#confidential-computing

[ follow ]
Information security
fromSecurityWeek
2 days ago

Battering RAM Attack Breaks Intel and AMD Security Tech With $50 Device

Battering RAM is a physical-access hardware attack using a low-cost interposer to bypass Intel SGX and AMD SEV-SNP memory protections.
Privacy technologies
fromcointelegraph.com
1 week ago

Trusted Execution Environments (TEE) explained: The future of secure blockchain applications

Trusted Execution Environments provide hardware-level trust for confidential, tamper-proof execution and attestable off-chain computation in blockchain nodes.
fromHackernoon
3 months ago

The Open-Source Privacy Project Making Untrusted Devices Work Together Securely | HackerNoon

Veracruz introduces a framework for designing privacy-preserving delegated computations among mutually mistrusting parties, leveraging isolates to safeguard computations from interference.
Scala
Artificial intelligence
fromHackernoon
3 months ago

Unlocking Autonomous AI: iExec's Matthieu Jung on Building Trust in a Decentralized Future | HackerNoon

Trusted AI Agents ensure privacy and trust, enabling scalable autonomous operations across ecosystems.
[ Load more ]