iExec will be supporting Intel SGX (Secure Enclave) promising to allow for private software execution in the decentralized cloud
iexec·@dana-edwards·
0.000 HBDiExec will be supporting Intel SGX (Secure Enclave) promising to allow for private software execution in the decentralized cloud
The adoption of Intel SGX in my opinion offers a major competitive advantage over all other similar attempts in it's class to the iExec platform. Golem will not have this capability for quite a while and the only other platform which will have privacy of this nature is Enigma. The benefit of hardware privacy at the CPU level --- The benefit of this level of privacy is that you get the most bang for your buck. In other words you get the most potential privacy for the cheapest cost in terms of implementation, performance, and other measures. The benefits of using Intel SGX in my opinion far outweigh the risks. There of course has been the exposure of Intel CPUs being vulnerable to [Meltdown and Spectre](https://www.trendmicro.com/vinfo/us/security/news/vulnerabilities-and-exploits/meltdown-and-spectre-intel-processor-vulnerabilities-what-you-need-to-know). These risks must be considered and because of this we can say Intel does not have the greatest track record currently. The vulnerabilities are based on a technique called "speculative execution" which by it's very name sounds in my opinion ridiculous. > Intel processors built since 1995 are reportedly affected by Meltdown, while Spectre affects devices running on Intel, AMD, and ARM processors. Meltdown is related to the way privileges can be escalated, while Spectre entails access to sensitive data that may be stored on the application’s memory space. So how does this impact Intel SGX? ---- Intel SGX is vulnerable to Spectre and an attack has been [demonstrated as successful](https://github.com/lsds/spectre-attack-sgx) in code. For this reason, it may be the case that Intel SGX is not sufficiently secure for all use cases. This could give the Enigma Protocol an edge over iExec in the fact that Enigma will provide the option to take security to a level beyond the limits of Intel SGX by using the SHE (somewhat homomorphic encryption) scheme they mention in the Enigma Whitepaper. This [quote](https://idfusionllc.com/2018/01/25/sgx-after-spectre-and-meltdown-status-analysis-and-remediations/) in particular should be deeply understood: > The most important security finding currently available is that there is no credible engineering rationale to support the contention that SGX enclaves will provide confidentiality guarantees in the face of these new micro-architectural cache probing attacks. This is disappointing for a technology that was designed to provide security guarantees in the face of an IAGO threat model or in the previously described service provider models. In summary: - Current Intel SGX offers limited security and cannot guarantee privacy due to the exploit/backdoor micro-architectural cache probing attacks. - Future Intel SGX may offer fixes to this which could make it secure but can we trust Intel? This is the variable which in my opinion creates the majority of the risk for using future iterations of Secure Enclave. - While Secure Enclave is a promising idea in theory the implementation which currently exists on the market is for sure vulnerable and should not be trusted. This means Enigma and iExec both are going to be vulnerable to whatever issues exist with Intel architectures and in my opinion both teams must seek to control the risks involved by offering additional security and privacy guarantees. At minimum, new hardware will likely need to be created and for this reason current expectations of privacy must realistically be low for either iExec or Enigma data in the early days until this gets resolved. Conclusion --- I'm still quite content with the progress being made by iExec. The Team is working to provide decentralized computation capabilities for decentralized apps. That said, I am not satisfied with Secure Enclave simply because it doesn't currently work to achieve confidentiality for data in motion based on the listed vulnerabilities discussed above. This means iExec will have to invest additional resources and conduct additional research to improve upon the security guarantees they try to achieve with Intel SGX. References --- 1. https://medium.com/iex-ec/iexec-dev-letter-14-intel-sgx-security-and-r-14-feb-2018-544d87e28869 2. https://www.trendmicro.com/vinfo/us/security/news/vulnerabilities-and-exploits/meltdown-and-spectre-intel-processor-vulnerabilities-what-you-need-to-know 3. https://idfusionllc.com/2018/01/25/sgx-after-spectre-and-meltdown-status-analysis-and-remediations/
👍 scarletsnow, bagindooo, jamjamfood, nomadnessie, vasilisapor2, thisisethanlau, fractal-team, markzuckerbergs, bella89n, josmirve, iamhuascar, lebekons, kouba01, zeroseven, photography-2018, bobbyboe, whynot, boomshikha, mammasitta, samwicallis, rynow, akomoajong, revan746, dana-edwards, st3llar, stranniksenya, nanzo-scoop, kontora, gamefiles, blockchainevo, team-leibniz, mtx, tilikum, mummyimperfect, ak2020, mafeeva, rasel11, daio, carpe-diem14, gotgame, bitcoinandcoffee, steemit-2018, bravenewcoin, jens84, chitty, profitgenerator, bjt34, timeall, teammo, nubchai, michaelwilshaw, bcc, safrims, behlulizana, razpor, topzone, kauslevi, jkkim, fooblic, kevinwong, truthtellerhere, sparklez, benilda, arconite, seanlloyd, gikitiki, cutagus, frikitiki, jed78, tokyodude, manyasli, incomemonthly, mrwalt, g-dubs, habeebability, ardiansptra, aaqibrasheed, himusuvo, teamhumble, purohumor, johnosaretin, kyusho, omar14x, janusface, dbukyo, igider, iwanderela, badzkie123, ceramixer, winsportsbet, khadimhussain, miraj, andyliotta, gabrielarbie10, ruwanulhasan, mahabub007, kaanhan, bestnazmul2, sachiewerk, floprime, roshnabkt, heboh, oba009, rondoncr, aansyuhada, askari, mohdtahir121, ikramellahi, andreea290, syahrullah, crypto.journo, kassu, durianwalker, tradewolf, yanidj, vksri, chesteer, lukakorba, sexy-girls3d, bitland, bidseption, sptelevision2018, hendysaputra, z3ll, maliksajad, tamimh100, stepnoysuslik, veraschu, elena1987, sajeebkabir, eliorojas, leslierevales, syfulcomet, zumerret, samdman, pias52, kenn24, bargolis, kashi-ahmed123, kondor1030, mycryptoverse, technicalbero, abhishekjanu, bdkazi, solascriptura, rightscomet, gokulpanta, cryptowani, jiashin, chrone, serguvan, mohamed10, husamia, rizwanmobile, omar10, mobaraksunny, mohamed59, saif10, vikwaitforittor, andisantos, mariaputri17, kasimsyah, ecsmayil, toddjsmith1979, foued, wayniac30, mdbasar, c0ff33a, shihab33, superstar2018, gtrplayer, amitsharma, dave76, cool-sergey, funt33, xrileyxquinnx, masqurade, sohailahmed, syedumair, anupupadhaya, julybrave, raton0119, shirish5, lukecreed, legin, attaulwahid, floxycool, redouanemez, whd, macbaren, burhanahmad, d-pend, aqeelahmed18k, onlinebangla, leader1971, btcsam, ayesharehman, jacksartori, haziqali, steem-samiam, szokerobert, andrea97, hasnaatali, dabeerhussain, victoria1112, moosaraza, randystiefer, blue.panda, azadaarhussain, florinsbalan, mazharkhan, rehan12, joel1220, ranayasir, amir10, imran.mahmudul, kona9918, zahidnaveed, aliraza22, lee.daniel, atloscomics, azeemjutt, mohamed118b, zenifar, ahsanjavaid, faiqyousafzai, akramkambooh, akhtarusman, bittrex12, alijavaid7, alisattar, angelina-jolie, shehlaraza, hamidaansary, valtiro, amadwaseem, shoaibmalik, munazashakeel, ankavatar, rahilamajid, crescendoofpeace, shammabilal12, amanat1993, bilalahmad12, lowlylutfur, haleemaslam, amirarif, tengkuaceh, shahidibrahim, foziajutt, ahmadtahir, shahbazkhokhar, rina77, faizamughal, streetsmart, ahmedjutt, ultraspace, jawadali12, mahnoormughal, saimamalik, afzalmalik, hrovat66, waleedmughal, bitcoinearnn, callmefib3r, otong17, michaelmorcos, senseibabs, katteasis, logan9852, noc, sjomeath, happypeople, steemit-bot, herryazmi11, samotonakatoshi, yazanstorm, mstfdmn, e-troubled, criptokingko, muhammadhabibie, thetargaryen, rndness222, zedikaredirect, anlewshin, hatu, starchy, slausonboy, tellmestory, shafiq742347, popeyesaba, jjprac, mctursh, shaharyarbaig, joao-cacador, olesh, steembackfree, roynerperez, ericjordan, kaizenokami, spawn09, eljuans, xxxpron, cauac, machnbirdsparo, rny, timclore, molikhatun, tuckerjtruman, sagor24, zzdenis, hasan086, andrewclk, zouxx, carterx7, cryptofixer, jonnyla08, maryhansen, arthurwatson, yusfriadi, robertthomas, totyahmed731993, iamthegray, hardhouse, marinesp, angrysage, shahedadib, pinkayesh, mitthradiumn, steemit-earn, thethreehugs, robpyne, lexiconical, steemionaire, dillip, motlhamme, fatkat, ashikrahman, mohikbal, learnguitar, daussteem, walkinharmony, wahabali, zawilq, suraiyaakther, raimundolm, steemitblog12, unfixable, thrinadh, googlenews, vipins, piratemonki, chetanpadliya, dante01, muhammadrizki01, onegin, will12, helamia, joyrozario, aahsann, donyanyo, aidenpearce, gabrielchm, rozario, rizkiadi, iin, rogerek, rahad, princecom, hossam20696, phototaker, spinladen, kral789, swssmarketing, luisitonews, sohailharoon, coin-market, utpoldebnath, crypto-money, amirjaved, realsteemian, edrivegom, lawlees, abuzar1, hasse72, cryptotax,