Welcome to Ungovernable Tech. This started as a landing page for my notes about research I was doing during the Sovereing Engineering Cohort but I've decided to make it more structured and make it a bookmark page for all my research into freedom enabling technology. Most topics are far from comprehensively covered, sadly I've decided to do this rather late so my notes and bookmarks are all over the place and in a need of free time to structure. Stay tuned.
I wanted to create a PoC of confidential computing over nostr, I didn't end up finishing it but the notes about that experiment are here.
- continuum
- confidential AI from GPU enclaves
- Nvidia confidential computing deployment guide
- Building GPU TEEs using CPU Secure Enclaves with GEVisor
- Heterogeneous Isolated Execution for Commodity GPUs
- Trusted Container Extensions for Container-based Confidential Computing
- Trusted execution environment
- Confidential Containers
- Firecracker-microvm
- Confidential computing
- Kata containers
- awesome-zama
- zama.ai
- Remote attestation Procedures Architecture
- Trusted Execution Environment Provisioning (TEEP) Architecture
- CoCo attestation proposal KBS / AS
- Generic Key Broker System for CoCo
- Constellation - Always encrypted kubernetes
- Garmine Shielded Containers
- Confidential containers in kubernetes
- Garmine library OS - run applications in enclaves
- COCONUT Secure VM Service Module
- enclavie
- List of SGX supported Intel CPUs
- List of SGX hardware
- Secure Multi-Party Computation Without Agreement
- SGX Secure Enclaves in Practice: Security and Crypto Review
- General overview of AMD SEV-SNP and Intel TDX
- Occlum
- awesome-confidential-computing
We are building all kinds of cool decentralized systems but keep forgetting that majority of them still relay on DNS which is very prone to seizure and manipulation.
Most people have spare compute and bandwidth, at least the ones with desktop PCs and routers. Cryptography can remove the issues with trust models and makes every computer plugged into internet and power a productive asset.
In a world where your private information is not for sale and your attention is not the product data is a liability not an asset. FHE can enable privacy preserving solutions for many/most database applications.
Fighting tyranny with math. Every company or individual is one court order away from needing to decide how long they are willing to spend behind bars for not sharing the data with the government. Designing systems that are default private and cryptographically sound makes sure you have nothing to share with them.
For any suggestions or comments submit a PR/open an issue or send smoke signals over nostr to aljaz@nostr.si