a) the source code of the secure enclave is 100% open source
b) I can compile my own version of it
c) I can run my own version of it
d) I face no reprecussions (i.e. services not working, DRM not working, ...) if I choose to do so.
This is all fine and dandy for key storage purposes; you actually want all of these to guarantee that your keys are safe. But modern enclaves are primarily used for DRM, and this just doesn't work if I can just patch a way into my enclave to get the key if I really want to.
So, I'd much rather have a system with no enclave which I can attach a HSM to than a secure "trust me bro" enclave.
DRM was the original sin of computing, and nobody can convince me otherwise.
a) the source code of the secure enclave is 100% open source b) I can compile my own version of it c) I can run my own version of it d) I face no reprecussions (i.e. services not working, DRM not working, ...) if I choose to do so.
This is all fine and dandy for key storage purposes; you actually want all of these to guarantee that your keys are safe. But modern enclaves are primarily used for DRM, and this just doesn't work if I can just patch a way into my enclave to get the key if I really want to.
So, I'd much rather have a system with no enclave which I can attach a HSM to than a secure "trust me bro" enclave.
DRM was the original sin of computing, and nobody can convince me otherwise.