Indeed! I was very close to writing a whole bit about TEEs, enclaves, and PUFs in my last comment, but I figured that it also boils down to “just don’t give it permission” so I left it out. I actually think designing secure hardware is incredibly interesting and there will probably be an increase in demand for secure computing environments and data provenance in the near future.
Indeed! I was very close to writing a whole bit about TEEs, enclaves, and PUFs in my last comment, but I figured that it also boils down to “just don’t give it permission” so I left it out. I actually think designing secure hardware is incredibly interesting and there will probably be an increase in demand for secure computing environments and data provenance in the near future.