Secret sharing protects data at rest. Confidential computation protects it in use. The infrastructure that does both simultaneously is what sanctuary actually requires.

Partisia Blockchain
@partisiampc
03-04
E2EE was a good start. It doesn't hold when the party holding your data can be compelled to hand it over. Sanctuary technologies need infrastructure where there is nothing to hand over in the first place. x.com/Cointelegraph/…
From Twitter
Disclaimer: The content above is only the author's opinion which does not represent any position of Followin, and is not intended as, and shall not be understood or construed as, investment advice from Followin.
Like
Add to Favorites
Comments