Most recent| Chainlink Blog
This post discusses how to efficiently parse the TLS response and form claims about it while preserving the privacy of sensitive data within the response.| Chainlink Blog
Discover how the prover convinces the verifier that a TLS response is obtained from a particular server in Chainlink DECO.| Chainlink Blog
Introducing a blog series outlining the research taking DECO, a privacy-preserving oracle protocol, from idea to implementation.| Chainlink Blog
DECO Research Series #2: Provenance and Authenticity | Chainlink Blog