Intel gave permission to Google to hack its servers operating on its new security hardware product dubbed “Trust Domain Extensions” (TDX). According to sources reporting to our cybersecurity insiders, permission to infiltrate its servers was given almost 10 months ago as part of an audit of its infrastructural defense-line.
Google Project’s Zero Bug Hunting team states that its researchers found about two significant vulnerabilities, and five of the newly found flaws were being used as proactive measures to strengthen the security of TDX’s defenses.
The silicon wafer manufacturing giant will use the intelligence obtained from the analysis of Intel’s 4th generation Intel Xeon Processor, named “Sapphire Rapids,” which will use TDX to keep customer data encrypted at all times.
On the other hand, this is not new to the web search giant, as it often involves in projects that let its engineers hack into the products developed by chipmakers for actionable insights. This approach helps in building a business relationship and integrating some of the best intellectual property into its data center infrastructure.
As hacking gangs become highly sophisticated, those involved in the R&D of computing hardware and software should be extra vigilant while developing new products without vulnerabilities.
So, at this juncture, if a company collaborates with other technology-driven firms, actionable insights can be gained through black-box testing, where potential flaws are uncovered, making the product completely secure.
Intel did exactly the same by joining hands with Google Cloud Security to find flaws in its TDX hardware and is all set to integrate the hardware extension into its Sapphire Rapids processors by October of this year.