#trusted-execution-environment

[ follow ]
Privacy technologies
fromTechCrunch
1 week ago

Moxie Marlinspike has a privacy-conscious alternative to ChatGPT | TechCrunch

Confer preserves user privacy by encrypting conversations and performing inference inside Trusted Execution Environments so hosts cannot access data or use it for training or ads.
#private-ai-compute
fromInfoQ
1 month ago
Artificial intelligence

Private AI Compute Enables Google Inference with Hardware Isolation and Ephemeral Data Design

fromInfoQ
1 month ago
Artificial intelligence

Private AI Compute Enables Google Inference with Hardware Isolation and Ephemeral Data Design

Information security
fromThe Hacker News
2 months ago

New TEE.Fail Side-Channel Attack Extracts Secrets from Intel and AMD DDR5 Secure Enclaves

Physical interposition on DDR5 memory enables extraction of cryptographic and attestation keys from Intel and AMD TEEs, compromising CPU and GPU confidential computing.
fromTheregister
5 months ago

Microsoft shows off custom silicon keeping Azure on lockdown

A key aspect of Microsoft's hardware security is isolation. Encryption keys are stored in an integrated hardware security module (HSM), while VMs are isolated from one another using trusted execution environments (TEE) baked into modern CPUs and GPUs. The control, data, networking, and storage planes are all offloaded to smartNICs and an open source Root of Trust (RoT) module ensures everything is what it purports to be.
Information security
Cryptocurrency
fromHackernoon
1 year ago

Layer-One Confidential Smart Contracts: Architecture, Threats, and Tradeoffs | HackerNoon

Layer-one blockchain solutions enhance transaction efficiency and privacy by integrating consensus and contract execution within isolated environments.
[ Load more ]