Loading...
Loading...
Browse all stories on DeepNewz
VisitWhich alternative secure computation method will see the highest adoption by August 31, 2025 in response to SGX compromise?
Multi-Party Computation (MPC) • 25%
Fully Homomorphic Encryption (FHE) • 25%
Zero-Knowledge (ZK) proofs • 25%
Other • 25%
Industry reports, official announcements from tech companies, or academic publications
Intel SGX Root Key Compromised, Raising Trusted Execution Environment Security Concerns
Aug 26, 2024, 07:07 PM
Intel's Software Guard Extensions (SGX) root key has been compromised, raising significant security concerns about the SGX platform and other Trusted Execution Environment (TEE) platforms that rely on it. The SGX Fuse Key0, also known as the Root Provisioning Key, along with the Root Sealing Key, has been extracted from a genuine Intel CPU. This breach highlights the vulnerability of hardware-based encryption and the flawed trust models inherent in such systems. The complexity of Intel hardware is cited as a factor in the security issues. Experts suggest exploring alternative secure computation methods, such as Multi-Party Computation (MPC), Fully Homomorphic Encryption (FHE), and Zero-Knowledge (ZK) proofs. The compromise of SGX affects various applications, including those in the cryptocurrency space, where platforms like Avax Bridge and Secret Network use SGX as part of their security stack.
View original story
Yes • 50%
No • 50%
Yes • 50%
No • 50%
No • 50%
Yes • 50%
Increase by more than 10% • 25%
Other • 25%
Change less than 10% • 25%
Decrease by more than 10% • 25%