TEA vs Trusted Computing


All these questions need to be done by a remote attestation process. However remote attestation needs evidence (PoT) to verify against a claim. The claims can be easily queried from the blockchain. But how about evidence? How do you know the proof coming from another node is the truth?


TEE is a very different approach. It makes the protected area even smaller, into a small part of the RAM and inside the CPU chip. We can use Intel SGX as an example.

When to Use TPM, and When to Use TEE?

The TEA Project supports both TPM/HSM and TEE solutions as the source of trust. Which solution a TEA node to choose depends on the specific use case.



Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store