Mental Models for Real-World Cryptography and Trusted Execution Environments

a16z crypto
a16z cryptoMay 9, 2026

Why It Matters

Understanding TEE mental models helps firms design secure, user‑friendly crypto solutions, reducing adoption barriers and strengthening trust in digital assets.

Key Takeaways

  • Security vs friction trade‑off drives adoption of cryptographic systems.
  • Trusted Execution Environments (TEEs) provide minimal physical trust for secrets.
  • AI advances may reduce friction while preserving high security.
  • Different adversary models (remote, software, physical) shape TEE design.
  • Attestation combines secret storage and measurement to verify system integrity.

Summary

The seminar, led by Itai Abraham, examined mental models for Trusted Execution Environments (TEEs) and their role in bridging the security‑friction trade‑off that hampers widespread crypto adoption.

He argued that pure cryptography cannot replace physical trust; a minimal hardware root‑of‑trust is required to store secrets, maintain monotonic counters, and reliably measure system state. He outlined three adversary classes—remote, software‑level, and physical—and showed how each demands different guarantees from TEEs.

A key illustration was the “no‑physical‑security” thought experiment, demonstrating that without hardware protection even hash functions become ineffective. Abraham highlighted attestation as the combination of secret‑based signing and trusted measurement, and noted AI’s potential to automate complex TEE designs, lowering friction while preserving security.

For enterprises and blockchain projects, these insights suggest that investing in robust TEEs—such as TPMs, Intel SGX/TDX, or secure wallets—will be essential to achieve high‑security, low‑friction products, influencing risk management, compliance, and competitive positioning.

Original Description

What are Trusted Execution Environments (TEEs), and should we trust them? Do we still need to trust hardware if we already trust cryptography?
In this talk, Ittai Abraham (Intel Labs) shares key learnings and mental models that help reason about the use of cryptography and TEEs. He explores how TEEs can transform many aspects of web3 architecture — including data availability, block production, consensus, execution, and layer-2 scaling — as well as emerging “layer-3” use cases such as confidential inference and secure agentic operations.
He covers two complementary paradigms: TEEs as primary security anchors, and TEEs as defense-in-depth components. The talk highlights practical trade-offs, limitations, and exciting opportunities for future systems that combine TEEs with decentralization and cryptography.
About the presenter
Ittai is a technologist and computer scientist with broad interests in algorithms, security, and distributed computing. His work bridges theory and practice, spanning cryptography, blockchain systems, and critical distributed infrastructure. He is currently a Senior Principal Engineer at Intel Labs and previously held industrial research roles at VMware and Microsoft Research.
About a16z crypto research
a16z crypto research is a multidisciplinary lab that works closely with our portfolio companies and others toward solving the important problems in the space, and toward advancing the science and technology of the next generation of the internet.
More about us: a16z.com/2022/04/21/announcing-a16z-crypto-research
More from the a16z crypto team
Subscribe to our 'web3 weekly newsletter': a16zcrypto.substack.com
Listen to our 'web3 with a16z' podcast: a16zcrypto.com/web3-with-a16z-podcast/
Read more of our work: a16zcrypto.com

Comments

Want to join the conversation?

Loading comments...