Blog
Security
Page 1 of 1
![](https://cms.polkadot.network/content/images/2020/07/image1-1.png)
Trusted Execution Environments and the Polkadot Ecosystem
The use of Trusted Execution Environments (TEEs) in combination with the Substrate blockchain modular framework is providing new solutions to enable real-use applications on the next generation of the web.
![](https://cms.polkadot.network/content/images/2019/12/unnamed.png)
Polkadot Consensus Part 4: Security
So far, we have discussed how BABE creates blockchain candidates and GRANDPA finalizes them. We know that we need more than two-thirds of validators to properly follow the protocol. But how many validators are there? How are they chosen? Why should they follow the rules?
![](https://cms.polkadot.network/content/images/2019/08/68@2x.png)
The Polkadot Claims Audit
Web3 Foundation engaged Chain Security for an audit of the Polkadot Claims smart contract. The audit found 0 Critical, 0 High, 2 Medium and 9 Low level issues, all of which have been resolved in the latest commits to the code.