ktemkin has quit [Ping timeout: 258 seconds]
devanagram has quit [Ping timeout: 258 seconds]
devanagram has joined #glasgow
ktemkin has joined #glasgow
englishm has quit [Ping timeout: 258 seconds]
englishm has joined #glasgow
thaytan has quit [Ping timeout: 245 seconds]
thaytan has joined #glasgow
<
ar>
i kind of hoped for amd to unlock memory encryption on consumer chips; right now it's locked to epyc, tr, and ryzen pro (aka unobtainium)
Jasjar has quit [Ping timeout: 245 seconds]
Jasjar has joined #glasgow
sorear_ has joined #glasgow
__blasty1 has joined #glasgow
sorear has quit [*.net *.split]
xorrbit has quit [*.net *.split]
__blasty_ has quit [*.net *.split]
sorear_ is now known as sorear
xorrbit has joined #glasgow
Jasjar has quit [Ping timeout: 245 seconds]
Jasjar_ has joined #glasgow
<
ktemkin>
their memory encryption stuff is interesting; it has a similar "wait, how do I actually
*use* this in secure way?" to Intel's SGX
<
ktemkin>
*in a secure way
<
ktemkin>
it was neat when I last had a chance to play with it; and just as vulnerable to blinded random block corruption attacks as ever~
__blasty1 is now known as ___blasty
m4ssi has joined #glasgow
vup has quit [Ping timeout: 258 seconds]
vup has joined #glasgow
electronic_eel has quit [Ping timeout: 245 seconds]
electronic_eel has joined #glasgow
uovo has quit [Read error: Connection reset by peer]
uovo has joined #glasgow
<
whitequark>
intel uses aes-xts which is apparently used for non-malleable disk encryption primarily
<
whitequark>
i don't understand how is that possible at all
<
Hellsenberg>
did I read intel
<
Hellsenberg>
oh no, cursed things
uovo has quit [Read error: Connection reset by peer]
uovo has joined #glasgow
Sellerie has joined #glasgow
m4ssi has quit [Remote host closed the connection]
electronic_eel_ has joined #glasgow
electronic_eel has quit [Ping timeout: 245 seconds]
electronic_eel_ has quit [Ping timeout: 272 seconds]
electronic_eel has joined #glasgow