The trust model explained.
How do you know the server is running the code you expect?
Hardware attestation + GitHub as trust anchor.
Intel Trust Domain Extensions. Creates isolated VMs with:
When a TD requests attestation, the CPU generates a quote:
┌─────────────────────────────────────┐
│ TDX QUOTE │
├─────────────────────────────────────┤
│ RTMR0: firmware measurement │
│ RTMR1: kernel measurement │
│ RTMR2: application measurement │
│ RTMR3: runtime data │
├─────────────────────────────────────┤
│ Report Data: custom payload │
├─────────────────────────────────────┤
│ Signature: Intel CPU attestation │
└─────────────────────────────────────┘
Signed by the CPU itself. Verifiable via Intel DCAP.
Your Repo TDX Host
│ │
│ docker-compose ───────────>│
│ │ deploy
│ │ generate quote
│ │
│<────── attestation.json ───│
│ (published as release) │
│ │
▼ │
Client SDK │
│ fetch release │
│ verify quote │
│ connect ──────────────────>│
Why GitHub?
Sealed (production)
Unsealed (development)
When you call connect("owner/repo"):
from easyenclave import connect, VerificationError
try:
client = connect("owner/repo")
except VerificationError as e:
print(f"attestation failed: {e}")