mastodon.world is one of the many independent Mastodon servers you can use to participate in the fediverse.
Generic Mastodon server for anyone to use.

Server stats:

8.4K
active users

#confidentialcomputing

0 posts0 participants0 posts today
Paul Meyer<blockquote><p>CSPs MUST allow customer-provided virtual firmware (with a well-documented interface for achieving UEFI variable persistence and ACPI table information) OR publish the sources for their virtual firmware. </p></blockquote><p>Transparency has value by <span class="h-card" translate="no"><a href="https://tech.lgbt/@drdeeglaze" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>drdeeglaze</span></a></span> <br><a href="https://deeglaze.github.io/blog/2025/Transparency-has-value/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">deeglaze.github.io/blog/2025/T</span><span class="invisible">ransparency-has-value/</span></a></p><p><a href="https://infosec.exchange/tags/ConfidentialComputing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ConfidentialComputing</span></a> <a href="https://infosec.exchange/tags/Attestation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Attestation</span></a> <a href="https://infosec.exchange/tags/ReproducibleBuilds" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReproducibleBuilds</span></a></p>
Netzpalaver<p>Robert Specht ist Director of Channel-Sales bei Enclaive</p><p><a href="https://social.tchncs.de/tags/Channel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Channel</span></a> <a href="https://social.tchncs.de/tags/CloudComputing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CloudComputing</span></a> <a href="https://social.tchncs.de/tags/ConfidentialComputing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ConfidentialComputing</span></a> <a href="https://social.tchncs.de/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> @enclaive_io <a href="https://social.tchncs.de/tags/KIFirewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KIFirewall</span></a> <a href="https://social.tchncs.de/tags/Verschl%C3%BCsselung" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Verschlüsselung</span></a></p><p><a href="https://netzpalaver.de/2025/06/25/robert-specht-ist-director-of-channel-sales-bei-enclaive/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">netzpalaver.de/2025/06/25/robe</span><span class="invisible">rt-specht-ist-director-of-channel-sales-bei-enclaive/</span></a></p>
Confident Security<p>🛑 𝗜𝘁’𝘀 𝗻𝗲𝘃𝗲𝗿 𝘁𝗼𝗼 𝗹𝗮𝘁𝗲 𝘁𝗼 𝗴𝗼 𝗽𝗿𝗶𝘃𝗮𝘁𝗲—𝗵𝗲𝗿𝗲’𝘀 𝘄𝗵𝘆 “𝘂𝗻𝗹𝗲𝗮𝗿𝗻𝗶𝗻𝗴” 𝗳𝗮𝗹𝗹𝘀 𝘀𝗵𝗼𝗿𝘁</p><p>📉 Harvard/MIT: 91% of real-world models suffer data drift and need retraining anyway.<br>⚙️ UNC + DeepMind (2024): exact unlearning still needs several complete fine-tune passes per deletion—massive compute overhead.</p><p>Stack those two facts and every delete-request turns into an expensive, repetitive fire drill.</p><p>𝘉𝘦𝘵𝘵𝘦𝘳: keep sensitive data out of the weights from the start. 𝗖𝗢𝗡𝗙𝗦𝗘𝗖’s attested enclaves make prompts private on day one—no unlearning treadmill later.</p><p><a href="https://infosec.exchange/tags/PrivacyByDesign" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PrivacyByDesign</span></a> <a href="https://infosec.exchange/tags/DataDrift" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataDrift</span></a> <a href="https://infosec.exchange/tags/MachineUnlearning" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MachineUnlearning</span></a> <a href="https://infosec.exchange/tags/ConfidentialComputing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ConfidentialComputing</span></a></p>
2rZiKKbOU3nTafniR2qMMSE0gwZNew Tech Lets Even Old Devices Run Sensitive Tasks Without Risking Your Privacy ARM researchers have developed a framework that helps different people—who don’t trust each other—collaborate s...<br><br><a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/cybersecurity" target="_blank">#cybersecurity</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/confidential-computing" target="_blank">#confidential-computing</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/veracruz" target="_blank">#veracruz</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/icecap" target="_blank">#icecap</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/isolation-technologies" target="_blank">#isolation-technologies</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/software-fault-isolation" target="_blank">#software-fault-isolation</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/secure-runtimes" target="_blank">#secure-runtimes</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/privacy-preserving-computation" target="_blank">#privacy-preserving-computation</a><br><br><a href="https://hackernoon.com/new-tech-lets-even-old-devices-run-sensitive-tasks-without-risking-your-privacy?source=rss" rel="nofollow noopener" target="_blank">Origin</a> | <a href="https://awakari.com/sub-details.html?id=2rZiKKbOU3nTafniR2qMMSE0gwZ" rel="nofollow noopener" target="_blank">Interest</a> | <a href="https://awakari.com/pub-msg.html?id=28EA7mp52uctxjvDvv0DJ7gIC1Y&amp;interestId=2rZiKKbOU3nTafniR2qMMSE0gwZ" rel="nofollow noopener" target="_blank">Match</a>
2rZiKKbOU3nTafniR2qMMSE0gwZIceCap Turns Arm Devices Into Secure Compute Environments—No Extra Hardware Needed ARM researchers have developed a framework that helps different people—who don’t trust each other—collabor...<br><br><a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/cybersecurity" target="_blank">#cybersecurity</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/confidential-computing" target="_blank">#confidential-computing</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/veracruz" target="_blank">#veracruz</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/icecap" target="_blank">#icecap</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/isolation-technologies" target="_blank">#isolation-technologies</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/software-fault-isolation" target="_blank">#software-fault-isolation</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/secure-runtimes" target="_blank">#secure-runtimes</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/privacy-preserving-computation" target="_blank">#privacy-preserving-computation</a><br><br><a href="https://hackernoon.com/icecap-turns-arm-devices-into-secure-compute-environmentsno-extra-hardware-needed?source=rss" rel="nofollow noopener" target="_blank">Origin</a> | <a href="https://awakari.com/sub-details.html?id=2rZiKKbOU3nTafniR2qMMSE0gwZ" rel="nofollow noopener" target="_blank">Interest</a> | <a href="https://awakari.com/pub-msg.html?id=NfZO5YQtOeJtbLHpNN1ONBCrZb6&amp;interestId=2rZiKKbOU3nTafniR2qMMSE0gwZ" rel="nofollow noopener" target="_blank">Match</a>
2rZiKKbOU3nTafniR2qMMSE0gwZNew Study Backs Confidential Computing Despite Security Flaws ARM researchers have developed a framework that helps different people—who don’t trust each other—collaborate securely by using i...<br><br><a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/cybersecurity" target="_blank">#cybersecurity</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/confidential-computing" target="_blank">#confidential-computing</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/veracruz" target="_blank">#veracruz</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/icecap" target="_blank">#icecap</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/isolation-technologies" target="_blank">#isolation-technologies</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/software-fault-isolation" target="_blank">#software-fault-isolation</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/secure-runtimes" target="_blank">#secure-runtimes</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/privacy-preserving-computation" target="_blank">#privacy-preserving-computation</a><br><br><a href="https://hackernoon.com/new-study-backs-confidential-computing-despite-security-flaws?source=rss" rel="nofollow noopener" target="_blank">Origin</a> | <a href="https://awakari.com/sub-details.html?id=2rZiKKbOU3nTafniR2qMMSE0gwZ" rel="nofollow noopener" target="_blank">Interest</a> | <a href="https://awakari.com/pub-msg.html?id=CQ9XdybJuQoQxIhyOjQcQwE1WUa&amp;interestId=2rZiKKbOU3nTafniR2qMMSE0gwZ" rel="nofollow noopener" target="_blank">Match</a>