I’m logging my idea across a series of posts with essays on different sub-parts of it in a Lemmy community created for it.
What do you think - does anyone see any obvious problems that might come up as it is implemented? Is there anything you’d do differently?
There are still some big decisions (e.g. how to do the ZKP part, including what type of ZKPs to use), and some big unknowns (I’m still not certain implementing TLS 1.3 on TPM 2.0 primitives is going to stand up and/or create a valid audit hash attestation to go into the proof, and the proofs might test the limits of what’s possible).
You must log in or register to comment.