Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Ent-to-end encrypted means that the other end (Apple/NSA) has access to it.


Imagine the memory on their server is encrypted with an on-processor key (something like intel SGX) -- reading OS memory, e.g dumping from linux or hardware, you can't read it unless you somehow extract the key (which are different on each chip) from the physical chip. Now, the process running using that encrypted memory generates TLS keys for you to send the data, and operates on it only inside this secure enclave.

There is no way to access it without destroying the chip, and even in this scenario it will be extremely expensive and imo unlikely, certainly impossible at scale. Some scientists may be able to do it once in a lab.


BTW there is an entire industry popping up around exactly this sort of use case, it's called 'confidential computing' and CNCF have some software in the works (confidential containers iirc). I'm pretty excited to see what risc-v is going to bring to the party enclave wise.


Ok, I'm imagining.

Now, is any of that actually true?



It does need to process the data. The server has no persistent storage and no remote shell. It is a limited and locked down special-purpose iOS.


Maybe, maybe not. I would like to purchase one of those servers and put it in my rack, so I can monitor all network traffic. Is that an option?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: