←back to thread

544 points josh2600 | 1 comments | | HN request time: 0.426s | source
Show context
josh2600 ◴[] No.26713883[source]
Hi!

I'm the CEO of MobileCoin. If anyone has any questions please feel free to ask here. We've been working on this project for four years and it has been a labor of love. There's a lot of new technology here.

We exist in a highly regulated space so it's possible some questions will require reaching out to lawyers to make sure we answer them in a way that's compliant so please don't feel offended if a response takes a while to come back.

The best set of docs for how the whole thing fits together is our book "The Mechanics of MobileCoin"[0].

We'll be around here and on our forums [1] to answer questions. Please also check out our foundation website[2]. The github[3] is also a lot of fun, especially the section on Fog[4].

[0]https://github.com/UkoeHB/Mechanics-of-MobileCoin/blob/maste...

[1]https://community.mobilecoin.foundation

[2]https://mobilecoin.foundation

[3]https://github.com/mobilecoinfoundation/mobilecoin

[4]https://github.com/mobilecoinfoundation/fog

replies(16): >>26714626 #>>26714768 #>>26715471 #>>26717141 #>>26717367 #>>26717544 #>>26718027 #>>26718043 #>>26718221 #>>26718404 #>>26718460 #>>26719397 #>>26719732 #>>26720238 #>>26720828 #>>26721468 #
1. tgsovlerkhgsel ◴[] No.26718027[source]
Assuming an attacker fully compromises SGX for machines under his physical control (e.g. can execute arbitrary code inside an attested enclave), what can the attacker do/what security properties of MobileCoin break?

I know Moxie seems to put near-complete trust in SGX, but many security professionals don't.