mjg59,
@mjg59@nondeterministic.computer avatar

@rzeta0 Cryptography doesn't remove side channels - if you keep the secrets in a TPM but it doesn't use constant time operations, or if I'm able to monitor the power rails, that's not an absolute barrier. Very little is absolute - the level of security appropriate for a given problem will vary depending on what your threat model is, and I'm broadly ok with having my WebAuthn secrets in a separate VM running on the same CPU

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • DreamBathrooms
  • everett
  • ngwrru68w68
  • magazineikmin
  • rosin
  • Youngstown
  • slotface
  • InstantRegret
  • Durango
  • ethstaker
  • kavyap
  • cisconetworking
  • thenastyranch
  • osvaldo12
  • JUstTest
  • tacticalgear
  • khanakhh
  • mdbf
  • Leos
  • normalnudes
  • modclub
  • GTA5RPClips
  • cubers
  • tester
  • megavids
  • provamag3
  • anitta
  • lostlight
  • All magazines