Hardening Witnesses with Confidential Computing
Apr 30, 2025 · 4 min read · Witnesses verify that the verifiable logs they are observing maintain their append-only property and countersign verified checkpoints. Clients can use these countersigned checkpoints to protect themselves against split-views, an attack where a log pr...
Join discussion
