
Incognitee on Asset Hub Polkadot is in an irrecoverable state since October 3rd, 2025. In this post-mortem, we’ll explain what happened, why the damage is irrecoverable, and how we plan to recover user funds.
IncogniteeAHP CC1 is our first beta-sidechain on Asset Hub Polkadot, and it shields the following assets: DOT, ETH, WBTC, USDC, USDT, EURC, PEPE. IncogniteeTEER is unaffected and is still live for the TEER token.
On October 3rd 2025, at (09:37am UTC), Incognitee was gracefully shut down for planned maintenance, which should have been just a BIOS and microcode update to get the latest security patches for Intel SGX. The maintenance window was announced by us to end no later than 1:00pm UTC the same day. At 2:25pm UTC, we still hadn’t gotten any update from our cloud service provider (OVH), thus reaching out several times over the following 70h (including the weekend).
On October 4th (4:31pm UTC), we attempted to spin up Incognitee again, and realized that:
SGX_ERROR_MAC_MISMATCHOn October 6th (12:38pm UTC), OVH finally informed us that they had replaced the mainboard due to damage. This intervention had not been approved by us, and they only informed us about it after we shared the observation that the mainboard’s serial number had changed.
Over the next couple of days, we tried to find out if the CPU was still the same and if the old mainboard could be recovered.
By October 10th (12:27pm UTC), OVH’s final statement concluded that:
Incognitee uses Intel SGX’s sealed data feature to persist:
During Incognitee’s beta phase, we used Intel’s MRSIGNER sealing policy, which allows us (the software “vendor”) to update the enclave and still unseal the data as long as we stay on the same machine and sign the enclave with our vendor key (read this for context on this design decision).
IncogniteeAHP CC1 runs on a single machine, a scalable multiplatform with one Intel XEON Gold 6526Y CPU. Although Integritee’s SDK demonstrated multi-validateer setup already back in 2022, we had observed forks in real-world multi-validateer setups on distributed nodes, and for Incognitee beta, we decided to keep the setup easy to debug and take the risks that come with missing redundancy.
On older SGX machines, the sealing key is derived from a secret fused into the CPU by Intel, which is unique for each CPU. This means sealed data can only be unsealed by the same CPU instance and only by the same enclave (or an enclave signed by the same vendor as we use MRSIGNER policy)
On a multiplatform like ours, the sealing key is the result of a key agreement among all CPUs on the same platform, and it is stored in the mainboard’s NVRAM. This means sealed data can only be recovered by the same platform, which is the same CPU on the same mainboard.
As OVH informed us that the mainboard suffered irrecoverable damage, we have to conclude that there is no chance we can recover the sealed storage.
The total amount of assets locked in Incognitee’s vault is:
At the time of writing, the market value of all locked assets is $17,692.
Unfortunately, the short answer is yes. But it’s more complicated.
Our single-validateer setup came with the known risk of total loss of access and information in the occurrence of irrecoverable hardware issues. On the other hand, a multi-validateer setup came with other risks of lower impact but higher likelihood; temporary state ambiguities due to forks, which we had not yet implemented all necessary mitigations for to ensure smooth operation. For the sake of testing the user interest in our Incognitee product, we decided to take the bounded risk, as we had to limit shielding amounts for legal reasons anyway.
In hindsight, there is one more thing we could have done, which would’ve partially spared us this awkward situation without risking forks: we could’ve run a kind of snapshotting in a master-slave setup by spinning up a second validateer at regular intervals, getting secrets and state provisioned to this backup platform, and shutting it down before it attempts to produce blocks itself. This would’ve allowed us to roll back to the latest snapshot, which would still be better than the situation we’re in now. This shall be a learning for the future (and others using our SDK).
With the private key of the only proxy gone, only Polkadot OpenGov has the power to move assets out of the vault account. This, however, needs a root track referendum to be approved by DOT holders. We are able to prove to the community that the lost private key had been generated by a genuine Intel SGX setup and never left the enclave (subject to Intel SGX’s threat model). We are, of course, unable to prove the absence of the possibility that this enclave will ever be operational again, as we have to rely on the information we got from OVH.
As the information about ownership is lost as well, we could only rely on our users’ voluntary claims of ownership. Even if we can assess the plausibility of such claims, we are unable to prove the contrary (with the exception of someone claiming more than the entire vault holdings, of course).
If you held a balance on Incognitee in one of the affected assets and are willing to trade your privacy for the possibility of a refund, please reach out to us at hello@integritee.network. You will have to provide as much proof for your claim as you can (e.g, sign your message with the wallet you used for shielding and optionally provide accounts you used for unshielding if you like).
We will not disclose the information you provide publicly unless we have your explicit approval to do so. However, any refund through an on-chain balance transfer may leak linkable information. We will be collecting claims until November 30th, 2025 (12:00pm UTC).
Integritee is the most scalable, privacy-enabling network with a Parachain on Kusama and Polkadot. Our SDK solution combines the security and trust of Polkadot, the scalability of second-layer Sidechains, and the confidentiality of Trusted Execution Environments (TEE), special-purpose hardware based on Intel Software Guard Extensions (SGX) technology, inside which computations run securely, confidentially, and verifiably.
Community & Social Media:
Join Integritee on Discord | Telegram | Twitter | Medium | Youtube | LinkedIn | Website
Products:
L2 Sidechains | Trusted Off-chain Workers | Teeracle | Attesteer | Securitee | Incognitee
Integritee Network:
Governance | Explorer | Mainnet | Github
This is the End
EU’s “Chat Control” Law: Mass Surveillance for the Sake of Children
TEER Kusama ↔ Polkadot Bridge: How to Transfer TEER & Why It Matters
Monthly Wrap-Up September 2025: Bridge Development, Red September Breakdown & More
Crypto Market’s “Red September” Selloff: 162 Billion USD Drop in Market Value, More Than 1,5 Billion USD Liquidated
Metadata in Messaging: How It Works and Why You Should Be Wary of It
Monthly Wrap-Up August 2025: New AI Solution & TEER Bridge Imminent
Crypto Heist Stats: 2025’s Half Was Worse Than All of 2024, and It Will Get Worse
USA’s Project Crypto: Key Takeaways & What It Means for the Rest of the World
Power to the People: How Crypto is Financially Empowering Communities
Incognitee’s Privacy-Preserving Chatbot: Your Conversations Deserve Better Protection
Monthly Wrap-Up June 2025: Introducing Incognitee’s ChatGPT Integration, Discussing Web3 Approaches & More
US vs EU: Two (very) Different Approaches to Web3 Regulation
Monthly Wrap-Up May 2025: Exploring Payments with AI, TEER Trending on Kraken & More
AI Isn’t Safe from Cybercriminals: Main Threats & How to Mitigate Them
AI to the Rescue: Streamlining Payments with AI Agents
Monthly Wrap-Up April 2025: EURC, WBTC & PEPE on Incognitee, TEER Landing on Ethereum, Winning the Hackernoon Awards & More
Monthly Wrap-Up March 2025: USDC, USDT & ETH Now on Incognitee, TEER on Uniswap Approved
Incognitee Feature Alert: USDT & USDC Now Available
Monthly Wrap-Up February 2025: Working on Incognitee, Discussing K-Anonymity & More
Monthly Wrap-Up January 2025: Launching Incognitee for DOT on Polkadot Asset Hub, Recapping 2024 & Releasing the Roadmap
Web3 2025 Predictions: What’s Going to Happen This Year?
Incognitee — The Start of Full Privacy for DOT
Integritee Network: Roadmap 2025
2024 at Integritee: Joining Coretime, Launching Incognitee, Developing New Features, Listing TEER on Basilisk & Much More
Monthly Wrap-Up December 2024: Launching the Incognitee Vouchers, Messaging, and More
Monthly Wrap-Up November 2024: All about Incognitee and Privacy in Web3
Monthly Wrap-Up October 2024: Incognitee Beta Launch & Guess the Number Contest
Incognitee Beta Launch & Guess the Number Contest
Monthly Wrap-Up September 2024: TEERDays Launch, Tech Updates, New Articles & More
TEERdays: A New Unit That Will Shape Incognitee
Monthly Wrap-Up July 2024: Talking at Decoded, Launching Treasury Proposals, Publishing Articles & More
Monthly Wrap-Up June 2024: Incognitee Bug Bounty Launch, Polkadot Treasury Proposal & More
Become a Collator Operator for Integritee Network!
Monthly Wrap-Up May 2024: Securing a Polkadot Parachain, Launching the Incognitee Test Campaign & More
The Incognitee User Test Campaign is Now Live!
Slot Auctions vs Coretime: What’s Changing for Polkadot Projects
Monthly Wrap-Up March 2024: Listing TEER on Basilisk, Attending Sub0 & Paseo Landing
Monthly Wrap-Up February 2024: Crowdloan, Governance and Treasury
Monthly Wrap-Up January 2024: Launching the Incognitee Testnet, Winning a Hackernoon Award & Much More!
Polkadot Crowdloan: Campaign Kicks Off on February 7th!
2023 at Integritee: Product Releases, Partnerships, a Privacy Sidechain & Much More
OLI Systems Releases Research Paper about a DLT-Based Local Energy Market Model
Monthly Wrap-Up December 2023: New Products, Fresh Content & More
2023 Integritee Content: Giving Back to Our Community
Unlocking Privacy in Transfers: The Power of Integritee’s Private Sidechain Model
Monthly Wrap-Up November 2023: New Content, TEER Recover & Tech Updates
Monthly Wrap-Up October 2023: Joining an Accelerator Program, Launching the New Website, Educational Content & More!
Monthly Wrap-Up September 2023: Winning an Award, Talking at Sub0, Partnering with OVH & More!
OVH Releases Whitepaper on How Integritee Is Re-Inventing Blockchain Security & Confidentiality Using Intel SGX Technology & OVHcloud
Monthly Wrap-Up August 2023: Launching the Attesteer, Encointer’s PoP Badge & More
Launching Integritee’s Attesteer
