HOW IT WORKS

Secure Enclaves

Secure Enclaves are a cutting-edge form of privacy technology used by Oasis Labs products to keep data confidential and secure — even while it's being processed.

Start building

How Secure Enclaves Work

Secure Enclaves are enabled by Trusted Execution Environments — a set of software and hardware features that together provide a secure, isolated execution environment for applications.

Specifically, secure enclaves can provide confidentiality, integrity, and attestation.

KEEP YOUR DATA PRIVATE

Confidentiality

Confidentiality guarantees that an adversary outside of the enclave cannot inspect the state of execution inside the enclave. In other words, confidentiality guarantees that data and code inside the enclave will remain secret at all times.

TRUSTWORTHY ENCLAVE

Integrity

Integrity ensures correctness of the computation running inside the enclave even if the operating system has been compromised or a user attempts to subvert the execution of the program inside the enclave.

TAMPER-RESISTENT, ALWAYS

Attestation

Attestation provides an unforgeable proof that enables a remote party to verify what has run inside the enclave even if they don’t have physical access to the machine.