frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Open in hackernews

Trusted Execution Environments? More Like "Trust Us, Bro" Environments

https://libroot.org/posts/trusted-execution-environments/
6•libroot•2h ago

Comments

rasengan•2h ago
This is a great list of academic attacks, but it proves less than you think.

Yes, TEEs have been broken in dozens of ways. Side channels, transient execution, voltage manipulation, interrupt timing... etc. To be fair, you could make an equally impressive list for many security primitives.

The question isn't "can TEEs be broken?" since clearly they can, but rather what's your threat model and what are your alternatives?

What TEEs actually defend against is passive compromise. They force an attacker to actively exploit rather than just read memory. That legal and operational distinction matters enormously in practice.

The alternative to TEE is "no hardware isolation at all," and that's strictly worse for every threat model where TEEs provide value.

Additionally, you still get attestation which gives you cryptographic proof of what code is running.

libroot•1h ago
Sure, threat models matter, but that's exactly the point. TEEs are marketed as if they solve the "malicious infrastructure" problem. Cloud providers tell you they can't see your data, and vendors pitch TEEs as some kind of hardware-rooted guarantee. If your threat model is "malicious sysadmin" or "host operator" then the fact that the root of trust is opaque, unauditable, and repeatedly compromised does matter.

Saying "what's your alternative" also misses the criticism. The issue isn't whether TEEs can reduce some threats compared to no isolation at all. Obviously they can in some scenarios. The issue is that their trust model is misrepresented: you're still trusting vendors and firmware you can't inspect, and history shows that trust is often misplaced. That's not "no alternative", that's "don't build your security story on black boxes with a track record of holes."

If the only way TEEs "work" is if you lower your expectations to "slightly better than nothing," then the marketing and security claims around them are deeply misleading. At that point, calling them "trusted" environments is just branding, not security.

> Additionally, you still get attestation which gives you cryptographic proof of what code is running.

Remote attestation ultimately relies on the same implicit trust it claims to replace. For example this paper[1] from 2019 showed how AMD's PSP secure boot can be compromised, giving an attacker an possibility to load a patched firmware that grants arbitrary read/write access to the PSP memory, which then allows the attacker to extract the Chip Endorsement Key (CEK), which is AMD's attestation root key. Once you have the CEK, you can forge attestation reports (for example impersonate a legitimate SEV platform) or bypass attestation entirely. And the CEK had (changed in 2023) an infinite lifetime and there was no rollback protection, so even if AMD issued a firmware update, attackers could revert to the old vulnerable firmware and re-extract the CEK.

[1]: https://arxiv.org/pdf/1908.11680

Edit:

And very recently, the new Battering RAM[2] (Sep 2025) and WireTap[3] (Oct 2025) attacks have broken Intel SGX and AMD SEV-SNP remote attestations.

[2]: https://batteringram.eu/

[3]: https://wiretap.fail/

ahazred8ta•1h ago
Some security researchers point out that 'trusted' does not mean trustworthy.

FounderOS: A visual IDE idea

https://founderos.xyz/
1•etimms•1m ago•1 comments

Show HN: Gridpoint Analytics – A privacy-first web analytics built on Cloudflare

https://gridpointanalytics.com
1•JuxtaMetrics•2m ago•1 comments

Taumata Hill, NZ

https://taumatawhakatangihanga.koauauotamateaturipukakapikimaungahoronukupokaiwhenuakitanatahu.nz/
1•piranhas•3m ago•1 comments

Show HN: Live demo anomaly detection for blind spots

https://demo.tsight.app/dashboard
1•anophelon•4m ago•0 comments

Macron re-appoints Lecornu, who had resigned on Monday, as prime minister

https://www.lemonde.fr/en/politics/article/2025/10/10/macron-re-appoints-lecornu-who-resigned-on-...
2•rossant•7m ago•1 comments

Why is observability so broken?

https://omji.ai
1•idea0rbit•7m ago•1 comments

Everything You Think You Know About DeltaChat Is Wrong

https://blog.feld.me/posts/2025/03/deltachat-is-actually-good-though/
1•mixcocam•11m ago•2 comments

Microwave technique allows energy-efficient chemical reactions

https://phys.org/news/2025-10-microwave-technique-energy-efficient-chemical.html
2•rolph•12m ago•0 comments

OpenAI's internal Slack messages could cost it billions in copyright suit

https://sherwood.news/power/openais-internal-slack-messages-could-cost-them-billions-in-copyright...
1•ModelForge•13m ago•0 comments

Bun 1.3

https://bun.com/blog/bun-v1.3
5•vqtska•15m ago•0 comments

I built physical album cards with NFC tags to teach my son music discovery

https://fulghum.io/album-cards
1•jordanf•20m ago•0 comments

Show HN: Semantic Search over the National Gallery of Art

https://nga.demo.mixedbread.com/
2•breadislove•21m ago•0 comments

A New Breed of Analysers

https://daniel.haxx.se/blog/2025/10/10/a-new-breed-of-analyzers/
1•viraptor•22m ago•0 comments

Resistance: How to Make the Most of It – The Resistance Zero System

http://markforster.squarespace.com/blog/2022/6/14/resistance-how-to-make-the-most-of-it-the-resis...
2•kblissett•22m ago•0 comments

America's Manufacturing Resurgence Will Be Powered by These Robots

https://www.wsj.com/business/americas-manufacturing-resurgence-will-be-powered-by-these-robots-78...
3•rbanffy•24m ago•1 comments

No North, No South: The Tragically Unfulfilled Promise of Korea's Asian Spring

https://lithub.com/no-north-no-south-the-tragically-unfulfilled-promise-of-koreas-asian-spring/
1•PaulHoule•24m ago•0 comments

Hardware Vulnerability Allows Attackers to Hack AI Training Data – NC State News

https://news.ncsu.edu/2025/10/ai-privacy-hardware-vulnerability/
2•rbanffy•24m ago•0 comments

Data leak at Sonicwall: All cloud backups of firewalls stolen

https://www.heise.de/en/news/Data-leak-at-Sonicwall-All-cloud-backups-of-firewalls-stolen-1074899...
3•gdgghhhhh•24m ago•0 comments

Federal officials probe Tesla 'Full Self-Driving' over traffic violations

https://www.washingtonpost.com/technology/2025/10/09/tesla-self-driving-investigation/
5•rbanffy•25m ago•0 comments

Postgres vector database extensions - A Benchmark

https://seanpedersen.github.io/posts/vector-databases
1•emschwartz•26m ago•0 comments

G2 data shows MIT study on AI ROI may be wrong

https://venturebeat.com/ai/what-mit-got-wrong-about-ai-agents-new-g2-data-shows-theyre-already-dr...
1•ptrhvns•27m ago•0 comments

LLMs Are Transpilers

https://alloc.dev/2025/10/10/llms_are_transpilers
2•Retro_Dev•28m ago•2 comments

Show HN: Egocentric and Exocentric Body Caputre from iPhones only

https://app.rerun.io/version/0.25.1/index.html?url=https%3A%2F%2Fhuggingface.co%2Fdatasets%2Fpabl...
4•pablovelagomez•28m ago•0 comments

Apple Newsroom on the Immersive Vision Pro Lakers Broadcasts

https://www.apple.com/newsroom/2025/10/spectrum-brings-nba-games-in-apple-immersive-to-apple-visi...
2•Bogdanp•29m ago•1 comments

Social media prank using AI home invader 'bluntly stupid,' police warn

https://globalnews.ca/news/11473482/ai-home-invader-police-warning/
3•rolph•31m ago•0 comments

Neural Networks from Scratch in Python: Simpler Than You Think

https://www.hamza.se/blog/neural-networks
2•hamza512b•32m ago•0 comments

VLLM Predicted Outputs

https://cascadetech.ai/blog/vllm-predicted-outputs/
1•alvion427•34m ago•0 comments

Intermolecular photoinduced charge separation in organic semiconductors

https://www.nature.com/articles/s41563-025-02362-z
3•bookofjoe•40m ago•0 comments

Show HN: OpenAI hasn't released their Apps SDK so we did

https://github.com/fractal-mcp/sdk
5•mercury24aug•44m ago•0 comments

Telegram now supports threads and streaming responses for AI bots

https://telegram.org/blog/comments-in-video-chats-threads-for-bots
2•vladoh•48m ago•1 comments