The Rollup Coaster #30

The Rollup Coaster is a bi-weekly newsletter that dives into the fascinating world of Ethereum, exploring the latest in rollups, zero-knowledge proofs, based sequencing/preconfirmations, TEEs, MEV/PBS and much more.

This edition is written by Taiko’s Researcher Jünger.

Hold on tight! 🎢

Disclaimer: This newsletter is neither financial advice, nor is indicative of Taiko’s position on any of the material presented. Please do your own research.


Highlights 🎢

Yet another SGX vulnerability

Last week, a new invulnerability was discovered that allows you to extract the Intel SGX Fuse Key0 aka Root Provisioning Key. FK0 is unique to each chip but the key to encrypt FK0 is not unique to each chip. If attacker found the fuse encryption key (GWK, can decrpyt FK0), they can use it on every chip, as Sylvain said. Also Pratyush wrote an in-depth analysis of the breach.

  • Vitalik touched on the fact that modern computing increasingly divides tasks between flexible but less efficient ‘glue’ components and highly specialised, efficient ‘coprocessor’ components, offering advantages in terms of performance, security and accessibility.

ZK and rollup research 🧙

ZK and rollup updates📰

Trusted execution environments

Based sequencing and preconfirmations 😎

MEV/PBS🔍

Additional resources 📚


Join us 💗

Explore open positions on our job board.

Follow us 🥁

Get the latest from Taiko:

Contribute 🤓

Contribute to Taiko on GitHub and earn a GitPOAP! You will also be featured as a contributor on our README. Get started with the contributing manual.

Subscribe to Taiko Labs
Receive the latest updates directly to your inbox.
Mint this entry as an NFT to add it to your collection.
Verification
This entry has been permanently stored onchain and signed by its creator.