TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Google reveals its servers all contain custom security silicon

363 pointsby chris-atover 8 years ago

10 comments

sergiosgcover 8 years ago
This is another signal of an interesting development on the hardware front. What used to be decoupled, with some companies offering hardware, and different companies buying hardware, is now coupled and hidden within these mega-companies (Google, Amazon, FB).<p>Google is big enough to develop a trusted hardware solution for internal use only, it has no financial need to sell it. Worse, due to competitiveness in the cloud segment, it is dis-incentivized from selling the solution.<p>Amazon Glacier is another one. It&#x27;s an interesting long-term storage solution, whose hardware implementation is unavailable to the market, since AMZN can better explore it as a service under AWS.<p>We are heading onto a more closed ecosystem than we are used to up until here. The cloud, which gave us the immense positive benefit of moving all capex to opex, is birthing this immense negative side effect of closing off hardware implementations in favour of exploring the added value in the form of services.
评论 #13409823 未加载
评论 #13410913 未加载
评论 #13410270 未加载
评论 #13409964 未加载
评论 #13410019 未加载
评论 #13409765 未加载
评论 #13411175 未加载
评论 #13410694 未加载
评论 #13412862 未加载
评论 #13414562 未加载
评论 #13410420 未加载
评论 #13412171 未加载
评论 #13412772 未加载
评论 #13411751 未加载
评论 #13412312 未加载
评论 #13411001 未加载
评论 #13410054 未加载
NelsonMinarover 8 years ago
This is what security looks like when your threat model is well funded government agencies.
评论 #13411267 未加载
评论 #13410727 未加载
foobiekrover 8 years ago
The actual document - <a href="https:&#x2F;&#x2F;cloud.google.com&#x2F;security&#x2F;security-design&#x2F;" rel="nofollow">https:&#x2F;&#x2F;cloud.google.com&#x2F;security&#x2F;security-design&#x2F;</a> - was linked previously.<p>It is interesting that they are doing some variant of trusted computing mostly because their homogeneity would allow Google to build a robust containment architecture with much more rigorous whitelisting and a robust SW distribution rules that go beyond what a measuring host and local SW bundle verification can do. So defense in depth.<p>We (skyport systems) do the same thing as a service for enterprises (we sell and operate cloud-managed trusted systems as a service) and I will say it&#x27;s pretty hard to get people to think about depth and trustworthiness when the entire security industry has trained CIOs to believe that all they need to do is install some random agent on their VMs.<p>Good for Google.
tlbover 8 years ago
&quot;Before a decommissioned encrypted storage device can physically leave our custody, it is cleaned using a multi-step process that includes two independent verifications. Devices that do not pass this wiping procedure are physically destroyed (e.g. shredded) on-premise&quot;<p>Why not just shred all decommissioned disks? Someone must be buying them for enough money that Google created a multi-step process for cleaning and verifying them. Presumably Google keeps disks in commission until they&#x27;re no longer economic in their own operation.<p>So, does anyone know about the operation that makes profitable use of disks that are no longer economic for Google?
评论 #13413001 未加载
评论 #13414292 未加载
评论 #13412542 未加载
评论 #13412069 未加载
评论 #13412546 未加载
woliveirajrover 8 years ago
&gt; Disks get the following treatment:<p>&gt; “We enable hardware encryption support in our hard drives and SSDs and meticulously track each drive through its lifecycle. Before a decommissioned encrypted storage device can physically leave our custody, it is cleaned using a multi-step process that includes two independent verifications. Devices that do not pass this wiping procedure are physically destroyed (e.g. shredded) on-premise.”<p>Interesting. There were discussions on the past on how to clean HDD, if multiple-passes were really necessary or not.<p>Then SDD become the problem, since there is a interface between what you see (from the OS) and where the data really is (inside those chips). Now Google not only encrypts data before saving (that should be enough, no?) but also tries to wipe using multiple passes and 2 verifications.<p>Wonder how many companies do that.
评论 #13410118 未加载
评论 #13409636 未加载
评论 #13410292 未加载
评论 #13412817 未加载
评论 #13410341 未加载
评论 #13410717 未加载
评论 #13410891 未加载
DanielDentover 8 years ago
A lot of stuff from this made it&#x27;s way into the chromebook. There&#x27;s a verified boot process, hardware assisted key management, rollback protection, ...<p>And it&#x27;s all open source and nicely documented for anyone who cares to look. With a bit of work you can actually create your own chain of trust and run your own verified boot process.<p>It&#x27;s very cool.
评论 #13414804 未加载
ameliusover 8 years ago
But if they don&#x27;t own an IC fab, how do they know it is secure?
评论 #13411292 未加载
评论 #13411203 未加载
bogomipzover 8 years ago
I was curious about this:<p>&gt;&quot;There&#x27;s plenty more in the document, like news that Google&#x27;s public cloud runs virtual machines in a custom version of the KVM hypervisor.&quot;<p>Does anyone know if this &quot;container inside kvm&quot; is true of their internal infrastructure as well or its just an extra layer of security for their public facing cloud?
评论 #13413780 未加载
Duobixover 8 years ago
I barely dug into the article when It came to me: Google just did a lockout chip, 1980s Nintendo style.
评论 #13409517 未加载
gerbillyover 8 years ago
Still it doesn&#x27;t make me want to use their services.<p>They may indeed be really good at securing their data but &#x27;their data&#x27; ironically is derived from my emails and browsing history and that of my friends.