
Bitalk News|Apr 11, 2025 08:42
Succinct's new product SP1-2FA has started internal testing, using TEE to add an additional security lock to zkVM
@Succinctlabs launched a new thing a week ago: SP1-2FA, This is the latest feature of Succinct Prover Network, which brings a second layer of protection to SP1.
Simply put, it adds another layer of protection to your program through a Trusted Execution Environment (TEE).
Why do we need SP1-2FA?
@Succinctlabs has been working hard on the security of SP1, such as through third-party audits, hiring security experts to review, and so on.
And SP1-2FA is a bigger step on this path. It combines multiple security measures to provide developers with stronger protection - and, the coolest thing is, it can be used in a production environment with just one line of code!
In the future, Succinct also plans to introduce formal verification to further prove the security properties of SP1 through mathematical means, creating a security system that balances theory and practice.
How does SP1-2FA protect applications?
SP1-2FA verifies your program in two independent ways to ensure that it runs safely and correctly:
Zero Knowledge Proof (ZKP): SP1's RISC-V zkVM generates an encrypted proof that tells you the program runs smoothly under specific inputs. This proof is backed by strict auditing, open source code review, and Succinct's continuous optimization of underlying encryption technology.
TEE verification: As the second line of defense, your program will run in a hardware level secure environment to ensure that no one can secretly tamper with the execution process.
The system will carefully check whether the results of these two methods are consistent. Even if one of the steps goes wrong, the other can still help you find a way out.
Even better, with the Succinct Prover Network, developers only need one line of code to enable this feature, making it so easy to fly!
What does a security architecture look like?
At the bottom level, SP1-2FA uses AWS Nitro safe zone to provide a super secure hardware operating environment for SP1 programs.
After enabling SP1-2FA, the safe zone will run your program in "execution mode" - Succinct has specially adjusted its internal RISC-V emulator to seamlessly adapt to pre compiled versions.
This design combines two powerful security measures together, which is equivalent to setting two levels for attackers. If they want to disrupt the program, they need to break through both lines of defense at the same time. For developers, this means that they can obtain production level hardcore security in the simplest way possible.
SP1-2FA is mainly used to prevent vulnerabilities in the verification system. If there are bugs in the code itself, it still needs to be resolved through testing and auditing.
Can it be used now?
SP1-2FA is currently undergoing internal testing on Succinct Prover Network, with security auditing provided by Zenith. If you are interested in giving it a try, you can contact Succinct through its partner form or Telegram.
@SuccinctLabs
@Naive_BNB
@0xCRASHOUT
Share To
Timeline
HotFlash
APP
X
Telegram
CopyLink