-
# A Minimal Trusted Computing Base (TCB)
Authors: Joshua Lind (@JoshLind), David Wong (@mimoo)
Status: Rough draft (for discussion)
## 1. Goals of this Document:
* The **goals** of this docu…
-
### Short description
Banking app refuses to allow access with floris board set as the current keyboard. It can be worked around by switching to the stock keyboard when using the app. The banking app…
-
With the current design, it is necessary to use Git to clone the repository and use Git to walk the trees. This means that Git is exposed to untrusted data before the signature is verified, making it…
-
WDYT? Is this publication in scope?
```
@inproceedings{Seifert_2005,
author = {Seifert, Jean-Pierre},
booktitle = {Proceedings of the 12th ACM conference on Computer and communications security},
c…
-
Convert Metric to Queries?
Comparing an RSI of 0.75 to 0.95 will always be hairy as long as we do not try to characterize what the PD is doing with the resource.
The argument that `since we are co…
-
Hello,
[Confidential Computing (CC) API](https://github.com/cc-api) group defines unified and vendor agnostic and Trusted Computing Group (TCG) compliant [CC trusted APIs](https://github.com/cc-ap…
-
### What's the issue?
The definition of `Nused` within the obs_diag documentation is: _The number of observations that were assimilated._ However, this is only true if `N_trusted` is false for al…
-
Shall this module be merged into another module? E.g. the topic of covert channels is related to trusted computing. Side-channels might belong to crypto, but is probably more related to trusted comp…
dbosk updated
5 years ago
-
### What happened? Provide a clear and concise description of the bug, including deployment details.
Issue with deploying .GOV
"code": "DeploymentFailed",
"target": "/subscriptions/cf4d6247-bf5…
-
IT Security Management and Risk Assessment
IT Security Controls, Plans and Procedure
Physical and Infrastructure Security
Human Resource Security
Security auditing and legal and ethical Aspects
linux …