🍵 There have been discussions about monero-pow randomX improvements for newer processor versions. One idea came to my mind: How about doing a check if a tee (trusted execution environment) is available?
Those could provide shortcuts to make CPU’s more efficient compared to that CPU’s that are currently used by ASIC-producers?
AMD:
- Platform Security Processor (PSP)
- AMD Secure Encrypted Virtualization and the
- Secure Nested Paging extension
ARM:
- TrustZone
- Realm Management Extension / Confidential Compute Architecture (CCA)
IBM:
- IBM Secure Service Container, formerly zACI, first introduced in IBM z13 generation machines (including all LinuxONE machines) in driver level 27.
- IBM Secure Execution, introduced in IBM z15 and - LinuxONE III generation machines on April 14, 2020.
Intel:
- Trusted Execution Technology
- SGX Software Guard Extensions
- “Silent Lake” (available on Atom processors)
RISC-V:
- MultiZone™ Security Trusted Execution Environment
- Keystone Customizable TEE Framework
- Penglai Scalable TEE for RISC-V
This initial post “TEE & randomX POW” is about a PoW Algo that potentially uses parts/capabilities/characteristics of CPU’s.