I do write about whatever I am learning and doing, mostly about software development. Below are the blogs I have written and I am going to publish more blogs whenever I got some time to write
In this article, we will focus on attestation, as a method to prove specific properties of the system and components being used.
Secure Boot is a security feature found in the UEFI standard, designed to add a layer of protection to the pre-boot process
In this post, we will look into confidential virtual machines (CVMs) and its core building blocks.
How on-chip security features (TEEs) that can significantly boost your Zero Trust solution architecture.
Confidential computing on AMD EPYC™ with built-in Encrypted Virtualization (SEV), which helps protect data in use.
CCA is hardware-based secure environment, to shield portions of code and data from access or modification, even from privileged software stack.
This blog covers the confidential computing (TCB) features on the Intel chips
Defining the Microservice Schema, Interfaces, Objects, and strategies that can be used to manage Microservice API Interfaces.
Goroutine is lightweight execution thread running in the background.
Tutorial series dedicated to learning the graphql from scratch with examples and working demos
Learn how to build JWT authentication middleware for Echo
This guide gets you started with gRPC in Go with a simple working example.