{"guid":"f4987ec6-cc49-495c-a210-e1923f0106d8","title":"Anarchist’s Guide to Confidential Computing","subtitle":"Zuverlässige Privatsphäre in der Cloud durch Hardware-Features","slug":"froscon2025-3276-anarchist_s_guide_to_confidential_computing","link":"https://programm.froscon.org/2025/events/3276.html","description":"„Confidential Computing“ bezeichnet eine Reihe von hardwaregestützten Technologien, die angeblich vertrauliche Datenverarbeitung in der Cloud ermöglichen. In diesem Vortrag zeige ich, wie diese Mechanismen funktionieren, welchen Versprechen man trauen kann – und wo ihre Grenzen liegen.\n\nConfidential Computing verspricht Privatsphäre durch Hardware – in einer Umgebung, die dir nicht gehört. In diesem Vortrag geht es nicht um BIOS-Versionen oder Kernel-Flags, sondern um die grundlegenden Mechanismen: Was passiert, wenn man dem Hypervisor nicht mehr trauen muss? Was tun TPMs eigentlich genau? Und wie lässt sich Vertrauen technisch abbilden – oder eben nicht?\n\nStatt sich im Implementierungsdschungel zu verlieren, zeige ich die Architektur und Denkweise hinter Technologien wie AMD SEV. Ziel ist ein Verständnis der Spielregeln: Wer kontrolliert den Speicher, wer signiert den Code, wer entscheidet, ob eine Maschine „echt“ ist?\n\nDas hier ist kein Verkaufsargument, sondern ein Blick auf Systeme, die selbst einem state-sponsored Actor mit physischem Zugriff auf die Hardware nur begrenzte Angriffsfläche bieten – zumindest theoretisch. Ich habe mir die Versprechen angeschaut, sie mit realer Technik abgeglichen und versucht, die Grenze zwischen Schutz und Illusion auszuloten.\n\nConfidential Computing ist kein Allheilmittel – aber ein Werkzeug, das man kennen sollte. Wenn man versteht, was es kann. Und was nicht.\n\nLicensed to the public under http://creativecommons.org/licenses/by/4.0","original_language":"deu","persons":["Thomas Hensel"],"tags":["3276","2025","froscon2025","Clouds over Europe - Digital Soverignty and broken promises","HS 8","froscon2025-deu","Day 2"],"view_count":329,"promoted":false,"date":"2025-08-17T13:45:00.000+02:00","release_date":"2025-08-17T00:00:00.000+02:00","updated_at":"2026-03-27T19:15:06.613+01:00","length":2695,"duration":2695,"thumb_url":"https://static.media.ccc.de/media/events/froscon/2025/3276-f4987ec6-cc49-495c-a210-e1923f0106d8.jpg","poster_url":"https://static.media.ccc.de/media/events/froscon/2025/3276-f4987ec6-cc49-495c-a210-e1923f0106d8_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/froscon/2025/3276-f4987ec6-cc49-495c-a210-e1923f0106d8.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/froscon/2025/3276-f4987ec6-cc49-495c-a210-e1923f0106d8.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/froscon2025-3276-anarchist_s_guide_to_confidential_computing","url":"https://api.media.ccc.de/public/events/f4987ec6-cc49-495c-a210-e1923f0106d8","conference_title":"FrOSCon 2025","conference_url":"https://api.media.ccc.de/public/conferences/froscon2025","related":[],"recordings":[{"size":244,"length":2695,"mime_type":"video/webm;codecs=av01","language":"deu","filename":"froscon2025-3276-deu-Anarchists_Guide_to_Confidential_Computing_av1-hd.webm","state":"new","folder":"av1-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2025-08-17T18:39:11.300+02:00","recording_url":"https://cdn.media.ccc.de/events/froscon/2025/av1-hd/froscon2025-3276-deu-Anarchists_Guide_to_Confidential_Computing_av1-hd.webm","url":"https://api.media.ccc.de/public/recordings/90564","event_url":"https://api.media.ccc.de/public/events/f4987ec6-cc49-495c-a210-e1923f0106d8","conference_url":"https://api.media.ccc.de/public/conferences/froscon2025"},{"size":41,"length":2695,"mime_type":"audio/mpeg","language":"deu","filename":"froscon2025-3276-deu-Anarchists_Guide_to_Confidential_Computing_mp3.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2025-08-17T17:51:18.463+02:00","recording_url":"https://cdn.media.ccc.de/events/froscon/2025/mp3/froscon2025-3276-deu-Anarchists_Guide_to_Confidential_Computing_mp3.mp3","url":"https://api.media.ccc.de/public/recordings/90546","event_url":"https://api.media.ccc.de/public/events/f4987ec6-cc49-495c-a210-e1923f0106d8","conference_url":"https://api.media.ccc.de/public/conferences/froscon2025"},{"size":26,"length":2695,"mime_type":"audio/opus","language":"deu","filename":"froscon2025-3276-deu-Anarchists_Guide_to_Confidential_Computing_opus.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2025-08-17T17:51:00.207+02:00","recording_url":"https://cdn.media.ccc.de/events/froscon/2025/opus/froscon2025-3276-deu-Anarchists_Guide_to_Confidential_Computing_opus.opus","url":"https://api.media.ccc.de/public/recordings/90543","event_url":"https://api.media.ccc.de/public/events/f4987ec6-cc49-495c-a210-e1923f0106d8","conference_url":"https://api.media.ccc.de/public/conferences/froscon2025"},{"size":270,"length":2695,"mime_type":"video/webm","language":"deu","filename":"froscon2025-3276-deu-Anarchists_Guide_to_Confidential_Computing_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2025-08-17T18:39:03.233+02:00","recording_url":"https://cdn.media.ccc.de/events/froscon/2025/webm-hd/froscon2025-3276-deu-Anarchists_Guide_to_Confidential_Computing_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/90563","event_url":"https://api.media.ccc.de/public/events/f4987ec6-cc49-495c-a210-e1923f0106d8","conference_url":"https://api.media.ccc.de/public/conferences/froscon2025"},{"size":98,"length":2695,"mime_type":"video/webm","language":"deu","filename":"froscon2025-3276-deu-Anarchists_Guide_to_Confidential_Computing_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2025-08-17T18:38:54.298+02:00","recording_url":"https://cdn.media.ccc.de/events/froscon/2025/webm-sd/froscon2025-3276-deu-Anarchists_Guide_to_Confidential_Computing_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/90562","event_url":"https://api.media.ccc.de/public/events/f4987ec6-cc49-495c-a210-e1923f0106d8","conference_url":"https://api.media.ccc.de/public/conferences/froscon2025"},{"size":91,"length":2695,"mime_type":"video/mp4","language":"deu","filename":"froscon2025-3276-deu-Anarchists_Guide_to_Confidential_Computing_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2025-08-17T17:51:14.371+02:00","recording_url":"https://cdn.media.ccc.de/events/froscon/2025/h264-sd/froscon2025-3276-deu-Anarchists_Guide_to_Confidential_Computing_sd.mp4","url":"https://api.media.ccc.de/public/recordings/90545","event_url":"https://api.media.ccc.de/public/events/f4987ec6-cc49-495c-a210-e1923f0106d8","conference_url":"https://api.media.ccc.de/public/conferences/froscon2025"},{"size":276,"length":2695,"mime_type":"video/mp4","language":"deu","filename":"froscon2025-3276-deu-Anarchists_Guide_to_Confidential_Computing_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2025-08-17T16:46:11.070+02:00","recording_url":"https://cdn.media.ccc.de/events/froscon/2025/h264-hd/froscon2025-3276-deu-Anarchists_Guide_to_Confidential_Computing_hd.mp4","url":"https://api.media.ccc.de/public/recordings/90539","event_url":"https://api.media.ccc.de/public/events/f4987ec6-cc49-495c-a210-e1923f0106d8","conference_url":"https://api.media.ccc.de/public/conferences/froscon2025"}]}