Enarx 0.7.0 has been released with a series of new features, bug fixes and automation improvements.
Source: Enarx's Blog
Enarx 0.7.0 has been released with a series of new features, bug fixes and automation improvements.
Source: Enarx's Blog
There’s been a flurry of articles over the past few weeks about WebAssembly (often shortened to Wasm) and its future in cloud Computing. This may come as something of a surprise to those who know Wasm only in its initial incarnation, which was as a browser technology, or its second main use case, which is as a gaming technology. Both of these uses are flourishing, but there’s a third, which is as a server technology.
Source: Profian's Blog
Link: https://profian.com/predictions-for-powerful-webassembly-in-2023/
If you are keeping up with the latest technology in cloud computing-related security, you have probably seen that several Cloud Service Providers (CSPs) have announced “confidential VMs” as part of their Confidential Computing offering. So, what exactly is a confidential VM? How does this compare to Confidential Computing? And why are cloud providers offering this?
Source: Profian's Blog
Nathaniel McCallum, co-founder of the Enarx project, gave a talk about Enarx and Confidential Computing at the 10th edition of All Things Open. How do we unlock all of the potential of the cloud while decreasing the risks that are associated and the cost?
Source: Enarx's Blog
Link: https://blog.enarx.dev/unlocking-the-cloud-with-confidential-computing/
If you’re interested in Confidential Computing to encrypt data and applications in use, then you must be interested in attestation, because, without it, you’re not doing Confidential Computing right. Specifically, without attestation, you really don’t have the documented assurance you need to satisfy regulators (or your boss, for that matter) that you’ve done all you could to protect the sensitive data belonging to your organization, partners, citizens or customers. In this blog post, we will run through why attestation is a necessity for Confidential Computing, and make the argument that doing attestation remotely is the way to go for the highest level of security.
Source: Profian's Blog
Link: https://profian.com/remote-attestation-a-confidential-computing-best-practice-necessity/
Currently there are several WASI proposals that are being developed. The State of WebAssembly survey provides a comprehensive overview of the existing WASI proposals and which ones the community are most interested in. There is a lot of interest in I/O, sockets, filesystem, and threads. The Enarx project in particular is investing in advancing WASI support in the Rust language, and we have contributed upstream to sockets, threads, and crypto.
Source: Enarx's Blog
Support for WebAssembly (and WASI) is advancing well across all major programming languages. Assessing how well a language supports WebAssembly/WASI is important because it allows us to understand what's possible with wasmtime and Enarx.
Source: Enarx's Blog
If you agree that deploying to the untrusted cloud means that you cannot control access, this technical look at Confidential Computing is for you.
Source: Profian
Link: https://profian.com/white-paper/an-introduction-to-confidential-computing/
Confidential Computing is a leading-edge security technology that encrypts sensitive data in use in a public cloud, private cloud or on-premises. It completes the data security triangle since data at rest (in storage) and in transit (across networks) is routinely encrypted.
Source: Profian's Blog
Learn more about the important characteristics of Privacy-enhancing technologies and how they differ from Confidential Computing.
Source: Profian
Link: https://profian.com/white-paper/pets-and-confidential-computing-compared/