Security
Security is the number one priority of NTFX. The whole idea of NTFX is to run Windows EXE's, Linux code, or macOS Apps containerized with native performance. The problem with this is that not all executables are treated the same. For example, macOS apps have limited functionality while Linux apps are much more open capable. To get around this we needed a top of the line Security implementation. For this, we created Microart DelV, an encryption platform that uses an existing TPM or our very own virutal TPM.
DelV
Libraries
DelV has many libraries for various encryption. Like the entire SHA family of ciphers, BCrpypt and many more. DelV also has its own Alpha encryption cipher which uses a custom implementation that is designed to run only on a TPM.
How it works
DelV processes keys and data exclusively on a TPM, if one is not preset, DelV will use Microart Nex to virtualize a TPM. Virtual TPM's are still much more secure than any other implementation because they can utilize HLI (Hardware Level Isolation) which lets virutal systems run physically seperate from the Host OS.
The TPM
LCLK (low)
GND (v)
LFRAME (low)
LRESET
NC
LAD3
LAD2
VCC3
The following pins are emulated by Microart Nex using the Carburetor API.
Fusion TPM
Fusion TPM is an experimental TPM replacement that does not use virtualization. Its purpose is to bring the security of DelV to devices that do not support TPM or virtualization. Currently Fusion TPM is still in the design phase. No real-world prototypes have been developed yet.
Fusion TPM might not be available until 2023. It is intended for older devices only. If you need a drop in replacement, it highly recommended to either use vTPM or use DelV Legacy Encrypt.
Legacy Encrypt
DelV also does provide a simple "legacy" API that just runs instructions on the CPU instead of a dedicated secure device. This does pose many security risks, but still implements some security features that other libraries do no support yet.
Last updated