Private Data Objects

In light of Meltdown and Spectre. Remediation patches have been released and applied by the top tier cloud providers. There are many servers deployed by others who are not top tier. To address security going forwards industry research is ongoing by the smartest people on the planet. One way to address rather than remediate is to secure the enclaves where computer keys could be exposed. Private data objects (PDOs) is one such implementation IntelDeck

To help share this work led by Intel's Mic Bowman we presented an unannounced lighting talk at PWL . Before Keys Under Doormats.

Mark S Miller is taking another approach to secure enclaves by sealing discontinuities inadvertently exposed by programming languages who are not based on first class object-capabilities.

We can concluded Intel's and Miller's work could overlap or 'backrub'.

Private Data Objects: an Overview Mic Bowman et, al. Intel Labs paper .

.

Initial Fabric Private Chaincode RFC page

Continued We make a start observing Hyperledger PDOs page aka HL Fabric Private Chaincode page and PDOs repo

.

# FPC Tech Preview / Concept Release 2.0.0 Repository: hyperledger-labs/fabric-private-chaincode · Tag: cr2.0.0 · Commit: adef1ae · Released by: g2flyer This release extends the concept release 1.0.1 as follows: FPC is now based on Fabric 2.1 and integrates more seamlessly, e.g., using external builders. It provides a full-specified and stable functional interface which should provide future-proofness for proof-of-concepts build on this release. For more information, see the FPC Reference Guides page The overall design and protocols are described in detail in an RFC (source page /PR with discussion page ) and UML diagrams page . Note that while parts of that design do not exist yet incomplete form and will be implemented as part of the MVP milestone, targeted for 20Q3. This makes this implementation not suitable for a secure production usage. However, these changes should, as mentioned above, not affect the functional interface as seen by fpc chaincode developers, users of these chaincodes and the operators of the infrastructure!

This release has 2 assets: Source code (zip) Source code (tar.gz) Visit the release to download them page .

/

# FPC Lite

To get this going in broader Kubernetes security; more to come. No touch, low touch FPC, trusted ledger, prevent roll-back attacks, prevent false info exposed to ledger before commit to ledger. Initial conditional release pre-trusted ledger.

2nd Custom endorsement standard chain code built into endorsement and resilience. Zero changes to Fabric will allow robust k8s containers.

- FPC externalized endorsement validation page - FPC without trusted endorsement page - FPC externalized endorsement validation page

Federated machine learning on-device ML page