Main Group

CCC main group
Welcome to the Confidential Computing Consortium mailing lists home page. Joining the "CCC main group" won't subscribe you to any of the project's mailing lists.  If you would like to subscribe to a Confidential Computing Consortium mailing list (such as the announce list), please click on "Subgroups" to the left, and self-select the lists you are interested in. Please note that unsubscribing from main@lists.confidentialcomputing.io will *remove you from all Confidential Computing Consortium mailing lists*.
Created:
618 Members, 22 Topics, Archive is visible to anyone, Last Post:
if len(subgrouplist) == 0 { continue }

Subgroups You Can Join

  • End-User Advisory Committee
    End-User Advisory Committee list.
    Created:
    12 Members, 6 Topics, Archive is visible to members only, Restricted, Last Post:
  • Announcements
    Welcome to the Confidential Computing Consortium announce mailing list. This is a public list, and is announce-only.
    Created:
    207 Members, 21 Topics, Archive is visible to members only, Last Post:
  • Associate Members
    Communications for all associate CCC members.
    Created:
    13 Members, 6 Topics, Archive is visible to members only, Restricted, Last Post:
  • Tech: Attestation
    Cross-project collaboration focusing on attestation.
    Created:
    104 Members, 36 Topics, Archive is visible to members only, Last Post:
  • General Members
    Distribution list to voting, marketing and technical contacts of General Members.
    Created:
    62 Members, 152 Topics, Archive is visible to members only, Restricted, Last Post:
  • grc
    Every time a new security technology with broad applicability emerges, regulations follow. This usually happens after the technology in question is deployed beyond some critical mass: in other words, regulations do not go into effect until there is a way for regulated entities to comply with them. This has already happened with data-in-transit and data-at-rest protections. Confidential Computing will shield data-in-use, completing the trifecta. Regulatory bodies vary in scope: regulations are put in place by nation states (Luxembourg), federal agencies (SEC), state legislatures (California), industry bodies (PCI-DSS), and regional powers (GDPR). Regardless of scope, all regulators demand that the subjects of regulations achieve, maintain, and prove on demand compliance with a given set of criteria. Failure to comply can be very costly indeed: for instance, a financial firm may lose its license to operate, effectively putting it out of business. As a result, regulated institutions treat these matters extremely seriously. In addition, even outside of externally imposed regulations, a business may enter into contractual relationships with its customers and/or suppliers, and then would also need to assess compliance with those commitments. The purpose of the SIG is to partner with existing regulatory bodies with the explicit goal of crafting, and speeding up the adoption of, regulations around data-in-use protections, such that compliance with these new regulations would also result in better security outcomes.
    Created:
    18 Members, 22 Topics, Archive is visible to members only, Last Post:
  • Linux Kernel Collaboration
    This is a public mailing list for coordination on topics which span the Linux kernel and Confidential Computing Consortium.
    Created:
    14 Members, 0 Topics, Archive is visible to members only
  • Open Enclave SDK
    ***************************** Open Enclave SDK Mailing List ***************************** * *
    Created:
    92 Members, 284 Topics, Archive is visible to members only, Last Post:
  • outreach
    This is the mailing list for the Outreach Committee of the Confidential Computing Consortium.
    Created:
    78 Members, 543 Topics, Archive is visible to members only, Last Post:
  • projectmentors
    This list serves as a place for project mentors to facilitate communications between events, sponsorship, and projects.
    Created:
    11 Members, 0 Topics, Archive is visible to members only
  • Security (All CCC projects)
    Welcome to the Confidential Computing Consortium security-all mailing list. This is an invitation-only list where core maintainers coordinate on embargoed security information, and may also be used to disclose suspected vulnerabilities in Confidential Computing Consortium projects ( https://confidentialcomputing.io/projects/ ) that do not have a security escalation path. *Discussion on this list is confidential, and is limited to discussing the impact and resolution of security concerns prior to public disclosure.* This list is configured to receive emails from anyone who has subscribed to any other Confidential Computing Consortium mailing list. *You must at least join the main mailing list ( https://lists.confidentialcomputing.io/g/main ) to send email to this list.* The Confidential Computing Consortium (CCC) ( https://confidentialcomputing.io ) brings together hardware vendors, cloud providers, and software developers to accelerate the adoption of Trusted Execution Environment (TEE) technologies and standards. CCC is a project community at the Linux Foundation ( http://linuxfoundation.org/ ) dedicated to defining and accelerating the adoption of confidential computing. It embodies the open governance and open collaboration that has aided the success of similarly ambitious efforts. The effort includes commitments from numerous member organizations ( https://confidentialcomputing.io/members/ ) and contributions from several open source projects ( https://confidentialcomputing.io/projects/ ).
    Created:
    2 Members, 0 Topics, Archive is visible to members only, Restricted
  • tac
    The mailing list for the Technical Advisory Council of the Confidential Computing Consortium.
    Created:
    129 Members, 457 Topics, Archive is visible to members only, Last Post:
  • veraison
    Project Veraison builds software components that can be used to build an Attestation Verification Service.
    Created:
    8 Members, 1 Topic, Archive is visible to members only, Last Post: