diff --git a/resources/2022-08-12-defcon-enarx.md b/resources/2022-08-12-defcon-enarx.md index e5daae9..82eee71 100644 --- a/resources/2022-08-12-defcon-enarx.md +++ b/resources/2022-08-12-defcon-enarx.md @@ -16,6 +16,8 @@ But being pwned does not necessarily mean it’s endgame. Confidential Computing This session will define Confidential Computing at a technical level and discuss current and upcoming hardware that have support for it. Later, we’ll introduce Enarx, an open source Linux Foundation project, and present a live demo to showcase Confidential Computing in a system that has been “pwned.” -**Source**: DEFCON 2022 +**Source**: DEF CON 30 -**Link**: https://defcon.org \ No newline at end of file +**Link**: https://defcon.org + +**PDF**: [DEFCON30 Owned or pwned.pdf](/assets/docs/DEFCON30_Owned_or_pwned.pdf) \ No newline at end of file diff --git a/resources/2022-08-13-defcon-cryptle.md b/resources/2022-08-13-defcon-cryptle.md index 20c714c..82df5bb 100644 --- a/resources/2022-08-13-defcon-cryptle.md +++ b/resources/2022-08-13-defcon-cryptle.md @@ -1,7 +1,7 @@ --- slug: 2022-08-13-defcon-cryptle title: "Cryptle: a secure multi-party Wordle clone with Enarx" -authors: [richard, nick] +authors: [richard, nick, tom] tags: [Event] --- @@ -18,6 +18,8 @@ The standard way to engage with the game is for players to guess the secret word We'll provide an overview of an exploit of Enarx and we'll explain how we were able to fix it. Attendees will be invited to find new vulnerabilities as part of the Cryptle Hack Challenge. -**Source**: DEFCON 2022 +**Source**: DEF CON 30 -**Link**: https://defcon.org \ No newline at end of file +**Link**: https://defcon.org + +**PDF**: [DEFCON30_Cryptle.pdf](/assets/docs/DEFCON30_Cryptle.pdf) \ No newline at end of file diff --git a/resources/2022-10-30-intro-confidential-computing.md b/resources/2022-10-30-intro-confidential-computing.md index 342e936..77eddb8 100644 --- a/resources/2022-10-30-intro-confidential-computing.md +++ b/resources/2022-10-30-intro-confidential-computing.md @@ -8,4 +8,6 @@ If you agree that deploying to the untrusted cloud means that you cannot control **Source**: Profian -**Link**: https://profian.com/white-paper/an-introduction-to-confidential-computing/ \ No newline at end of file +**Link**: https://profian.com/white-paper/an-introduction-to-confidential-computing/ + +**PDF**: [An Introduction to Confidential Computing.pdf](/assets/docs/An_Introduction_to_Confidential_Computing.pdf) \ No newline at end of file diff --git a/resources/2022-12-19-confidential-vms.md b/resources/2022-12-19-confidential-vms.md index 3de9d09..052b71a 100644 --- a/resources/2022-12-19-confidential-vms.md +++ b/resources/2022-12-19-confidential-vms.md @@ -8,4 +8,6 @@ If you are keeping up with the latest technology in cloud computing-related secu **Source**: Profian's Blog -**Link**: https://profian.com/what-are-confidential-vms/ \ No newline at end of file +**Link**: https://profian.com/what-are-confidential-vms/ + +**PDF**: [Enarx and Confidential VMs Compared.pdf](/assets/docs/Enarx_and_Confidential_VMs_compared.pdf) \ No newline at end of file diff --git a/resources/authors.yml b/resources/authors.yml index 3015390..1f9afdc 100644 --- a/resources/authors.yml +++ b/resources/authors.yml @@ -38,6 +38,12 @@ richard: url: https://github.com/rjzak image_url: https://github.com/rjzak.png +tom: + name: Tom Dohrmann + title: Community member, Enarx hacker + url: https://github.com/Freax13 + image_url: https://github.com/Freax13.png + roman: name: Roman Volosatovs title: Senior Software Engineer diff --git a/static/assets/docs/An_Introduction_to_Confidential_Computing.pdf b/static/assets/docs/An_Introduction_to_Confidential_Computing.pdf new file mode 100644 index 0000000..235fe3e Binary files /dev/null and b/static/assets/docs/An_Introduction_to_Confidential_Computing.pdf differ diff --git a/static/assets/docs/DEFCON30_Cryptle.pdf b/static/assets/docs/DEFCON30_Cryptle.pdf new file mode 100644 index 0000000..978d561 Binary files /dev/null and b/static/assets/docs/DEFCON30_Cryptle.pdf differ diff --git a/static/assets/docs/DEFCON30_Owned_or_pwned.pdf b/static/assets/docs/DEFCON30_Owned_or_pwned.pdf new file mode 100644 index 0000000..fec3f6d Binary files /dev/null and b/static/assets/docs/DEFCON30_Owned_or_pwned.pdf differ diff --git a/static/assets/docs/Enarx_and_Confidential_VMs_compared.pdf b/static/assets/docs/Enarx_and_Confidential_VMs_compared.pdf new file mode 100644 index 0000000..a08a6a1 Binary files /dev/null and b/static/assets/docs/Enarx_and_Confidential_VMs_compared.pdf differ