Skip to content

Conversation

@renuchauhan221
Copy link
Contributor

@riaankleinhans CCC_Meeting_Artifacts_2025-11-13

Attestation key extraction vulnerability could require tying attestations to specific machines/platforms, which Mike strongly opposed as a "hugely retrograde step"


The committee acknowledged that who should provide attestation remains a major unsolved problem for confidential computing.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't think we said that. Does anyone have notes / review recording to provide a better synopsis or can verify this was correct?
I think the open is more nuanced.. it's how to assess attestation in context of other factors/claims.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants