- From: betuldurak via GitHub <sysbot+gh@w3.org>
- Date: Mon, 28 Mar 2022 03:43:02 +0000
- To: public-patcg@w3.org
Thanks @marianapr for such a good idea and @ajknox for suggesting a hands-on engineer from decentriq which is a good call. I believe we may use two sessions: one on the capabilities of TEEs (to make us familiar) and the other is on security vulnerabilities/guarantees (to address some of the concerns raised about this specific technologies). It would be great if we could bring an academic who worked on the side-channel analysis and attacks and who is also engaged with [BlackHat ](https://www.blackhat.com/) and [DefCon](https://defcon.org/) community -where real stuff happens-. I don't work in that domain, but was pointed out that [Yuval Yarom ](https://cs.adelaide.edu.au/~yval/) or [Daniel Gruss](https://gruss.cc/) would be valuable guests to talk about their attacks on TEEs to give us perspective. For MPC, I support Nigel or Boneh's invitation. Given that it would be difficult to fetch academics in a short notice, probably we can discuss about these invitations in the upcoming meeting. -- GitHub Notification of comment by betuldurak Please view or discuss this issue at https://github.com/patcg/meetings/issues/39#issuecomment-1080148964 using your GitHub account -- Sent via github-notify-ml as configured in https://github.com/w3c/github-notify-ml-config
Received on Monday, 28 March 2022 03:43:03 UTC