Back to blog
September 17, 2024 · 5 min · SQD Team

Exploring the potential of TEEs

TEE Technology Security
Exploring the potential of TEEs

ICYMI, TEEs are the latest crypto craze after dunking on 100 million dollar raises and the complicated social relationships between the ETH clique.

On TEEs in General

Speakers explained that TEE, short for Trusted Execution Environments, represents a hardware-based security approach. In typical implementations, a chip contains a secure compartment where computation occurs inaccessibly to the host system. This isolation of data and compute from the rest of the chip defines TEEs’ fundamental characteristic.

TEEs aren’t novel technology — they’ve existed for decades. Apple has long used “secure enclaves” terminology in keynotes to assure users of privacy protection.

As AI and crypto hype escalated, developers realized zero-knowledge technology was prohibitively expensive for verifying compute at scale. TEEs, now widely available, integrate seamlessly with cryptographic technologies like MPC or ZK-Proofs.

According to speakers, TEEs offer advantages including:

  • Widespread availability
  • Affordability compared to ZKP usage
  • High performance capabilities
  • Verifiability for general compute
  • Fast learning curve for developers
  • Integration compatibility with other cryptographic tech
  • Essential role in making AI x Crypto functional

Existing open-source code runs inside TEEs without modification, and they’re already embedded in billions of devices globally.

On Using TEEs in Products

SQD plans future TEE integration across three areas:

  • Trustless ingestion: enabling participants to add onchain data to the SQD data lake
  • Verification of query results: executing queries within TEEs
  • Trustless indexing: allowing users to rely on others’ indexers without trust requirements

For investors, verification emerges as critical. While zero-knowledge proofs proved computation correctness, they remained expensive and time-consuming. TEEs provide faster, practical verification that data remains uncompromised.

TEE applications include:

  • Co-processing: connecting smart contracts with off-chain sources to expand capabilities
  • Trustless computing: platforms like Super Protocol enabling decentralized cloud applications with verifiable trustlessness

Beyond deAI

TEE applications extend beyond AI-crypto integration to block building and decentralized frontends. Recent dApp exploits have driven interest in decentralized frontends, with TEEs enabling secure dynamic website hosting without compromising user experience.

Addressing Downsides

Intel TEEs have experienced past exploits, raising vulnerability concerns. However, the calculation requires weighing attack costs against protected asset value. With increasing open-source TEE development, developers gain additional attack mitigation strategies, potentially combining MPC or ZKP for enhanced security.

What Does the Future Hold?

Speakers envision:

  • Fully open-source TEEs becoming the off-chain base layer
  • Rise of compliant Web3 infrastructure and useful applications
  • Innovation in open-sourcing chips, affecting private key creation processes
  • Novel functionality enabling experimentation for discovering new use cases

The future appears promising, with justified enthusiasm surrounding TEE and crypto convergence.


Thanks to speakers and participants.

Want to learn more about SQD?