Content
@
0 reply
0 recast
0 reaction
Gop
@guop
AI at the Intersection of Bio w/: Vijay Pande, Surya Ganguli & Bowen Liu Exploring the transformational role of AI in drug discovery and biology > How machine learning and self-supervised models are reshaping the foundational tasks of drug design, and more
11 replies
0 recast
13 reactions
Youre
@dtmyxuyenst
In order to deploy applications inside of secure enclaves, we’ve built a new OS: QuorumOS. Among other things, QuorumOS adds a crucial provisioning mechanism. QuorumOS expects shares of a known key (“Quorum Key”) to be posted when an enclave boots. Once enough shares are posted and the Quorum Key is reconstructed, QuorumOS runs the application, and the application can use this Quorum Key to decrypt, encrypt, or sign data. Applications running within QuorumOS operate with a stable key across reboots: their Quorum Key. This Quorum Key can be used to authenticate the application’s output: If data is signed by the Quorum Key, it’s legitimate and originates from this application. Otherwise, it’s not. In Part III we’ll see how Quorum Keys are used to ensure TLS response authenticity. Before we get there, we need to talk about enclave networking.
0 reply
0 recast
0 reaction