And in a post here from June 28, 2016: "VM CPU mapping -
countermeasurements against covert channels via cpu caches?"
"With SGX, the memory is encrypted so that
it cannot be "read", however, the CPU still does calculations of an SGX
enclave the same way as without them which creates the opportunity for
the very same covert channels to form."
https://mail-archive.com/qubes...@googlegroups.com/msg01200.html
Tai...@gmx.com
unread,
Feb 25, 2018, 4:57:31 PM2/25/18
Reply to author
Sign in to reply to author
Forward
Sign in to forward
Delete
You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to aw...@danwin1210.me, qubes...@googlegroups.com
SGX is a DRM anti-feature mechanism that prevents people from inspecting
what runs on their own computer and it enables malware that is immune to
antivirus programs because it runs in an ME enclave.
"Hardening DRM for enhanced high definition, 4K ultra high definition
(UHD) content protection"
awokd
unread,
Feb 26, 2018, 7:52:57 AM2/26/18
Reply to author
Sign in to reply to author
Forward
Sign in to forward
Delete
You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to Tai...@gmx.com, aw...@danwin1210.me, qubes...@googlegroups.com
That's the part I found amusing. They sold their closed-source,
proprietary code running on ME as a "secure" enclave, but there was
conjecture on this very list two years ago that it was not and it was
proven with the Spectre exploit.