Over the past few years, hardware manufacturers have developed technologies that ought to make it possible for companies and governmental organizations to process sensitive data securely using shared cloud computing resources. Known as confidential computing, this approach protects sensitive data while it is being processed by isolating it in an area that is impenetrable to other users and even to the cloud provider. But computer scientists at ETH Zurich have now proven that it is possible for hackers to gain access to these systems and to the data stored in them.
Computer scientists discover gap in the latest security mechanisms used by some chips
Tech News
-
Free Dark Web Monitoring Stamps the $17 Million Credentials Markets
-
Smart buildings: What happens to our free will when tech makes choices for us?
-
Screenshots have generated new forms of storytelling, from Twitter fan fiction to desktop film
-
Darknet markets generate millions in revenue selling stolen personal data, supply chain study finds
-
Privacy violations undermine the trustworthiness of the Tim Hortons brand
-
Why Tesla’s Autopilot crashes spurred the feds to investigate driver-assist technologies – and what that means for the future of self-driving cars