h3artbl33d 🐡 on Nostr: Another day, another #Intel #clusterfuck 🎉 Researchers managed to extract the SGX ... Another day, another #Intel #clusterfuck 🎉 Researchers managed to extract the SGX Fuse Key0 (AKA Root Provisioning Key). Together with the FK1 (AKA Root Sealing Key, which is also compromised), it represents the root of trust for SGX. #SGX #secureenclave #Intel #CPU #oops
Published at
2024-08-27 07:46:05 Event JSON
{
"id": "391282256f36016456945aea51ec8eaee8e3079513d46ec4d7636c07ecdcaeb6" ,
"pubkey": "679fb1d88a64fa6cb7dcd05cedbcdfe8ffa15cce922e0ad92c8dddcaa2bcd079" ,
"created_at": 1724744765 ,
"kind": 1 ,
"tags": [
[
"t",
"intel"
],
[
"t",
"clusterfuck"
],
[
"t",
"sgx"
],
[
"t",
"secureenclave"
],
[
"t",
"cpu"
],
[
"t",
"oops"
],
[
"proxy",
"https://exquisite.social/users/h3artbl33d/statuses/113032872930422875",
"activitypub"
]
],
"content": "Another day, another #Intel #clusterfuck 🎉\n\nResearchers managed to extract the SGX Fuse Key0 (AKA Root Provisioning Key). Together with the FK1 (AKA Root Sealing Key, which is also compromised), it represents the root of trust for SGX.\n\n#SGX #secureenclave #Intel #CPU #oops\n\nhttps://exquisite.social/system/media_attachments/files/113/032/870/733/667/131/original/e313e72cdd16f243.mp4" ,
"sig": "889b254c9cd63590e367bb8918688effa88b557a6aa862fd70c58bc14a84b0b06d27190f3b6a22da45af16dea651a280c203a375399b11eb225ca3853b253bc5"
}