https://www.da.vidbuchanan.co.uk/blog/
https://github.com/DavidBuchanan314
HackerSmacker profile: https://www.hackersmacker.org/user/Retr0id?hs=KvrqTVG8YAcdTSZFuf
This is quite a short list, maybe someone's agent can help expand it
What does that have to do with solving the problem?
Until they require fTPMs, an attacker can just choose to use a regular TPM.
A more sophisticated attacker could plausibly extract key material from the TPM itself via sidechannels, and sign their own attestations.
This got me wondering how easy it'd be to automate discovery of BYOVD vulns with LLMs (both offensively and defensively)
This project is an enhanced reader for Ycombinator Hacker News: https://news.ycombinator.com/.
The interface also allow to comment, post and interact with the original HN platform. Credentials are stored locally and are never sent to any server, you can check the source code here: https://github.com/GabrielePicco/hacker-news-rich.
For suggestions and features requests you can write me here: gabrielepicco.github.io