On Wed, May 09, 2018 at 08:29:14AM -0500, John McKown wrote:
> This is interesting. Reminds me a bit of IBM's newest "Pervasive
> Encryption".
>
> https://www.theregister.co.uk/2017/06/20/amd_epyc_launch/
>
[...]
>
> You simply cannot effectively read one VM's memory contents from a
> different
John McKown wrote:
>This is interesting. Reminds me a bit of IBM's newest "Pervasive Encryption".
>https://www.theregister.co.uk/2017/06/20/amd_epyc_launch/
Interesting. So to grab a CPU is needing this condition - available and correct
Private Key.
"The key is generated during power-up by the
Very cool indeed !
Carmen Vitullo
- Original Message -
From: "John McKown"
To: IBM-MAIN@LISTSERV.UA.EDU
Sent: Wednesday, May 9, 2018 8:29:14 AM
Subject: OT: AMD Eypc processor -- RAM encrypt/decrypt built in
This is interesting. Reminds me a bit of IBM's ne
This is interesting. Reminds me a bit of IBM's newest "Pervasive
Encryption".
https://www.theregister.co.uk/2017/06/20/amd_epyc_launch/
There are three modes. The one that is really interesting is the SEV mode,
designed to be used when running a hypervisor.
"
Each VM is assigned an address space