Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
News
Sports
TV & Film
About Us
Contact Us
Copyright
© 2024 PodJoint
Podjoint Logo
US
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/d4/02/a5/d402a5ab-7153-7db9-2476-2ed742ba4577/mza_13277582984184660621.jpg/600x600bb.jpg
Blackbox Podcast
Blackbox Podcast
6 episodes
4 days ago
The Blackbox Podcast is where builders of the future come to talk shop — no fluff, no hype, just real technical insight. Whether you’re a solo creator, startup innovator, or enterprise architect, we want your perspective on the systems shaping confidential computing and SAFE AGI. Each episode dives into the architectures that matter — from TEE CPU/GPU deployments (SGX, TDX, SEV, etc.) to Zero Trust frameworks and privacy-first design principles. We’re here to explore how these technologies actually work in practice, and to spotlight the visions driving them forward.
Show more...
Technology
RSS
All content for Blackbox Podcast is the property of Blackbox Podcast and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
The Blackbox Podcast is where builders of the future come to talk shop — no fluff, no hype, just real technical insight. Whether you’re a solo creator, startup innovator, or enterprise architect, we want your perspective on the systems shaping confidential computing and SAFE AGI. Each episode dives into the architectures that matter — from TEE CPU/GPU deployments (SGX, TDX, SEV, etc.) to Zero Trust frameworks and privacy-first design principles. We’re here to explore how these technologies actually work in practice, and to spotlight the visions driving them forward.
Show more...
Technology
https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_nologo/44194214/44194214-1756399778705-ee45c4937055e.jpg
E04 with Andrew Miller: "Your Al is Weak, Until You Add Zero Trust."
Blackbox Podcast
1 hour 55 minutes 51 seconds
1 month ago
E04 with Andrew Miller: "Your Al is Weak, Until You Add Zero Trust."

This is the Blackbox Podcast — where we peel back the hidden layers of technology, society, and the human psyche to unravel the forces shaping confidential AI.


In this episode, host Dylan Kawalec sits down with researcher and entrepreneur Andrew Miller for a deep dive into confidential computing, trusted execution environments (TEEs), and the future of private AI.


Andrew has been at the forefront of cryptography and decentralized systems, from early Bitcoin scripting experiments to Ethereum, MPC, and zero-knowledge proofs. As a key architect behind Flashbots and dstack, he’s redefining how we think about secure, verifiable computation in a world where AI is becoming ever more powerful—and ever more in need of unbreakable safeguards.


Through the lens of auctions, Andrew explains how trust models evolve, why combining TEEs and MPC strengthens guarantees, and how confidential containers may become the new smart contracts. He then connects these ideas to AI, reputation, and agent-to-agent protocols—making the case for “prove what, not who” as a guiding principle for building trustworthy systems.


Along the way, he demos sandboxed TikTok sessions inside a TEE, critiques reputation models for autonomous agents, and explores how confidential compute enables rivals to collaborate securely through projects like BuilderNet—reshaping the future of decentralized infrastructure.


Now here is E04 of the Blackbox Podcast, hosted by Dylan Kawalec and brought to you by Phala Network.


Phala Docs: https://docs.phala.com/

Flashbots Docs: https://docs.flashbots.net

Blackbox Podcast
The Blackbox Podcast is where builders of the future come to talk shop — no fluff, no hype, just real technical insight. Whether you’re a solo creator, startup innovator, or enterprise architect, we want your perspective on the systems shaping confidential computing and SAFE AGI. Each episode dives into the architectures that matter — from TEE CPU/GPU deployments (SGX, TDX, SEV, etc.) to Zero Trust frameworks and privacy-first design principles. We’re here to explore how these technologies actually work in practice, and to spotlight the visions driving them forward.