In its essence, Confidential Computing is designed to protect and encrypt data while it's being processed. With the help of Trusted Execution Environments (TEEs) and verification processes like cryptographic attestation, your data stays safe and private from the cloud hosting provider, server administrators and even the hypervisor itself.

If you want to dive deeper, here’s the full article: https://www.vpsbg.eu/blog/confidential-computing-history-technologies-applications

#confidentialcomputing #amdsev #cloudsecurity #vps #tech

OpenBSD 7.7 released with AMD SEV support in QEMU, SMP improvements, updated DRM based on Linux Kernel 6.12.21, kernel support for Ryzen AI 300, Radeon RX 9070 and Intel ArrowLake, new Intel E810 ethernet devices driver, support for MA devices, installer and bootloader improvements

https://www.openbsd.org/77.html

#openbsd #openbsd77 #bsd #amdsev #amdryzen #qemu #opensource #freesoftware

OpenBSD 7.7

OpenBSD 7.7

#BadRAM / #CVE_2024_21944 #vulnerability seems quite far fetched to me. If your trust model includes #AMDSEV you hopefully also have assurances of physical security.
https://arstechnica.com/information-technology/2024/12/new-badram-attack-neuters-security-assurances-in-amd-epyc-processors/
AMD’s trusted execution environment blown wide open by new BadRAM attack

Attack bypasses AMD protection promising security, even when a server is compromised.

Ars Technica
Researchers at CISPA Helmholtz Center and Graz University of Technology uncovered the "CacheWarp" exploit (https://cachewarpattack.com/). Our colleague Youheng Lü is one of the researchers who found it. A single write drop can empower attackers to seize control using openssh and sudo. Youheng shares his insights and explains exploitation of CacheWarp in our blogpost: https://www.schutzwerk.com/blog/cachewarp/ #cybersecurity #CacheWarp #AMDSEV #technology
CacheWarp