It employs zk-proofs (such as PLONK) and TEE attestations to cryptographically prove model execution correctness without exposing sensitive data.
It employs zk-proofs (such as PLONK) and TEE attestations to cryptographically prove model execution correctness without exposing sensitive data.
Contact us via email and we will respond within 48 hours.
Contact us to submit a feature request!
Chat with us for additional support!