Note that physical access and an interposer can be used to decrypt memory. See this other recent story[0].
> They exploit both Intel’s and AMD’s use of deterministic encryption, which produces the same ciphertext each time the same plaintext is encrypted with a given key.
Note that physical access and an interposer can be used to decrypt memory. See this other recent story[0].
> They exploit both Intel’s and AMD’s use of deterministic encryption, which produces the same ciphertext each time the same plaintext is encrypted with a given key.
[0] https://news.ycombinator.com/item?id=45443767