Is it possible to see the pubkeys that pair with private keys inside the TPM in Windows?

Is it possible to inspect data (pubkeys, domain names used for webauthn, not private keys) related to private keys stored in the TPM on Windows?

I legally own the hardware and have maximum permissions on my user account
I have the necessa… Continue reading Is it possible to see the pubkeys that pair with private keys inside the TPM in Windows?

How can an application, using Apple’s Secure Enclave on macOS or TPM on Windows, protect itself from other applications accessing its private keys?

I’m interested in using Apple’s Secure Enclave on macOS or TPM on Windows to protect cryptographic keys used by an application from being accessed by other applications running with the same or higher privileges. However, the documentation… Continue reading How can an application, using Apple’s Secure Enclave on macOS or TPM on Windows, protect itself from other applications accessing its private keys?

Google Cloud looks forward to confidential computing but eyes hardware changes

Google Cloud, AMD and Intel collaborated on a roundtable to discuss the past, present and future of confidential computing.
The post Google Cloud looks forward to confidential computing but eyes hardware changes appeared first on TechRepublic.
Continue reading Google Cloud looks forward to confidential computing but eyes hardware changes

How to distribute Android mobile app functionality between OS, Trusted Execution Environment (TEE) and Secure Element (SE)?

There are different scenarios when it’s about secure computation/storage on mobile devices, e.g., "REE only", "REE + TEE", or "REE + SE" or "REE + TEE + SE".
REE – Real Execution Environment, i.e. de… Continue reading How to distribute Android mobile app functionality between OS, Trusted Execution Environment (TEE) and Secure Element (SE)?

Practicality of outsourcing password hashing using enclaves

I’ve been pondering some potential cybersecurity applications for enclaves. One of them being the problem of password hashing.
Some clients have enclave support, meaning part of their CPU can securely execute code in an encrypted and authe… Continue reading Practicality of outsourcing password hashing using enclaves