Dear Powers of Tau's fellows, This is my attestation:
The BLAKE2b hash of `./response` is: 9f9cad6a 61311a88 291f3b14 eb9808e3 4b570b94 a1ad6cc7 3d7add21 32182df8 17e7e6a6 d2fb0dcd 7ad9526b 6e05038c 5592fb74 e41ddfd6 50c1f0d2 72062a69 __ I performed the computation on a Thinkpad T460p, running QubesOS R3.2. I have used Sean Bowe's implementation, compiled with Rust 1.24.1 in a Fedora-26 TemplateVM. The computation was done on a dedicated, network-less paravirtualized guest AppVM based on the Fedora-26 TemplateVM. Before starting the computation, to prevent local side-channel attacks in the case one of my untrusted AppVM is compromised, I have shutdown all the AppVMs running on the machine, leaving only dom0 and the computation VM running. Once the computation was completed, I created a second networkless VM where I moved the response. Then, I proceeded to delete the entire computation VM and reboot the machine. Best, Marco Giglio
0x88F9948D.asc
Description: application/pgp-keys
signature.asc
Description: OpenPGP digital signature
