Tim Mahoney
(replying to Saagar Jha)
@saagar what stuff did you read? I haven’t looked into it, but I’m super interested in what it can be used for.
Tim Mahoney
(replying to Saagar Jha)
@saagar so you’re saying that since Apple controls the hardware, Apple could potentially violate the privacy guarantees in a way that isn’t verfiable/visible externally?
1 replies
Tim Mahoney
(replying to Saagar Jha)
So even if the software guarantees/attestation/etc remain secure, some sort of hardware change could compromise the system?
I find it hard to believe that a vulnerability like that would be overlooked. I guess I assume the flow would also include hardware attestation.
Or is it something else I’m missing?
Saagar Jha
(replying to Tim Mahoney)
1 replies
Tim Mahoney
(replying to Saagar Jha)
@saagar overlooked by Apple. Unless the insinuation is that Apple purposefully left a vulnerability, which I’d find hard to believe.
You’re saying some sort of physical attachment to the hardware? I’m out of my area of expertise here, so I’m not sure what’s actually possible.
Saagar Jha
(replying to Tim Mahoney)
1 replies
Ben!
(replying to Saagar Jha)
“Our threat model for Private Cloud Compute includes an attacker with physical access to a compute node and a high level of sophistication — that is, an attacker who has the resources and expertise to subvert some of the hardware security properties of the system and potentially extract data that is being actively processed by a compute node.”
Saagar Jha
(replying to Ben!)
Saagar Jha
(replying to Saagar Jha)
Saagar Jha
(replying to Saagar Jha)
Saagar Jha
(replying to Saagar Jha)
Saagar Jha
(replying to Saagar Jha)
Tim Mahoney
(replying to Saagar Jha)
@saagar I believe they’re saying they _can’t_ do the same thing, but I might be wrong.
Saagar Jha
(replying to Tim Mahoney)
Saagar Jha
(replying to Saagar Jha)
Tim Mahoney
(replying to Saagar Jha)
@saagar That’s a good question. You’d hope that this whole system was provably secure even if someone has access to all the hardware, software, everything. I guess we’ll see as more information comes out.
Saagar Jha
(replying to Tim Mahoney)
2 replies
Tim Mahoney
(replying to Saagar Jha)
@saagar from what I gather, part of the hard problem here is running the code in an environment that is protected from peeking at the data even while the execution is in progress. Basically like Intel SGX, but not compromised.
The write up mentions the Secure Enclave. Maybe Apple figured it out?
Mark Pauley
(replying to Tim Mahoney)
@_tim______ @saagar I am assuming that if you cannot cryptographically guarantee the actual topology of the hardware it’s running on then you can never be 100% secure if Alice can’t even trust Bob. Maybe with homomorphic encryption?
Light
(replying to Mark Pauley)
@unsaturated @_tim______ @saagar
>Maybe with homomorphic encryption?
That's what I assumed was being talked about at first.
Mark Pauley
(replying to Light)
@light @_tim______ @saagar I’ve heard HE basically doesn’t work :tiredcat:
Dominic Hopton
(replying to Saagar Jha)
@saagar @_tim______ in many ways this whole space is riddled with ‘no liquids’ security theater. You only need *one* person to get through the ‘perimeter’ with a ‘magic dongle’ that reads stuff off the side of the rack. Or *one* person to open a gap. If you don’t get it through the first 10,000 times, it’s OK. But that 10,001th time…
Tim Mahoney
(replying to Tim Mahoney)
@saagar if any of my code or PR comments are involved, do you think the lawyers will enjoy my jokes?