Vaultee

VAULTEE: TEE-based secure Ethereum login for your devices with Intel chip

Vaultee

Created At

ETHGlobal Trifecta - Trusted Execution Environments

Winner of

Privy

Privy - Best Agentic Consumer

Project Description

Today, 80 % of hacking-related breaches involve stolen or weak credentials across 200+ billion connected devices, resulting in an estimated $10.5 trillion loss in 2025.

VUALTEE is a solution for trust through TEE-based, secure Ethereum login for your devices.

Currently, user data is stored in the cloud and accessible by multiple companies and devices, which introduces multiple entry points for security breaches/failures.

Fear not, Web3 equips us to solve this problem! With VAULTEE and trusted execution environment (TEE) technology, user data is stored in a secure enclave accessible by the local device only so account information can only be reached through the enclave.

Users can now login to their devices securely in seconds with a simple UX and UI make the experience as easy as current device login, with our Sign-in with Ethereum (SIWE) module via Privy. On the back-end, we created a Linux Pluggable Authentication Module (PAM) that leverages Intel Software Guard Extensions (SGX), which involves integrating SGX's secure enclave capabilities into the authentication process. This enhances the security of authentication mechanisms by ensuring that sensitive operations are performed within a TEE.

VAULTEE is keeping user data on lock, ensuring privacy and security for users.

Verified by Math. Secured by Design.

How it's Made

The Technology Flow:

  1. User Authentication Request: A user attempts to log in with Privy.
  2. PAM Module Invocation: The PAM module is invoked as part of the authentication process.
  3. Enclave Initialization: The PAM module initializes the SGX enclave.
  4. Secure Operation: The enclave performs the secure operation (e.g., password verification).
  5. Result Return: The enclave returns the result to the PAM module.
  6. Authentication Decision: The PAM module makes an authentication decision based on the enclave's result.
  7. Success: Upon successful verification, the user is granted access to the device.

High-level Tech Stack/Protocols used:

  • Web 3: 
Sign-in with Ethereum (SIWE) via Privy
  • Operating System: 
Linux Pluggable Authentication Module (PAM)
  • CPU: 
Intel Software Guard Extensions (SGX) SDK
  • Blockchain Technology: 
Ether.JS for querying blockchain data with QuickNode, displaying transactions on a dashboard for the user to access from their device home screen (i.e. desktop).

Privy protocol enabled a simple and seamless UX for users on the front-end.

background image mobile

Join the mailing list

Get the latest news and updates