(2)

Blog

©2025

Technical articles about verifiable applications, TEEs, and modern development practices. Insights from our team.

WireTap: New vulnerability in Intel SGX

WireTap reveals a critical vulnerability in Intel SGX's memory encryption. We explore why Intel TDX is not vulnerable and learn about Livy approach combining TDX with cryptographic verification.

4 min readLivy Labs
Tags
TEEVulnerabilitiesSecurity

Livy: The Universal Provenance Layer

Livy is introduced as the universal provenance layer, a language-agnostic execution layer for verifiable computing.

4 min readLivy Labs
Tags
TEESecurityVerifiable ComputingPrivacy

info@livylabs.xyz

© 2025 livylabs.xyz. All rights reserved.