1 / 11
Space or arrow keys to navigate
NEAR AI

Beyond Mac Mini

Scaling Verifiable AI Agents with TEEs

Pierre Le Guen  |  NEAR AI
Quick question
Who's heard of TEEs?
Trusted Execution Environments

Your AI agent runs on
someone else's server

It handles your wallets, API keys, private data
The server operator can see everything
"What if even the cloud provider
can't see your data?"
Definition

A vault inside the CPU

A hardware-isolated secure area in the processor.
Code and data inside are protected from everything outside.

Inside vs Outside the TEE

Processor
Blocked
Operating System
Hypervisor
Cloud Operator
Physical Access
Trusted Execution Environment
Your Agent
Code & Data
Private Keys
Encrypted Memory

How TEEs Work

Hardware Root of Trust

Crypto keys baked into silicon at the factory. Not software, not config — hardware.

🔐

Memory Encryption

RAM is encrypted in real-time. Physical access to the machine = gibberish.

🔎

Measurements

TEE hashes everything loaded into it. Creates a unique fingerprint of the code.

Remote Attestation

Anyone can verify that fingerprint remotely. This is why it can't be faked.

NEAR AI

Agents that hold real assets
need real security

Agents manage wallets and private keys
They access sensitive user data
They execute financial transactions

How It Works at NEAR AI

👤
User
Deploys agent
☁️
NEAR AI
Cloud infra
🔒
TEE Enclave
Encrypted agent
Attestation
User verifies

Code + data encrypted in memory

Operators cannot inspect what's running

Private inference with GLM-5 on NEAR AI Cloud

Beyond Mac Mini

🖥
Mac Mini
Single machine
🔒
🔒
🔒
🔒
🔒
🔒
Cloud TEEs
NEAR AI Cloud

Same security guarantees. Infinite scale.

Why This Matters

Builders Deploy agents users can actually trust
Users Verifiable AI — don't "just trust" the platform
Ecosystem Autonomous agents holding real assets
"Trust the operator" "Trust the hardware + verify"

Deploy your agent in a TEE

Deploy your agent in a TEE
in a few clicks

agent.near.ai

Questions?