Page cover

Future Directions

Bluethroat Labs: Who are we?

We are a technical collective that studies TEEs. We study how they're built, how they break, and how to make them more reliable.

Vision for this document

To make this document the gold standard for practical security around TEEs.

Any web3 protocol that leverages TEEs in any capacity should be able to get significant help from this document on TEE security.

Future of this document

This document is and will remain a living resource. The TEE security landscape shifts rapidly: new hardware revisions and exploits, cloud platform changes, attestation updates, and emerging side-channel research can alter threat models quickly. For a technology as critical and as misunderstood as TEEs, regular updates are not optional, they are a must.

Here's a non-exhaustive list of all the ideas that we have to make this document richer:

  • Appendices with extended references, examples, and supporting material

  • Deep dives into additional TEE infrastructure providers (beyond AWS Nitro and dStack)

  • Platform recommendations tied to specific protocol requirements and risk profiles

  • Security-first hybrid architectures, including but not limited to:

    • ZK + TEEs

    • TEEs + MPC

    • ZK + TEEs + MPC

    • TEEs + FHE

  • Post-mortems of TEE vulnerabilities, based on:

    • Real-world exploits and incident write-ups

    • Findings from blockchain audit reports and production failures

The long-term intention is for this guide to evolve into a community-maintained reference for practical TEE security in Web3: reviewed, challenged, and improved by engineers who are actively deploying and operating TEE systems.

This document will soon be open-sourced, and contributions from all interested parties will be welcomed.

Last updated