Language Selection

English French German Italian Portuguese Spanish

Late Coverage of Confidential Computing Consortium

Filed under
Linux
OSS
  • Microsoft Partners With Google, Intel, And Others To Form Data Protection Consortium

    The software maker joined Google Cloud, Intel, IBM, Alibaba, Arm, Baidu, Red Hat, Swisscom, and Tencent to establish the Confidential Computing Consortium, a group committed to providing better private data protection, promoting the use of confidential computing, and advancing open source standards among members of the technology community.

  • #OSSUMMIT: Confidential Computing Consortium Takes Shape to Enable Secure Collaboration

    At the Open Source Summit in San Diego, California on August 21, the Linux Foundation announced the formation of the Confidential Computing Consortium. Confidential computing is an approach using encrypted data that enables organizations to share and collaborate, while still maintaining privacy. Among the initial backers of the effort are Alibaba, Arm, Baidu, Google Cloud, IBM, Intel, Microsoft, Red Hat, Swisscom and Tencent.

    “The context of confidential computing is that we can actually use the data encrypted while programs are working on it,” John Gossman, distinguished engineer at Microsoft, said during a keynote presentation announcing the new effort.

    Initially there are three projects that are part of the Confidential Computing Consortium, with an expectation that more will be added over time. Microsoft has contributed its Open Enclave SDK, Red Hat is contributing the Enarx project for Trusted Execution Environments and Intel is contributing its Software Guard Extensions (SGX) software development kit.

    Lorie Wigle, general manager, platform security product management at Intel, explained that Intel has had a capability built into some of its processors called software guard which essentially provides a hardware-based capability for protecting an area of memory.

More in Tux Machines

Android Leftovers

cmus – free terminal-based audio player

It took me a few years to appreciate console-based software. Repairing a broken system using the ubiquitous vi text editor was a turning point in my Linux journey. Now I spend a lot of time at the terminal, and listening to music. Best combine the two! When it comes to console-based music software, I really admire musikcube, a wonderful audio engine, library, player and server written in C++. This review looks at an alternative to musikcube. It’s called cmus. It shares many similarities with musikcube. Both are designed to run on a text-only user interface, reducing the resources required to run the application. cmus is written in C. Read more Also: Rclone Browser Fork With Fixes And Enhancements

Android Leftovers

GNU Linux-libre 5.3-gnu

GNU Linux-libre 5.3-gnu sources and tarballs are now available at
<http://www.fsfla.org/selibre/linux-libre/download/releases/5.3-gnu/>.
It didn't require any deblobbing changes since -rc7-gnu, the first
published rc-gnu.  Freesh binaries are already available!, thanks to
Jason Self; others are on the way.


Besides recognizing new false positives (sequences that our blob hunter
would report as suspicious, but that are neither blobs nor requests for
blobs), updating the deblobbing scripts for 5.3 required adjusting
cleaned up drivers for updated blob names, recognizing one new Free
piece of firmware with binary and corresponding sources embedded in the
kernel sources, and disabling blob loading introduced in a few drivers:
QCOM, DRM (HDCP), Allegro-DVT, and Meson-VDEC.

This last one was particularly disappointing: the firmware sources were
supposed to be available from LibreELEC, and though the link to the
alleged sources there is broken, I managed to find the "source" repo
containing them, only to find out the "source" was just a binary blob
encoded in C as an array of char, just like Linux used to do back when I
got involved with Linux-libre.  Oh well...  Request disabled...

If anyone can find Freely-licensed actual source code for that, or for
any other file whose loading we disable, please let us know, so that we
can refrain from disabling its loading.


For up-to-the-minute news, join us on #linux-libre of irc.gnu.org
(Freenode), or follow me (@lxoliva) on Twister <http://twister.net.co/>,
Secure Scuttlebutt, GNU social at social.libreplanet.org, Diaspora* at
pod.libreplanetbr.org or pump.io at identi.ca.  Check my web page (link
in the signature) for direct links.


Be Free! with GNU Linux-libre.
Read more Also: GNU Linux-Libre 5.3 Kernel Arrives for Those Seeking 100% Freedom for Their PCs GNU Linux-libre 5.3 Continues Deblobbing & Dealing With Firmware Trickery