Oasis Secure: Unaffected by New TEE Attacks
Join CommunitySummary
The Oasis Network Community announced that the Oasis Network remains completely secure and unaffected by two newly disclosed major side-channel exploits, Battering RAM and Wiretap, which compromised Intel SGX and AMD SEV-SNP used by other networks. This resilience is attributed to Oasis's defense-in-depth architecture, including its SGX v1 implementation and reliance on onchain governance rather than solely on TEEs. This demonstrates Oasis's superior commitment to privacy and resilience compared...
⚔️ New TEE Attacks? Oasis Stands Unshaken!! 🔐💪
Security researchers just dropped two major side-channel exploits, Battering RAM & Wiretap! Breaking Intel SGX & AMD SEV-SNP. Multiple networks were hit hard.
But here’s the difference: Oasis remains 100% secure and unaffected!
Why? Because we built defense-in-depth from day one:
🔹 SGX v1 architecture → immune to these attacks
🔹 Onchain governance + ephemeral keys → security that doesn’t rely on TEEs alone
📖 Full story: https://oasis.net/blog/oasis-tee-vulnerabilities
🔗 Twitter: https://x.com/OasisProtocol/status/1973718619952721998
Zero Impact. Zero Compromise. Just proof that privacy + resilience is what sets Oasis apart. 🌐✨
Oasis Unaffected by TEE Vulnerabilities

Defense-in-depth design kept Oasis secure while attacks compromised other TEE-based projects.
New side-channel attacks (Battering RAM & Wiretap) broke Intel SGX + AMD SEV-SNP, impacting multiple blockchain networks.
Thanks to proactive design, Oasis remains secure and unaffected. Find out more about why researchers couldn't compromise Oasis:
X