Hardware Verification using Trusted Execution
Manual auditor-based hardware verification does not scale. Trusted Execution replaces it with cryptographic attestation — and lays the foundation for Confidential Computing.
Currently, hardware provided by a provider is verified using a decentralized network of auditors. This manual approach is proving challenging at scale, especially when incentives go onchain without a human in the loop.
Hardware Verification using Trusted Execution minimizes the trust required to verify provider hardware through a cryptographic attestation process (IETF RATS RFC 9334) involving measurement collection, remote verification against vendor golden measurements, and policy enforcement. Supported hardware includes Intel CPUs with TDX (Xeon Sapphire Rapids), AMD CPUs with SEV-SNP (EPYC Milan/Genoa), and NVIDIA H100/H200 GPUs via the NVTrust SDK.
This is also a foundational building block for Confidential Computing.