Skip to content

Commit

Permalink
feat: add defcon slides, some whitepapers, leaving Profian links for now
Browse files Browse the repository at this point in the history
Signed-off-by: Richard Zak <[email protected]>
  • Loading branch information
rjzak authored and github-actions[bot] committed Dec 12, 2023
1 parent 8b659da commit d4c5f66
Show file tree
Hide file tree
Showing 9 changed files with 21 additions and 7 deletions.
6 changes: 4 additions & 2 deletions resources/2022-08-12-defcon-enarx.md
Original file line number Diff line number Diff line change
Expand Up @@ -16,6 +16,8 @@ But being pwned does not necessarily mean it’s endgame. Confidential Computing
This session will define Confidential Computing at a technical level and discuss current and upcoming hardware that have support for it. Later, we’ll introduce Enarx, an open source Linux Foundation project, and present a live demo to showcase Confidential Computing in a system that has been “pwned.”


**Source**: DEFCON 2022
**Source**: DEF CON 30

**Link**: https://defcon.org
**Link**: https://defcon.org

**PDF**: [DEFCON30 Owned or pwned.pdf](/assets/docs/DEFCON30_Owned_or_pwned.pdf)
8 changes: 5 additions & 3 deletions resources/2022-08-13-defcon-cryptle.md
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
---
slug: 2022-08-13-defcon-cryptle
title: "Cryptle: a secure multi-party Wordle clone with Enarx"
authors: [richard, nick]
authors: [richard, nick, tom]
tags: [Event]
---

Expand All @@ -18,6 +18,8 @@ The standard way to engage with the game is for players to guess the secret word
We'll provide an overview of an exploit of Enarx and we'll explain how we were able to fix it. Attendees will be invited to find new vulnerabilities as part of the Cryptle Hack Challenge.


**Source**: DEFCON 2022
**Source**: DEF CON 30

**Link**: https://defcon.org
**Link**: https://defcon.org

**PDF**: [DEFCON30_Cryptle.pdf](/assets/docs/DEFCON30_Cryptle.pdf)
4 changes: 3 additions & 1 deletion resources/2022-10-30-intro-confidential-computing.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,4 +8,6 @@ If you agree that deploying to the untrusted cloud means that you cannot control

**Source**: Profian

**Link**: https://profian.com/white-paper/an-introduction-to-confidential-computing/
**Link**: https://profian.com/white-paper/an-introduction-to-confidential-computing/

**PDF**: [An Introduction to Confidential Computing.pdf](/assets/docs/An_Introduction_to_Confidential_Computing.pdf)
4 changes: 3 additions & 1 deletion resources/2022-12-19-confidential-vms.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,4 +8,6 @@ If you are keeping up with the latest technology in cloud computing-related secu

**Source**: Profian's Blog

**Link**: https://profian.com/what-are-confidential-vms/
**Link**: https://profian.com/what-are-confidential-vms/

**PDF**: [Enarx and Confidential VMs Compared.pdf](/assets/docs/Enarx_and_Confidential_VMs_compared.pdf)
6 changes: 6 additions & 0 deletions resources/authors.yml
Original file line number Diff line number Diff line change
Expand Up @@ -38,6 +38,12 @@ richard:
url: https://github.com/rjzak
image_url: https://github.com/rjzak.png

tom:
name: Tom Dohrmann
title: Community member, Enarx hacker
url: https://github.com/Freax13
image_url: https://github.com/Freax13.png

roman:
name: Roman Volosatovs
title: Senior Software Engineer
Expand Down
Binary file not shown.
Binary file added static/assets/docs/DEFCON30_Cryptle.pdf
Binary file not shown.
Binary file added static/assets/docs/DEFCON30_Owned_or_pwned.pdf
Binary file not shown.
Binary file not shown.

0 comments on commit d4c5f66

Please sign in to comment.