| ▲ | gruez 7 hours ago | |
>If you need to trust the encryption and trust the hardware itself, it may not be suitable for your environment/ threat model. Are we reading the same article? It's talking about homorphic encryption, ie. doing mathematical operations on already encrypted data, without being aware of its cleartext contents. It's not related to SGX or other trusted computing technologies. | ||