Tag: enclave

  • Slashdot: Intel and AMD Trusted Enclaves, a Foundation For Network Security, Fall To Physical Attacks

    Source URL: https://it.slashdot.org/story/25/10/01/229239/intel-and-amd-trusted-enclaves-a-foundation-for-network-security-fall-to-physical-attacks?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Intel and AMD Trusted Enclaves, a Foundation For Network Security, Fall To Physical Attacks Feedly Summary: AI Summary and Description: Yes Summary: Researchers have introduced two significant hardware attacks, Battering RAM and Wiretap, that compromise Intel SGX and AMD SEV-SNP trusted enclaves. These attacks exploit flaws in deterministic encryption…

  • Slashdot: VP.net Promises "Cryptographically Verifiable Privacy"

    Source URL: https://news.slashdot.org/story/25/06/30/1852224/vpnet-promises-cryptographically-verifiable-privacy?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: VP.net Promises "Cryptographically Verifiable Privacy" Feedly Summary: AI Summary and Description: Yes Summary: The text discusses the launch of VP.net, a VPN service that leverages Intel SGX enclaves to provide users with “cryptographically verifiable privacy.” By ensuring that even the VPN provider cannot track user activities, this service challenges…

  • Cloud Blog: How Confidential Computing lays the foundation for trusted AI

    Source URL: https://cloud.google.com/blog/products/identity-security/how-confidential-computing-lays-the-foundation-for-trusted-ai/ Source: Cloud Blog Title: How Confidential Computing lays the foundation for trusted AI Feedly Summary: Confidential Computing has redefined how organizations can securely process their sensitive workloads in the cloud. The growth in our hardware ecosystem is fueling a new wave of adoption, enabling customers to use Confidential Computing to support cutting-edge…

  • Hacker News: Reversing Samsung’s H-Arx Hypervisor Framework (Part 1)

    Source URL: https://dayzerosec.com/blog/2025/03/08/reversing-samsungs-h-arx-hypervisor-part-1.html Source: Hacker News Title: Reversing Samsung’s H-Arx Hypervisor Framework (Part 1) Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses Samsung’s advancements in mobile hypervisor security, specifically their Real-time Kernel Protection (RKP) implemented through their Exynos platform. It details the transition from a monolithic to a modular design, highlighting…

  • The Register: Now’s your chance to try Microsoft’s controversial Windows Recall … maybe

    Source URL: https://www.theregister.com/2024/11/22/microsoft_recall_release/ Source: The Register Title: Now’s your chance to try Microsoft’s controversial Windows Recall … maybe Feedly Summary: Like its AI, this automated screenshotter and logger is a feature not exactly everyone wanted Microsoft has initiated a limited public preview of its Windows Recall system – about six months after its unveiling sparked…

  • The Register: iOS 18 added secret and smart security feature that reboots iThings after three days

    Source URL: https://www.theregister.com/2024/11/19/ios_18_secret_reboot/ Source: The Register Title: iOS 18 added secret and smart security feature that reboots iThings after three days Feedly Summary: Security researcher’s reverse engineering effort reveals undocumented reboot timer that will make life harder for attackers Apple’s latest mobile operating system, iOS 18, appears to have added an undocumented security feature that…

  • Hacker News: Reverse Engineering iOS 18 Inactivity Reboot

    Source URL: https://naehrdine.blogspot.com/2024/11/reverse-engineering-ios-18-inactivity.html Source: Hacker News Title: Reverse Engineering iOS 18 Inactivity Reboot Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses the new inactivity reboot feature in iOS 18, which adds a significant layer of security by forcing a device reboot after three days of inactivity. This feature aims to protect…