Cory DoctorowAnti-cheat, gamers, and the Crowdstrike disasterThe constituency for trusted computing is fracturing.Sep 163
Cory DoctorowDemon-haunted computers are back, babySurely no one will ever find a way to abuse this security system that treats the computer’s owner as an attacker.Jan 1815
Francis LampayanHow to setup TPM-simulator in Ubuntu 20.04This article will cover how to setup an environment with a simulator for Trusted Platform Module (TPM), specifically IBM’s Opensource Linux…Sep 7, 20213Sep 7, 20213
Cory DoctorowForcing your computer to rat you outSelf determination starts with the right to decide who can know which facts about you.Aug 2, 20239Aug 2, 20239
Nadeem BhatiBlockchains in Trusted Execution Environments (TEEs)A smart contract on a blockchain cannot keep a secret. Its data is replicated on all nodes. As a remedy to this problem, it is suggested…Dec 29, 20194Dec 29, 20194
Cory DoctorowAnti-cheat, gamers, and the Crowdstrike disasterThe constituency for trusted computing is fracturing.Sep 163
Cory DoctorowDemon-haunted computers are back, babySurely no one will ever find a way to abuse this security system that treats the computer’s owner as an attacker.Jan 1815
Francis LampayanHow to setup TPM-simulator in Ubuntu 20.04This article will cover how to setup an environment with a simulator for Trusted Platform Module (TPM), specifically IBM’s Opensource Linux…Sep 7, 20213
Cory DoctorowForcing your computer to rat you outSelf determination starts with the right to decide who can know which facts about you.Aug 2, 20239
Nadeem BhatiBlockchains in Trusted Execution Environments (TEEs)A smart contract on a blockchain cannot keep a secret. Its data is replicated on all nodes. As a remedy to this problem, it is suggested…Dec 29, 20194
Anand RaoRaising Awareness About Confidential Computing: Protecting Data in a Connected WorldIntroduction:May 11, 2023
Edwin CovertAn Examination of Select Controls for Enforcing the CIA TriadPlease note: any mention of products in this article should not be construed as an endorsement.Nov 29, 20211
OxfordOn the Impossibility of SMEs Delivering Secure ProductsWhy SMEs are unable to integrate the well-known security practices into new products while big vendors use those solutions for decades?May 27, 2022