Build with Confidential VMs
Confidential Virtual Machines (CVMs) enable secure and private computation in untrusted environments. By leveraging hardware-based encryption and secure enclaves, CVMs ensure that your sensitive data and applications remain protected even when running on third-party infrastructure. With Oyster's CVM tooling, you can create secure environments that maintain data privacy while still allowing for complex computations and operations.
Getting started
Users who wish to build and deploy Confidential VMs should start with the tutorials. If you're feeling adventurous, head straight to the quickstart ;)
📄️ Tutorials
Step-by-step walkthroughs for Oyster CVMs.
📄️ Quickstart
Get your hands dirty with Oyster CVMs.
Core concepts
Learn about the concepts at the heart of Oyster CVMs and how to wield them effectively.
📄️ TEEs
What even is a TEE? And other related terminology...
📄️ Remote Attestations
How do you know what is running in a TEE?
📄️ Reproducible Builds
How do you check if a EIF was derived from specific code?
📄️ Basic Networking
How does a TEE communicate with you? Or the Internet?
📄️ Secure Networking
How does you set up secure channels?
Guides
Follow these guides to accomplish specific tasks:
🗃️ Deploy a node.js server
5 items
🗃️ Perform privacy preserving addition
5 items
🗃️ Deploy llama2
5 items
Examples
Here are some example images that solve real-world problems that you can use as a reference for your own images:
🗃️ Examples
1 item
Explore the protocol
Oyster is not just a compute environment, but a decentralized protocol! Explore the design of the protocol and the decisions that make Oyster CVMs what it is today.
📄️ Confidential VMs
Decentralized backends and off-chain services