{"id":4011,"date":"2018-06-22T21:46:19","date_gmt":"2018-06-22T21:46:19","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/did-you-have-locking-down-ai-and-blockchain-as-possible-intel-sgx-uses-if-so-congrats\/"},"modified":"2018-06-22T21:46:19","modified_gmt":"2018-06-22T21:46:19","slug":"did-you-have-locking-down-ai-and-blockchain-as-possible-intel-sgx-uses-if-so-congrats","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/did-you-have-locking-down-ai-and-blockchain-as-possible-intel-sgx-uses-if-so-congrats\/","title":{"rendered":"Did you have locking down AI and blockchain as possible Intel SGX uses? If so, congrats&#8230;"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2016\/08\/02\/shutterstock_mobe_chip.jpg?x=1200&amp;y=794\" class=\"ff-og-image-inserted\"\/><\/div>\n<p><strong class=\"trailer\">Israel Cyber Week<\/strong> At the Cyber Week security conference in Israel on Tuesday, chip giant Intel plans to discuss how it is addressing threats to the overexposed tech celebrities known as AI and blockchain.<\/p>\n<p>Spoiler: its strategy involves enticing other companies to implement Intel Software Guard Extensions (SGX).<\/p>\n<p>In remarks provided in advance to <em>The Register<\/em>, Rick Echevarria, VP of Intel&#8217;s software and services group and general manager of the company&#8217;s platforms security division, will declare that trusted, secure computing depends on the ability of organizations to work together.<\/p>\n<p>This is a roundabout way of saying no company is an island, and Intel can lend a hand.<\/p>\n<p>&#8220;Intel technologies provide unique capabilities that can help improve the privacy, security and scalability for data-centric workloads like AI and blockchain,&#8221; Echevarria says.<\/p>\n<p>Sure enough <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/software.intel.com\/en-us\/sgx\/details\">SGX<\/a> is unique, in name at least if not in concept \u2013 AMD&#8217;s hardware security tech is called Secure Memory Encryption (<a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/developer.amd.com\/wordpress\/media\/2013\/12\/AMD_Memory_Encryption_Whitepaper_v7-Public.pdf\">SME<\/a>) and Secure Encrypted Virtualization (<a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/developer.amd.com\/wp-content\/resources\/55766_SEV-KM%20API_Specification.pdf\">SEV<\/a>). Arm has something similar called <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/developer.arm.com\/technologies\/trustzone\">TrustZone<\/a>.<\/p>\n<p>And SGX is being supported by partners to make AI \u2013 those algorithms we worry aren&#8217;t transparent enough \u2013 more secure.<\/p>\n<h3 class=\"crosshead\"><span>Algorithms<\/span><\/h3>\n<p>In April, at the RSA Conference, Intel talked up Threat Detection Technology, which is being supported by Microsoft and Cisco. Now comes word of Intel&#8217;s work with partners to protect data and algorithms.<\/p>\n<p>Chipzilla, said Echevarria, is working with Docker to make AI secure and sharable enough to allow federated machine learning. Key to this conceit is hardening software-based containers with Intel&#8217;s silicon security tech.<\/p>\n<p>The processor maker is also working with Duality to support homomorphic encryption \u2013 by which encrypted data can be used for calculations without being decrypted \u2013 on Intel hardware.<\/p>\n<p>Then there&#8217;s Fortanix, which has tweaked its Runtime Encryption Platform to support container-based Python applications and applications written in R. The two programming languages are widely used for machine learning so their addition to the Runtime Encryption Platform, with support for SGX, should enable more secure AI and data science algorithms.<\/p>\n<h3 class=\"crosshead\"><span>Challenges<\/span><\/h3>\n<p>Beyond hardening AI against the humans who might challenge it, Intel sees value in adding protection to the blockchain, despite reports that <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.gartner.com\/newsroom\/id\/3873790\">almost no one<\/a> is actually using it in enterprise organizations.<\/p>\n<p>In accordance with its blockchain burnishment, Echevarria contends Intel&#8217;s chip tech can improve privacy and throughput for blockchain applications, most of which presently seem to involve the words &#8220;distributed &#8220;and &#8220;ledger&#8221; in that order or sometimes &#8220;smart&#8221; paired with &#8220;contracts.&#8221;<\/p>\n<p>The chip fabber&#8217;s tech has been embraced by Enigma, an Israel-based firm, which <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/medium.com\/@EnigmaMPC\/ccb363280c73\">just announced<\/a> an SGX-strengthened &#8220;public blockchain that supports privacy-preserving &#8216;secret&#8217; contracts,&#8221; which won&#8217;t actually be available until later this year.<\/p>\n<p>Echevarria also points to Intel&#8217;s recently announced decision to join <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/discover.sap.com\/sap-blockchain-consortium\/en-us\/index.html\">SAP&#8217;s blockchain consortium<\/a> and an effort disclosed a month ago by Accenture, The Floor and the Tel Aviv Stock Exchange to build a blockchain security lending platform atop Intel tech as signs that the almost 50 year-old chip biz is hip to current trends.<\/p>\n<p>&#8220;Security is pivotal to our company\u2019s strategy and a fundamental underpinning for all workloads, especially those that are as data-centric as AI and blockchain,&#8221; said Echevarria. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1759\/shttp:\/\/www.mcubed.london\/\">Minds Mastering Machines &#8211; Call for papers now open<\/a><\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2018\/06\/20\/intel_sgx_uses\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Bias-enabling algorithms and smart contract tech no one quite trusts now easier to secure Israel Cyber Week\u00a0 At the Cyber Week security conference in Israel on Tuesday, chip giant Intel plans to discuss how it is addressing threats to the overexposed tech celebrities known as AI and blockchain.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":4012,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-4011","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Did you have locking down AI and blockchain as possible Intel SGX uses? If so, congrats... 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/did-you-have-locking-down-ai-and-blockchain-as-possible-intel-sgx-uses-if-so-congrats\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Did you have locking down AI and blockchain as possible Intel SGX uses? If so, congrats... 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/did-you-have-locking-down-ai-and-blockchain-as-possible-intel-sgx-uses-if-so-congrats\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-06-22T21:46:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/did-you-have-locking-down-ai-and-blockchain-as-possible-intel-sgx-uses-if-so-congrats.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"794\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/did-you-have-locking-down-ai-and-blockchain-as-possible-intel-sgx-uses-if-so-congrats\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/did-you-have-locking-down-ai-and-blockchain-as-possible-intel-sgx-uses-if-so-congrats\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Did you have locking down AI and blockchain as possible Intel SGX uses? If so, congrats&#8230;\",\"datePublished\":\"2018-06-22T21:46:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/did-you-have-locking-down-ai-and-blockchain-as-possible-intel-sgx-uses-if-so-congrats\\\/\"},\"wordCount\":554,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/did-you-have-locking-down-ai-and-blockchain-as-possible-intel-sgx-uses-if-so-congrats\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/did-you-have-locking-down-ai-and-blockchain-as-possible-intel-sgx-uses-if-so-congrats.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/did-you-have-locking-down-ai-and-blockchain-as-possible-intel-sgx-uses-if-so-congrats\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/did-you-have-locking-down-ai-and-blockchain-as-possible-intel-sgx-uses-if-so-congrats\\\/\",\"name\":\"Did you have locking down AI and blockchain as possible Intel SGX uses? If so, congrats... 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/did-you-have-locking-down-ai-and-blockchain-as-possible-intel-sgx-uses-if-so-congrats\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/did-you-have-locking-down-ai-and-blockchain-as-possible-intel-sgx-uses-if-so-congrats\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/did-you-have-locking-down-ai-and-blockchain-as-possible-intel-sgx-uses-if-so-congrats.jpg\",\"datePublished\":\"2018-06-22T21:46:19+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/did-you-have-locking-down-ai-and-blockchain-as-possible-intel-sgx-uses-if-so-congrats\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/did-you-have-locking-down-ai-and-blockchain-as-possible-intel-sgx-uses-if-so-congrats\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/did-you-have-locking-down-ai-and-blockchain-as-possible-intel-sgx-uses-if-so-congrats\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/did-you-have-locking-down-ai-and-blockchain-as-possible-intel-sgx-uses-if-so-congrats.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/did-you-have-locking-down-ai-and-blockchain-as-possible-intel-sgx-uses-if-so-congrats.jpg\",\"width\":1200,\"height\":794},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/did-you-have-locking-down-ai-and-blockchain-as-possible-intel-sgx-uses-if-so-congrats\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Did you have locking down AI and blockchain as possible Intel SGX uses? If so, congrats&#8230;\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Did you have locking down AI and blockchain as possible Intel SGX uses? If so, congrats... 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/did-you-have-locking-down-ai-and-blockchain-as-possible-intel-sgx-uses-if-so-congrats\/","og_locale":"en_US","og_type":"article","og_title":"Did you have locking down AI and blockchain as possible Intel SGX uses? If so, congrats... 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/did-you-have-locking-down-ai-and-blockchain-as-possible-intel-sgx-uses-if-so-congrats\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-06-22T21:46:19+00:00","og_image":[{"width":1200,"height":794,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/did-you-have-locking-down-ai-and-blockchain-as-possible-intel-sgx-uses-if-so-congrats.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/did-you-have-locking-down-ai-and-blockchain-as-possible-intel-sgx-uses-if-so-congrats\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/did-you-have-locking-down-ai-and-blockchain-as-possible-intel-sgx-uses-if-so-congrats\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Did you have locking down AI and blockchain as possible Intel SGX uses? If so, congrats&#8230;","datePublished":"2018-06-22T21:46:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/did-you-have-locking-down-ai-and-blockchain-as-possible-intel-sgx-uses-if-so-congrats\/"},"wordCount":554,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/did-you-have-locking-down-ai-and-blockchain-as-possible-intel-sgx-uses-if-so-congrats\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/did-you-have-locking-down-ai-and-blockchain-as-possible-intel-sgx-uses-if-so-congrats.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/did-you-have-locking-down-ai-and-blockchain-as-possible-intel-sgx-uses-if-so-congrats\/","url":"https:\/\/www.threatshub.org\/blog\/did-you-have-locking-down-ai-and-blockchain-as-possible-intel-sgx-uses-if-so-congrats\/","name":"Did you have locking down AI and blockchain as possible Intel SGX uses? If so, congrats... 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/did-you-have-locking-down-ai-and-blockchain-as-possible-intel-sgx-uses-if-so-congrats\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/did-you-have-locking-down-ai-and-blockchain-as-possible-intel-sgx-uses-if-so-congrats\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/did-you-have-locking-down-ai-and-blockchain-as-possible-intel-sgx-uses-if-so-congrats.jpg","datePublished":"2018-06-22T21:46:19+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/did-you-have-locking-down-ai-and-blockchain-as-possible-intel-sgx-uses-if-so-congrats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/did-you-have-locking-down-ai-and-blockchain-as-possible-intel-sgx-uses-if-so-congrats\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/did-you-have-locking-down-ai-and-blockchain-as-possible-intel-sgx-uses-if-so-congrats\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/did-you-have-locking-down-ai-and-blockchain-as-possible-intel-sgx-uses-if-so-congrats.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/did-you-have-locking-down-ai-and-blockchain-as-possible-intel-sgx-uses-if-so-congrats.jpg","width":1200,"height":794},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/did-you-have-locking-down-ai-and-blockchain-as-possible-intel-sgx-uses-if-so-congrats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Did you have locking down AI and blockchain as possible Intel SGX uses? If so, congrats&#8230;"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/4011","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=4011"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/4011\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/4012"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=4011"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=4011"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=4011"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}