Skip to content

Privacy

Icon base by Lorc under CC BY 3.0 with modifications to add a gradient

1 Topics 2 Posts
  • > Verify our no-logging policy through code inspection

    2
    0 Votes
    2 Posts
    0 Views
    J
    Someone please correct me if I'm wrong. You are 100% right. Also - SGX depends on explicit trust of Intel code signing, which is another externality that needs to be in the threat model.