@AndreaBarisani @cynicalsecurity whats the advantage to having the TZ monitor?
-
-
-
@newshtwit@cynicalsecurity the answer is complicated, you should lookup TZ intros, basically a software defined TEE -
@AndreaBarisani@cynicalsecurity I have software defined TEEs. They're called processes. Or if you prefer, hypervisor domains. why TZ?! -
@newshtwit@cynicalsecurity TZ related docs can do a far better job than a tweet, look them up if you want to know more or email me -
@AndreaBarisani@cynicalsecurity I've read them. basically you get a bit on the io bus you can make decisions on. but only 1 new "domain" -
@newshtwit@cynicalsecurity not true, secured user input is another use case since TZ can use isolated hardware -
@AndreaBarisani@cynicalsecurity "secured" statement assumes everything in TZ is "secure" and everything outside of it is not. Im not buying -
@newshtwit@cynicalsecurity TZ is about isolation, whether you put "secure" code or not in there it is up to you
End of conversation
New conversation -
-
-
@cynicalsecurity@AndreaBarisani No 0day pal, you know the result you're supposed to find, just to read.Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.