Category: Industry Insights
-
How Can Integritee Help Prevent Fraud Schemes?
What if your identity was suddenly stolen by criminals and used for fraud schemes? That’s what happened to the sensitive private information of 24 million people in the US. Earlier this month, the SSNOB marketplace — an illegal data market — was taken down by the authorities, according to a recent article from Bleeping Computer. It is…
-
How Integritee combines the benefits of Web2 and Web3 technologies
Web3 has a lot of promise, but there is a fundamental problem that hinders adoption: the blockchain trilemma. While the trilemma is sometimes used as a tool for competitive analyses between blockchains, Web2 infrastructure can also be positioned within it. A centralized server is akin to a network with only “one node”. This provides a scalable…
-
A Healthier Approach to Wearables
Everybody wants a fitness tracker, but nobody wants that much of their personal data exposed. Here’s how providers can protect sensitive information while still offering all the smart benefits. From pedometers to smartwatches, wearables have risen in remarkably little time to a popular must-have. Whether you want to improve your sleep habits, your fertility, or…
-
Event Series: Learn How Integritee Is Taking Gaming to the Next Level With Ajuna
Did you know that the Integritee Network can be used to power a new generation of fast, decentralized, Web3 games? Through our partnership with the games platform Ajuna Network, we will enable fast, graphically rich, Web3 games that balance performance with decentralization. But how do Web3 games work in practice and how does Integritee fit…
-
TEE 101: How Intel SGX works and why we use it at Integritee
Integritee uses a technology known as trusted execution environments (TEEs) to process sensitive data off-chain. But what exactly are TEEs and how do they work? In this post, we will take a look at one of the most common & powerful TEE architectures, which we also use at Integritee: Intel Software Guard Extensions (SGX). Data…
-
Confidential Computing Will Secure Our Secrets in Web3
Web2 was built on data harvesting but the next phase of development must be about protecting that data, not exploiting it. Often the true consequences of a technological shift only become clear later – and when they do, they can drive the next shift. That is certainly true of the “social web”, or Web2, which…
-
Divided We Fall? – Why Crypto Exchanges Should Work Together
The widespread availability of reliable information is crucial to the efficiency of markets. But the information in the crypto sphere is fragmented and opaque. Cryptocurrency exchanges need to work together to change this. In the burgeoning cryptocurrency market, traders are hampered by a chronic lack of information. Although transparency is often cited as a core…