-
Can we use remote attestation to prove the trustworthiness of witnesses?
E.g. a witness uses the remote attestation module in the phone's hardware to prove it was running the correct version of the…
dbosk updated
3 years ago
-
I cannot get the JMD.jar file after I run "gradlew jar". I want to build the latest JMD.jar from source code.
Is there anyone who could tell me how to handle this problem?
-
Over the years, we have had a number of conversations about introducing an identity mechanism to Confidential Containers. Identity is one of the most subtle parts of confidential computing, so these c…
-
In GCP we have as part of every Shielded VM's vTPM an endorsement key certificate that includes x.509 extensions that bind a quote to platform identity metadata. This is zone, project name, project id…
-
# yAcademy - Rate Limiting Nullifier Review
**Review Resources:**
- The code repository at [github.com/Rate-Limiting-Nullifier](https://github.com/Rate-Limiting-Nullifier/circom-rln)
- The RLN …
-
- @searri, Rick Sear, Critical: Most Arduinos don't connect to the Internet, so how does the security model change? What bad things can be done with a non-connected device? How many of these other mid…
-
Chrome proposes developing a high-level document to capture use-cases and requirements for device attestation and other high-fidelity, low-entropy signals. This is a call for collaboration among inter…
-
As suggested in the [explainer](https://github.com/WICG/turtledove/blob/main/FLEDGE.md#31-fetching-real-time-data-from-a-trusted-server), sellers have the ability to fetch additional real-time signals…
-
The purpose of the proof of identity protocol (POI) is to avoid duplicates members in the network (which is very important as verified members provoke minting of VOTE tokens which are then allocated t…
-
### Context
I first encountered the "TOTP-based" contact tracing idea after the [CodeVsCOVID19](https://codevscovid19.devpost.com/) hackathon in the [Next Step](https://next-step.io/de/) app by [Ubiq…