What are the functional similarities and differences between TPM and SGX in trusted computing?

I know about the TPM (Trusted Platform Module). In recent years, more researchers start to develop on Intel SGX, which I do not have any experience with.

They are both crypto chips, but what are their functional similarities and differen… Continue reading What are the functional similarities and differences between TPM and SGX in trusted computing?

Is ransomware that threatens with publication and verifiably deletes upon payment possible?

Inspired by the article The future of Ransomware and its description of possible ransomware with verifiable key delivery, I wonder if the idea can be taken further into ransomware that credibly threatens publication unless a … Continue reading Is ransomware that threatens with publication and verifiably deletes upon payment possible?