Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

After skimming through the documentation this seems like a nice solution, but I'm not sure if this is a problem we want to solve.

Consumers are finding out the issue with cloud computing when their heating system can't turn on because Cloudflare is down. A cheaper and more reliable solution is still on-premises computing.

Large social network and content platforms don't have any incentive to keep your data safe because they want to monitor and own everything.

Maybe this is for something like a government running a public service?



> I'm not sure if this is a problem we want to solve

Who is this we you speak of?

I for one much prefer my cloud services and would love TEE I can control.

> A cheaper and more reliable solution is still on-premises computing.

I assure you that my use of Cloudflare services ($0 in nearly 10 years) is much more reliable and much cheaper than hardware I run.


I was genuinely asking, what cloud service do you use where trusted computing is essential for the core functionality of that service? What elements of the computational process do you not trust those services to perform for you?

My point about Cloudflare was more about them taking down essential services that could run just as well on-premises like a heating controller.


For a while I was running LLMs in secure enclaves on AWS so I could do E2E encryption. Privacy without having to run a local LLM.


i want good confidential compute for cases where e2ee is impractical, like an email server or immich with server-side ml/processing etc


Who are you protecting data access from in those cases? My suggestion was that it's probably more practical to run those kinds of solutions on a hardware stack you trust; in our basement or in a small box on the wall in your living room.

Besides, the specific extension we're talking about protect registers and computation and not shared memory.


Issue is, unless you can be 100% sure you hardware has not been built with a vulnerability or backdoor, or subject to an evil maid attack....then you can't be sure its trustworthy.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: