Blogs
I do write about whatever I am learning and doing, mostly about software development. Below are the blogs I have written and I am going to publish more blogs whenever I got some time to write
TLS with Remote Attestation (aTLS) | Machine-to-Machine Secure Channel
An Attested TLS channel is a TLS channel that integrates remote attestation validation as part of the TLS channel establishing process.
Managing the cryptographic keys within Trusted Execution Environment
High level overview of the cryptographic keys management in the Trusted Execution Environment.
Trusted Platform Module (TPM) as Root of Trust (rot) and cryptographic features
High level overview of the trusted platform module its cryptographic features that can be used to perform the platform attestation.
Deep dive into the Confidential Containers (CoCo)
Enabling cloud native confidential computing by leveraging Trusted Execution Environments to protect containers and data
Remote Attestation Procedures Architecture (RATS) - Part-I
In this article, we will focus on attestation, as a method to prove specific properties of the system and components being used.
Protection against vulnerabilities at boot time with Linux Secure Boot Process
Secure Boot is a security feature found in the UEFI standard, designed to add a layer of protection to the pre-boot process
Bits and pieces of confidential virtual machine architecture
In this post, we will look into confidential virtual machines (CVMs) and its core building blocks.
Zero Trust Architecture and Confidential Computing
How on-chip security features (TEEs) that can significantly boost your Zero Trust solution architecture.
AMD Secure Encrypted Virtualization (SEV) on AMD EPYC™ Microprocessors
Confidential computing on AMD EPYC™ with built-in Encrypted Virtualization (SEV), which helps protect data in use.
Confidential Compute Architecture(CCA) on Armv9.2+ Microprocessors
CCA is hardware-based secure environment, to shield portions of code and data from access or modification, even from privileged software stack.
Confidential Computing on Intel Microprocessors
This blog covers the confidential computing (TCB) features on the Intel chips
Managing Microservice Schema With Protocol Buffers
Defining the Microservice Schema, Interfaces, Objects, and strategies that can be used to manage Microservice API Interfaces.
Anatomy of Go-Routines in Go - Golang concurrency pattern
Goroutine is lightweight execution thread running in the background.
A Comprehensive Guide to Learn GraphQL & Its Core Concepts
Tutorial series dedicated to learning the graphql from scratch with examples and working demos
JWT authentication in Golang with Echo
Learn how to build JWT authentication middleware for Echo
Build Simple API with gRPC, Protocol Buffers in Golang
This guide gets you started with gRPC in Go with a simple working example.