Caution
The verifiable compute hosting platform
The problem Caution solves
Judges can contact us at [email protected] to get a closed alpha access code.
Caution is a cloud hosting platform focused on the next generation of confidential compute - verifiable compute. People can use our fully open source software to deploy any workload into verifiable compute infrastructure. This is a useful fundamental building block for securing systems and decentralizing trust on the hardware level. Imagine using this tech to run a blockchain node, an oracle, a bridge, or an LLM in a manner where you can verify exactly what source code was used for that service, in real time, with cryptographic proof. Now you can. It's time to stop blindly trusting that the services you are using respect your privacy and play by the rules, and start verifying that they do.
We solve the problem that no current solutions do:
- Proving exactly what software is running on a server using cryptographic remote attestation
- Removing trust in single TEE hardware
- Making deploying verifiable compute easy
What we sell:
- Single tenancy one-click provably verifiable applications (blockchain nodes, LLMs, VPNs etc)
- Managed on-premises deployments for businesses
- Enterprise technical support
Most confidential compute solutions can isolate workloads and prove the code hasn't changed. Caution proves exactly what source code is running in an enclave, and it does so by using reproducible and full-source bootstrapped builds.
On top of this, we are actively developing EnclaveOS (https://git.distrust.co/public/enclaveos/) which currently targets AWS Nitro, but will soon be able to use multiple different kinds of hardware for attestation to eliminate single points of failure.
Challenges we ran into
The main challenges were around ensuring that the user can deploy software in a fully verifiable, while making the user experience feel seamless as it does with other great UX solutions such as Heroku and Fly.io.
To achieve this, careful attention was paid to have both a CLI native experience, including registration and login, using Passkey, which can also be used in the web browser.
Beyond that, there was a lot of piping to glue all the different stages of the system, as it is a fully functioning cloud hosting platform.
Tracks Applied (7)
General Bounty
Network School
Privacy-Preserving AI & Computation
Axelar Network
Privacy Infrastructure & Developer Tools
Fhenix
Privacy Infrastructure & Developer Tools
Zcash Community Grants
Privacy Infrastructure & Developer Tools
Raybot
Privacy-Preserving AI & Computation
NEAR Protocol
General Bounty
Project Tachyon
