-
**Summary**
At GENXT, we develop security addons for Kubernetes that leverage Confidential Computing technology, which is a protection of data while it's in use in remote infrastructures by performin…
-
The current HTTP configuration has cross-domain and whitelist configurations, but for other HTTP response header configurations that will report medium and low-risk vulnerabilities during security sca…
-
## Feature Request
Nats is a tremendously useful service and it would be even more useful if it were possible to run it in an SGX enclave. This would allow to verify that the server is genuine and …
-
As the SCS operator, I want to have a good understanding of the value proposition that confidential computing offers me over tenant separation and if and why I can't achieve the same offering with ten…
-
### Question
Here, I'm taking the liberty to share some of the key design principles of the SCER spec that I 've personally been trying to follow:
- **Business value**: how would companies see busin…
-
## Attestation Background
Attestation is a method for verifying the integrity of a computer’s software, hardware, and firmware using a Trusted Platform Module (TPM). The TPM creates cryptographic m…
-
Recent systemd EFI stubs have changed their behavior re: extending PCR 4 in a way that tpm_futurepcr doesn't handle (or at least handle in the naïve way this code leverages it). From an email exchange…
-
there's an x86 and an x64 build, how about an ARM64 build as well?
-
From #8:
[Signal's use of SGX to perform private contact discovery](https://signal.org/blog/private-contact-discovery/)
Subject: Leveraging Intel SGX to Create a Nondisclosure Cryptographic libr…
dbosk updated
4 years ago
-
After a long hesitant update of the phone firmware from UQ1A.231205.015/pims 1.2.4 to the most recent one VoWiFi stopped to work. Im out of luck in turning it working back. logcat suggest it fails at …