rezabfil Profile Banner
frezabek Profile
frezabek

@rezabfil

Followers
351
Following
1K
Media
30
Statuses
291

Tech brewer at @SpaceComputerIO. Distributed systems researchers at TUM. A TEE researcher at 🤖.

Munich
Joined August 2022
Don't wanna be here? Send us removal request.
@rezabfil
frezabek
2 days
Hope to see you around and listen to my talk: From Logical to Physical Trust: Extending the Foundations of Secure Execution Agents is one use case out of many that TEEs can support.
@OasisProtocol
Oasis @DevConnect 🌹
3 days
Co-founder of SpaceComputer @rezabfil will be grabbing the mic next, with a keynote on exploring the gap between theoretical trust models and the messy physical world where agents actually operate.
0
2
11
@OasisProtocol
Oasis @DevConnect 🌹
3 days
Co-founder of SpaceComputer @rezabfil will be grabbing the mic next, with a keynote on exploring the gap between theoretical trust models and the messy physical world where agents actually operate.
2
1
31
@SpaceComputerIO
SpaceComputer - 天机 | 𝕤𝕡/𝕒𝕔𝕔
5 days
Research Day 🧑‍🏫 Nov 20th at Devconnect Privacy Community Hub Tune into @frezabek's research talk discussing recent TEE failures through the lens of “Proof of Cloud,” exploring data-center execution assurance for confidential VMs. 10AM to 11AM https://t.co/NKOzSS1bH3
0
1
2
@SpaceComputerIO
SpaceComputer - 天机 | 𝕤𝕡/𝕒𝕔𝕔
5 days
We are co-sponsoring the Afternoon TEE Party! 🍵 Nov 19th at MUGSO Tune into @rezabfil's keynote "From Logical to Physical Trust: Extending the Foundations of Secure Execution" 4:45 PM to 5PM https://t.co/VXsFITMNDw
Tweet card summary image
luma.com
Join us for the TEE Party @Devconnect Buenos Aires! Privacy, Cocktails & Latin Beats! Get ready for a night where cutting-edge tech meets the warmth of Buenos…
1
1
3
@SpaceComputerIO
SpaceComputer - 天机 | 𝕤𝕡/𝕒𝕔𝕔
5 days
Practical Privacy Day 🔒 Nov 18th at Devconnect Privacy Community Hub Our Co-Founders @semicondurian & @rezabfil will lead an off-the-record after hour Q&A on TEEs with the Flashbots team. 4:45PM to 5:30PM https://t.co/tM495UXzEB
2
6
16
@poddotnetwork
pod network
5 days
🧑‍🚀 Monday, 17 November Frontier Forum ~18:35 @shresth3103 @DistributedMarz @OrestTa and @rezabfil have an out-of-this world chat about the next 100x improvement in blockchain performance and throughput. We hear that a real-life moon man will be there. https://t.co/Jx4bYtHClh
Tweet card summary image
luma.com
An Event That Dreams Bigger Expect the unexpected. Frontier Forum aims to spark bold conversations and challenge conventional thinking within the blockchain…
5
3
6
@SpaceComputerIO
SpaceComputer - 天机 | 𝕤𝕡/𝕒𝕔𝕔
7 days
A fantastic media partner @DefiantNews and amazing views on the Planetario for Frontier Forum✨🛰️ Imagine what the visuals are like inside👀
@DefiantNews
The Defiant
7 days
Proud to be a media partner of Frontier Forum by @SpaceComputerIO! 🌕 Where Moonshot Ideas Begin. Happening Nov 17, from 2:00–9:30 PM at the Buenos Aires Planetario Galileo Galilei. Frontier Forum brings together innovators for bold conversations, experimental discussion
8
2
15
@SpaceComputerIO
SpaceComputer - 天机 | 𝕤𝕡/𝕒𝕔𝕔
21 days
We don’t let just anyone on the stage at Frontier Forum. It’s high time we dive deeper into the brilliant minds setting the course for the frontier at DevConnect. Each speaker brings a unique set of expertise, offering new perspectives and moonshot ideas through various
5
2
34
@SpaceComputerIO
SpaceComputer - 天机 | 𝕤𝕡/𝕒𝕔𝕔
8 days
@blocksec @Offchain @allred_chase @arbitrum @prabalbanerjee @AvailProject @matan_si @EO_Network @0xbowio @ameensol @auryn_macmillan @EnclaveE3 @jbaylina @ziskvm @Socrates @flashbots_x @Nethermind @mpfzajac @poddotnetwork @shresth3103 @kokebsolomon @gnosisdotio @hoprnet @SCBuergel @StoffelMPC @badcryptobitch @hashcloak @t1protocol @OrestTa @FireblocksHQ @arik_g Welcome Michał Zając as a speaker for Frontier Forum. CSO at @Nethermind, @mpfzajac works on formal verification of zkVMs and Ethereum-scale rollups, researching the primitives that make privacy scale in production. At Frontier Forum, Michał will speak on applied cryptography
2
1
4
@SpaceComputerIO
SpaceComputer - 天机 | 𝕤𝕡/𝕒𝕔𝕔
11 days
7 Days until Frontier Forum in Buenos Aires. The launch date is approaching, and we have quite the lineup for you: 25+ Brilliant speakers 5 Keynotes from industry leaders 5 Debates on frontier topics 5 Lightning talks on moonshot ideas 1 Immersive planetarium experience And
1
4
21
@AutomataNetwork
Automata Network
16 days
We've given TEE Wiki a quick refresh with better flow including for contributors @PhalaNetwork @SecretNetwork @OasisProtocol @t1protocol and more A great starting point to understand TEEs as they become central to intelligent agents and verifiable AI → https://t.co/bq3JmHrgap
8
11
55
@rezabfil
frezabek
24 days
The final form of TEE haters: unpaid marketing department.
0
1
14
@0xQuintus
quintus (sovs arc)
24 days
PSA: this is an application of the attack published a few weeks ago to newer chips It still doesn't apply to BuilderNet (or any Flashbots products) because of the physical access requirement but it *does* highlight some of the R&D we're doing [post below]
@DanielGenkin
Daniel Genkin
24 days
More interposer fun, this time with DDR5 memory. Breaking TDX, SGX, SEV and even Nvidia TEEs. Checkout our work at https://t.co/Jl1dpGnM6J, and get a personally-signed Intel attestation report at @TEEdotFail.
7
10
43
@hasufl
Hasu⚡️🤖
24 days
TLDR - TEEs broken again in a lab. - Doesn't affect BuilderNet or other Flashbots products, as we don't allow operators to run outside of vetted cloud environments. No user funds or data ever at risk. - Attack is nontheless very relevant for moving beyond the cloud model, our
Tweet card summary image
collective.flashbots.net
Recently, wiretap.fail, battering RAM and tee.fail attacks were made public. These are not applicable to BuilderNet or any Flashbots products and do not enable frontrunning or unbundling. These...
18
30
266
@rezabfil
frezabek
24 days
To find out more, our papers: • https://t.co/Bflq3jxd4b https://t.co/1ojjYScf2l
0
0
5
@rezabfil
frezabek
24 days
Notably, TEEs are not perfect, but they offer significant benefits when implemented properly. Issues like this move us forward and inspire new solutions - something we work on with @SpaceComputerIO, along with many other great initiatives, such as Trustless TEE.
1
1
4
@rezabfil
frezabek
24 days
DCEA bridges the missing link in TEE trust. We finally get an assurance where a secure enclave runs, not just what runs inside it. This enables high assurance for TEE applications.
1
0
4
@rezabfil
frezabek
24 days
Contributions: ✅ Formal threat model for “physical adversaries” in TEEs ✅ Design of DCEA architecture ✅ Feasibility evaluations
1
0
4
@rezabfil
frezabek
24 days
Threat model: Trust the CPU vendor’s root keys and the provider’s integrity (not confidentiality). Attackers may have full host access, but can’t forge DCEA proofs without breaking hardware measurements.
1
0
4
@rezabfil
frezabek
24 days
Bare-metal case: Use Intel TXT to extend trust from firmware → hypervisor → enclave, sealing the TPM to that chain. You get one continuous attestation from silicon to the guest.
1
0
4