Back to Roadmap
bl-009Q3 2026Est. 9/30/2026Planned

Hardware Verification using Trusted Execution

Manual auditor-based hardware verification does not scale. Trusted Execution replaces it with cryptographic attestation — and lays the foundation for Confidential Computing.

security

Currently, hardware provided by a provider is verified using a decentralized network of auditors. This manual approach is proving challenging at scale, especially when incentives go onchain without a human in the loop.

Hardware Verification using Trusted Execution minimizes the trust required to verify provider hardware through a cryptographic attestation process (IETF RATS RFC 9334) involving measurement collection, remote verification against vendor golden measurements, and policy enforcement. Supported hardware includes Intel CPUs with TDX (Xeon Sapphire Rapids), AMD CPUs with SEV-SNP (EPYC Milan/Genoa), and NVIDIA H100/H200 GPUs via the NVTrust SDK.

This is also a foundational building block for Confidential Computing.