Skip to content

๐Ÿ›ก๏ธ Intel TDX Technology โ€‹

Intel TDX (Trust Domain Extensions) is Intel's next-generation confidential computing technology, representing the evolution from application-level to virtual machine-level protection. On the iExec platform, TDX is an experimental technology that offers advanced capabilities for memory-intensive workloads and legacy application migration.

Why TDX Matters for iExec โ€‹

iExec is exploring TDX as the next evolution of TEE technology to address the limitations of SGX and enable new use cases:

๐Ÿ”ฌ Research and Innovation โ€‹

  • Future-Proofing: iExec is preparing for the next generation of TEE technology
  • Advanced Capabilities: TDX enables new use cases that SGX cannot support
  • Technology Leadership: Staying ahead of the curve in confidential computing

๐Ÿ’พ Memory-Intensive Workloads โ€‹

  • Large AI Models: Support for complex AI workloads that exceed SGX memory limits
  • Big Data Processing: Handle large-scale data analytics in secure environments
  • Database Applications: Secure processing of large databases

๐Ÿ”„ Legacy Application Migration โ€‹

  • Lift-and-Shift: Enable existing applications to run securely with minimal changes
  • Enterprise Adoption: Make it easier for enterprises to adopt confidential computing
  • Reduced Development Overhead: Lower barrier to entry for TEE adoption

๐Ÿš€ Experimental Platform โ€‹

  • Limited Availability: Currently available on experimental worker pools
  • Research Environment: Perfect for testing future capabilities
  • Developer Feedback: iExec uses TDX to gather developer feedback and improve the platform

What is Intel TDX? โ€‹

TDX (Trust Domain Extensions) is Intel's newer confidential computing technology, different from the default SGX implementation. TDX provides VM-level protection, allowing entire virtual machines to run in secure, isolated environments.

Key TDX Benefits โ€‹

  1. ๐Ÿ”„ Lift-and-Shift Compatibility: Run existing applications with minimal changes
  2. ๐Ÿ’พ Large Memory Support: Handle memory-intensive workloads (AI, databases)
  3. ๐Ÿ›ก๏ธ VM-Level Protection: Protect entire virtual machines, not just applications
  4. โšก Better Performance: Optimized for complex workloads

TDX: The "Virtual Machine-Level" Security โ€‹

Intel TDX is like having an entire secure building where you can move your existing operations without major renovations. It protects entire virtual machines.

Key Characteristics โ€‹

  • Scope: Protects entire virtual machines
  • Memory: Large secure memory space (like a large vault)
  • Code Changes: Minimal changes needed - "lift and shift" approach
  • Use Case: Ideal for complex applications, legacy systems, and AI workloads

Analogy: TDX is like moving your entire office into a secure building where everything is protected.

Visual Representation โ€‹

TDX Technology Details โ€‹

How TDX Works โ€‹

  1. Trust Domain Creation: TDX creates secure virtual machines called "trust domains"
  2. VM-Level Isolation: Entire virtual machines run in isolated, secure environments
  3. Large Memory Support: Significantly larger secure memory space compared to SGX
  4. Legacy Compatibility: Existing applications can run with minimal modifications

TDX Advantages โ€‹

  • Larger Memory: Multi-GB+ secure memory space vs limited SGX memory
  • Easier Migration: "Lift and shift" approach for existing applications
  • Better Performance: Optimized for complex, memory-intensive workloads
  • VM-Level Security: Protects entire virtual machines, not just applications

TDX with iExec โ€‹

iExec is actively exploring TDX technology to expand the platform's capabilities and prepare for the future of confidential computing.

iExec's TDX Infrastructure โ€‹

iExec provides experimental TDX support through:

  • ๐Ÿ”ฌ Experimental Worker Pools: Limited TDX-enabled workers for testing
  • ๐Ÿ“ฆ TDX Technology Support: Integration with Intel TDX technology
  • ๐Ÿ” Secret Management Service: SMS support for TDX applications
  • ๐Ÿ“‹ Task Verification: Proof of contribution for TDX executions
  • ๐Ÿ”— Blockchain Integration: Decentralized coordination and payment

iExec TDX Workflow โ€‹

TDX Use Cases on iExec โ€‹

Best For โ€‹

  • ๐Ÿ”ฌ Research and Development: Testing future capabilities on iExec
  • ๐Ÿงช Experimental Features: Exploring new TEE possibilities
  • ๐Ÿ’พ Memory-Intensive Applications: AI workloads, large databases
  • ๐Ÿ”„ Legacy Applications: Existing applications that need TEE protection
  • ๐Ÿš€ Complex Workloads: Applications requiring large memory and processing power

Current Limitations โ€‹

Production Warnings

  • ๐Ÿšซ NOT for production use
  • ๐Ÿšซ Limited worker availability
  • ๐Ÿšซ Unstable execution environment
  • ๐Ÿšซ Breaking changes without notice

When to Use TDX โ€‹

TDX is ideal for:

  • ๐Ÿ’พ Working with memory-intensive applications
  • ๐Ÿ”„ Running existing applications with minimal changes
  • ๐Ÿš€ Running complex workloads with VM-level protection

What's Next? โ€‹

Learn about the foundation:

Ready to experiment with TDX? Check out the practical guides:

For production applications, use SGX: