<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Sat, 09 May 2026 13:00:39 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Dave &amp; Gunnar Show - Episodes Tagged with “Enarx”</title>
    <link>https://dgshow.org/tags/enarx</link>
    <pubDate>Fri, 04 Nov 2022 05:00:00 -0500</pubDate>
    <description>David Egts and Gunnar Hellekson discuss privacy, security, robots, and internet ephemera.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Not our circus, not our monkey.</itunes:subtitle>
    <itunes:author>David Egts &amp; Gunnar Hellekson</itunes:author>
    <itunes:summary>David Egts and Gunnar Hellekson discuss privacy, security, robots, and internet ephemera.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/1/1b67eddd-d80f-444d-ba32-aa9ef36b589d/cover.jpg?v=2"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>privacy, security, robots, internet, open source, technology</itunes:keywords>
    <itunes:owner>
      <itunes:name>David Egts &amp; Gunnar Hellekson</itunes:name>
      <itunes:email>gunnar@hellekson.com</itunes:email>
    </itunes:owner>
<itunes:category text="Society &amp; Culture"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>Episode 239: The Bottom Turtle</title>
  <link>https://dgshow.org/239</link>
  <guid isPermaLink="false">3be567ec-edff-4ba6-92d8-337d05cfbf35</guid>
  <pubDate>Fri, 04 Nov 2022 05:00:00 -0500</pubDate>
  <author>David Egts &amp; Gunnar Hellekson</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/1b67eddd-d80f-444d-ba32-aa9ef36b589d/3be567ec-edff-4ba6-92d8-337d05cfbf35.mp3" length="13998467" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>David Egts &amp; Gunnar Hellekson</itunes:author>
  <itunes:subtitle>This week Dave talks with Mike Bursell about his new book, Trust in Computer Systems and the Cloud!</itunes:subtitle>
  <itunes:duration>29:10</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/1/1b67eddd-d80f-444d-ba32-aa9ef36b589d/episodes/3/3be567ec-edff-4ba6-92d8-337d05cfbf35/cover.jpg?v=1"/>
  <description>&lt;p&gt;This week Dave talks with &lt;a href="https://dgshow.org/guests/mbursell" target="_blank" rel="nofollow noopener"&gt;Mike Bursell&lt;/a&gt; about his new book, &lt;em&gt;&lt;a href="https://www.wiley.com/en-us/Trust+in+Computer+Systems+and+the+Cloud-p-9781119692324" target="_blank" rel="nofollow noopener"&gt;Trust in Computer Systems and the Cloud&lt;/a&gt;&lt;/em&gt;!&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Check out &lt;a href="https://dgshow.org/guests/mbursell" target="_blank" rel="nofollow noopener"&gt;Mike Bursell&lt;/a&gt; and &lt;a href="https://dgshow.org/guests/nmccallum" target="_blank" rel="nofollow noopener"&gt;Nathaniel McCallum&lt;/a&gt; on &lt;a href="https://dgshow.org/237" target="_blank" rel="nofollow noopener"&gt;episode 237&lt;/a&gt;!&lt;/li&gt;
&lt;li&gt;
&lt;em&gt;&lt;a href="https://www.wiley.com/en-us/Trust+in+Computer+Systems+and+the+Cloud-p-9781119692324" target="_blank" rel="nofollow noopener"&gt;Trust in Computer Systems and the Cloud&lt;/a&gt;&lt;/em&gt; by Mike Bursell&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.profian.com/" target="_blank" rel="nofollow noopener"&gt;Profian&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://defcon.org/" target="_blank" rel="nofollow noopener"&gt;Defcon&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://en.wikipedia.org/wiki/Blockchain" target="_blank" rel="nofollow noopener"&gt;Blockchain&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://en.wikipedia.org/wiki/Zero_trust_security_model" target="_blank" rel="nofollow noopener"&gt;Zero Trust&lt;/a&gt;: Poorly named? Would Explicit Trust be more accurate?&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.ece.cmu.edu/%7Eganger/712.fall02/papers/p761-thompson.pdf" target="_blank" rel="nofollow noopener"&gt;Reflections on Trusting Trust&lt;/a&gt; by &lt;a href="https://en.wikipedia.org/wiki/Ken_Thompson" target="_blank" rel="nofollow noopener"&gt;Ken Thompson&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="https://en.wikipedia.org/wiki/Trusted_Platform_Module" target="_blank" rel="nofollow noopener"&gt;Trusted Platform Module (TPM)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://en.wikipedia.org/wiki/Hardware_security_module" target="_blank" rel="nofollow noopener"&gt;Hardware Security Module (HSM)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://en.wikipedia.org/wiki/Trusted_execution_environment" target="_blank" rel="nofollow noopener"&gt;Trusted Execution Environment (TEE)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://en.wikipedia.org/wiki/Trusted_Computing" target="_blank" rel="nofollow noopener"&gt;Trusted computing&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://aliceevebob.com/2019/12/03/confidential-computing-the-new-https/" target="_blank" rel="nofollow noopener"&gt;Confidential computing – the new HTTPS?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://enarx.dev/" target="_blank" rel="nofollow noopener"&gt;Enarx&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://en.wikipedia.org/wiki/Idris_Elba" target="_blank" rel="nofollow noopener"&gt;Idris Elba&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://en.wikipedia.org/wiki/Horrible_Histories_(2001_TV_series)" target="_blank" rel="nofollow noopener"&gt;Horrible Histories&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;We Give Thanks&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://dgshow.org/guests/mbursell" target="_blank" rel="nofollow noopener"&gt;Mike Bursell&lt;/a&gt;, for joining us on the show! Special Guest: Mike Bursell.&lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>Trust in Computer Systems and the Cloud, trust, Profian, Defcon, blockchain, zero trust, Reflections on Trusting Trust, Ken Thompson, trusted platform modules, TPM, hardware security modules, HSM, trusted execution environments, TEE, trusted computing, confidential computing, Enarx, Idris Elba, Horrible Histories</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week Dave talks with <a href="https://dgshow.org/guests/mbursell" rel="nofollow">Mike Bursell</a> about his new book, <em><a href="https://www.wiley.com/en-us/Trust+in+Computer+Systems+and+the+Cloud-p-9781119692324" rel="nofollow">Trust in Computer Systems and the Cloud</a></em>!</p>

<ul>
<li>Check out <a href="https://dgshow.org/guests/mbursell" rel="nofollow">Mike Bursell</a> and <a href="https://dgshow.org/guests/nmccallum" rel="nofollow">Nathaniel McCallum</a> on <a href="https://dgshow.org/237" rel="nofollow">episode 237</a>!</li>
<li><em><a href="https://www.wiley.com/en-us/Trust+in+Computer+Systems+and+the+Cloud-p-9781119692324" rel="nofollow">Trust in Computer Systems and the Cloud</a></em> by Mike Bursell</li>
<li><a href="https://www.profian.com/" rel="nofollow">Profian</a></li>
<li><a href="https://defcon.org/" rel="nofollow">Defcon</a></li>
<li><a href="https://en.wikipedia.org/wiki/Blockchain" rel="nofollow">Blockchain</a></li>
<li><a href="https://en.wikipedia.org/wiki/Zero_trust_security_model" rel="nofollow">Zero Trust</a>: Poorly named? Would Explicit Trust be more accurate?</li>
<li><a href="http://www.ece.cmu.edu/%7Eganger/712.fall02/papers/p761-thompson.pdf" rel="nofollow">Reflections on Trusting Trust</a> by <a href="https://en.wikipedia.org/wiki/Ken_Thompson" rel="nofollow">Ken Thompson</a> </li>
<li><a href="https://en.wikipedia.org/wiki/Trusted_Platform_Module" rel="nofollow">Trusted Platform Module (TPM)</a></li>
<li><a href="https://en.wikipedia.org/wiki/Hardware_security_module" rel="nofollow">Hardware Security Module (HSM)</a></li>
<li><a href="https://en.wikipedia.org/wiki/Trusted_execution_environment" rel="nofollow">Trusted Execution Environment (TEE)</a></li>
<li><a href="https://en.wikipedia.org/wiki/Trusted_Computing" rel="nofollow">Trusted computing</a></li>
<li><a href="https://aliceevebob.com/2019/12/03/confidential-computing-the-new-https/" rel="nofollow">Confidential computing – the new HTTPS?</a></li>
<li><a href="https://enarx.dev/" rel="nofollow">Enarx</a></li>
<li><a href="https://en.wikipedia.org/wiki/Idris_Elba" rel="nofollow">Idris Elba</a></li>
<li><a href="https://en.wikipedia.org/wiki/Horrible_Histories_(2001_TV_series)" rel="nofollow">Horrible Histories</a></li>
</ul>

<p><strong>We Give Thanks</strong></p>

<ul>
<li><a href="https://dgshow.org/guests/mbursell" rel="nofollow">Mike Bursell</a>, for joining us on the show!</li>
</ul><p>Special Guest: Mike Bursell.</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week Dave talks with <a href="https://dgshow.org/guests/mbursell" rel="nofollow">Mike Bursell</a> about his new book, <em><a href="https://www.wiley.com/en-us/Trust+in+Computer+Systems+and+the+Cloud-p-9781119692324" rel="nofollow">Trust in Computer Systems and the Cloud</a></em>!</p>

<ul>
<li>Check out <a href="https://dgshow.org/guests/mbursell" rel="nofollow">Mike Bursell</a> and <a href="https://dgshow.org/guests/nmccallum" rel="nofollow">Nathaniel McCallum</a> on <a href="https://dgshow.org/237" rel="nofollow">episode 237</a>!</li>
<li><em><a href="https://www.wiley.com/en-us/Trust+in+Computer+Systems+and+the+Cloud-p-9781119692324" rel="nofollow">Trust in Computer Systems and the Cloud</a></em> by Mike Bursell</li>
<li><a href="https://www.profian.com/" rel="nofollow">Profian</a></li>
<li><a href="https://defcon.org/" rel="nofollow">Defcon</a></li>
<li><a href="https://en.wikipedia.org/wiki/Blockchain" rel="nofollow">Blockchain</a></li>
<li><a href="https://en.wikipedia.org/wiki/Zero_trust_security_model" rel="nofollow">Zero Trust</a>: Poorly named? Would Explicit Trust be more accurate?</li>
<li><a href="http://www.ece.cmu.edu/%7Eganger/712.fall02/papers/p761-thompson.pdf" rel="nofollow">Reflections on Trusting Trust</a> by <a href="https://en.wikipedia.org/wiki/Ken_Thompson" rel="nofollow">Ken Thompson</a> </li>
<li><a href="https://en.wikipedia.org/wiki/Trusted_Platform_Module" rel="nofollow">Trusted Platform Module (TPM)</a></li>
<li><a href="https://en.wikipedia.org/wiki/Hardware_security_module" rel="nofollow">Hardware Security Module (HSM)</a></li>
<li><a href="https://en.wikipedia.org/wiki/Trusted_execution_environment" rel="nofollow">Trusted Execution Environment (TEE)</a></li>
<li><a href="https://en.wikipedia.org/wiki/Trusted_Computing" rel="nofollow">Trusted computing</a></li>
<li><a href="https://aliceevebob.com/2019/12/03/confidential-computing-the-new-https/" rel="nofollow">Confidential computing – the new HTTPS?</a></li>
<li><a href="https://enarx.dev/" rel="nofollow">Enarx</a></li>
<li><a href="https://en.wikipedia.org/wiki/Idris_Elba" rel="nofollow">Idris Elba</a></li>
<li><a href="https://en.wikipedia.org/wiki/Horrible_Histories_(2001_TV_series)" rel="nofollow">Horrible Histories</a></li>
</ul>

<p><strong>We Give Thanks</strong></p>

<ul>
<li><a href="https://dgshow.org/guests/mbursell" rel="nofollow">Mike Bursell</a>, for joining us on the show!</li>
</ul><p>Special Guest: Mike Bursell.</p>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 201: Trust Issues</title>
  <link>https://dgshow.org/201</link>
  <guid isPermaLink="false">dc0a5d29-3905-4aef-8948-2ab51580a946</guid>
  <pubDate>Mon, 27 Jul 2020 07:00:00 -0500</pubDate>
  <author>David Egts &amp; Gunnar Hellekson</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/1b67eddd-d80f-444d-ba32-aa9ef36b589d/dc0a5d29-3905-4aef-8948-2ab51580a946.mp3" length="13310663" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>David Egts &amp; Gunnar Hellekson</itunes:author>
  <itunes:subtitle>This week Dave talks with Mike Bursell about how he handles his trust issues with Enarx!</itunes:subtitle>
  <itunes:duration>27:43</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/1/1b67eddd-d80f-444d-ba32-aa9ef36b589d/episodes/d/dc0a5d29-3905-4aef-8948-2ab51580a946/cover.jpg?v=2"/>
  <description>&lt;p&gt;This week &lt;a href="https://twitter.com/davidegts" target="_blank" rel="nofollow noopener"&gt;Dave&lt;/a&gt; talks with &lt;a href="https://twitter.com/mikecamel" target="_blank" rel="nofollow noopener"&gt;Mike Bursell&lt;/a&gt; about how he handles his trust issues with Enarx!&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;  &lt;a href="https://enarx.io/" target="_blank" rel="nofollow noopener"&gt;Enarx&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;  &lt;a href="https://en.wikipedia.org/wiki/Trusted_execution_environment" target="_blank" rel="nofollow noopener"&gt;Trusted Execution Environment (TEE)&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;  &lt;a href="https://next.redhat.com/2019/08/16/trust-no-one-run-everywhere-introducing-enarx/" target="_blank" rel="nofollow noopener"&gt;Trust No One, Run Everywhere–Introducing Enarx&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;  &lt;a href="https://opensource.com/article/19/5/enarx-security" target="_blank" rel="nofollow noopener"&gt;Announcing Enarx for running sensitive workloads&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;  &lt;a href="https://next.redhat.com/2020/07/01/enarx-project-maturity-update/" target="_blank" rel="nofollow noopener"&gt;Enarx - project maturity update&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;  &lt;a href="http://aliceevebob.com/2020/07/07/enarx-news-webassembly-sgx/" target="_blank" rel="nofollow noopener"&gt;Enarx news: WebAssembly + SGX&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;  Follow &lt;a href="https://twitter.com/enarxproject" target="_blank" rel="nofollow noopener"&gt;@enarxproject&lt;/a&gt; on Twitter&lt;/li&gt;
&lt;li&gt;  &lt;a href="https://confidentialcomputing.io" target="_blank" rel="nofollow noopener"&gt;https://confidentialcomputing.io&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;We Give Thanks&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;  &lt;a href="https://twitter.com/mikecamel" target="_blank" rel="nofollow noopener"&gt;Mike Bursell&lt;/a&gt; for being our special guest star! Special Guest: Mike Bursell.&lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>Enarx, trusted execution environment, TEE, confidential computing</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week <a href="https://twitter.com/davidegts" rel="nofollow">Dave</a> talks with <a href="https://twitter.com/mikecamel" rel="nofollow">Mike Bursell</a> about how he handles his trust issues with Enarx!</p>

<ul>
<li>  <a href="https://enarx.io/" rel="nofollow">Enarx</a></li>
<li>  <a href="https://en.wikipedia.org/wiki/Trusted_execution_environment" rel="nofollow">Trusted Execution Environment (TEE)</a></li>
<li>  <a href="https://next.redhat.com/2019/08/16/trust-no-one-run-everywhere-introducing-enarx/" rel="nofollow">Trust No One, Run Everywhere–Introducing Enarx</a></li>
<li>  <a href="https://opensource.com/article/19/5/enarx-security" rel="nofollow">Announcing Enarx for running sensitive workloads</a></li>
<li>  <a href="https://next.redhat.com/2020/07/01/enarx-project-maturity-update/" rel="nofollow">Enarx - project maturity update</a></li>
<li>  <a href="http://aliceevebob.com/2020/07/07/enarx-news-webassembly-sgx/" rel="nofollow">Enarx news: WebAssembly + SGX</a></li>
<li>  Follow <a href="https://twitter.com/enarxproject" rel="nofollow">@enarxproject</a> on Twitter</li>
<li>  <a href="https://confidentialcomputing.io" rel="nofollow">https://confidentialcomputing.io</a> </li>
</ul>

<p><strong>We Give Thanks</strong></p>

<ul>
<li>  <a href="https://twitter.com/mikecamel" rel="nofollow">Mike Bursell</a> for being our special guest star!</li>
</ul><p>Special Guest: Mike Bursell.</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week <a href="https://twitter.com/davidegts" rel="nofollow">Dave</a> talks with <a href="https://twitter.com/mikecamel" rel="nofollow">Mike Bursell</a> about how he handles his trust issues with Enarx!</p>

<ul>
<li>  <a href="https://enarx.io/" rel="nofollow">Enarx</a></li>
<li>  <a href="https://en.wikipedia.org/wiki/Trusted_execution_environment" rel="nofollow">Trusted Execution Environment (TEE)</a></li>
<li>  <a href="https://next.redhat.com/2019/08/16/trust-no-one-run-everywhere-introducing-enarx/" rel="nofollow">Trust No One, Run Everywhere–Introducing Enarx</a></li>
<li>  <a href="https://opensource.com/article/19/5/enarx-security" rel="nofollow">Announcing Enarx for running sensitive workloads</a></li>
<li>  <a href="https://next.redhat.com/2020/07/01/enarx-project-maturity-update/" rel="nofollow">Enarx - project maturity update</a></li>
<li>  <a href="http://aliceevebob.com/2020/07/07/enarx-news-webassembly-sgx/" rel="nofollow">Enarx news: WebAssembly + SGX</a></li>
<li>  Follow <a href="https://twitter.com/enarxproject" rel="nofollow">@enarxproject</a> on Twitter</li>
<li>  <a href="https://confidentialcomputing.io" rel="nofollow">https://confidentialcomputing.io</a> </li>
</ul>

<p><strong>We Give Thanks</strong></p>

<ul>
<li>  <a href="https://twitter.com/mikecamel" rel="nofollow">Mike Bursell</a> for being our special guest star!</li>
</ul><p>Special Guest: Mike Bursell.</p>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
