npub1al…7rg94 on Nostr: Don't overestimate proprietary Trusted Execution Environments. We might never know ...
Don't overestimate proprietary Trusted Execution Environments. We might never know for sure whether they are another sophisticated NSA honeypots or not. Issues have already been found in them; Nvidia is not excluded.
Not that I'm against these technologies, but I'd like to see more solutions based on something open and independently verifiable as well.
If it's not something identical to hardware TEE solutions, then at least there's a not-yet-well-known Linux syscall `memfd_secret`, which is basically a way to allocate private RAM regions that are, to some degree, isolated even from the kernel (pages with these regions won't be swapped to disk, core dumps won't include this memory, etc.).
It's a limited solution. It's not for GPUs. However, it's open and independent from any particular vendor.
Originally it was designed for cryptography. Useful for NIP-46 signers and CPU-only ML models for example.
https://www.man7.org/linux/man-pages/man2/memfd_secret.2.html#NOTES Today we're excited to release our first confidential compute (TEE) models on PPQ! These models verifiably show that neither we (PPQ) nor our AI provider can see the content of your queries.
This is a big step towards user privacy and dignity in the AI age.
#privacy #linux #TEE
Published at
2026-03-08 15:08:04 CETEvent JSON
{
"id": "00f28b871bfa53aae2be89ad95fe9b1afb3c2654382ca5d53ac5e639a2b3107b",
"pubkey": "efc2b6e59480f0e55cc87c69af06b6d1a11fa25e4ea95a439878c41799c53c19",
"created_at": 1772978884,
"kind": 1,
"tags": [
[
"t",
"privacy"
],
[
"t",
"linux"
],
[
"t",
"TEE"
],
[
"L",
"ISO-639-1"
],
[
"l",
"en",
"ISO-639-1"
],
[
"nonce",
"287",
"7"
]
],
"content": "Don't overestimate proprietary Trusted Execution Environments. We might never know for sure whether they are another sophisticated NSA honeypots or not. Issues have already been found in them; Nvidia is not excluded.\n\nNot that I'm against these technologies, but I'd like to see more solutions based on something open and independently verifiable as well.\n\nIf it's not something identical to hardware TEE solutions, then at least there's a not-yet-well-known Linux syscall `memfd_secret`, which is basically a way to allocate private RAM regions that are, to some degree, isolated even from the kernel (pages with these regions won't be swapped to disk, core dumps won't include this memory, etc.).\n\nIt's a limited solution. It's not for GPUs. However, it's open and independent from any particular vendor.\n\nOriginally it was designed for cryptography. Useful for NIP-46 signers and CPU-only ML models for example.\n\nhttps://www.man7.org/linux/man-pages/man2/memfd_secret.2.html#NOTES\n\nnostr:nevent1qqsgtwf2jhn02u36aepl3pjd7386wvz7alqtjdu9flyzfhs4vkc0ewgpzemhxue69uhhyetvv9ujuurjd9kkzmpwdejhgqgdwaehxw309ahx7uewd3hkcqg5waehxw309aex2mrp0yhxgctdw4eju6t0qgsdy27dk8f9qk7qvrm94pkdtus9xtk970jpcp4w48k6cw0khfm06msuzuenx\n\n#privacy #linux #TEE\n",
"sig": "2e22a3dc1520f24323d4939b677053ac30aeaa643be9fba767ec2bc87e8f53e3bba4ca4bd0d8d6a8d8167aa4a1d93b60753d54ddc30e76fdea402f9b480c7e89"
}