#tcsc

[ follow ]
Cryptocurrency
fromHackernoon
1 year ago

Blockchain Security Layers: Tradeoffs Between L1, L2, and Hardware TEEs | HackerNoon

Layer-one and layer-two solutions present distinct security vulnerabilities, requiring careful implementation for TCSC applications.
fromHackernoon
1 year ago

What Most Blockchain Devs Get Wrong About TEE Security and Smart Contract Privacy | HackerNoon

The methodology identifies two main categories: layer-one solution (L1) where contract executes inside a TEE on blockchain, and layer-two solution (L2) that decouples contract computations off-chain.
Cryptocurrency
[ Load more ]