Hello Andrew,
the idea is, if crypt-methods may help...
E.g. can holomorphic encryption be used to do all the crypt-key calculation on
encrypted data (instead of the plain-text of the key) - so "nobody" can leak
key-bis, also if N VMs work in parallel?
Kind Regards
--
You received this mess
091384'019438'0913284'0918324'09:
> Hello Ilpo Järvinen,
>
> would be it an option, if some "secure CPU" is just encrypt the caches before
> it handles over the CPU power to other processes?
>
> Perhaps in the some near future?
>
> Kind Regards
>
Please, go read the literature on cache-based
Hello Ilpo Järvinen,
would be it an option, if some "secure CPU" is just encrypt the caches before
it handles over the CPU power to other processes?
Perhaps in the some near future?
Kind Regards
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
On Tue, 28 Jun 2016, 12384013418489'14'810'4 wrote:
> would be the Intel Skylake Technology SGX a solution, so that the keys
> cannot be read from the crypto processes?
In these covert attacks, the keys are not "read" but leaked. Those leaks
are unlikely to be solved by SGX as it's not the thre
Hello,
would be the Intel Skylake Technology SGX a solution, so that the keys cannot
be read from the crypto processes?
https://github.com/01org/linux-sgx
Kind Regards
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this g
Assume my PC has to CPUs.
How I can configure Qubes that all black VMs are running under CPU0 and all
other VMs are running under CPU1?
That would be cool!
Kind Regards
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this
Hallo Andrew,
real crypto works always with air-gapped machines.
PC0 handels all encryptions (PC0 is sheltered)
PC1 is the achive
The charme of this solution is, that the risk of bit-leaks, of the crypto keys
can mitigated.
In qubes I could use a dual CPU system.
CPU0 handels all encryption
Hallo Andrew,
real crypto works always with air-gapped machines.
PC0 handels all encryptions
PC1 is the achive
This setup (if PC0 is sheltered) allows to distribute documents without the
risk of bit-leaks, e.g. with side channel attacks, of the crypto keys (game
over, if you know it).
Q look
1093284'109438'019438'0914328'0913284'0913:
> Hi Andrew,
>
> could it be that with some real-time OS features, it will possible to splitt
> the Cores of an CPU in two clean domains?
>
> This would lead to a better latency performance for real time communication,
> like skype and for some "air-g
Hi Andrew,
could it be that with some real-time OS features, it will possible to splitt
the Cores of an CPU in two clean domains?
This would lead to a better latency performance for real time communication,
like skype and for some "air-gapped engines" inside Q.
Kind Regards
--
You received t
10 matches
Mail list logo