Singapore health records were hacked. More than 1.5m records were stolen in one of the worst cyber attacks in Singapore history. Including Prime Minister Lee's records were stolen. page Multiple tiers of protection did not do anything to help stop the honeypot (database) from being stolen -- a new solution is sorely required. Thus, the idea of a decentralized secure enclave solution is discussed. The question is how secure enclaves can be used at scale in a decentralized setting?
For brevity many discussions referenced papers links.
- On Security Analysis of Proof-of-Elapsed-Time (PoET) download - A critical review of TEE and IoT paper - Properties of various TEE’s with a bit more substantial explanation pdf From Mic, we look for three characteristics for general purpose use: - Confidentiality – this can be provided by some form of encrypted memory. - Integrity – guarantees that what was run is what was supposed to run. - 3rd party attestation – prove to somebody else that I ran what I claim I ran.