- Local time
- 6:06 PM
- Posts
- 721
- OS
- WinDOS 23H2
It's quite ironic to say the least: all this modern features being implemented as a new standard for improved security - while latter on - the same features turn-up to be a the ones which make it vulnerable. As was the case with Intel SGX (Software Guard Extensions) - or maybe it would be more accurate to call it Intel Swiss Cheese - since it's filled with holes...
arstechnica.com
...and their number is piling up....
www.theregister.com
And now... it's TPM 2.0 turn - which for Windows 11 is even an oficial requirement:
www.bleepingcomputer.com
....

SGX, Intel’s supposedly impregnable data fortress, has been breached yet again
ÆPIC Leak spills users’ most sensitive secrets in seconds from SGX enclaves.

...and their number is piling up....

Intel issues patches for SGX vulnerabilities
Plus bugs squashed in Server Platform Services and more
And now... it's TPM 2.0 turn - which for Windows 11 is even an oficial requirement:

New TPM 2.0 flaws could let hackers steal cryptographic keys
The Trusted Platform Module (TPM) 2.0 specification is affected by two buffer overflow vulnerabilities that could allow attackers to access or overwrite sensitive data, such as cryptographic keys.
....

My Computer
System One
-
- OS
- WinDOS 23H2
- Computer type
- Laptop
- CPU
- Intel & AMD
- Memory
- SO-DIMM SK Hynix 15.8 GB Dual-Channel DDR4-2666 (2 x 8 GB) 1329MHz (19-19-19-43)
- Graphics Card(s)
- nVidia RTX 2060 6GB Mobile GPU (TU106M)
- Sound Card
- Onbord Realtek ALC1220
- Screen Resolution
- 1920 x 1080
- Hard Drives
- 1x Samsung PM981 NVMe PCIe M.2 512GB / 1x Seagate Expansion ST1000LM035 1TB