Today we launched Subnoto on Product Hunt — a privacy-first alternative to legacy e-signature platforms.

It keeps documents encrypted and isolated at every step, even during signing.

If you’re interested in privacy, open standards, or security design, we’d appreciate your feedback or a boost on our launch page.

👉 https://www.producthunt.com/products/subnoto?utm_source=other&utm_medium=social

(We’re a tiny team, so visibility really helps. Thank you!)

#Privacy #Security #Infosec #eSignature #ProductLaunch #ConfidentialComputing

Subnoto: Electronic signatures rebuilt for modern security | Product Hunt

Subnoto is the only e-signature platform where your documents stay encrypted during server-side processing—not just in transit. Using confidential computing, we provide cryptographic proof that your contracts remain private and isolated, even from our own servers. No trust required. Perfect for individuals and organizations handling sensitive data who refuse to choose between convenience and privacy. GDPR & eIDAS compliant by design. Try it free: 10 signatures/month, no credit card needed.

Product Hunt

Das Whitepaper von Axel Sass und Jens Freimann und mir hat es durch die interne Red Hat Veröffentlichungspipeline geschafft 🎉🎊

#redhat #confidentialcomputing

https://www.linkedin.com/feed/update/urn:li:activity:7401611872983994368/

Wer keinen Bock auf LI hat: hier der direkte Link

https://www.redhat.com/tracks/confidential-computing

Disclaimer: dafür habe ich kein Geld genommen, um kein Marketing für RH zu machen. Dafür hat es etwas länger gedauert!

Confidential Computing | Steffen L.

Meine Kollegen Axel Saß, Jens Freimann und Thomas Fricke haben ein White-Paper zum Thema Confidential Computing geschrieben. Was euch erwartet? Die traditionelle Datensicherheit konzentrierte sich auf Data-at-Rest (ruhende Daten) und Data-in-Transit (Daten während der Übertragung). Doch die entscheidende Lücke, Data-in-Use (Daten während der Verarbeitung im Arbeitsspeicher), blieb oft ungeschützt. Genau dieses Problem löst Confidential Computing (CC). Dies ist aktuell durchaus relevant: Der DORA Act fordert den Schutz von Data-in-Use. CC unterstützt zudem maßgeblich die Umsetzung von Zero-Trust-Architekturen. Das Paper beleuchtet ehrlich die Komplexität und die verbleibenden Risiken, wie Seitenkanalangriffe , Hardware-Schwachstellen und den notwendigen Firmware-Update-Prozess. Es liefert klare Empfehlungen, z.B. die Automatisierung mittels GitOps und die strikte Rollentrennung für Attestation-Administratoren. Confidential Computing ist kein Allheilmittel, aber ein wichtiger Baustein einer modernen Sicherheitsarchitektur, insbesondere wenn Daten bei Dritten verarbeitet werden (sog. Cloud). Es ist bereits produktionsreif, erfordert aber eine sorgfältige Planung und ein strukturiertes Vorgehen. Das auf deutsch verfasste Whitepaper findet ihr hier: https://lnkd.in/ewP9Vp5Y #ConfidentialComputing #Cybersecurity #ITSecurity #DORA #ZeroTrust #CloudSecurity

In its essence, Confidential Computing is designed to protect and encrypt data while it's being processed. With the help of Trusted Execution Environments (TEEs) and verification processes like cryptographic attestation, your data stays safe and private from the cloud hosting provider, server administrators and even the hypervisor itself.

If you want to dive deeper, here’s the full article: https://www.vpsbg.eu/blog/confidential-computing-history-technologies-applications

#confidentialcomputing #amdsev #cloudsecurity #vps #tech

I’m excited to share that I’ve joined the organizing team for the Confidential Computing devroom at FOSDEM! I’m curious about the proposed talks and look forward to meet the Confidential Computing community in Brussels.

CfP: https://falder.org/fosdem26-cfp

#ConfidentialComputing #Cloud #CloudSecurity #FOSDEM #FOSDEM2026

FOSDEM 2026 - Confidential computing devroom call for participation

Fritz Alder
@geco_de #ConfidentialComputing ist ne Technologie, die dafür sorgt, dass alle Prozesse im Arbeitsspeicher bzw. CPU geschützt sind. Ein Angreifer (oder böser Admin) kann sich dann nicht bspw. mittels Speicherabbild o.ä. Daten beschaffen.
In der Regel gehört auch noch ein Attestation Prozess dazu, damit sicher ist, welcher Stand der Software installiert ist. Die Ausführung klappt dann nur, wenn die Software richtig signiert ist. So kann man die Authentizität der Software sicherstellen. 😬
Ich hätte ja Bock ne #nextcloud in nem #ConfidentialComputing VPS zu betreiben.
Wenn ich unbegrenzt Zeit und unbegrenzt Geld hätte. 🫣

🚀 DevOps Meetup Zürich – Streamline Your Infrastructure & Confidential Computing

Fantastic evening at Digicomp Zürich!
Ralf Weber showed how Crossplane makes Infra-as-Code truly Kubernetes-native 🌐
Jan Moser dove into Confidential Computing & TEEs 🔐

Big thanks to Martin Thalmann, Digicomp & DevOpsDays Zürich 🙏

Next meetup: 29 Nov 2025
👉 https://buff.ly/iShGX3J

#DevOps #Kubernetes #Crossplane #ConfidentialComputing #PlatformEngineering

Thanks to @ajuvo for the hint

The French gouv shares my opinions on #confidentialcomputing

"However, Confidential Computing is not secure enough to protect data integrity and confidentiality against a hostile administrator performing targeted, active attacks. Under such a threat model, users must avoid running on shared infrastructure operated by providers they cannot trust, ..."

https://cyber.gouv.fr/en/publications/technical-position-paper-confidential-computing

That is basically every company under the #cloudact !

帰ってきた IETF 124 Side Meeting 差分アップデート(2025年10月19日版) - Qiita

そろそろIETF124の開催が近づいてきてきましたね! GMOコネクト 菅野(かんの)です。 10月14日に公開した「【徹底分析】IETF 124 Side Meeting まとめ」から、Trelloボード上の構成が複数更新されました。 本記事では、Trello公式ボード・...

Qiita
"Enabling Integrity Measurement for Secure Applications in the #Enarx Framework" by Jacopo Catalano, Enrico Bravi, Silvia Sisinni, and Antonio Lioy https://link.springer.com/article/10.1007/s10922-025-09983-4 #ConfidentialComputing
Enabling Integrity Measurement for Secure Applications in the Enarx Framework - Journal of Network and Systems Management

The Cloud Computing paradigm has significantly spread thanks to the high-speed Internet connection, standardization of digital technology, and the wide adoption of mobile devices. As a result, several privacy-enhancing technologies have been developed, among which Confidential Computing aims to protect data in use. Among the various solutions proposed for Confidential Computing, the Trusted Execution Environments (TEE) is becoming increasingly adopted, even in industrial scenarios, providing a shielded area where data and code can be processed and stored. However, heterogeneous TEE technologies are now available, making trusted application development difficult for developers. To overcome the problem of developing and deploying applications caused by the deep differences between the currently available TEE technologies, the project Enarx has been proposed. Enarx permits application development for various TEE instances in the public cloud, being CPU-architecture independent and guaranteeing the security of applications from cloud providers. The Enarx logic loads an application attesting the hardware and the Enarx components but misses the integrity verification of the user-developed application. Therefore, the primary objective of our work is to propose an extension where Enarx can verify the user application’s trustworthiness deployed in underneath the TEE. The next objective is to integrate the extended Enarx framework with the Trust Monitor system, a centralized monitoring and reporting solution to assess the trustworthiness of a heterogeneous critical infrastructure, like the cloud environment. A validation phase has been conducted, proving the solution fulfils the defined goals in terms of functionalities and performance.

SpringerLink