque.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;For capital providers:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Funds are governed by immutable logic.&lt;/li&gt;
&lt;li&gt;Risk controls are enforced exactly as specified.&lt;/li&gt;
&lt;li&gt;Performance claims can be independently validated.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  A Broader Signal for DeFi Infrastructure
&lt;/h2&gt;

&lt;p&gt;This integration is a strong example of how &lt;strong&gt;verifiable compute&lt;/strong&gt; can unlock new classes of financial applications. Prop trading requires:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;high-frequency logic&lt;/li&gt;
&lt;li&gt;complex evaluation rules&lt;/li&gt;
&lt;li&gt;strict fairness guarantees&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;ROFL shows how such systems can remain performant &lt;em&gt;and&lt;/em&gt; trust-minimized.&lt;/p&gt;

&lt;p&gt;While full onchain execution is often impractical for this class of workloads, &lt;strong&gt;cryptographically verified offchain compute&lt;/strong&gt; offers a realistic middle ground.&lt;/p&gt;

&lt;h2&gt;
  
  
  Looking Ahead
&lt;/h2&gt;

&lt;p&gt;Carrotfunding’s roadmap includes deeper reliance on ROFL over time, potentially eliminating centralized execution entirely. More broadly, this pattern,&lt;/p&gt;

&lt;p&gt;&lt;em&gt;parallel verification → gradual migration → full verifiable execution&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;is likely to become standard for complex DeFi systems.&lt;/p&gt;

&lt;p&gt;As onchain finance matures, trust assumptions will increasingly move from people and servers to &lt;strong&gt;code and cryptography&lt;/strong&gt;. This integration is an early but meaningful step in that direction.&lt;/p&gt;

</description>
      <category>web3</category>
      <category>blockchain</category>
      <category>privacy</category>
      <category>proptrading</category>
    </item>
    <item>
      <title>Why Oasis Is Backing Custody-Native Credit Infrastructure</title>
      <dc:creator>Manav</dc:creator>
      <pubDate>Thu, 25 Dec 2025 14:58:09 +0000</pubDate>
      <link>https://forem.com/caerlower/why-oasis-is-backing-custody-native-credit-infrastructure-2mfm</link>
      <guid>https://forem.com/caerlower/why-oasis-is-backing-custody-native-credit-infrastructure-2mfm</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjougalltxyzkx8ko9lsy.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjougalltxyzkx8ko9lsy.png" alt="Oasis X SemiLiquid" width="800" height="480"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The next phase of blockchain adoption isn’t about more throughput or cheaper gas, it’s about &lt;strong&gt;making onchain systems usable for institutions without forcing them to give up custody, confidentiality, or compliance&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;That context explains why Oasis has launched a &lt;strong&gt;strategic investment arm&lt;/strong&gt;, and why its first investment targets a very specific problem: &lt;strong&gt;credit activation on tokenized assets that never leave custody&lt;/strong&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Problem Institutions Actually Care About
&lt;/h2&gt;

&lt;p&gt;Tokenized real-world assets are growing fast, but credit markets around them are still thin. The blocker isn’t demand, it’s structure.&lt;/p&gt;

&lt;p&gt;Most DeFi credit models assume:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;assets move freely between contracts,&lt;/li&gt;
&lt;li&gt;counterparties are visible,&lt;/li&gt;
&lt;li&gt;enforcement is public.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;That works for crypto-native assets. It doesn’t work for custodians, asset managers, or regulated funds. Once assets leave custody, you’ve already lost the battle.&lt;/p&gt;

&lt;p&gt;This is the gap &lt;strong&gt;SemiLiquid&lt;/strong&gt; is addressing.&lt;/p&gt;

&lt;h2&gt;
  
  
  What SemiLiquid Does Differently
&lt;/h2&gt;

&lt;p&gt;SemiLiquid’s approach starts from a hard constraint: &lt;strong&gt;collateral must remain inside existing custody frameworks&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Instead of wrapping assets or moving them into lending pools, SemiLiquid activates credit &lt;em&gt;on top of&lt;/em&gt; tokenized collateral that stays put. Credit terms, margin logic, and liquidation conditions are enforced programmatically — without exposing positions or counterparty data.&lt;/p&gt;

&lt;p&gt;From a systems perspective, this requires:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;confidential policy evaluation,&lt;/li&gt;
&lt;li&gt;automated enforcement logic,&lt;/li&gt;
&lt;li&gt;verifiable state transitions,&lt;/li&gt;
&lt;li&gt;and strict separation between what’s public and what must remain private.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This is not something generic smart contracts handle well.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why Oasis Infrastructure Fits This Use Case
&lt;/h2&gt;

&lt;p&gt;SemiLiquid is built on &lt;strong&gt;Oasis Sapphire&lt;/strong&gt;, using confidential compute to enforce credit logic while keeping sensitive financial data encrypted.&lt;/p&gt;

&lt;p&gt;A key component is &lt;strong&gt;Liquefaction&lt;/strong&gt;, a research-backed primitive originating from &lt;strong&gt;Cornell Tech&lt;/strong&gt;, which enables fine-grained control over information flow. Liquefaction allows credit systems to:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;enforce policy without revealing inputs,&lt;/li&gt;
&lt;li&gt;monitor breaches privately,&lt;/li&gt;
&lt;li&gt;issue programmable credit receipts,&lt;/li&gt;
&lt;li&gt;and still anchor outcomes onchain.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This combination of confidential execution &amp;amp; onchain verifiability is what makes custody-native credit feasible at all.&lt;/p&gt;

&lt;h2&gt;
  
  
  From Theory to Production
&lt;/h2&gt;

&lt;p&gt;After an extended build phase, SemiLiquid is now running a live pilot with established players including:&lt;/p&gt;

&lt;p&gt;Franklin Templeton,&lt;br&gt;
Zodia Custody,&lt;br&gt;
M11Credit,&lt;br&gt;
Avalanche,&lt;br&gt;
and Presto Labs.&lt;/p&gt;

&lt;p&gt;The workflow covers collateral locking, credit issuance, monitoring, and repayment, all without exposing sensitive financial relationships or breaking custody guarantees.&lt;/p&gt;

&lt;p&gt;That’s a meaningful signal that this isn’t just conceptual infrastructure.&lt;/p&gt;

&lt;h2&gt;
  
  
  What This Signals for Oasis
&lt;/h2&gt;

&lt;p&gt;The launch of a strategic investment arm isn’t about picking winners randomly. It’s about &lt;strong&gt;backing teams that push confidential compute into real institutional workflows&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;SemiLiquid sets the tone:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;compliance-aware by design,&lt;/li&gt;
&lt;li&gt;compute-heavy,&lt;/li&gt;
&lt;li&gt;confidentiality as a requirement, not an add-on.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Future investments are likely to follow the same pattern across RWAs, settlement layers, identity systems, and agent-based infrastructure where verifiable but private computation is unavoidable.&lt;/p&gt;

&lt;h2&gt;
  
  
  Closing Thought
&lt;/h2&gt;

&lt;p&gt;If tokenized assets are going to support real credit markets, the infrastructure has to meet institutions where they are, not ask them to compromise on custody or confidentiality.&lt;/p&gt;

&lt;p&gt;This investment is a bet that &lt;strong&gt;confidential compute is the missing layer&lt;/strong&gt;, and that custody-native credit is one of the first places where it actually proves itself.&lt;/p&gt;

&lt;p&gt;Resources: &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://oasis.net/blog/strategic-investment-arm-semiliquid" rel="noopener noreferrer"&gt;Oasis Blog - Semiliquid&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://oasis.net/sapphire" rel="noopener noreferrer"&gt;Oasis Sapphire&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>privacy</category>
      <category>web3</category>
      <category>blockchain</category>
      <category>infrastructure</category>
    </item>
    <item>
      <title>x402: Turning HTTP 402 into a Real Payment Primitive</title>
      <dc:creator>Manav</dc:creator>
      <pubDate>Thu, 25 Dec 2025 14:45:47 +0000</pubDate>
      <link>https://forem.com/caerlower/x402-turning-http-402-into-a-real-payment-primitive-5077</link>
      <guid>https://forem.com/caerlower/x402-turning-http-402-into-a-real-payment-primitive-5077</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fb4ad59n5f024cvzpnbbq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fb4ad59n5f024cvzpnbbq.png" alt="x402" width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;HTTP has carried the status code &lt;strong&gt;402 – Payment Required&lt;/strong&gt; since the early days of the web. The idea was simple: servers could charge per request. The reason it never worked wasn’t conceptual, it was infrastructural. Payments were slow, expensive, and required accounts, sessions, and chargeback-heavy intermediaries.&lt;/p&gt;

&lt;p&gt;x402 revisits this idea with modern primitives: &lt;strong&gt;stablecoins, fast settlement, and programmable authorization&lt;/strong&gt;. The result is a web-native payment protocol that lets services charge for access directly in the HTTP request–response loop.&lt;/p&gt;

&lt;h2&gt;
  
  
  How x402 Works (At a Protocol Level)
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flwaeejjxpqd02kddaw5y.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flwaeejjxpqd02kddaw5y.png" alt="x402 flow of work" width="800" height="462"&gt;&lt;/a&gt;&lt;br&gt;
x402 introduces a small extension to standard HTTP flows:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;A client (human or agent) requests a resource.&lt;/li&gt;
&lt;li&gt;The server responds with &lt;code&gt;HTTP 402&lt;/code&gt; plus payment metadata:

&lt;ul&gt;
&lt;li&gt;token&lt;/li&gt;
&lt;li&gt;amount&lt;/li&gt;
&lt;li&gt;chain&lt;/li&gt;
&lt;li&gt;destination address&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;The client signs a &lt;strong&gt;permit-style authorization&lt;/strong&gt; using &lt;code&gt;transferWithAuthorization&lt;/code&gt; (EIP-3009).&lt;/li&gt;
&lt;li&gt;A facilitator verifies the authorization off-chain and settles it on-chain.&lt;/li&gt;
&lt;li&gt;Once settlement is confirmed, the server returns the requested resource.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;From the client’s perspective, this feels like a normal API call.&lt;br&gt;
From the server’s perspective, payment is verified before access is granted.&lt;br&gt;
No accounts, no sessions, no API keys.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why This Is Interesting for Developers
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Micropayments become viable&lt;/strong&gt;&lt;br&gt;
The protocol itself has no fees. Costs are limited to gas, which on modern L2s makes sub-cent pricing realistic.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Stateless by design&lt;/strong&gt;&lt;br&gt;
Each request carries its own payment authorization. There’s no need to manage balances, subscriptions, or identity layers.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Web-native integration&lt;/strong&gt;&lt;br&gt;
x402 works with plain HTTP. Any backend capable of returning a 402 response can adopt it without special SDKs.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Machine-friendly payments&lt;/strong&gt;&lt;br&gt;
This model fits agents far better than traditional payment systems. An agent can pay per request, per inference, or per compute unit without human involvement.&lt;/p&gt;

&lt;h2&gt;
  
  
  Agent-to-Agent Payments
&lt;/h2&gt;

&lt;p&gt;The real unlock isn’t just charging humans, it’s enabling &lt;strong&gt;autonomous economic activity&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;An agent can:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;pay an API for data,&lt;/li&gt;
&lt;li&gt;pay another agent to process it,&lt;/li&gt;
&lt;li&gt;pay a compute service to run a job,&lt;/li&gt;
&lt;li&gt;all conditionally and programmatically.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These are high-volume, low-value, composable payments that traditional rails can’t support efficiently, but blockchains can.&lt;/p&gt;

&lt;h2&gt;
  
  
  Where Trust Comes In: x402 + ERC-8004 + ROFL
&lt;/h2&gt;

&lt;p&gt;x402 handles &lt;strong&gt;payment&lt;/strong&gt;, not &lt;strong&gt;trust&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;For agent ecosystems, that matters. When an agent pays a service, it needs to know:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;what code is actually running,&lt;/li&gt;
&lt;li&gt;who controls the keys,&lt;/li&gt;
&lt;li&gt;whether execution can be verified.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;That’s where complementary primitives fit:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;ERC-8004&lt;/strong&gt; provides on-chain registries for agent identity, reputation, and validation.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;ROFL&lt;/strong&gt; enables verifiable execution inside TEEs, with enclave-generated keys and cryptographic attestations.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Together:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;x402 moves money,&lt;/li&gt;
&lt;li&gt;ERC-8004 enables discovery and coordination,&lt;/li&gt;
&lt;li&gt;ROFL provides execution integrity and confidentiality.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Even facilitators themselves can run inside ROFL, making the payment layer auditable and resistant to censorship.&lt;/p&gt;

&lt;h2&gt;
  
  
  Practical Examples
&lt;/h2&gt;

&lt;p&gt;Early demos already exist:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;pay-per-inference services where users pay cents per request,&lt;/li&gt;
&lt;li&gt;multi-model AI pipelines with cross-validation,&lt;/li&gt;
&lt;li&gt;document processing APIs with verifiable execution.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In each case, pricing tracks actual usage instead of subscriptions.&lt;/p&gt;

&lt;h2&gt;
  
  
  Closing Thoughts
&lt;/h2&gt;

&lt;p&gt;x402 doesn’t try to reinvent payments. It makes them &lt;strong&gt;composable with the web itself&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;By aligning HTTP semantics with on-chain settlement, it opens the door to pricing models and agent workflows that were previously impractical. Combined with verifiable execution and standardized agent discovery, it points toward a more granular, automated, and open internet economy.&lt;/p&gt;

&lt;p&gt;For developers building APIs, agent systems, or compute-heavy services, x402 is worth paying attention to.&lt;/p&gt;

&lt;p&gt;Resources: &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://oasis.net/blog/x402-https-internet-native-payments" rel="noopener noreferrer"&gt;Oasis Blog - x402&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://docs.oasis.io/build/rofl/" rel="noopener noreferrer"&gt;ROFL&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>privacy</category>
      <category>blockchain</category>
      <category>web3</category>
      <category>http</category>
    </item>
    <item>
      <title>x402: A Web-Native Payment Protocol for Micropayments and Autonomous Agents</title>
      <dc:creator>Manav</dc:creator>
      <pubDate>Mon, 24 Nov 2025 16:31:15 +0000</pubDate>
      <link>https://forem.com/caerlower/x402-a-web-native-payment-protocol-for-micropayments-and-autonomous-agents-1g39</link>
      <guid>https://forem.com/caerlower/x402-a-web-native-payment-protocol-for-micropayments-and-autonomous-agents-1g39</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fygbj3uomzmhqtet1v7ug.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fygbj3uomzmhqtet1v7ug.png" alt="x402 payment protocol" width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;For decades, the web has had an unused HTTP status code: &lt;strong&gt;402 – Payment Required&lt;/strong&gt;. It was reserved for a future in which servers could charge per request. That future never arrived, not because the idea was flawed, but because the infrastructure wasn’t ready.&lt;/p&gt;

&lt;p&gt;Today, that infrastructure exists.&lt;br&gt;
Stablecoins settle instantly, blockchains are programmable, and agents, both human-driven and autonomous need payments that can occur at machine speed.&lt;br&gt;
&lt;strong&gt;x402&lt;/strong&gt; is the protocol that finally operationalizes HTTP 402 in a modern context.&lt;/p&gt;

&lt;h2&gt;
  
  
  What x402 Enables
&lt;/h2&gt;

&lt;p&gt;x402 introduces a minimal extension to HTTP that allows any service API, model, dataset, or content endpoint to require payment &lt;strong&gt;within the request-response loop&lt;/strong&gt;. No sessions, no accounts, no OAuth flows.&lt;/p&gt;

&lt;p&gt;A server can respond with &lt;code&gt;HTTP 402&lt;/code&gt; along with:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Token type&lt;/li&gt;
&lt;li&gt;Amount&lt;/li&gt;
&lt;li&gt;Receiving address&lt;/li&gt;
&lt;li&gt;Chain/network&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Far8sxicrfn49hh1r2o7x.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Far8sxicrfn49hh1r2o7x.png" alt="how x402 works" width="800" height="462"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The client then submits a signed authorization using &lt;strong&gt;&lt;a href="https://eips.ethereum.org/EIPS/eip-3009" rel="noopener noreferrer"&gt;EIP-3009&lt;/a&gt; (&lt;code&gt;transferWithAuthorization&lt;/code&gt;)&lt;/strong&gt;, enabling third-party execution of the transfer. A facilitator verifies and settles the transaction on-chain, allowing the server to return the requested resource.&lt;/p&gt;

&lt;p&gt;This sequence takes &lt;strong&gt;sub-second&lt;/strong&gt; for the client.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why Developers Should Care
&lt;/h2&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;1. Micropayments Become Realistic&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Facilitator costs are simply gas. For low-cost L2s, sub-cent pricing becomes economically viable.&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;2. Works With Existing Web Infrastructure&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;x402 is HTTP-native.&lt;br&gt;
Any backend that can return a custom status code can support it. Framework-specific SDKs aren’t required.&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;3. Stateless Payments&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;No user accounts, no cookies, no stored balances.&lt;br&gt;
Each request carries the authorization needed for settlement.&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;4. Machine-Readable Payments for Agents&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Agents can consume, pay for, and chain services without human supervision:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Pay-per-inference&lt;/li&gt;
&lt;li&gt;Pay-per-crawl&lt;/li&gt;
&lt;li&gt;Pay-per-compute-cycle&lt;/li&gt;
&lt;li&gt;Pay-per-task orchestration between agents&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This pattern is impossible with traditional payment rails.&lt;/p&gt;

&lt;h2&gt;
  
  
  Trust Models: Where x402 Intersects With Web3
&lt;/h2&gt;

&lt;p&gt;x402 enables payment, but it does not solve trust e.g., whether the model or service responding is authentic, private, or verifiable.&lt;br&gt;
This is where &lt;strong&gt;ERC-8004&lt;/strong&gt; and &lt;strong&gt;ROFL&lt;/strong&gt; come in.&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;a href="https://oasis.net/blog/erc-8004-trustless-agents" rel="noopener noreferrer"&gt;&lt;strong&gt;ERC-8004&lt;/strong&gt;&lt;/a&gt;
&lt;/h3&gt;

&lt;p&gt;A neutral on-chain registry system for:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Agent identity&lt;/li&gt;
&lt;li&gt;Reputation trails&lt;/li&gt;
&lt;li&gt;Validation methods&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;It lets agents discover each other and negotiate trust assumptions.&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;a href="https://docs.oasis.io/build/rofl/" rel="noopener noreferrer"&gt;&lt;strong&gt;ROFL&lt;/strong&gt;&lt;/a&gt;
&lt;/h3&gt;

&lt;p&gt;A confidential compute layer enabling:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Verifiable execution in &lt;a href="https://oasis.net/security-and-tees" rel="noopener noreferrer"&gt;TEEs&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Attestation of service code and models.&lt;/li&gt;
&lt;li&gt;Enclave-generated keys and isolated signing.&lt;/li&gt;
&lt;li&gt;End-to-end encrypted request processing.&lt;/li&gt;
&lt;li&gt;Autonomous agents with tamper-proof state.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Together, x402 handles &lt;em&gt;payment&lt;/em&gt;, ERC-8004 handles &lt;em&gt;coordination&lt;/em&gt;, and ROFL handles &lt;em&gt;trust&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkntz9575c9hjd0f5wzk5.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkntz9575c9hjd0f5wzk5.png" alt="x402 x erc-8004 x rofl" width="800" height="312"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This trio forms an interoperable stack for building &lt;strong&gt;autonomous services that transact, compute, and collaborate without intermediaries&lt;/strong&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  Example Implementations
&lt;/h2&gt;

&lt;p&gt;Developers have already begun deploying x402-enabled confidential services, including:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Document summarization APIs&lt;/strong&gt; where users pay cents per inference.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Multi-LLM verification oracles&lt;/strong&gt;, with each inference paid through x402.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;GPU compute tasks&lt;/strong&gt; triggered programmatically by agents.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In all cases, the payment, execution, and verification layers compose cleanly.&lt;/p&gt;

&lt;h2&gt;
  
  
  Closing Thoughts
&lt;/h2&gt;

&lt;p&gt;x402 brings the web much closer to a true pay-per-use model one that’s compatible with autonomous agents, micro-services, and global machine-driven commerce. When paired with verifiable computation (ROFL) and standardized agent discovery (ERC-8004), it forms the foundation for an emerging &lt;strong&gt;agentic economy&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;If you're building APIs, autonomous systems, or compute-heavy services, this is a protocol worth watching.&lt;/p&gt;

</description>
      <category>web3</category>
      <category>blockchain</category>
      <category>ai</category>
      <category>privacy</category>
    </item>
    <item>
      <title>ROFL Introduces Native Frontend Hosting: Confidential Apps Can Finally Go Full-Stack</title>
      <dc:creator>Manav</dc:creator>
      <pubDate>Mon, 24 Nov 2025 16:12:42 +0000</pubDate>
      <link>https://forem.com/caerlower/rofl-introduces-native-frontend-hosting-confidential-apps-can-finally-go-full-stack-c89</link>
      <guid>https://forem.com/caerlower/rofl-introduces-native-frontend-hosting-confidential-apps-can-finally-go-full-stack-c89</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0ls3bb5hb5biyxsagb7u.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0ls3bb5hb5biyxsagb7u.png" alt="rofl premitives" width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;One of the long-standing challenges with confidential computing has been building applications that do more than secure backend logic. TEEs excel at protected execution, secret key handling, and verifiable compute, but exposing a user-facing frontend from inside an enclave has always been awkward.&lt;/p&gt;

&lt;p&gt;Developers typically had to rely on external proxies, manually managed TLS certificates, and domain routing pipelines that operated &lt;strong&gt;outside&lt;/strong&gt; the TEE boundary. That meant extra tooling, inconsistent setups across providers, and, ironically, more opportunities for data to leave the secure boundary than most teams wanted.&lt;/p&gt;

&lt;p&gt;The latest update to &lt;a href="https://docs.oasis.io/build/rofl" rel="noopener noreferrer"&gt;&lt;strong&gt;ROFL&lt;/strong&gt;&lt;/a&gt; changes this dynamic in a meaningful way. ROFL now provides &lt;strong&gt;built-in proxy support and automated HTTPS endpoint creation&lt;/strong&gt;, allowing applications to run both frontend and backend components entirely inside confidential environments.&lt;/p&gt;

&lt;p&gt;This isn’t just a quality-of-life improvement, it shifts what “confidential apps” can practically look like.&lt;/p&gt;

&lt;h2&gt;
  
  
  A New Hosting Model for Confidential Apps
&lt;/h2&gt;

&lt;p&gt;The new proxy layer in ROFL acts as the gateway between the public Internet and the enclave-based application. Instead of requiring developers to configure NGINX, Traefik, or bespoke proxy setups, ROFL now handles:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Public endpoint creation&lt;/li&gt;
&lt;li&gt;Domain and subdomain assignment&lt;/li&gt;
&lt;li&gt;Certificate provisioning&lt;/li&gt;
&lt;li&gt;Routing to the correct enclave instance&lt;/li&gt;
&lt;li&gt;Secure transport through encrypted internal tunnels&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;From the developer’s perspective, hosting a frontend in ROFL now resembles deploying to a modern PaaS, only with hardware-backed confidentiality at every step.&lt;/p&gt;

&lt;h2&gt;
  
  
  What Deployment Looks Like
&lt;/h2&gt;

&lt;p&gt;ROFL’s deployment flow remains container-based, but with an additional annotation step to declare the domain an app should serve from. After redeploying, the CLI provides DNS instructions for whichever domain the developer wants to use.&lt;/p&gt;

&lt;p&gt;Once DNS is configured, a quick restart triggers certificate creation. Importantly, &lt;strong&gt;certificate keys are generated inside the enclave&lt;/strong&gt;, and never leave it.&lt;/p&gt;

&lt;p&gt;The proxy infrastructure routes based on TLS handshake metadata, not plaintext preserving the enclave’s data-isolation guarantees.&lt;/p&gt;

&lt;p&gt;Read the Docs here: &lt;a href="https://docs.oasis.io/build/rofl/features/proxy/" rel="noopener noreferrer"&gt;https://docs.oasis.io/build/rofl/features/proxy/&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Why This Matters
&lt;/h2&gt;

&lt;p&gt;This feature closes one of the last major gaps in building production-grade confidential applications:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Developers no longer need external hosting for frontends.&lt;/li&gt;
&lt;li&gt;TLS is managed automatically with no key exposure.&lt;/li&gt;
&lt;li&gt;The entire app stack logic, state, and UI can live in a TEE.&lt;/li&gt;
&lt;li&gt;The operational burden of using enclaves drops significantly.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Confidential computing becomes far more approachable when deploying a secure app is as simple as annotating a compose file and configuring DNS.&lt;/p&gt;

&lt;p&gt;In practical terms, teams can now build:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Private DeFi dashboards.&lt;/li&gt;
&lt;li&gt;Agent interfaces that expose no sensitive state.&lt;/li&gt;
&lt;li&gt;Confidential admin panels.&lt;/li&gt;
&lt;li&gt;Encrypted multi-tenant applications.&lt;/li&gt;
&lt;li&gt;Verified compute services with secure user-facing UIs.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;all running inside trusted hardware, with no external proxy infrastructure to maintain.&lt;/p&gt;

&lt;h2&gt;
  
  
  Closing Thoughts
&lt;/h2&gt;

&lt;p&gt;ROFL has always focused on giving developers a general-purpose execution layer for verifiable, confidential off-chain logic. Adding native frontend hosting pushes it toward a &lt;strong&gt;true full-stack confidential compute platform&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;The more that infrastructure fades into the background, the easier it becomes for developers to actually use these capabilities. This update moves the ecosystem one step closer to confidential applications that are secure by default—not secure with caveats.&lt;/p&gt;

</description>
      <category>webdev</category>
      <category>privacy</category>
      <category>blockchain</category>
      <category>web3</category>
    </item>
    <item>
      <title>Zcash vs. Oasis: Two Completely Different Visions of Privacy in Crypto</title>
      <dc:creator>Manav</dc:creator>
      <pubDate>Mon, 24 Nov 2025 14:46:23 +0000</pubDate>
      <link>https://forem.com/caerlower/zcash-vs-oasis-two-completely-different-visions-of-privacy-in-crypto-1e96</link>
      <guid>https://forem.com/caerlower/zcash-vs-oasis-two-completely-different-visions-of-privacy-in-crypto-1e96</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fewuirp7vb5hrdvyzgquu.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fewuirp7vb5hrdvyzgquu.png" alt="zcash vs Oasis" width="800" height="320"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Not competitors, two architectures solving two very different problems.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Privacy in blockchain isn’t a single feature. It’s an entire design space.&lt;br&gt;
And when you compare &lt;a href="https://z.cash/" rel="noopener noreferrer"&gt;Zcash&lt;/a&gt; to &lt;a href="//oasis.net"&gt;Oasis&lt;/a&gt;, this becomes obvious fast.&lt;/p&gt;

&lt;p&gt;Both projects care deeply about privacy, but the way they pursue it and the types of problems they’re built to solve, couldn’t be more different.&lt;br&gt;
One protects &lt;strong&gt;transactions&lt;/strong&gt;.&lt;br&gt;
The other protects &lt;strong&gt;computation&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Understanding that distinction is the key to understanding why these two ecosystems exist at all.&lt;/p&gt;

&lt;h2&gt;
  
  
  How Zcash Thinks About Privacy
&lt;/h2&gt;

&lt;p&gt;Zcash’s model starts with a simple premise: if you’re moving value on-chain, you should be able to do so without exposing yourself to the world.&lt;/p&gt;

&lt;p&gt;Its foundation is &lt;strong&gt;zk-SNARKs&lt;/strong&gt;, which allow a transaction to be proven valid without revealing anything else about it. Zcash intentionally keeps the surface area small: no complex smart contracts, no heavy execution layers, no programmable privacy logic.&lt;br&gt;
Just money-made private.&lt;/p&gt;

&lt;p&gt;This is why Zcash has been able to stay both elegant and efficient. It’s fast, fees are negligible, and the shielding mechanism is mathematically sound.&lt;br&gt;
Its engineering goal is clear: &lt;em&gt;private payments that scale&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;Not private smart contracts.&lt;br&gt;
Not private computation.&lt;br&gt;
Not confidential AI workloads.&lt;br&gt;
Just private transfers.&lt;/p&gt;

&lt;h2&gt;
  
  
  How Oasis Thinks About Privacy
&lt;/h2&gt;

&lt;p&gt;Oasis starts from the opposite direction: what if privacy is not only about &lt;em&gt;transferring&lt;/em&gt; value, but also about &lt;strong&gt;how applications process it&lt;/strong&gt;?&lt;/p&gt;

&lt;p&gt;This leads to a completely different architecture.&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;a href="https://oasis.net/sapphire" rel="noopener noreferrer"&gt;&lt;strong&gt;Sapphire&lt;/strong&gt;: Confidential EVM&lt;/a&gt;
&lt;/h3&gt;

&lt;p&gt;A full EVM runtime where contract state, storage, and user inputs remain encrypted, yet developers deploy using standard Solidity tooling. It’s privacy without rewriting the Web3 stack.&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;a href="https://docs.oasis.io/build/rofl/" rel="noopener noreferrer"&gt;&lt;strong&gt;ROFL&lt;/strong&gt;: Verifiable Off-Chain Logic&lt;/a&gt;
&lt;/h3&gt;

&lt;p&gt;A TEE-backed execution layer where agents, apps, or AI systems can run complex logic privately while still producing on-chain, verifiable attestations.&lt;/p&gt;

&lt;p&gt;Instead of hiding “the transaction,” Oasis hides &lt;strong&gt;the computation itself&lt;/strong&gt;.&lt;br&gt;
That’s an entirely different category of privacy.&lt;/p&gt;

&lt;p&gt;This enables use cases that Zcash, by design, does not touch:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Private order books&lt;/li&gt;
&lt;li&gt;Encrypted lending logic&lt;/li&gt;
&lt;li&gt;Autonomous agents with isolated key management&lt;/li&gt;
&lt;li&gt;Confidential governance&lt;/li&gt;
&lt;li&gt;Enterprise-grade data pipelines&lt;/li&gt;
&lt;li&gt;Cross-chain privacy layers&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Where Zcash aims to be private cash, Oasis aims to be &lt;strong&gt;private infrastructure&lt;/strong&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  Threat Models: Math vs. Architecture
&lt;/h2&gt;

&lt;p&gt;Zcash’s security model is pure cryptography: if zk-SNARK assumptions hold, privacy holds. The protocol does not lean on trusted hardware or off-chain execution. Its attack surface is intentionally minimal.&lt;/p&gt;

&lt;p&gt;Oasis’s model is layered. The system assumes that hardware may fail which is why it relies on:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Confidential execution inside hardware enclaves&lt;/li&gt;
&lt;li&gt;On-chain governance to restrict who can run key-critical roles&lt;/li&gt;
&lt;li&gt;Ephemeral encryption keys that rotate continually&lt;/li&gt;
&lt;li&gt;Verified TEEs with attestation and CPU blacklisting&lt;/li&gt;
&lt;li&gt;Encrypted state transitions inside Sapphire&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Zcash’s model says: &lt;em&gt;trust the math&lt;/em&gt;.&lt;br&gt;
Oasis’s model says: &lt;em&gt;trust no single layer, verify them all&lt;/em&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  What Each System Is Really Built For
&lt;/h2&gt;

&lt;p&gt;It’s easy to compare these two systems as “privacy projects,” but their roles are fundamentally different:&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;Zcash excels at&lt;/strong&gt;
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Private value transfer&lt;/li&gt;
&lt;li&gt;Low-latency, low-cost settlements&lt;/li&gt;
&lt;li&gt;Strong cryptographic anonymity&lt;/li&gt;
&lt;li&gt;Simple, predictable privacy guarantees&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;Oasis excels at&lt;/strong&gt;
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Confidential smart contracts&lt;/li&gt;
&lt;li&gt;Private AI agents with verifiable logic&lt;/li&gt;
&lt;li&gt;Encrypted stateful applications&lt;/li&gt;
&lt;li&gt;Cross-chain privacy for existing EVM ecosystems&lt;/li&gt;
&lt;li&gt;Confidential data processing for enterprise or DeFi&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In modern Web3 terms:&lt;br&gt;
&lt;strong&gt;Zcash is a private ledger. Oasis is a private compute layer.&lt;/strong&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Looking Ahead
&lt;/h2&gt;

&lt;p&gt;As the ecosystem shifts toward agentic systems, AI integrations, and more complex financial primitives, the demand for &lt;strong&gt;private computation&lt;/strong&gt; is rising. That’s where Oasis fits naturally.&lt;/p&gt;

&lt;p&gt;At the same time, the need for &lt;strong&gt;private money&lt;/strong&gt; simple, shielded, censorship-resistant value transfer, has never gone away. That’s where Zcash remains unmatched.&lt;/p&gt;

&lt;p&gt;There is no single “winner” here because they are optimizing for very different goals.&lt;/p&gt;

&lt;p&gt;One protects &lt;em&gt;what&lt;/em&gt; you send.&lt;br&gt;
The other protects &lt;em&gt;how your applications think&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;Both are necessary pillars in a privacy-first crypto stack.&lt;/p&gt;

</description>
      <category>privacy</category>
      <category>blockchain</category>
      <category>web3</category>
      <category>webdev</category>
    </item>
    <item>
      <title>ERC-8004: Building Trustless Autonomous Agents with TEEs</title>
      <dc:creator>Manav</dc:creator>
      <pubDate>Thu, 23 Oct 2025 13:23:11 +0000</pubDate>
      <link>https://forem.com/caerlower/erc-8004-building-trustless-autonomous-agents-with-tees-3iea</link>
      <guid>https://forem.com/caerlower/erc-8004-building-trustless-autonomous-agents-with-tees-3iea</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fy8v49npnumz99a1l7nt2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fy8v49npnumz99a1l7nt2.png" alt="erc-8004" width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The concept of autonomous agents, software that can operate, transact, and make decisions on-chain without constant human supervision has been around for a while. &lt;/p&gt;

&lt;p&gt;However, widespread adoption has been hampered by &lt;strong&gt;incompatible frameworks, isolated registries, and trust assumptions&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;ERC-8004 is a proposed Ethereum standard designed to address these challenges by providing &lt;strong&gt;a minimal yet extensible framework for agent discovery and trustless interaction&lt;/strong&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  How ERC-8004 Works
&lt;/h2&gt;

&lt;p&gt;The standard defines &lt;strong&gt;three core registries&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Identity&lt;/strong&gt;: Assigns each agent a unique ID and links it to off-chain metadata describing capabilities, supported protocols, and domains.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Reputation&lt;/strong&gt;: Creates an on-chain audit trail of client-authorized feedback, enabling reputation tracking without storing all data on-chain.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Validation&lt;/strong&gt;: Supports task verification through &lt;strong&gt;crypto-economic staking&lt;/strong&gt; or cryptographic proofs using &lt;strong&gt;Trusted Execution Environments (TEEs)&lt;/strong&gt; or zero-knowledge proofs.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;By keeping the standard lean, ERC-8004 lets developers implement trust models appropriate for each use case, from social consensus for low-risk tasks to cryptographic validation for financial operations or sensitive data workflows.&lt;/p&gt;

&lt;h2&gt;
  
  
  Oasis’s ROFL: Enabling Trustless Execution
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhu9yaaqzlwv7tri7mo6r.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhu9yaaqzlwv7tri7mo6r.png" alt="rofl" width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;ROFL (Runtime Off-chain Logic)&lt;/strong&gt; is a TEE framework built on the &lt;strong&gt;Oasis Protocol&lt;/strong&gt;, enabling agents to execute off-chain computations &lt;strong&gt;securely and verifiably&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Key features include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Confidential execution&lt;/strong&gt;: Code runs inside hardware-isolated enclaves, keeping sensitive inputs private.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Cryptographic attestations&lt;/strong&gt;: Outputs are verifiable on-chain, allowing other agents to trust results without relying on the developer.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Cross-chain key management&lt;/strong&gt;: Supports native wallet operations across EVM-compatible chains, Solana, and more, removing bridge dependencies.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;ROFL essentially decouples &lt;strong&gt;computation from coordination&lt;/strong&gt;: ERC-8004 handles agent registration, reputation, and discovery on-chain, while ROFL ensures that sensitive computations and transaction signing remain &lt;strong&gt;trustless and private&lt;/strong&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  Adoption Path and Potential
&lt;/h2&gt;

&lt;p&gt;ERC-8004 is moving toward a stable v2, introducing features like &lt;strong&gt;NFT-based agent ownership&lt;/strong&gt;, flexible reputation storage, and integration with payment protocols like &lt;strong&gt;x402&lt;/strong&gt;. The combination of ERC-8004 and ROFL enables developers to build &lt;strong&gt;verifiable, cross-chain autonomous agents&lt;/strong&gt;, laying the groundwork for new applications in DeFi, trading, gaming, and beyond.&lt;/p&gt;

&lt;p&gt;By standardizing identity, reputation, and validation while leveraging TEE-backed execution, ERC-8004 provides a foundation for &lt;strong&gt;trustless agent networks&lt;/strong&gt; that can scale across ecosystems without requiring centralized control.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;References&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://oasis.net/blog/erc-8004-trustless-agents" rel="noopener noreferrer"&gt;Oasis Protocol Blog: ERC-8004: A Standard for Trustless Agents‍&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://eips.ethereum.org/EIPS/eip-8004" rel="noopener noreferrer"&gt;ERC-8004: Trustless Agents (EIP Draft)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://ethereum-magicians.org/t/erc-8004-trustless-agents/25098" rel="noopener noreferrer"&gt;Ethereum Magicians: ERC-8004 Discussion&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://developers.googleblog.com/en/a2a-a-new-era-of-agent-interoperability/" rel="noopener noreferrer"&gt;Google A2A Protocol Announcement&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>web3</category>
      <category>ai</category>
      <category>privacy</category>
      <category>blockchain</category>
    </item>
    <item>
      <title>Oasis Launches “TEE Break Challenge”, One Bitcoin Bounty for Breaking Their Secure Enclave</title>
      <dc:creator>Manav</dc:creator>
      <pubDate>Thu, 23 Oct 2025 13:13:47 +0000</pubDate>
      <link>https://forem.com/caerlower/oasis-launches-tee-break-challenge-one-bitcoin-bounty-for-breaking-their-secure-enclave-2ea8</link>
      <guid>https://forem.com/caerlower/oasis-launches-tee-break-challenge-one-bitcoin-bounty-for-breaking-their-secure-enclave-2ea8</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fz0ssh5ynebdg7h5to788.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fz0ssh5ynebdg7h5to788.png" alt="tee challenge" width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Oasis, the team behind the &lt;strong&gt;Sapphire confidential EVM&lt;/strong&gt;, has launched what might be one of the boldest blockchain security experiments in recent years: a public challenge to break their TEE-based system.&lt;/p&gt;

&lt;p&gt;There’s &lt;strong&gt;one Bitcoin (wBTC)&lt;/strong&gt; locked in a Sapphire smart contract.&lt;/p&gt;

&lt;p&gt;If anyone can extract the private key controlling it, the funds are theirs.&lt;/p&gt;

&lt;p&gt;No bug report. No triage. Just proof through action.&lt;/p&gt;

&lt;h2&gt;
  
  
  A Real-World TEE Security Test
&lt;/h2&gt;

&lt;p&gt;The setup is simple but powerful: a smart contract deployed on the &lt;strong&gt;Sapphire Mainnet&lt;/strong&gt; generates a keypair &lt;em&gt;entirely inside&lt;/em&gt; an Intel SGX enclave.&lt;/p&gt;

&lt;p&gt;The private key never leaves the TEE, never exists in plaintext, and has no API or function that can export it.&lt;/p&gt;

&lt;p&gt;Only the derived Ethereum address: &lt;code&gt;0xCEAf9abFdCabb04410E33B63B942b188B16dd497&lt;/code&gt; , is public and holds the 1 wBTC bounty.&lt;/p&gt;

&lt;p&gt;The contract code is verified and live on-chain at: &lt;code&gt;0xc1303edbFf5C7B9d2cb61e00Ff3a8899fAA762B8&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;If anyone manages to move the funds without authorization, it’s a clear indicator that the TEE itself has been compromised, not the smart contract logic.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why This Matters
&lt;/h2&gt;

&lt;p&gt;Trusted Execution Environments (TEEs) have been a cornerstone for confidential computing in blockchain, used by projects like Phala, Secret, and Crust to keep on-chain data private. But recent research has shown that TEE hardware can be vulnerable too.&lt;/p&gt;

&lt;p&gt;In 2025, two new physical attack vectors, &lt;strong&gt;Battering RAM&lt;/strong&gt; and &lt;strong&gt;Wiretap&lt;/strong&gt; were disclosed, successfully breaching Intel SGX (Scalable version) and AMD SEV-SNP enclaves. Several networks using these systems were forced into emergency upgrades.&lt;/p&gt;

&lt;p&gt;Oasis, however, claimed that its architecture remained unaffected, largely due to:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Running on &lt;strong&gt;Intel SGX v1&lt;/strong&gt;, which uses a different memory encryption design not impacted by the attacks.&lt;/li&gt;
&lt;li&gt;A &lt;strong&gt;defense-in-depth model&lt;/strong&gt; that adds additional on-chain and governance-based security layers beyond the TEE.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This public challenge seems designed to test those claims under real-world conditions.&lt;/p&gt;

&lt;h2&gt;
  
  
  Technical Architecture Highlights
&lt;/h2&gt;

&lt;p&gt;The Sapphire contract uses the following design principles:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;In-enclave key generation:&lt;/strong&gt; Keypairs are generated using Sapphire’s secure randomness and stored only inside the enclave.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;No off-chain dependencies:&lt;/strong&gt; There’s no off-chain signing service or export function.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Hardcoded transaction paths:&lt;/strong&gt; Even compromised owners can’t redirect withdrawals, outputs are fixed.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;On-chain authentication:&lt;/strong&gt; Every action requires Sign-In with Ethereum (SIWE) and enclave-verified signatures.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Production environment:&lt;/strong&gt; This is live on &lt;strong&gt;Sapphire Mainnet&lt;/strong&gt;, not a testnet or sandbox instance.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The challenge uses the same infrastructure as deployed applications — meaning it tests &lt;strong&gt;real production security&lt;/strong&gt;, not a simplified simulation.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why This Is Interesting
&lt;/h2&gt;

&lt;p&gt;Most bug bounties offer rewards for vulnerabilities under specific reporting conditions. The TEE Break Challenge takes a different stance, it’s a &lt;em&gt;binary outcome test&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;Either:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;The Bitcoin moves, proving a TEE-level compromise, or&lt;/li&gt;
&lt;li&gt;It doesn’t, validating Sapphire’s enclave model under live conditions.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;That approach is rare in blockchain security and the transparency of putting real funds on the line makes it especially compelling.&lt;/p&gt;

&lt;h2&gt;
  
  
  Duration and Participation
&lt;/h2&gt;

&lt;p&gt;The challenge runs through the &lt;strong&gt;end of 2025&lt;/strong&gt;, giving researchers ample time to attempt TEE-level extraction. It’s open to anyone: hardware security researchers, blockchain engineers, and academic teams interested in confidential computing.&lt;/p&gt;

&lt;p&gt;The contract and related infrastructure are fully public. Discussion and coordination are happening in the &lt;a href="https://discord.com/invite/oasis-network-community-748635004384313474" rel="noopener noreferrer"&gt;Oasis Discord.&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Closing Thoughts
&lt;/h2&gt;

&lt;p&gt;Regardless of the outcome, this is one of the most practical demonstrations yet of &lt;strong&gt;TEE security in a live decentralized system&lt;/strong&gt;. It’s part bounty, part experiment, and part statement, that the best way to test trust is to make it public and measurable.&lt;/p&gt;

&lt;p&gt;If someone manages to extract the key, it’ll be a breakthrough moment in TEE research.&lt;/p&gt;

&lt;p&gt;If not, it’s a strong validation of Sapphire’s design and Oasis’s defense-in-depth strategy.&lt;/p&gt;

&lt;p&gt;Either way, the results will be valuable for everyone working at the intersection of hardware security and blockchain privacy.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Links:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://explorer.oasis.io/mainnet/sapphire/address/0xc1303edbFf5C7B9d2cb61e00Ff3a8899fAA762B8" rel="noopener noreferrer"&gt;Challenge Contract on Oasis Explorer&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://explorer.oasis.io/mainnet/sapphire/address/0xc1303edbFf5C7B9d2cb61e00Ff3a8899fAA762B8/code#code" rel="noopener noreferrer"&gt;Full contract source code&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://docs.oasis.io/dapp/sapphire" rel="noopener noreferrer"&gt;Sapphire Documentation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://discord.com/invite/oasis-network-community-748635004384313474" rel="noopener noreferrer"&gt;Oasis Discord&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>privacy</category>
      <category>devchallenge</category>
      <category>web3</category>
      <category>blockchain</category>
    </item>
    <item>
      <title>When TEEs Fail Gracefully: How Oasis Survived the Battering RAM and Wiretap Attacks</title>
      <dc:creator>Manav</dc:creator>
      <pubDate>Thu, 23 Oct 2025 12:55:41 +0000</pubDate>
      <link>https://forem.com/caerlower/when-tees-fail-gracefully-how-oasis-survived-the-battering-ram-and-wiretap-attacks-189f</link>
      <guid>https://forem.com/caerlower/when-tees-fail-gracefully-how-oasis-survived-the-battering-ram-and-wiretap-attacks-189f</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmhagewqlem1ixsmab8qu.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmhagewqlem1ixsmab8qu.png" alt="Tee attack" width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;In early October, 2025, two new physical attacks - &lt;strong&gt;Battering RAM&lt;/strong&gt; and &lt;strong&gt;Wiretap&lt;/strong&gt;, broke open the latest generation of hardware trusted execution environments (TEEs), namely &lt;strong&gt;Intel SGX Scalable&lt;/strong&gt; and &lt;strong&gt;AMD SEV-SNP&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;These attacks didn’t just expose theoretical vulnerabilities. They granted real attackers the ability to extract &lt;strong&gt;attestation keys&lt;/strong&gt;, effectively nullifying the cryptographic guarantees of those TEEs. Within hours of disclosure, multiple blockchain projects built around them like &lt;strong&gt;Phala&lt;/strong&gt;, &lt;strong&gt;Secret&lt;/strong&gt;, &lt;strong&gt;Crust&lt;/strong&gt;, and &lt;strong&gt;IntegriTEE&lt;/strong&gt; began issuing emergency updates and migration plans.&lt;/p&gt;

&lt;p&gt;One project didn’t have to: &lt;strong&gt;Oasis&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;While others scrambled to patch, Oasis nodes kept running exactly as before. The reason has less to do with luck and everything to do with &lt;strong&gt;architectural philosophy&lt;/strong&gt;, a belief that &lt;em&gt;TEE security must never be a single point of failure&lt;/em&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  Understanding What Broke
&lt;/h2&gt;

&lt;p&gt;To understand why Oasis stayed online, we first need to look at what actually failed elsewhere.&lt;/p&gt;

&lt;p&gt;Both Battering RAM and Wiretap exploited flaws in &lt;strong&gt;deterministic encryption schemes&lt;/strong&gt; used in new SGX and SEV-SNP memory controllers. By monitoring predictable encryption patterns, attackers could reconstruct secret material including attestation and session keys from physical side channels.&lt;/p&gt;

&lt;p&gt;Once the attestation layer is gone, the whole TEE trust model collapses:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Data sealed inside enclaves can be decrypted externally.&lt;/li&gt;
&lt;li&gt;Remote attestation can be forged.&lt;/li&gt;
&lt;li&gt;“Confidential compute” becomes just “compute.”&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This chain reaction was precisely what many TEE-reliant blockchains experienced. Their node operators lost assurance that enclave nodes were genuine, effectively breaking consensus-level trust.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why Oasis Didn’t Fall
&lt;/h2&gt;

&lt;p&gt;Oasis took a different path years ago. Its team designed around the assumption that &lt;strong&gt;hardware will fail eventually&lt;/strong&gt;, so every core system includes at least one independent layer that doesn’t rely on TEE integrity.&lt;/p&gt;

&lt;p&gt;Here’s how that philosophy plays out in practice:&lt;/p&gt;

&lt;h3&gt;
  
  
  1. Architectural Separation
&lt;/h3&gt;

&lt;p&gt;The &lt;strong&gt;key manager&lt;/strong&gt; and &lt;strong&gt;Sapphire confidential runtime&lt;/strong&gt; on Oasis run on &lt;strong&gt;Intel SGX v1&lt;/strong&gt;, not the newer Scalable version. SGX v1 uses non-deterministic memory encryption and an attestation model that wasn’t impacted by the recent flaws.&lt;/p&gt;

&lt;p&gt;More importantly, Oasis separates key access and execution. No single enclave or node ever holds the full cryptographic picture. A compromised enclave is isolated, not catastrophic.&lt;/p&gt;

&lt;h3&gt;
  
  
  2. On-Chain Governance as a Security Layer
&lt;/h3&gt;

&lt;p&gt;Unlike networks that rely solely on enclave attestations, Oasis enforces &lt;strong&gt;on-chain governance rules&lt;/strong&gt; around who can even run a key manager node.&lt;/p&gt;

&lt;p&gt;Membership in the key committee requires:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Explicit governance approval;&lt;/li&gt;
&lt;li&gt;A validator stake (≥ 5M ROSE);&lt;/li&gt;
&lt;li&gt;Continuous compliance with network policies.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Even if someone could fake attestation with stolen keys, they still couldn’t bypass these governance requirements baked into consensus logic.&lt;/p&gt;

&lt;h3&gt;
  
  
  3. Ephemeral Cryptography
&lt;/h3&gt;

&lt;p&gt;Each epoch, the network rotates &lt;strong&gt;ephemeral encryption keys&lt;/strong&gt; used for transaction confidentiality. Once rotated, the old keys are deleted permanently. This means that even a perfect enclave compromise only affects &lt;em&gt;future&lt;/em&gt; sessions — past data remains irreversibly protected.&lt;/p&gt;

&lt;h3&gt;
  
  
  4. Adaptive Response
&lt;/h3&gt;

&lt;p&gt;Oasis also maintains a &lt;strong&gt;CPU-level blacklist&lt;/strong&gt; mechanism. When a hardware vulnerability is disclosed, affected processor models can be banned through governance proposals. This allows the network to react in hours, not months.&lt;/p&gt;

&lt;h2&gt;
  
  
  Lessons for Developers
&lt;/h2&gt;

&lt;p&gt;For developers building privacy-preserving dApps or agent systems, Oasis offers a valuable case study in &lt;strong&gt;graceful failure&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;TEE technology enables confidential logic and data handling, but as we’ve now seen, the underlying hardware is far from infallible. Designing for resilience means assuming that even your most “trusted” environment might one day betray you.&lt;/p&gt;

&lt;p&gt;In practice, that means:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Don’t rely solely on enclave attestations for authentication or access control.&lt;/li&gt;
&lt;li&gt;Keep sensitive operations modular and separable.&lt;/li&gt;
&lt;li&gt;Rotate encryption keys frequently, and expire them aggressively.&lt;/li&gt;
&lt;li&gt;Build governance or consensus checks that exist outside the hardware trust domain.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Oasis’s continued uptime and data integrity during this incident show that these principles are not just theoretical — they work.&lt;/p&gt;

&lt;h2&gt;
  
  
  A Model for Future Confidential Systems
&lt;/h2&gt;

&lt;p&gt;What happened with Battering RAM and Wiretap should serve as a wake-up call for developers working on confidential smart contracts, MPC frameworks, or AI inference enclaves.&lt;/p&gt;

&lt;p&gt;Hardware isolation is an important tool, but not a guarantee. The safer path forward is &lt;strong&gt;layered trust&lt;/strong&gt;, where no single failure (hardware, software, or governance) can fully compromise the system.&lt;/p&gt;

&lt;p&gt;Oasis’s defense-in-depth design represents one of the first large-scale proofs that this philosophy works in production.&lt;/p&gt;

&lt;p&gt;While other networks were rebooting enclaves and replacing attestation keys, Oasis simply continued to function. No data loss, no downtime, and no user impact.&lt;/p&gt;

&lt;p&gt;For developers, that’s more than just good news, it’s a validation of how to architect secure, resilient confidential compute systems in the real world.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Further Reading&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://oasis.net/sapphire" rel="noopener noreferrer"&gt;Oasis Protocol: Sapphire Confidential EVM&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://docs.oasis.io/adrs/" rel="noopener noreferrer"&gt;Oasis Security Architecture&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://oasis.net/security-and-tees" rel="noopener noreferrer"&gt;Oasis Protocol: Tees&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>security</category>
      <category>blockchain</category>
      <category>web3</category>
      <category>tee</category>
    </item>
  </channel>
</rss>
