Oasis Secure: Unaffected by New TEE Attacks

โš”๏ธ New TEE Attacks? Oasis Stands Unshaken!! ๐Ÿ”๐Ÿ’ช

@โ€‹everyone Security researchers just dropped two major side-channel exploits, Battering RAM & Wiretap! Breaking Intel SGX & AMD SEV-SNP. Multiple networks were hit hard.

But hereโ€™s the difference: Oasis remains 100% secure and unaffected!
Why? Because we built defense-in-depth from day one:
๐Ÿ”น SGX v1 architecture โ†’ immune to these attacks
๐Ÿ”น Onchain governance + ephemeral keys โ†’ security that doesnโ€™t rely on TEEs alone

๐Ÿ“– Full story: https://oasis.net/blog/oasis-tee-vulnerabilities
๐Ÿ”— Twitter: https://x.com/OasisProtocol/status/1973718619952721998

Zero Impact. Zero Compromise. Just proof that privacy + resilience is what sets Oasis apart. ๐ŸŒโœจ

Oasis Unaffected by TEE Vulnerabilities

Embed Thumbnail
Defense-in-depth design kept Oasis secure while attacks compromised other TEE-based projects.

New side-channel attacks (Battering RAM & Wiretap) broke Intel SGX + AMD SEV-SNP, impacting multiple blockchain networks.

Thanks to proactive design, Oasis remains secure and unaffected. Find out more about why researchers couldn't compromise Oasis:
X

The latest from Oasis Network Community