BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//pretalx.com//kvm-forum-2024//talk//7LELGG
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-kvm-forum-2024-7LELGG@pretalx.com
DTSTART;TZID=CET:20240922T141500
DTEND;TZID=CET:20240922T144500
DESCRIPTION:Confidential computing - making VM guest secrets harder for\nth
 e hypervisor to access - is getting more and more important as\ntime goes 
 by.\n\nVirtio (and paravirtualization generally)\, fundamentally\, can be 
 thought of as\na means of improving guests by making use of hyprevisor fun
 ctionality.  To what\nlevel can this still be beneficial when the guest do
 es not want to fully trust\nthe hypervisor?\n\nThis talk will try to addre
 ss these questions\, by touching on the following\nareas:\n\n- review of n
 ew features / devices and how they interact with\n  confidential computing
 \n- status and plans of hardening (improving confidentiality)\n  with virt
 io on Linux \n- known open issues and how you can help
DTSTAMP:20260415T104423Z
LOCATION:Hall C+D
SUMMARY:Virtio and the chamber of secrets - Michael S. Tsirkin
URL:https://pretalx.com/kvm-forum-2024/talk/7LELGG/
END:VEVENT
END:VCALENDAR
