Return of the sovereign cloud

Black Hat: Hackers are using skeleton keys to target chip vendors