AnswerBun.com

What are the concerns, or drawbacks, regarding Intel's SGX when it comes to privacy?

Information Security Asked by Aventinus on November 4, 2020

I was in a workshop about privacy recently and at some point, a passionate debate started about Intel’s Software Guard Extensions (SGX). Although I have a security background (Master in Information Security), I find it very difficult to understand exactly how SGX works. But I understand that it is an alternative to homomorphic encryption, since it can process data securely way faster than homomorphic encryption does.

At that workshop some people made the argument that there are no guarantees about privacy when it comes to SGX and that, by using SGX, you basically have to consider Intel a trusted third party.

My question is: What are the concerns, or drawbacks, regarding Intel’s SGX when it comes to privacy?

One Answer

Intel SGX does not really replace homomorphic encryption. It is designed to protect from compromise of one of the communicating computers by verifying, that the other computer runs the correct, unmodified software and that any data the SW saves can be only read by the unmodified software. You have to trust Intel to achieve this. This can be used to for example make sure, that self-destructing messages are really deleted by the other party in communication. Signal wants to use it to confirm they don't keep user metadata and contact list.

On the other hand, to protect the data, you can still add your own encryption as an inner layer, whether in transport or at rest.

As for privacy and trust in Intel, this is a moot point considering the Intel Managment Engine is effectively a backdoor into your computer black box with full access to your computer, that can not be fully removed or disabled.

Answered by Peter Harmann on November 4, 2020

Add your own answers!

Related Questions

What’s a “safe” URL shortening algorithm?

3  Asked on December 31, 2020 by bensower

   

Securing internet connection with hostile ISP

1  Asked on December 29, 2020 by user242761

       

Is Chrome Browser/ Computer compromised by KMSPico?

0  Asked on December 27, 2020 by waterbyte

         

Web Cache Deception – exploitable without a cache server?

1  Asked on December 26, 2020 by citylight

 

Determine if private key belongs to certificate?

3  Asked on December 25, 2020 by thanatos

     

Filtering http responses for subdomain takeover

0  Asked on December 21, 2020 by kirill-z

 

Sql map Manual Vulnerability Assessment

1  Asked on December 20, 2020 by badddy

         

Unknown folders in OneDrive

1  Asked on December 19, 2020 by user851

     

Ask a Question

Get help from others!

© 2023 AnswerBun.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP