alum @utah.edu, cs.umd.edu.
find me @ eligrubb.com.
The Typestate Pattern in Rust cliffle.com/blog/rust-ty...
Implementing As-Safe-As-Possible, Misuse-Resistant Cryptographic Libraries blog.patternsinthevoid.net/index.html
The Typestate Pattern in Rust cliffle.com/blog/rust-ty...
Implementing As-Safe-As-Possible, Misuse-Resistant Cryptographic Libraries blog.patternsinthevoid.net/index.html
youtu.be/h0-k7vW9Xek
youtu.be/h0-k7vW9Xek
However, FHE isn't the only answer to "encryption-in-use". Other solutions exist that are efficient, employ well-established cryptography, and are deployable today!
Naturally, there's a catch:
Data can be encrypted at rest, and even in transit…but not “in use”.
Fundamentally, CPUs execute arithmetic instructions on decrypted plaintext; even with secure enclaves.
But what if we got *really* clever:
However, FHE isn't the only answer to "encryption-in-use". Other solutions exist that are efficient, employ well-established cryptography, and are deployable today!
Naturally, there's a catch:
I’ve gotten to the fun part of the Zig standard library
I’ve gotten to the fun part of the Zig standard library
1. Be explicit about the threat model your advice is meant for.
1. Be explicit about the threat model your advice is meant for.