Treetee provides secure, private virtual machines running in TEEs across a decentralized network.
Treetee provides secure, private virtual machines running in TEEs across a decentralized network. Access your compute resources with full control while maintaining complete data privacy. never wonder if it will work on your machine again it definitely will if its secured in a TreeTee!
Decentralized Self-Custodial Computing Secured by Trusted Execution Environments Treetee provides secure, private virtual machines running in TEEs across a decentralized network. Access your compute resources with full control while maintaining complete data privacy.
How Treetee Works Treetee transforms traditional virtual machines into secure, containerized environments running inside Trusted Execution Environments (TEEs) across a decentralized network.
1 VM to Docker Conversion We convert traditional virtual machines into optimized Docker containers, preserving all functionality while making them portable and lightweight.
Technical Process: VM disk images are analyzed and converted to container layers System dependencies are identified and optimized Custom init systems ensure proper service startup State persistence is maintained through volume mapping 2 TEE Deployment Containerized VMs are deployed to Trusted Execution Environments (TEEs) on decentralized infrastructure like Phala Network, Marlin, or other TEE cloud providers.
Supported TEE Platforms: Phala Network: Decentralized confidential computing using Intel SGX Marlin: High-performance TEE infrastructure Azure Confidential Computing: Enterprise-grade TEE solutions AWS Nitro Enclaves: Isolated compute environments 3 Meshcentral Management A secure Meshcentral server provides comprehensive management capabilities for all your TEE-secured virtual machines across the network.
Management Features: Remote Desktop: Secure GUI access to your VMs Command Execution: Run commands and scripts remotely File Transfer: Securely upload and download files Performance Monitoring: Track resource usage in real-time Multi-User Access: Delegate access with fine-grained permissions 4 End-to-End Encryption All communication between you and your TEE-secured VMs is protected with end-to-end encryption, ensuring complete privacy and security.
Security Measures: TLS 1.3 for all network communications Remote attestation verifies TEE integrity Encrypted storage for persistent data Zero-knowledge proofs for sensitive operations Treetee Architecture š¤ User ā š Meshcentral Server ā š”ļø TEE Network (Phala, Marlin, etc.) ā š³ Containerized VMs Treetee's architecture ensures that your virtual machines run in secure TEEs, managed through an encrypted Meshcentral connection, with all data and processes protected from unauthorized access.