@notolootu.eth
How does @acurast secure @anoma 's intent-centric computation?
▶️Simple. It leverages smart phones' Trusted Execution Environments (TEE).
▶️This does not only ensure confidentiality but also encryption of the computations.
Since TEE in rooted devices are not valid, ROOTED devices CANNOT be used for @Acurast deployments.
@anoma x @acurast