How does the delegation chain help security and trust?

There are two common ways to protect data security and privacy. Either from the cryptographic approach or the unbreakable hardware approach. The former can guarantee privacy by math rule, the later guarantee by engineering. We did not choose the cryptographic approach because it is still far from practical. The cost is usually higher than the benefits. We did not choose the unbreakable hardware approach either, because no hardware is unbreakable over time. We design differently by using some part of their advantage but combine with the ideas we learn from the…



Bear with me as English is not my programming language

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store