Page 1 of 1

Run an Enclave Ciphernode

In Enclave, encrypted execution depends on a set of cryptographic participants called Ciphernodes.
They generate ephemeral keys for each computation, hold threshold shares, and contribute decryption shares that recover only the final output, without access to plaintext or reliance on trusted hardware.
A wide and independently operated set of Ciphernodes is essential for Enclave to be secure, reliable, and broadly useful.
If you’re interested in contributing to this part of the network — whether through existing infrastructure, curiosity, or principle — you can share your information below.

Name/handle

Email

Social handle (Telegram or Twitter)


Have you operated nodes before?

Have you operated nodes before?
A
B
C

Are you comfortable using CLI tools and running dockerized services?

Are you comfortable using CLI tools and running dockerized services?
A
B
C

What interests you about Enclave Ciphernodes?


Anything you'd like to share?