Amazon EC2 Instance Attestation

(docs.aws.amazon.com)

9 points | by Judson 20 hours ago ago

1 comments

  • karmakaze 13 hours ago ago

    Note that physical access and an interposer can be used to decrypt memory. See this other recent story[0].

    > They exploit both Intel’s and AMD’s use of deterministic encryption, which produces the same ciphertext each time the same plaintext is encrypted with a given key.

    [0] https://news.ycombinator.com/item?id=45443767