By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Inside Trusted Execution Environments: How Secure Are Your Crypto Transactions? | HackerNoon
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Inside Trusted Execution Environments: How Secure Are Your Crypto Transactions? | HackerNoon
Computing

Inside Trusted Execution Environments: How Secure Are Your Crypto Transactions? | HackerNoon

News Room
Last updated: 2025/10/05 at 7:45 PM
News Room Published 5 October 2025
Share
SHARE

Table of Links

Abstract and I. Motivation

II. Local Currencies

III. Unique Pop Ceremonies

IV. Monetary Policy

V. Purchasing-Power Adjusted Transaction Fees

VI. Architecture

VII. Trusted Execution Environment Security

VIII. Encointer Association

IX. Known Limitations

X. Conclusion and References

VII. TRUSTED EXECUTION ENVIRONMENT SECURITY

TEEs aim to provide the necessary guarantees for secure remote computation. They should provide integrity and confidentiality guarantees when executing software on a computer maintained by an untrusted party. The most recent TEEs rely on software attestation, a process that guarantees the user that she’s communicating with a known piece of code running inside a secure container on a genuine trusted hardware by means of a manufacturer signature.

As criticized in [14], manufacturers seem to follow a security by obscurity principle not disclosing design internals necessary for a proper security review. Their in dubio contra reum analysis of Intel SGX shows vulnerabilities to cache timing and sidechannel attacks. Foreshadow [15] falsified confidentiality as well as integrity claims for SGX but the attack is mitigated for now. ARM TrustZone on the other hand is only an IP core and design details are left to the manufacturer, equally reluctant to disclose details.

Since at least the post-Snowden era, one also has to be concerned about manufacturers being forced by their state to introduce deliberate backdoors. Even if open-source TEEs like Keystone [22] might soon deliver devices, one would still have to trust the manufacturer not to tamper with the design.

While all this is disturbing, it should be put in perspective. Information security is a never-ending race. All blockchain solutions are software running by large part on Intel CPUs. While hardware wallets may give us some comfort concerning our funds private keys, there’s no guarantee on confidentiality when considering sidechannel attacks.

The Encointer association will follow developments closely and maintain an up to date list of accepted TEE manufacturers’ attestation keys.

VIII. Encointer ASSOCIATION

The Encointer association is a not-for-profit association under Swiss law. Its purpose is to govern the Encointer ecosystem during its initial phase. It fulfills the following tasks

• community bootstrapping

• protocol updates

• maintain list of accepted TEE attestation service keys

All changes are subject to a referendum by the community.

IX. KNOWN LIMITATIONS

A. Scalability

The proposed Encointer protocol assumes that the entire state for a local community can fit into secure memory within a TEE. This limits the number of accounts that can be registered per community.

X. CONCLUSION

A novel cryptocurrency system has been introduced in conceptual detail. Main contributions are

• A novel approach to monetary policy supporting equal opportunity globally with a universal basic income (UBI) in local community currencies.

• A novel protocol for trustless pseudonym key signing parties for proof-of-personhood (PoP)

• Private transactions with purchasing-power adjusted fees.

REFERENCES

[1] Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system, http://bitcoin.org/bitcoin.pdf, 2008

[2] Richard Cantiollon. Essai sur la Nature du Commerce en Gen´ eral, 1755 ´

[3] Thomas Piketty. Capital in the Twenty-First Century, 2013

[4] Bryan Ford. Pseudonym Parties: An Offline Foundation for Online Accountability, 2008

[5] Maria Borge et al. Proof-of-Personhood: Redemocratizing Permissionless Cryptocurrencies

[6] Silvio Gesell, The Natural Economic Order, 1958

[7] Bernard Lietaer at al., People Money: The Promise of Regional Currencies, 2012

[8] Sunny King, Scott Nadal. PPCoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake, 2012

[9] Gavin Wood, Polkadot: Vision for a Heterogeneous Multi-Chain Framework

[10] Fergal Reid. An Analysis of Anonymity in the Bitcoin System, Security and Privacy in Social Networks, 2012

[11] Nicolas van Saberhagen, CryptoNote v 2.0, https://cryptonote.org/whitepaper.pdf, 2014

[12] Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, Madars Virza, Zerocash: Decentralized Anonymous Payments from Bitcoin, proceedings of the IEEE Symposium on Security & Privacy (Oakland) 2014, 459-474, IEEE, 2014

[13] Hyperledger Sawtooth Private Data Objects. https://github.com/hyperledger-labs/private-data-objects

[14] V. Costan S. Devadas. Intel SGX Explained. Tech. rep., Cryptology ePrint Archive, 2016.

[15] Jo Van Bulck et.al. Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution, 2018

[16] Introducing ARM TrustZone. https://developer.arm.com/technologies/trustzone

[17] www.substratee.com Historical Economics in Honour of Joseph Schumpeter, Princeton University Press, 1972

[18] Poon, Joseph. The Bitcoin Lightning Network: Scalable Off-Chain Instant Payments, 2015

[19] J. Lind, I. Eyal, P. Pietzuch, E. Gun Sirer. Teechan: Payment Channels ¨ Using Trusted Execution Environments

[20] Serguey Popov. The Tangle, http://iotatoken.com/IOTA Whitepaper.pdf, 2016

[21] Colin LeMahieu. Nano: A Feeless Distributed Cryptocurrency Network, 2016

[22] Keystone Project, https://keystone-enclave.github.io/

[23] https://en.wikipedia.org/wiki/List of cities by population density, sampled Nov. 2018

[24] Stodder, J., Complementary Credit Networks and Macro-Economic Stability: Switzerland’s Wirtschaftsring, Journal of Economic Behavior and Organization, 2009

[25] Gelleri, Chiemgauer Regiomoney: Theory and Proctise of Regional Currencies, 2009

[26] Freicoin: https://freico.in

:::info
Author:

(1) Alain Brenzikofer ([email protected]).

:::


:::info
This paper is available on arxiv under CC BY-NC-SA 4.0 DEED license.

:::

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article I’m surrounded by snorers — can the Soundcore A30 sleep earbuds save me?
Next Article How To See The Aurora Borealis (And What The Northern Lights Actually Are) – BGR
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Best Headsets for Working From Home in 2025 According to CNET's Audio Expert
News
Retail Crypto Traders Deserve Better Than India’s Patchwork Regulations | HackerNoon
Computing
OpenAI’s Sora Video Tops Apple App Store Despite Being Invite-Only
News
Apple’s reported alliance with Baidu for AI functions in China draws mixed response · TechNode
Computing

You Might also Like

Computing

Retail Crypto Traders Deserve Better Than India’s Patchwork Regulations | HackerNoon

1 Min Read
Computing

Apple’s reported alliance with Baidu for AI functions in China draws mixed response · TechNode

4 Min Read
Computing

Space Tourism Is Taking Off: Are We Ready for the Risks? | HackerNoon

1 Min Read
Computing

US chip firm Micron plans to expand investment in China · TechNode

1 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?