Cory DoctorowDemon-haunted computers are back, babySurely no one will ever find a way to abuse this security system that treats the computer’s owner as an attacker.Jan 1815
Cory DoctorowForcing your computer to rat you outSelf determination starts with the right to decide who can know which facts about you.Aug 2, 20239
Francis LampayanHow to setup TPM-simulator in Ubuntu 20.04This article will cover how to setup an environment with a simulator for Trusted Platform Module (TPM), specifically IBM’s Opensource Linux…Sep 7, 20213Sep 7, 20213
Anand RaoRaising Awareness About Confidential Computing: Protecting Data in a Connected WorldIntroduction:May 11, 2023May 11, 2023
Nadeem BhatiBlockchains in Trusted Execution Environments (TEEs)A smart contract on a blockchain cannot keep a secret. Its data is replicated on all nodes. As a remedy to this problem, it is suggested…Dec 29, 20193Dec 29, 20193
Cory DoctorowDemon-haunted computers are back, babySurely no one will ever find a way to abuse this security system that treats the computer’s owner as an attacker.Jan 1815
Cory DoctorowForcing your computer to rat you outSelf determination starts with the right to decide who can know which facts about you.Aug 2, 20239
Francis LampayanHow to setup TPM-simulator in Ubuntu 20.04This article will cover how to setup an environment with a simulator for Trusted Platform Module (TPM), specifically IBM’s Opensource Linux…Sep 7, 20213
Anand RaoRaising Awareness About Confidential Computing: Protecting Data in a Connected WorldIntroduction:May 11, 2023
Nadeem BhatiBlockchains in Trusted Execution Environments (TEEs)A smart contract on a blockchain cannot keep a secret. Its data is replicated on all nodes. As a remedy to this problem, it is suggested…Dec 29, 20193
OxfordOn the Impossibility of SMEs Delivering Secure ProductsWhy SMEs are unable to integrate the well-known security practices into new products while big vendors use those solutions for decades?May 27, 2022
Ensar SekerinGeek CultureTrusted Execution Environment (TEE), Implementations, DrawbacksThe Trusted Execution Environments are one of the technologies that help manufacturers, service providers, and consumers protect their…Jun 13, 2021
Cory DoctorowinOneZeroWhen Automation Becomes EnforcementWhat we talk about when we talk about interoperable end-to-end encryptionApr 3, 20225