Skip to content
This repository has been archived by the owner on Mar 13, 2024. It is now read-only.

google/sealedcomputing

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 
 
 
 
 

The Sealed Computing Platform

Minimal trusted computing base for enforcing privacy policies

Sealed Computing is what Apple and Google do when protecting your lock screen secrets in HSMs or Titan chips, so you can recover your encrypted data from the cloud after losing your device. The secure hardware makes it hard for the cloud provider to see your data. It is similar to "Confidential Computing", which is when users can run their virtual-machines in the cloud inside "secure enclaves", which in theory stops the cloud provider from snooping on what you're doing on their hardware. Sealed computing has some portion of the code, called the "privacy policy", which is non-updatable, other than as the privacy policy itself allows, for example with user consent. An existing sealed enclave is incapable of violating its hardware-enforced privacy policy.

Any data users encrypt to sealed enclaves can only be used in accordance with the privacy policy, assuming the hardware and algorithms remain secure. In other words:

Sealed computing, when secure, ensures user data is used in accordance with the privacy policy.

Privacy policies are just publicly disclosed algorithms running in 3rd-party attested hardware such as Intel TDX, or AMD SEV-SNP. Privacy policies can only be attested if the source code is public and the builds are reproducible. For Google's Sealed Computing effort, that source code lives here.

About

No description, website, or topics provided.

Resources

License

Code of conduct

Security policy

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published