-
Hi,
I don't see how keystone check runtime or eapp authenticity. It means that anyone could write eapp or runtime, and load and execute them.
Attestation report could be used to check enclave auth…
-
-
For example, if I pass in a piece of function code in the "host part" , how can it automatically load and enter the enclave?
-
*Needs to first be researched in depth*
RSA should be deprecated as it should no longer be considered secure
NaCl is scheme enabling asymmetric encryption and authentication at the same time, ba…
-
_brainstorm_ Not afraid of assembly! Defend: July 2025. Phd ambition?!
First, describe the scope and past occurrences of node hijacks.
From Solarwinds to the [recent 1.3 million Android TVs in a b…
-
Hi, I am studying DarkneTZ for my end-of-studies project.
I am wondering what are you exactly protecting when you put a layer inside an enclave: does its parameters becomes unreadable for external …
-
Build types for SGX-LKL
=================
We want to support the following three mutually-exclusive build types for SGX-LKL:
1. `make DEBUG=true` **# DEBUG build**
This creates a debug build…
-
hey all!
I'm curious how the mnemonics are stored inside of the near wallet, is it an iframe or some type of secure enclave?
Would be great to understand how it comes together, and I believe wou…
-
## Motivation
To improve security of the storage, I'm proposing to use `eth-keyring-controller` which provides a unified enclave like way to sign transaction. The enclave/controller prevents any le…
-
I updated my MacBook Pro to macOS 14.5, and now, I seem to have (a) lost all my existing SSH keys in Secretive, and (b) get an immediate Secretive crash when trying to create new ones. I'm running Sec…