faq about tee'scommon questions about trusted execution environmentswhy does litentry use tees?to allow users to aggregate their fragmented identity, litentry needs to offer storage of sensitive user data, such as a user's polkadot or ethereum account, twitter account and credit scores. trusted execution environments have been chosen as a fundamental and scalable approach to guarantee the security of data storage and data processing.what is a tee?a trusted execution environment is a secure area or enclave on a computer's processor, separate from the main operating system. it stores and processes data with complete integrity and protects data from any possible tampering from the outside. computation within a tee is totally invisible from the outside.how does a tee protect data privacy?litentry provides these closed environments or enclaves (tees) in which only the user has control over their data and sharing authorizations. besides the specific hardware design of a tee, any input and output, such as a user's sensitive account relationships or their credentials, are encrypted with cryptographic keys.how does a tee create trust?the trusted execution environment is known as a secured machine running a known piece of open source code. everyone can verify the tee's functionality and results. it functions as an independent 3th party. everyone can also verify that the inputs and outputs of a tee act according to the open source code.how do you make sure that a tee can be trusted?every tee goes through an attestation process to ensure the code is running on a genuine and secure tee from the hardware manufacturer. this process verifies the tee’s code is untampered with and verifies the dedicated cryptographic key pair of the specific tee. these keys allow the tee to sign its own messages as a means of verification that a specific credential was issued by a specific tee.how does litentry use’s tee’s?litentry uses trusted execution enclaves to protect the sensitive relations of identity owner. a user can store & communicate the relationships between their web2 & web3 accounts safely since it is protected by the tee and encrypted during communication. our tee’s also verify the on-chain information that is related to those accounts as an independent trustworthy observer and help users practice selective disclosure of credentials.how does the tee allow for ‘selective disclosure’ of credentials?since the tee acts as an independent trustworthy and verifiable observer it can issue claims and credentials about the accounts being stored inside it’s enclave. this middle layer allows the user to manage the amount of information they select to disclose or allows to share. a user might prefer to share the possession of a token but not it’s size or purchase date.read our documentsexplore the pillars we build onself sovereign identityby using the self-sovereign identity framework we bring full control over what, when & to whom individuals share their personal data.
网站成立于2019年2月20日。