Build with Confidential VMs
Confidential Virtual Machines (CVMs) enable secure and private computation in untrusted environments. By leveraging hardware-based encryption and secure enclaves, CVMs ensure that your sensitive data and applications remain protected even when running on third-party infrastructure. With Oyster's CVM tooling, you can create secure environments that maintain data privacy while still allowing for complex computations and operations.
Getting started
Users who wish to build and deploy Confidential VMs should start with the tutorials. If you're feeling adventurous or just want to get a taste of what deploying an Oyster CVM looks like, head straight to the quickstart ;)
📄️ Tutorials
Step-by-step walkthroughs for Oyster CVMs.
📄️ Quickstart
Get your hands dirty with Oyster CVMs.
Core concepts
Learn about the concepts at the heart of Oyster CVMs and how to wield them effectively.
📄️ Trusted Execution Environments
A TEE is a protected system where data and code are isolated from other processes usually at a hardware level.
📄️ Remote Attestations
How do you know what is running in a TEE?
📄️ Reproducible Builds
How do you check if a EIF was derived from specific code?
📄️ Basic Networking
How does a TEE communicate with you? Or the Internet?
📄️ Secure Networking
How does you set up secure channels?
📄️ Key Management Systems
Derive persistent application secrets
Guides
Follow these guides to accomplish specific tasks:
🗃️ Deploy a node.js server
5 items
🗃️ Perform privacy preserving addition
5 items
🗃️ Deploy llama3.2
4 items
Examples
Here are some examples that solve real-world problems that you can use as a reference for your own applications:
🗃️ Examples
1 item
Explore the protocol
Oyster is not just a compute environment, but a decentralized protocol! Explore the design of the protocol and the decisions that make Oyster CVMs what it is today.
📄️ Confidential VMs
Decentralized backends and off-chain services