Public cloud services employ special security technologies. Computer scientists at ETH Zurich have now discovered a gap in the latest security mechanisms used by AMD and Intel chips. This affects major cloud providers.
(Updated: )
An architecture that gives users full control of their smartphones
Do users have complete control over their smartphone? Apple and Google cite technical reasons to control what users, developers, and governments can do on phones. We are building Sovereign Smartphones to address this. external page TechXplore Article
An international research team whose members include an ETH Zurich professor has revealed a vulnerability in the security architecture of Intel processors. Until July, Microsoft and Google products were also affected.
Recent Publications
WeSee: Using Malicious #VC Interrupts to Break AMD SEV-SNP