Oasis Secure: Unaffected by New TEE Attacks
โ๏ธ New TEE Attacks? Oasis Stands Unshaken!! ๐๐ช
@โeveryone Security researchers just dropped two major side-channel exploits, Battering RAM & Wiretap! Breaking Intel SGX & AMD SEV-SNP. Multiple networks were hit hard.
But hereโs the difference: Oasis remains 100% secure and unaffected!
Why? Because we built defense-in-depth from day one:
๐น SGX v1 architecture โ immune to these attacks
๐น Onchain governance + ephemeral keys โ security that doesnโt rely on TEEs alone
๐ Full story: https://oasis.net/blog/oasis-tee-vulnerabilities
๐ Twitter: https://x.com/OasisProtocol/status/1973718619952721998
Zero Impact. Zero Compromise. Just proof that privacy + resilience is what sets Oasis apart. ๐โจ
Oasis Unaffected by TEE Vulnerabilities

Defense-in-depth design kept Oasis secure while attacks compromised other TEE-based projects.
New side-channel attacks (Battering RAM & Wiretap) broke Intel SGX + AMD SEV-SNP, impacting multiple blockchain networks.
Thanks to proactive design, Oasis remains secure and unaffected. Find out more about why researchers couldn't compromise Oasis:
X