Settings

Theme

Amazon EC2 Instance Attestation

docs.aws.amazon.com

9 points by Judson 3 months ago · 1 comment

Reader

karmakaze 3 months ago

Note that physical access and an interposer can be used to decrypt memory. See this other recent story[0].

> They exploit both Intel’s and AMD’s use of deterministic encryption, which produces the same ciphertext each time the same plaintext is encrypted with a given key.

[0] https://news.ycombinator.com/item?id=45443767

Keyboard Shortcuts

j
Next item
k
Previous item
o / Enter
Open selected item
?
Show this help
Esc
Close modal / clear selection