Example: trusted time might be provided as a psuedo node, rather than a host function. A wasm node should be able to request a channel and then use the channel to request the trusted time. The channel should block requests once the node has seen any secret data, as time request make external network requests which could be used as a side channel to leak data.
Example: trusted time might be provided as a psuedo node, rather than a host function. A wasm node should be able to request a channel and then use the channel to request the trusted time. The channel should block requests once the node has seen any secret data, as time request make external network requests which could be used as a side channel to leak data.