[Teep] Webinar Series

Hannes Tschofenig <hannes.tschofenig@gmx.net> Mon, 12 June 2017 18:36 UTC

Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: teep@ietfa.amsl.com
Delivered-To: teep@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 90C2C126E3A for <teep@ietfa.amsl.com>; Mon, 12 Jun 2017 11:36:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.921
X-Spam-Level:
X-Spam-Status: No, score=-1.921 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bDIZU2OKl0FD for <teep@ietfa.amsl.com>; Mon, 12 Jun 2017 11:36:26 -0700 (PDT)
Received: from mout.gmx.net (mout.gmx.net [212.227.17.20]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7864E124C27 for <teep@ietf.org>; Mon, 12 Jun 2017 11:36:25 -0700 (PDT)
Received: from [192.168.91.196] ([80.92.114.129]) by mail.gmx.com (mrgmx101 [212.227.17.168]) with ESMTPSA (Nemesis) id 0LrrRi-1dyRnF1poE-013cNw for <teep@ietf.org>; Mon, 12 Jun 2017 20:36:23 +0200
To: "teep@ietf.org" <teep@ietf.org>
From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
Openpgp: id=071A97A9ECBADCA8E31E678554D9CEEF4D776BC9
Message-ID: <090ef192-1e53-272a-6af4-94045e2e3280@gmx.net>
Date: Mon, 12 Jun 2017 20:36:22 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.1.1
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Language: en-US
Content-Transfer-Encoding: 7bit
X-Provags-ID: V03:K0:1QgM+HP3yB2VMRQF4sqJkLtDxb7Q3Ud2+qbc15dUl3dCotCEvVb ceeIdbbKoJ9TAvQuWE0Tj7qE8UOpI2QYpO3mDB+ZbCqYPEyhe1fzXF0N87UZc2eF1ZLrTuL 4oJx/HmsGaYCrdSi2x51dmIaTceaCtC06sBJkja0jIY7WcGqUEexLQoyYTjz+w303es8L4D KyfL835g8GM2Cuc2ZNleg==
X-UI-Out-Filterresults: notjunk:1;V01:K0:K6yIC+dy5Rg=:MejlHb3YvTk9YPoXxcS7gb g/rZVUd7sbGNGzSnGAYTXg40+QjoYqhcNpTOmzvygdca4MBx2ymAEZDSkbenVPmciW+4xmZeL kM2/NlAtPXqqP+N+lsfn5B7yRvYVyBx1dQgyyx45FRYnloda3g9K9E3IdFGgVBuYni8hlb0u/ l5I+zPnwXZVu4LAhVJtu9Pa/yfPUYhIr4dlm6bsy/eLWgtpYH2zIrWd1s/YAT6FiCPZg7efrQ bbN0kjzxeLJroeTKocpGXmXc9KjDSYR98z2Kx5A6DE9YagTfyx9H5j7gMmriuTXyU1MHCeowx tglEyQLR+McimGN4q2gf1AFOEY3jDbvXDpqwEcljd/FkGQqFpg2bUx7h84q3GDGYz3QRn+REa HUeHPirmOmfG/q4LrxILxbLZkzlc6kjuHbBLyX5piJZpWgiY3Q1QkWDu90/lc76NW8n3+QIzQ 9DA1UgamPb0DSCyOVd7cO795q65qhtJJZNACwf3YnRrCKailmdx1yhWXEEXR8MtIK/kiTtYVK 9EDs4/A9s90gbG4qx24y3pU5/T4vn4sl56/neVDGFC7kQCiKx/+NmsSjVKXEnpvnMgC8BQkAG 8gKOCi69p9S/BJtd50foOHtlhkHH0Q4ygQEF2Bk/MJ41ZAwMxdO2xOTwBwTYeTEC9urZ09KDN 1eZrHWDmRN1XdSIJQQwSHS9jtI63nLuXWbKDLyRI35dl7VUFOAr4OpLP9sY6424IBOBmVxlRM pgabrVyyrrdr1LrqxoHxf9eUZMIxaiTi8jdIu6QMRq7ypYBdR/suaV4eMRKg33gF2r42eGusE eI5Tjgv
Archived-At: <https://mailarchive.ietf.org/arch/msg/teep/5znsVGi8JU52mrOFCgb2y_uGXU0>
Subject: [Teep] Webinar Series
X-BeenThere: teep@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement <teep.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teep>, <mailto:teep-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teep/>
List-Post: <mailto:teep@ietf.org>
List-Help: <mailto:teep-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teep>, <mailto:teep-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 12 Jun 2017 18:36:28 -0000

Hi all,

at the last TEEP BOF in Chicago we noticed that not all participants
were familiar with the concept of Trusted Execution Environments (TEEs).

In discussion with the BOF chairs, the ADs, and the BOF presenters we
have therefore decided to schedule a few webinars to offer background
information for those who are interested.

The following three webinars are anticipated at this point in time:

 * Global Platform / TEE Overview
 * Deep dive on ARM TEEs
 * Deep dive on Intel TEEs

The first talk should provide you some background of what GlobalPlatform
has been doing and their views on the TEE architecture.

The ARM/Intel extend what was explained during the BOF itself. This will
explain why standardization of a software update protocol makes sense
for certain types of TEEs.

Mails for each of those webinars will follow.

Ciao
Hannes