Detailed instructions are coming soon. Implementation details are evolving as we finalize the self-hosted deployment architecture.
Next steps
- Security Model — Understand the TEE threat model
- Attestation — Implement attestation verification
- gRPC API Reference — Full API documentation