Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Yeah that's a good point, I don't call that confidential compute though it's a different use case.

CoCo = protecting consumer data from the industry. DRM = protecting industry bullshit from the consumer.

TBF my understanding is that in the DRM usecases they achieve actual security by squeezing the TCB into a single die. And I think if anyone tries, they generally still always get pwned by physical attackers even though it's supposedly in scope for the threat model.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: