Vinoth (Mobile security)<p>This is my <a href="https://infosec.exchange/tags/indroduction" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>indroduction</span></a> post. I hope I am doing this right.</p><p>I am Vinoth, from San Diego. I lead the silicon security architecture and silicon security operations teams at <a href="https://infosec.exchange/tags/Google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Google</span></a>. Before this, I worked on mobile silicon security at <a href="https://infosec.exchange/tags/Qualcomm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Qualcomm</span></a>. I will mostly talk about <a href="https://infosec.exchange/tags/mobilesecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mobilesecurity</span></a>, <a href="https://infosec.exchange/tags/androidsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>androidsecurity</span></a> and <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a>. </p><p>Much of my work is about improving the security of <a href="https://infosec.exchange/tags/Pixel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pixel</span></a> and other <a href="https://infosec.exchange/tags/Android" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Android</span></a> devices. My expertise is at the intersection of hardware security architecture, software security architecture and silicon security operations (secure key provisioning, code signing, device attestation etc.). I have ~20 years of experience making mistakes at this particular intersection that make me feel eminently qualified to talk about how to not make them. </p><p>I love explaining the intricacies of silicon development to software engineers and vice versa. So if you want to understand the hardware underpinnings of Trusted compute, confidential compute or whatever, I'm your guy.</p><p>I sometimes hold unpopular opinions, and I welcome healthy discussions about them. For example, (a) open sourcing RTL will not improve hardware security to the same extent open source software improved software security (b) there are situations where compliance actively harms security.</p><p>Also a medidator, volunteer at <a href="https://infosec.exchange/tags/ishafoundation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ishafoundation</span></a>, father of 2 kids, husband of 1 wife, angel investor and a very curious human being.</p>