home.social

#confidentialcomputing — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #confidentialcomputing, aggregated by home.social.

  1. Physical security has become an important aspect of protecting confidential computing workloads. Physical access is typically excluded from hardware vendors' CVM attack models, leaving physical and relay attacks largely unaddressed.
    Flashbots and Intel have each been working independently on solutions to help bridge this physical-access gap: writings.flashbots.net/mind-th

    #ConfidentialComputing #CloudSecurity #TPM

  2. Physical security has become an important aspect of protecting confidential computing workloads. Physical access is typically excluded from hardware vendors' CVM attack models, leaving physical and relay attacks largely unaddressed.
    Flashbots and Intel have each been working independently on solutions to help bridge this physical-access gap: writings.flashbots.net/mind-th

    #ConfidentialComputing #CloudSecurity #TPM

  3. Physical security has become an important aspect of protecting confidential computing workloads. Physical access is typically excluded from hardware vendors' CVM attack models, leaving physical and relay attacks largely unaddressed.
    Flashbots and Intel have each been working independently on solutions to help bridge this physical-access gap: writings.flashbots.net/mind-th

    #ConfidentialComputing #CloudSecurity #TPM

  4. Physical security has become an important aspect of protecting confidential computing workloads. Physical access is typically excluded from hardware vendors' CVM attack models, leaving physical and relay attacks largely unaddressed.
    Flashbots and Intel have each been working independently on solutions to help bridge this physical-access gap: writings.flashbots.net/mind-th

    #ConfidentialComputing #CloudSecurity #TPM

  5. Physical security has become an important aspect of protecting confidential computing workloads. Physical access is typically excluded from hardware vendors' CVM attack models, leaving physical and relay attacks largely unaddressed.
    Flashbots and Intel have each been working independently on solutions to help bridge this physical-access gap: writings.flashbots.net/mind-th

    #ConfidentialComputing #CloudSecurity #TPM

  6. Cool, KVM-based AMD SEV-SNP support was recently added to Cloud Hypervisor! Including support for Google's oak stage0 firmware and IGVM image format.
    github.com/cloud-hypervisor/cl

    #ConfidentialComputing #virtualization #KVM #CloudHypervisor

  7. @OpenCloud

    Congratulations. This is another major step forward in the battle to tame the EU AI Act Compliance beast. Accountable Hardware meets sovereign Cloud.

    We should have a chat (soon) about structured indexing of large unstructured datasets. I have some novel. and very fast, tools under development right now.

    #DigitalSovereignty #EUAIAct #SovereignCloud #OCIS #ConfidentialComputing #DigitalForensics #IPCEICIS #OpenSource #DataIntegrity #StructuredIndexing

  8. #e2ee #e2eencryption

    AMD: Microcode Signature Verification Vulnerability

    "... security vulnerability in some AMD Zen-based CPUs. This vulnerability allows an adversary with local administrator privileges (ring 0 from outside a VM) to load malicious microcode patches."

    github.com/google/security-res

    This is exactly the attack against which #confidentialcomputing should protect us

    And it won't, when the attacker has access to ring0 of the hardware. Everywhere you don't run yourself.

    #cloud