Though the nuance is critical to correctly assess the superfluous mention of containment is not comforting and as such distracting from the message the researcher seems to have portrayed a false picture. Misrepresenting risk potential is far too common and makes for defenders to look like (overworked/overasked) fools at times. Naming and shaming researchers in an accurate, sensible and substantiated way is essential to maintaining good #cybersecurity hygiene. One notable obstacle here is how leadership often has neither time, neither much attention to even have people assess the quality of vulnerability reports. It is of importance to have hit business and technology cone to terms with what is hands-on and what is hands-off for each. #infosec #cybersecurity
Intel hits back at claims that Intel SGX Key was compromised "In addition, the key the researcher claims to have extracted is encrypted, not plain text. The encryption protecting the key would have to be broken to use it for malicious purposes, and then it would only apply to the individual system under attack." https://lnkd.in/eaZe2hCT