Post Syndicated from original https://lwn.net/Articles/922986/
The field of confidential computing is still in its infancy, to the point
where it lacks a clear, agreed, and established problem description. Elena
Reshetova and Andi Kleen from Intel recently
started the conversation by sharing their view of a potential threat
model in the form of this
document, which is specific to the Intel Trust Domain Extension (TDX)
on Linux, but which is intended to be applicable to other
confidential-computing solutions as well. The resulting conversation
showed that there is some ground to be covered to achieve a consensus on
the model in the community.