Dear Powers of Tau's fellows,
This is my attestation:
The BLAKE2b hash of `./response` is:
9f9cad6a 61311a88 291f3b14 eb9808e3
4b570b94 a1ad6cc7 3d7add21 32182df8
17e7e6a6 d2fb0dcd 7ad9526b 6e05038c
5592fb74 e41ddfd6 50c1f0d2 72062a69
__
I performed the computation on a Thinkpad T460p, running QubesOS R3.2. I
have used Sean Bowe's implementation, compiled with Rust 1.24.1 in a
Fedora-26 TemplateVM.
The computation was done on a dedicated, network-less paravirtualized
guest AppVM based on the Fedora-26 TemplateVM. Before starting the
computation, to prevent local side-channel attacks in the case one of my
untrusted AppVM is compromised, I have shutdown all the AppVMs running
on the machine, leaving only dom0 and the computation VM running.
Once the computation was completed, I created a second networkless VM
where I moved the response. Then, I proceeded to delete the entire
computation VM and reboot the machine.
Best,
Marco Giglio
0x88F9948D.asc
Description: application/pgp-keys
signature.asc
Description: OpenPGP digital signature