TEE In-depth Research Report: Revolutionizing Confidential Computing in the Web3 Era
#HTX Tutorial#DeFi#Technical Analysis#Blockchain

Trusted Execution Environment (TEE) is emerging as a vital foundation for data security and confidential computing in the Web3 era. From MEV protection to AI computing, from decentralized finance to the DePIN ecosystem, TEEs are instrumental in creating a more secure and efficient crypto landscape. This report delves into this groundbreaking technology, exploring its transformative impact on reshaping the future of Web3.
I. The Rise of TEEs: A Core Component of the Web3 Era
1.1 What is TEE?
TEE is a hardware-based secure execution environment that ensures data is not tampered with, stolen, or leaked during computation. In modern computing systems, a TEE creates an isolated area within the CPU, separate from the operating system (OS) and applications, providing extra security for sensitive data and computations.
Key Features of TEE:
Isolation: The TEE runs in a protected area of the CPU, isolated from the operating system, other applications, and external attackers. Even if a hacker compromises the main operating system, the data and code within the TEE remain secure.
Integrity: The TEE ensures that code and data are not tampered with during execution.
Remote Attestation allows the TEE to cryptographically prove this integrity to external parties.
Confidentiality: The TEE keeps data secret. No one, not even the manufacturer or cloud provider, can access the information stored and processed within the TEE. Sealed Storage ensures sensitive data remains secure even when the device is off.
1.2 Why Web3 Needs TEEs?
Confidential computing, secure execution, and censorship resistance are fundamental pillars of the Web3 ecosystem. TEEs are uniquely positioned to address these core needs. Currently, blockchain and decentralized applications (DApps) grapple with several key challenges:
1.2.1 Resolving Blockchain Privacy Concerns
Traditional blockchains like Bitcoin and Ethereum operate with complete transparency. All transaction and smart contract data is publicly viewable, which leads to significant privacy vulnerabilities:
User Privacy Compromised: In use cases ranging from DeFi transactions and NFT purchases to social media interactions, users' financial activity and identities can be easily tracked.
Corporate Data Exposure: Companies want to use blockchain technology, but sensitive data (such as trade secrets and medical records) cannot be stored on public chains.
The TEE Solution: TEEs, combined with smart contracts, enable the creation of private computation environments, protecting sensitive data and ensuring only authorized access to results. Platforms like Secret Network demonstrate the power of this approach, allowing developers to build truly privacy-preserving DApps.
1.2.2 Tackling MEV Problem
Miner Extractable Value (MEV) refers to the profit that miners or block producers can extract by exploiting the transparency of transaction information when packaging transactions. For example, front-running is when miners or bots submit transactions before those of users to gain profit. A sandwich attack involves attackers placing their transactions both before and after a user's transaction to manipulate prices and make a profit.
The TEE Solution: With TEEs, transactions can be ordered in a private environment, ensuring that miners cannot see transaction details in advance.
Flashbots is exploring a TEE and Fair Sequencing solution to reduce the impact of MEV on DeFi.
1.2.3 Overcoming Web3 Computing Bottlenecks
Public blockchains have limited computing capacity, making on-chain computation expensive and inefficient. For example, Ethereum's high gas fees make running complex smart contracts extremely costly. This bottleneck prevents blockchain from effectively supporting resource-intensive tasks such as AI, image processing, and complex financial modeling.
The TEE Solution: TEEs can act as a core component of decentralized computing networks. They allow smart contracts to offload computationally demanding tasks to a secure, trusted environment and receive verifiable results.
Key Player: iExec is a prime example of a project utilizing TEEs to build a decentralized cloud computing platform.
1.2.4 Addressing Trust Issues in DePIN
Decentralized Physical Infrastructure Networks (DePIN) are an emerging trend in Web3, with examples like Helium (decentralized 5G), Filecoin (decentralized storage), and Render Network (decentralized rendering).
Since DePINs rely on decentralized computation and verification, TEEs can help ensure the integrity of data and computations. For instance, data processing devices can perform computations within a TEE, guaranteeing that results remain untampered. Combining TEEs with remote attestation allows these verifiable results to be securely relayed to the blockchain, mitigating fraud in DePIN ecosystems.
1.3 Comparing TEE with Other Confidential Computing Technologies (ZKP, MPC, FHE)
Currently, the confidential computing technologies in the Web3 field mainly include:
TEE (Trusted Execution Environment)
Strengths: High efficiency and low latency make TEEs suitable for high-throughput computations like MEV protection and AI processing.
Weaknesses: TEEs rely on specific hardware and are susceptible to security vulnerabilities (e.g., SGX attacks).
ZKP (Zero-Knowledge Proof)
Strengths: ZKPs mathematically prove the validity of data without requiring trust in a third party.
Weaknesses: The computational overhead of ZKPs is significant, limiting their use for large-scale computations.
MPC (Multi-Party Computation)
Strengths: MPC doesn't rely on a single trusted hardware component, making it suitable for decentralized governance and privacy-preserving payments.
Weaknesses: MPC suffers from relatively low computational performance and limited scalability.
FHE (Fully Homomorphic Encryption)
Strengths: FHE enables computations directly on encrypted data, ideal for situations requiring the strongest privacy guarantees.
Weaknesses: The extremely high computational cost of FHE makes it challenging to deploy commercially at present.
II. Understanding TEEs: Exploring Core Architecture of Trusted Computing
TEE is a hardware-based security technology that provides isolated execution environments, guaranteeing data confidentiality, integrity, and verifiability. With the rapid growth of blockchain, AI, and cloud computing, TEEs have become a key component of the Web3 security architecture. This chapter explores TEE principles, implementations, and data security applications.
2.1 Fundamental Principles of TEE
2.1.1 The Mechanics of TEE
TEEs leverage hardware support to establish a protected and isolated execution space within the CPU. This ensures that code and data remain confidential and untampered during processing. Key components of a TEE include:
Secure Memory: TEEs utilize dedicated, encrypted memory regions within the CPU (often referred to as Enclaves or Secure Worlds). These regions are inaccessible to external programs, preventing unauthorized access or modification of data.
Isolated Execution: Code executed within a TEE operates independently of the main operating system. This isolation ensures that even if the OS is compromised, the TEE can still safeguard data security.
Sealed Storage: Data can be encrypted using keys held within the TEE and stored in potentially insecure environments. Only the TEE possesses the capability to decrypt and access this sealed data.
Remote Attestation: This feature enables remote parties to verify that the TEE has executed trusted code. This verification process confirms the integrity of the computation and assures that results have not been manipulated.
2.1.2 TEE Security Model
The TEE security model is built upon the principle of a Minimal Trusted Computing Base (TCB). This means:
Trust is placed solely in the TEE itself. The host operating system, drivers, and other external components are considered untrusted.
Security is enforced through encryption and hardware-based protections, defending against both software and physical attacks.
2.2 Comparing Leading TEE Technologies: Intel SGX, AMD SEV, and ARM TrustZone
Currently, the mainstream TEE solutions are mainly provided by the three major chip manufacturers: Intel, AMD, and ARM.
2.2.1 Intel SGX (Software Guard Extensions)
Intel's TEE technology, initially introduced in Skylake and subsequent CPUs, creates a secure computing environment through Enclaves (encrypted isolated areas), suitable for cloud computing, blockchain privacy contracts, and more.
Core Features
Enclave-based Memory Isolation: Applications can create protected Enclaves to store sensitive code and data.
Hardware-Level Memory Encryption: Data within an Enclave is always encrypted externally to the CPU, preventing access even if memory is dumped.
Remote Attestation: Enables remote verification that the Enclave is running untampered code.
Limitations
Enclave Memory Constraints: Enclaves have memory limits (originally 128MB, now expandable to 1GB+).
Vulnerability to Side-Channel Attacks: SGX is susceptible to side-channel attacks (e.g., L1TF, Plundervolt, SGAxe).
Complex Development Environment : Developing for SGX requires specialized applications using the SGX SDK.
2.2.2 AMD SEV (Secure Encrypted Virtualization)
AMD's TEE technology, designed for secure computing in virtualized environments, is ideal for cloud computing scenarios and offers encryption protection at the virtual machine (VM) level.
Core Features
Full Memory Encryption: SEV uses CPU-internal keys to encrypt the entire memory of a VM.
Multi-VM Isolation: Each VM has its own unique encryption key, preventing data access between VMs on the same physical machine.
SEV-SNP Enhancements: The latest SEV version (SNP) adds remote attestation, enabling verification of VM code integrity.
Limitations
Virtualization Dependency: SEV is designed exclusively for virtualized environments and is not applicable to non-VM applications.
Performance Overhead: The encryption and decryption processes introduce a performance overhead.
2.2.3 ARM TrustZone
ARM's TrustZone is a TEE solution commonly found in mobile devices, IoT devices, and secure hardware wallets for smart contracts.
It partitions the CPU into a Secure World and a Normal World.
Core Features
Lightweight Architecture: TrustZone avoids complex virtualization, making it suitable for resource-constrained devices.
System-Wide TEE Support: It supports various security applications, including encrypted storage, DRM, and secure financial transactions.
Hardware-Based Isolation: TrustZone offers hardware-based isolation, although it uses a different mechanism than SGX's Enclaves.
Limitations
Lower Security Level: Compared to SGX and SEV, TrustZone's security can be considered lower due to its reliance on device manufacturer implementations for the Secure World.
Restricted Development: Development can be limited, as some functionalities are only exposed by device manufacturers, restricting third-party developers' access to the full TEE API.
2.3 RISC-V Keystone: A Promising Future for Open-Source TEEs
2.3.1 The Need for Open-Source TEEs
Proprietary TEE technologies like Intel SGX and AMD SEV are controlled by their respective vendors. RISC-V, as an open-source Instruction Set Architecture (ISA), offers a compelling alternative, empowering developers to create custom TEE solutions and mitigate the security risks associated with closed-source hardware.
2.3.2 Key Features of Keystone TEE
Open Source: Based on the RISC-V architecture, fully open source.
Flexible Security Policies: Developers can define their own TEE mechanisms and security policies, enabling greater customization.
Web3 Integration: Well-suited for decentralized computing and the Web3 ecosystem, it can be integrated with blockchain for trusted computing.
2.3.3 The Future of Keystone
Keystone has the potential to become a critical component of Web3 security infrastructure, reducing reliance on proprietary solutions from Intel and AMD. Community-driven development can push for stronger security mechanisms and minimize the risks of side-channel attacks.
2.4 TEE and Data Security: From Sealed Storage to Remote Attestation
2.4.1 Sealed Storage (Encrypted Storage)
TEE enables applications to encrypt data stored externally, ensuring that only authorized applications within the TEE can decrypt and access it. This is useful for protecting sensitive information such as private keys, medical records, and confidential AI training data.
2.4.2 Remote Attestation
Remote attestation allows external servers to verify the integrity of the code running within the TEE. This process confirms that the TEE hasn't been compromised and is executing trusted code. In the Web3 field, remote attestation is crucial for verifying the trustworthiness of the environment executing smart contracts.
2.4.3 Protection Against Side-Channel Attacks
The latest TEE designs incorporate mitigations like memory encryption and randomized data access to minimize the risk of side-channel attacks. Furthermore, the community and vendors continually work to patch and address TEE vulnerabilities, such as Spectre, Meltdown, and Plundervolt.
III. Chapter 3: TEEs in the Crypto Landscape: A Revolution from MEV to AI Computing
TEEs, as a powerful hardware security technology, are gradually becoming one of the most important computing infrastructures in the Web3 ecosystem. It can not only solve the performance bottlenecks of decentralized computing, but also play a key role in MEV (Maximal Extractable Value), confidential computing, AI training, DeFi and decentralized identity. TEE-empowered Web3 computing is ushering in a revolution, bringing more efficient and secure solutions to the decentralized world.
3.1 Decentralized Computing: TEEs as a Solution to Web3 Bottlenecks
Blockchain technology, while offering censorship resistance and high trust due to its decentralized nature, suffers from significant limitations in computing power and efficiency. Decentralized computing platforms like Akash and Ankr are exploring TEEs to overcome these hurdles and provide a high-performance, secure computing environment for Web3.
3.1.1 The Challenges Facing Web3 Computing
Limited Computing Capacity: Blockchains like Ethereum execute smart contracts slowly and cannot handle large-scale computing tasks such as AI training or high-frequency financial calculations.
Data Privacy Concerns: On-chain computations are transparent, making it difficult to protect sensitive data like personal identification information or trade secrets.
High Computing Costs: The high cost of running complex computations (e.g., generating ZK proofs) on the blockchain restricts the range of possible applications.
3.1.2 Akash & Ankr: TEE-Empowered Decentralized Computing
Akash Network
Akash offers a decentralized cloud computing marketplace where users can rent computing resources. The applications of TEE within Akash include:
Confidential Computing: TEE enables users to run confidential computing tasks in a decentralized environment without exposing code or data.
Trusted Computing Marketplace: Akash leverages TEE to ensure that rented computing resources remain unaltered, enhancing the security of computing tasks.
Ankr Network
Ankr provides decentralized computing infrastructure, specializing in Web3 cloud services and RPC solutions. The applications of TEE within Ankr include:
Secure Remote Computing: TEE ensures that cloud-executed computing tasks run in a trusted environment, preventing data leaks.
Censorship Resistance: By integrating TEE with its decentralized architecture, Ankr offers censorship-resistant computing resources, making it ideal for privacy-focused DApps.
3.1.3 Future Outlook
With the increasing demand for Web3 computing, TEE is set to become a fundamental component of decentralized computing networks, enhancing their competitiveness in privacy protection, efficiency, and security.
3.2 Trustless MEV Transactions: Why TEEs Offer the Best Solution
MEV (Maximum Extractable Value) is a core issue in blockchain transaction ordering, involving complex strategies such as arbitrage, sandwich attacks, and liquidations. TEEs offer a trustless MEV solution by enabling secure computation and encrypted transactions, thus minimizing the potential for malicious behavior by miners and validators.
3.2.1 Current State and Challenges of MEV
Front-running: Miners can run ahead of user transactions, implementing sandwich attacks.
Centralized Ordering: Flashbots and other MEV solutions still rely on centralized sequencers.
Information Leakage: Current MEV bidding systems may expose transaction details, compromising fairness.
3.2.2 TEE-Empowered Solutions to MEV Issues
Flashbots & TEEs: Flashbots is investigating TEEs as a core component of a trustless transaction ordering system (MEV-Boost). By encrypting and ordering transactions within a TEE, miners and validators are prevented from manipulating the transaction sequence.
EigenLayer & TEEs: EigenLayer leverages TEEs to ensure the integrity of its restaking mechanism and prevent MEV manipulation. Remote attestation, facilitated by TEEs, ensures that the MEV bidding system is not manipulated.
3.2.3 Future Outlook
TEEs can revolutionize the MEV field by offering "trustless ordering" and "privacy transactions," reducing miner manipulation and improving fairness. This creates a more equitable trading environment for DeFi users.
3.3 Privacy-Preserving Computing & DePIN Ecosystem: Nillion's TEE-Powered Approach
Confidential computing is a significant challenge in the Web3 ecosystem, especially in the field of DePIN (Decentralized Physical Infrastructure Networks). TEEs, through hardware-level encryption and isolated execution, provide powerful privacy protection capabilities for projects like Nillion.
3.3.1 Nillion's Solution to Confidential Computing
Nillion is a decentralized confidential computing network that leverages TEEs and MPC to protect data privacy.
Data Sharding Processing: Encrypted computation is performed through TEE to prevent sensitive data leakage.
Private Smart Contracts: Developers can create private dApps on Nillion, where data remains confidential within the TEE.
3.3.2 TEE Applications within DePIN
Smart Grids: TEEs can protect user energy data privacy in smart grid applications, preventing misuse and unauthorized access.
Decentralized Storage: Combined with Filecoin, ensuring that stored data is processed within TEEs to prevent unauthorized access.
3.3.3 Future Outlook
Nillion and similar projects may become the core infrastructure for confidential computing in Web3, with TEEs playing an indispensable role.
3.4 Decentralized AI: Protect AI Training Data with TEEs
The convergence of AI and blockchain is a major trend in Web3, but AI training faces significant data privacy and security challenges. TEEs offer a solution by safeguarding AI training data, preventing leaks, and bolstering computational security.
3.4.1 Bittensor & TEEs
Bittensor, a decentralized AI computing network, leverages TEEs to protect the privacy of data used for training AI models.
Through remote attestation, it ensures that AI computing nodes have not been tampered with, providing trustworthy AI computing services.
3.4.2 Gensyn & TEEs
Gensyn enables developers to execute AI training tasks within a decentralized environment, relying on TEEs to maintain data confidentiality.
By combining ZKPs with TEEs, it achieves verifiable trustworthiness for decentralized AI computation.
3.5 DeFi Privacy and Decentralized Identity: How Secret Network Uses TEEs to Protect Smart Contracts
3.5.1 DeFi Privacy Issues
Traditional smart contracts are transparent, with all transaction data publicly available. This creates a significant demand for privacy in DeFi.
Users want to protect their transaction data, such as balances and transaction history.
3.5.2 Secret Network & TEEs
Private Smart Contracts: Secret Network uses TEEs to protect the execution of smart contracts, ensuring that transaction data is only visible within the TEE.
Decentralized Identity (DID): TEEs can be used to store user identity information, preventing identity leakage while supporting KYC compliance.
3.5.3 Future Outlook
TEEs will play an increasingly important role in DeFi privacy and decentralized identity, providing stronger privacy protection for DeFi.
IV. Technical Summary and Outlook: How Will TEEs Reshape Web3?
TEEs, a key technology in the crypto space, have already shown significant promise in numerous applications. As the Web3 ecosystem continues to evolve, TEEs will play an increasingly vital role, especially in decentralized infrastructure, privacy-preserving computing, smart contracts, and other related fields. This chapter will summarize the current status of TEE technology, explore its potential to drive Web3 development, and analyze the possible business models and tokenomic opportunities for TEEs within the crypto industry.
4.1 How Will TEEs Facilitate the Growth of Decentralized Infrastructure?
4.1.1 Benefits and Challenges of Decentralized Computing
With the rise of decentralized technologies, traditional centralized computing architectures are gradually unable to meet the needs of the Web3 ecosystem. Decentralized computing offers significant advantages, including enhanced security, improved fault tolerance, greater transparency, and increased resistance to censorship. Despite the benefits, it still faces many challenges:
Trust Deficits: The instability of trust relationships between nodes can lead to data manipulation and unreliable computational outcomes.
Privacy Concerns: Protecting user data privacy within decentralized environments presents a major challenge.
Performance Bottlenecks: Decentralized computing can suffer from performance limitations, such as uneven resource distribution and low throughput.
4.1.2 TEE's Contribution to Decentralized Infrastructure
TEE technology offers a crucial solution to the challenges facing decentralized computing. By establishing a protected and isolated execution environment, TEE empowers decentralized computing in several key ways:
Enabling Trustless Computation: TEE ensures the integrity of computations and the confidentiality of data, even in environments where trust between participants is limited or non-existent.
Privacy Protection: TEE facilitates encrypted computation on sensitive data without compromising its confidentiality, thereby safeguarding user privacy.
Performance Enhancement: Advancements in hardware-based TEE solutions promise significant improvements in computational throughput.
TEE is poised to become a core technology within decentralized computing networks, such as Akash and Ankr, driving the maturation and widespread adoption of decentralized infrastructure.
4.2 Potential Business Models and Token Economic Opportunities of TEEs
4.2.1 TEE-Driven Business Models
The growing adoption of TEE technology is giving rise to a variety of innovative business models and platforms. Here are some prominent examples:
Decentralized Computing Marketplaces : Platforms like Akash and Ankr facilitate the renting and leasing of computing resources in a decentralized manner. TEEs play a vital role in these marketplaces by guaranteeing the trustworthiness and privacy of computations.
Confidential Computing Services: Companies specializing in TEE-empowered privacy solutions can offer valuable data encryption and secure computation services to sectors like finance, healthcare, and insurance. Revenue is typically generated through usage-based fees for computational tasks.
Distributed Computing and Storage Platforms: TEEs can bolster the security and reliability of decentralized storage and computation platforms. This opens up commercial opportunities related to storage fees and revenue from computational services.
Blockchain Infrastructure Provision: Providers can offer specialized hardware or software solutions that enable Web3 projects to leverage TEEs for running smart contracts and executing DApps within a secure environment.
4.2.2 Token Economic Opportunities for TEEs
TEE has the potential to deeply integrate with token economics within the Web3 and crypto ecosystem, unlocking new avenues for value creation. Key opportunities include:
Tokenized Computing Resources: Decentralized computing platforms can use tokens to exchange computing resources. Users and node operators can participate in computing tasks, submit and verify data through cryptocurrencies, and all exchanges of computing resources and tasks are executed through smart contracts.
Token Incentives for TEE Services: TEE-empowered confidential computing services can use tokens as user incentives or payment methods to ensure the smooth execution and verification of confidential computing tasks.
Decentralized Identity and Data Exchange: TEE can provide the technological foundation for decentralized identity (DID) systems, safeguarding user data privacy. Tokenized incentive mechanisms can further promote the adoption and widespread use of DIDs and decentralized data exchange protocols.
4.3 Key Development Directions for TEEs over the Next Five Years
4.3.1 Deep Integration of TEEs with Web3
Over the next five years, TEE technology is poised to become even more integral to the Web3 landscape, particularly within the following key domains:
DeFi: TEE will see widespread adoption within DeFi protocols, ensuring user transaction privacy, bolstering the trustworthiness of computations, and strengthening the security of smart contracts.
Confidential Computing: Driven by evolving data privacy regulations globally, confidential computing will become a core component of Web3. The synergy between TEEs and other privacy-enhancing technologies, such as ZKPs and FHE, will deliver more robust privacy solutions for the Web3 ecosystem.
Decentralized AI: TEEs provide a secure computing environment for decentralized AI, supporting the secure training and inference of AI models. Thus, it helps realize the decentralized AI applications.
Cross-Chain Computing: As the blockchain ecosystem expands, TEE will facilitate trusted computation across different chains, leading to more secure and efficient cross-chain asset exchanges and data processing.
4.3.2 Hardware and Protocol Innovations for TEEs
Continued advancements in TEE technology are being fueled by innovations in both hardware and protocols, leading to enhanced performance and security.
Hardware Innovations: Next-generation hardware TEE solutions, like RISC-V Keystone and Intel TDX (Trust Domain Extensions), promise to outperform current offerings in performance, security, and scalability.
Protocol Innovations: The convergence of TEE with technologies like MPC and ZKPs will pave the way for new privacy-preserving and trustless protocols.
Decentralized Hardware Platforms: Decentralized computing hardware platforms are poised to disrupt the traditional single-vendor model, encouraging broader participation of smaller nodes in the trusted computing ecosystem. This will maximize the utilization of decentralized computing resources.
4.3.3 The Evolving Landscape of Regulatory Compliance and Privacy
As global privacy regulations become more stringent, innovation in TEE compliance will be crucial over the next five years.
Multi-Jurisdictional Compliance: TEE technology will be adapted and further developed to meet the specific requirements of various national and regional privacy regulations, such as GDPR, CCPA, and PIPL. This will ensure that decentralized computing environments adhere to global data protection standards.
Transparent Confidential Computing: Integrating TEE with technologies like ZKPs will enable verifiable confidential computing. This transparency will build trust with regulators and facilitate compliance.
V. Conclusion
TEE technology holds immense potential within the Web3 ecosystem. It can not only provide a trustless computing environment, but also effectively protect user privacy. As TEE technology continues to advance, its role in decentralized computing, privacy protection, smart contracts, and other key areas will keep growing, driving the maturity and innovation of the Web3 ecosystem. Furthermore, TEEs will foster new business models and token economic opportunities, creating significant value within the crypto space. Over the next five years, driven by hardware advancements, protocol development, and evolving regulations, TEEs are poised to become a core, indispensable technology for the crypto industry.