
Verifiable Key Management and TEEs with Turnkey
Zero Knowledge
00:00
What a Malicious Build Could Do and How Audits Catch It
Anna asks about attacks in opaque TEEs; Jack explains entropy hijacking and how auditable source prevents hidden malicious behavior.
Transcript
Play full episode