(2)
©2025
Technical articles about verifiable applications, TEEs, and modern development practices. Insights from our team.
WireTap: New vulnerability in Intel SGX
WireTap reveals a critical vulnerability in Intel SGX's memory encryption. We explore why Intel TDX is not vulnerable and learn about Livy approach combining TDX with cryptographic verification.
Livy: The Universal Provenance Layer
Livy is introduced as the universal provenance layer, a language-agnostic execution layer for verifiable computing.
© 2025 livylabs.xyz. All rights reserved.