Oasis Secure: Unaffected by New TEE Attacks
Join CommunitySummary
The Oasis Network Community announced that the Oasis Network remains completely secure and unaffected by two newly disclosed major side-channel exploits, Battering RAM and Wiretap, which compromised Intel SGX and AMD SEV-SNP used by other networks. This resilience is attributed to Oasis's defense-in-depth architecture, including its SGX v1 implementation and reliance on onchain governance rather than solely on TEEs. This demonstrates Oasis's superior commitment to privacy and resilience compared...
โ๏ธ New TEE Attacks? Oasis Stands Unshaken!! ๐๐ช
Security researchers just dropped two major side-channel exploits, Battering RAM & Wiretap! Breaking Intel SGX & AMD SEV-SNP. Multiple networks were hit hard.
But hereโs the difference: Oasis remains 100% secure and unaffected!
Why? Because we built defense-in-depth from day one:
๐น SGX v1 architecture โ immune to these attacks
๐น Onchain governance + ephemeral keys โ security that doesnโt rely on TEEs alone
๐ Full story: https://oasis.net/blog/oasis-tee-vulnerabilities
๐ Twitter: https://x.com/OasisProtocol/status/1973718619952721998
Zero Impact. Zero Compromise. Just proof that privacy + resilience is what sets Oasis apart. ๐โจ
Oasis Unaffected by TEE Vulnerabilities

Defense-in-depth design kept Oasis secure while attacks compromised other TEE-based projects.
New side-channel attacks (Battering RAM & Wiretap) broke Intel SGX + AMD SEV-SNP, impacting multiple blockchain networks.
Thanks to proactive design, Oasis remains secure and unaffected. Find out more about why researchers couldn't compromise Oasis:
X