What is Foreshadow, and How Can You Overcome this Vulnerability?

What is Foreshadow, and How Can You Overcome this Vulnerability? Earlier this month it was revealed that another vulnerability – the fourth – was discovered in Intel’s x86 chip architecture. Researchers in Belgium originally alerted I… Continue reading What is Foreshadow, and How Can You Overcome this Vulnerability?

Why is an HSM required to protect CA certificates (rather than a regular USB token)?

Typical USB tokens (Nitrokey, YubiKey…) allow an everyday user to store PGP keys and use them to encrypt email, harddrives and so on.

The same vendors also offer distinct products called HSMs (Nitrokey HSM, YubiHSM). The suggested use c… Continue reading Why is an HSM required to protect CA certificates (rather than a regular USB token)?

Is there some type of x-ray that can see through HSM or shielded integrated circuit?

I know that security-oriented products can easily protect their contents from even the most sensitive commercial x-rays, which can see objects at about 0.5µm. But let’s put cost limits aside (or imagine that we have State-level resources),… Continue reading Is there some type of x-ray that can see through HSM or shielded integrated circuit?

Where to put a code signing server with EV code signing certificate and plugged-in HSM

Microsoft recently started enforcing apps to be signed by EV code-signing certificates instead of just regular certificates. These usually come on an external device such as USB smart card or a HSM, where the private key is stored and can’… Continue reading Where to put a code signing server with EV code signing certificate and plugged-in HSM