This is my post. I hope I am doing this right.

I am Vinoth, from San Diego. I lead the silicon security architecture and silicon security operations teams at . Before this, I worked on mobile silicon security at . I will mostly talk about , and .

Much of my work is about improving the security of and other devices. My expertise is at the intersection of hardware security architecture, software security architecture and silicon security operations (secure key provisioning, code signing, device attestation etc.). I have ~20 years of experience making mistakes at this particular intersection that make me feel eminently qualified to talk about how to not make them.

I love explaining the intricacies of silicon development to software engineers and vice versa. So if you want to understand the hardware underpinnings of Trusted compute, confidential compute or whatever, I'm your guy.

I sometimes hold unpopular opinions, and I welcome healthy discussions about them. For example, (a) open sourcing RTL will not improve hardware security to the same extent open source software improved software security (b) there are situations where compliance actively harms security.

Also a medidator, volunteer at , father of 2 kids, husband of 1 wife, angel investor and a very curious human being.

0
0
0

If you have a fediverse account, you can quote this note from your own instance. Search https://infosec.exchange/users/vinoth/statuses/109411307612304030 on your instance and quote it. (Note that quoting is not supported in Mastodon.)