NotOlootu pfp
NotOlootu

@notolootu.eth

How does @acurast secure @anoma 's intent-centric computation? ▶️Simple. It leverages smart phones' Trusted Execution Environments (TEE). ▶️This does not only ensure confidentiality but also encryption of the computations. Since TEE in rooted devices are not valid, ROOTED devices CANNOT be used for @Acurast deployments. @anoma x @acurast
0 reply
0 recast
0 reaction