Open Menu
AllLocalCommunitiesAbout
lotide
AllLocalCommunitiesAbout
Login

Intel and AMD trusted enclaves, a foundation for network security, fall to physical attacks

⁨24⁩ ⁨likes⁩

Submitted ⁨⁨2⁩ ⁨days⁩ ago⁩ by ⁨leo@lemmy.linuxuserspace.show⁩ to ⁨news@lemmy.linuxuserspace.show⁩

https://arstechnica.com/security/2025/09/intel-and-amd-trusted-enclaves-the-backbone-of-network-security-fall-to-physical-attacks/

source

Comments

Sort:hotnewtop
  • fubarx@lemmy.world ⁨2⁩ ⁨days⁩ ago

    The communication channel between the main processor and the TPM is the easiest point of attack. The Chip Whisperer has been able to do this for years. Once someone gets their hands on the hardware, all bets are off.

    Don’t see how this is new?

    source
    • whiwake@lemmy.cafe ⁨2⁩ ⁨days⁩ ago

      New clicks!

      source
      • SL3wvmnas@discuss.tchncs.de ⁨2⁩ ⁨days⁩ ago

        Well not only, there are still industry solutions relying on this infra, going “state actors in our data center are not a threat”…

        From Signal Messenger of all places…

        I remember one intel technology was pretty thoroughly tested and field proven, (and had significant memory constraints since almost everything happened on-chip as far as I remember) what came after (with similar AMD/IBM/ARM tech) was quite controversial as far as I remember. I think it was SGX 1 vs 2 or maybe Intel-TE that was marked tamper resistant, because everything happened on die, but I could misremember.

        On the other hand: Reddit thread about SGX from 5 years ago. I think the talking point even back then was “state actors in our data center are not a concern”.

        source