Blog

The latest updates and news

MuSig2
Technology

Enhancing MuSig2 protocol with Klave

Learn how to optimise MuSig2 multi-signature scheme with Klave's confidential computing technology.

Engineering Resilience
Technology

Engineering Resilience: Redefining Fault Tolerance

How advanced consensus mechanisms like Secretarium's BFT-RAFT are pushing the boundaries of distributed computing.

Apple Intelligence
Technology

Apple Intelligence

Apple believes Private Cloud Compute is "nothing short of the world-leading security architecture for cloud AI compute at scale".

Honest Computing Image
Technology

Honest Computing

Systems that can't lie: Inside Secretarium's new "Honest Computing" technological solution.

Forbes
Technology

Forbes Spotlights Confidential Computing

Ed Stacey highlights the transformative potential of confidential computing, citing Klave as a key initiative making it easy for developers to build secure applications, based on smart contracts.

Conveyor belt with packages
Technology

Implementing performant scalable solutions in confidential computing

Confidential computing (also known as Trusted Execution Environments or SGX enclaves) is a means to calculate secret information while maintaining confidence that malicious software installed on that machine cannot see or amend those calculations.