Tag: hardware security

  • Cloud Blog: Announcing quantum-safe digital signatures in Cloud KMS

    Source URL: https://cloud.google.com/blog/products/identity-security/announcing-quantum-safe-digital-signatures-in-cloud-kms/ Source: Cloud Blog Title: Announcing quantum-safe digital signatures in Cloud KMS Feedly Summary: The continued advancement of experimental quantum computing has raised concerns about the security of many of the world’s widely-used public-key cryptography systems. Crucially, there exists the potential for sufficiently large, cryptographically-relevant quantum computers to break these algorithms. This potential…

  • NCSC Feed: MIKEY-SAKKE frequently asked questions

    Source URL: https://www.ncsc.gov.uk/guidance/mikey-sakke-frequently-asked-questions Source: NCSC Feed Title: MIKEY-SAKKE frequently asked questions Feedly Summary: A brief guide to MIKEY-SAKKE, a protocol that allows organisations to provide secure communications with end-to-end encryption. AI Summary and Description: Yes Summary: The text discusses the deployment of a Key Management System (KMS) within a Hardware Security Module (HSM) for enhanced…

  • Hacker News: Kaspersky finds hardware backdoor in 5 generations of Apple Silicon (2024)

    Source URL: https://www.xstore.co.za/stuff/2024/01/kaspersky-finds-hardware-backdoor-in-5-generations-of-apple-silicon/ Source: Hacker News Title: Kaspersky finds hardware backdoor in 5 generations of Apple Silicon (2024) Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses a significant security concern regarding a hardware backdoor found in Apple’s silicon. Identified as CVE-2023-38606, this vulnerability reportedly affects five generations of Apple mobile CPUs,…

  • The Register: The biggest microcode attack in our history is underway

    Source URL: https://www.theregister.com/2025/02/10/microcode_attack_trump_musk/ Source: The Register Title: The biggest microcode attack in our history is underway Feedly Summary: When your state machines are vulnerable, all bets are off Opinion All malicious attacks on digital systems have one common aim: taking control. Mostly, that means getting a CPU somewhere to turn traitor, running code that silently…

  • Slashdot: How To Make Any AMD Zen CPU Always Generate 4 As a Random Number

    Source URL: https://it.slashdot.org/story/25/02/09/2021244/how-to-make-any-amd-zen-cpu-always-generate-4-as-a-random-number?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: How To Make Any AMD Zen CPU Always Generate 4 As a Random Number Feedly Summary: AI Summary and Description: Yes Summary: Google security researchers have identified a vulnerability in AMD’s security architecture, allowing them to inject unofficial microcode into processors, which can compromise the integrity of virtual environments…

  • Hacker News: Fabrication Begins for Production OpenTitan Silicon – Google Open Source Blog

    Source URL: https://opensource.googleblog.com/2025/02/fabrication-begins-for-production-opentitan-silicon.html Source: Hacker News Title: Fabrication Begins for Production OpenTitan Silicon – Google Open Source Blog Feedly Summary: Comments AI Summary and Description: Yes Summary: The text details the announcement of Google’s production-ready OpenTitan silicon, the first open-source Root of Trust (RoT) for silicon. This initiative is significant for the security landscape of…

  • Hacker News: A Brief History of Code Signing at Mozilla

    Source URL: https://hearsum.ca/posts/history-of-code-signing-at-mozilla/ Source: Hacker News Title: A Brief History of Code Signing at Mozilla Feedly Summary: Comments AI Summary and Description: Yes **Summary:** This text explores the evolution of code signing processes at Mozilla, detailing the complexity of securely shipping software to end-user devices over the last two decades. It emphasizes improvements in automation…

  • Hacker News: TKey – Security for the New World

    Source URL: https://tillitis.se/products/tkey/ Source: Hacker News Title: TKey – Security for the New World Feedly Summary: Comments AI Summary and Description: Yes Summary: The text describes TKey, a flexible USB security token that emphasizes open source principles. TKey generates unique key material tied to specific applications, ensuring security by preventing unauthorized access even if the…

  • The Register: Los Alamos lab to research next-gen chip technologies

    Source URL: https://www.theregister.com/2025/02/05/los_alamos_lab_to_research/ Source: The Register Title: Los Alamos lab to research next-gen chip technologies Feedly Summary: Radiation-hardening for space environments and energy efficiency tweaks for above and below Los Alamos National Laboratory (LANL) is leading a project to transform how chips are designed and manufactured, to make them more energy efficient and able to…

  • The Register: Microsoft quietly erases Windows 11 TPM 2.0 bypass workaround from help page

    Source URL: https://www.theregister.com/2025/02/05/windows_11_hardware_requirement_workaround/ Source: The Register Title: Microsoft quietly erases Windows 11 TPM 2.0 bypass workaround from help page Feedly Summary: You’ll upgrade that aging piece of kit and you’ll like it For the past three years, Microsoft documented a way to run Windows 11 on PCs that lack Trusted Platform Module 2.0 hardware –…