🍵 There have been discussions about monero-pow randomX improvements for newer processor versions. One idea came to my mind: How about doing a check if a tee (trusted execution environment) is available?

Those could provide shortcuts to make CPU’s more efficient compared to that CPU’s that are currently used by ASIC-producers?

AMD:

  • Platform Security Processor (PSP)
  • AMD Secure Encrypted Virtualization and the
  • Secure Nested Paging extension

ARM:

  • TrustZone
  • Realm Management Extension / Confidential Compute Architecture (CCA)

IBM:

  • IBM Secure Service Container, formerly zACI, first introduced in IBM z13 generation machines (including all LinuxONE machines) in driver level 27.
  • IBM Secure Execution, introduced in IBM z15 and - LinuxONE III generation machines on April 14, 2020.

Intel:

  • Trusted Execution Technology
  • SGX Software Guard Extensions
  • “Silent Lake” (available on Atom processors)

RISC-V:

  • MultiZone™ Security Trusted Execution Environment
  • Keystone Customizable TEE Framework
  • Penglai Scalable TEE for RISC-V
  • rideOP
    link
    fedilink
    arrow-up
    1
    ·
    1 year ago

    This initial post “TEE & randomX POW” is about a PoW Algo that potentially uses parts/capabilities/characteristics of CPU’s.