Skip to content

Threat Model

Assumptions

  • Host OS is honest-but-curious in standard tier
  • The SDK runtime is not actively malicious
  • Attested tier assumes the enclave runtime is trusted

Adversaries

  • Network attackers observing traffic
  • Cloud model providers (honest-but-curious)
  • Local privileged attackers outside the TEE

In scope protections

  • Raw data never leaves the host
  • Boundary violations are detected and rejected
  • Attestation evidence can be verified against expected measurement and output

Out of scope

  • Fully compromised host or kernel
  • Physical attacks on firmware or hardware
  • Advanced hardware side-channel attacks

Prev: Guarantees | Next: Integration Overview