Threshold Key Derivation - Privacy on the IC

One quick question - how do you envision on-chain encryption in a world with AMD SEV nodes? Do they solve for the same problem, i.e. “defense in depth”? Or do they actually solve for different problems?

I am struggling to think of a use case where on-chain encryption is still needed when subnet nodes run AMD SEV.

3 Likes