Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 15 submissions in the queue.
posted by Fnord666 on Saturday June 16 2018, @11:39AM   Printer-friendly
from the golems-everywhere dept.

https://blog.golemproject.net/introducing-graphene-ng-running-arbitrary-payloads-in-sgx-enclaves-a03f219447a5

A few months ago, during my keynote at Black Hat Europe, I was discussing how we should be limiting the amount of trust when building computer systems. Recently, a new technology from Intel has been gaining popularity among both developers and researchers, a technology which promises a big step towards such trust-minimizing systems. I'm talking about Intel SGX, of course.

Intel SGX caught my attention for the first time about 5 years ago, a little while before Intel has officially added information about it to the official Software Developer's Manual. I've written two posts about my thoughts on this (then-upcoming) technology, which were a superposition of both positive and negative feelings.

Over the last 2 years or so, together with my team at ITL, we've been investigating this fascinating technology a bit closer. Today I'd like to share some introductory information on this interesting project we've been working on together with our friends at Golem for several months now.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2, Informative) by Anonymous Coward on Saturday June 16 2018, @09:15PM

    by Anonymous Coward on Saturday June 16 2018, @09:15PM (#694043)

    If you have research or ideas you want to share, you can do it online, (pseudo)anonymously.

    What are you getting by going in-person to these events? Schmoozing and networking with social butterflies? Job offers? Risk of financial ruin and/or prosecution leading to your suicide?

    Real antisocial hackers dump it online. No need to take credit or responsibly disclose. Or you can exploit for cash.

    Starting Score:    0  points
    Moderation   +2  
       Interesting=1, Informative=1, Total=2
    Extra 'Informative' Modifier   0  

    Total Score:   2