Security

Security is the number one priority of NTFX. The whole idea of NTFX is to run Windows EXE's, Linux code, or macOS Apps containerized with native performance. The problem with this is that not all executables are treated the same. For example, macOS apps have limited functionality while Linux apps are much more open capable. To get around this we needed a top of the line Security implementation. For this, we created Microart DelV, an encryption platform that uses an existing TPM or our very own virutal TPM.

DelV

Libraries

DelV has many libraries for various encryption. Like the entire SHA family of ciphers, BCrpypt and many more. DelV also has its own Alpha encryption cipher which uses a custom implementation that is designed to run only on a TPM.

How it works

DelV processes keys and data exclusively on a TPM, if one is not preset, DelV will use Microart Nex to virtualize a TPM. Virtual TPM's are still much more secure than any other implementation because they can utilize HLI (Hardware Level Isolation) which lets virutal systems run physically seperate from the Host OS.

The TPM

Pin
Description
1

LCLK (low)

2

GND (v)

3

LFRAME (low)

4

LRESET

5

NC

6

LAD3

7

LAD2

8

VCC3

The following pins are emulated by Microart Nex using the Carburetor API.

Fusion TPM

Fusion TPM is an experimental TPM replacement that does not use virtualization. Its purpose is to bring the security of DelV to devices that do not support TPM or virtualization. Currently Fusion TPM is still in the design phase. No real-world prototypes have been developed yet.

Legacy Encrypt

DelV also does provide a simple "legacy" API that just runs instructions on the CPU instead of a dedicated secure device. This does pose many security risks, but still implements some security features that other libraries do no support yet.

Last updated