<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Blogs on Gauthier Jolly</title>
    <link>https://gjolly.fr/blog/</link>
    <description>Recent content in Blogs on Gauthier Jolly</description>
    <generator>Hugo -- 0.154.5</generator>
    <language>en</language>
    <lastBuildDate>Wed, 21 Jan 2026 17:30:00 +0000</lastBuildDate>
    <atom:link href="https://gjolly.fr/blog/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>The trust model of vTPM in Confidential VMs</title>
      <link>https://gjolly.fr/blog/ek-cvm-binding/</link>
      <pubDate>Wed, 21 Jan 2026 17:30:00 +0000</pubDate>
      <guid>https://gjolly.fr/blog/ek-cvm-binding/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://gjolly.fr/blog/confidential-computing-vision/&#34;&gt;In a previous post&lt;/a&gt;, I explained that the direction most Confidential Computing deployments are converging toward is to &lt;strong&gt;reintroduce the TPM abstraction inside the Confidential VM itself&lt;/strong&gt;. Rather than relying on a physical TPM, the goal is to expose a TPM interface from within the TEE.&lt;/p&gt;
&lt;p&gt;This design choice is largely pragmatic. It enables a lift-and-shift model for existing operating systems and workloads that already depend on TPMs for measured boot, disk encryption, and remote attestation. At the same time, it preserves the familiar TPM security guarantees while replacing physical trust assumptions with hardware-enforced isolation.&lt;/p&gt;</description>
    </item>
    <item>
      <title>The race toward Confidential AI inference</title>
      <link>https://gjolly.fr/blog/confidential-ai-inference/</link>
      <pubDate>Sun, 18 Jan 2026 15:30:00 +0000</pubDate>
      <guid>https://gjolly.fr/blog/confidential-ai-inference/</guid>
      <description>&lt;p&gt;For almost half a decade now, I have been working on Confidential Computing at Canonical. This position has given me a front-row seat to the evolution of Confidential Computing technologies and their applications.&lt;/p&gt;
&lt;p&gt;One of the most exciting applications is Confidential AI inference, which allows AI models to be hosted and executed in a way that can keep the user&amp;rsquo;s input data confidential, even from the service provider itself.&lt;/p&gt;
&lt;p&gt;While Apple is announcing &lt;a href=&#34;https://blog.google/company-news/inside-google/company-announcements/joint-statement-google-apple/&#34;&gt;a partnership with Google&lt;/a&gt;, to base its own models on Google Gemini and while some might see this as a failure, it is worth noting that Apple Intelligence already has a meaningful legacy.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Attestable Immutable Nodes for Kubernetes</title>
      <link>https://gjolly.fr/blog/confidential-computing-vision/</link>
      <pubDate>Wed, 14 Jan 2026 15:30:00 +0000</pubDate>
      <guid>https://gjolly.fr/blog/confidential-computing-vision/</guid>
      <description>How immutable operating systems and Confidential Computing can provide a trustworthy foundation for Kubernetes worker nodes</description>
    </item>
    <item>
      <title>Exposing a local web server using Cloudflare Tunnels</title>
      <link>https://gjolly.fr/blog/cf-tunnels/</link>
      <pubDate>Tue, 16 Dec 2025 15:30:00 +0000</pubDate>
      <guid>https://gjolly.fr/blog/cf-tunnels/</guid>
      <description>Make your local web server accessible from the internet using Cloudflare Tunnels</description>
    </item>
    <item>
      <title>Build an AI inference server on Ubuntu</title>
      <link>https://gjolly.fr/blog/llm-inference/</link>
      <pubDate>Sat, 13 Dec 2025 19:10:00 +0000</pubDate>
      <guid>https://gjolly.fr/blog/llm-inference/</guid>
      <description>Deploy local LLM inference with Ollama and Open WebUI</description>
    </item>
    <item>
      <title>Build an Ubuntu Destkop image with genesis</title>
      <link>https://gjolly.fr/blog/ubuntu-desktop-images/</link>
      <pubDate>Tue, 18 Nov 2025 12:10:00 +0000</pubDate>
      <guid>https://gjolly.fr/blog/ubuntu-desktop-images/</guid>
      <description>How to use my image build tool to easily build Desktop images</description>
    </item>
    <item>
      <title>How I built an Ubuntu archive mirror using Cloudflare</title>
      <link>https://gjolly.fr/blog/ubuntu-mirror/</link>
      <pubDate>Thu, 25 Sep 2025 11:30:00 +0100</pubDate>
      <guid>https://gjolly.fr/blog/ubuntu-mirror/</guid>
      <description>A fast and modern way to create an package mirror.</description>
    </item>
    <item>
      <title>Architecture of a Linux system and boot process</title>
      <link>https://gjolly.fr/blog/linux-system-boot/</link>
      <pubDate>Sat, 26 Apr 2025 11:10:00 +0000</pubDate>
      <guid>https://gjolly.fr/blog/linux-system-boot/</guid>
      <description>What makes a Linux system: Kernels, Root Filesystems, and the Boot Process</description>
    </item>
    <item>
      <title>Practical Guide To Virtual Networking on Linux</title>
      <link>https://gjolly.fr/blog/virtual-networking/</link>
      <pubDate>Wed, 23 Apr 2025 09:10:00 +0000</pubDate>
      <guid>https://gjolly.fr/blog/virtual-networking/</guid>
      <description>How to create and manage virtual networks on you Linux host.</description>
    </item>
    <item>
      <title>How to install NVIDIA drivers on Ubuntu</title>
      <link>https://gjolly.fr/blog/nivdia-drivers/</link>
      <pubDate>Wed, 12 Feb 2025 20:30:00 +0100</pubDate>
      <guid>https://gjolly.fr/blog/nivdia-drivers/</guid>
      <description>Stop installing the NVIDIA drivers from NVIDIA repos on Ubuntu</description>
    </item>
    <item>
      <title>Build an Ubuntu Server live image with mkosi</title>
      <link>https://gjolly.fr/blog/ubuntu-mkosi/</link>
      <pubDate>Sun, 22 Dec 2024 12:10:00 +0000</pubDate>
      <guid>https://gjolly.fr/blog/ubuntu-mkosi/</guid>
      <description>Let&amp;#39;s see how to use mkosi to build an Ubuntu image</description>
    </item>
    <item>
      <title>Boot Linux with coreboot without bootloader</title>
      <link>https://gjolly.fr/blog/boot-from-rom/</link>
      <pubDate>Mon, 14 Oct 2024 17:10:00 +0000</pubDate>
      <guid>https://gjolly.fr/blog/boot-from-rom/</guid>
      <description>Virtual firmware can be as big as you want, so you can fit a entire kernel.</description>
    </item>
    <item>
      <title>User temporary directory</title>
      <link>https://gjolly.fr/blog/user_tmp/</link>
      <pubDate>Mon, 07 Aug 2023 11:10:00 +0000</pubDate>
      <guid>https://gjolly.fr/blog/user_tmp/</guid>
      <description>A temporary directory in the user home folder</description>
    </item>
    <item>
      <title>A basic CLI tool to build Ubuntu images</title>
      <link>https://gjolly.fr/blog/genesis/</link>
      <pubDate>Fri, 09 Jun 2023 09:10:00 +0000</pubDate>
      <guid>https://gjolly.fr/blog/genesis/</guid>
      <description>Build Ubuntu images from scratch with a CLI tool</description>
    </item>
    <item>
      <title>FDE, Secureboot and unified kernel image</title>
      <link>https://gjolly.fr/blog/unified_kernel_sb/</link>
      <pubDate>Sun, 13 Nov 2022 09:10:00 +0000</pubDate>
      <guid>https://gjolly.fr/blog/unified_kernel_sb/</guid>
      <description>Full Disk Encryption on most Linux distro has a major security flow. Why? How to fix it?</description>
    </item>
    <item>
      <title>Boot Linux without GRUB</title>
      <link>https://gjolly.fr/blog/grub_less/</link>
      <pubDate>Fri, 19 Nov 2021 11:10:00 +0000</pubDate>
      <guid>https://gjolly.fr/blog/grub_less/</guid>
      <description>How to take advantage of the Kernel&amp;#39;s EFI stub to boot without any bootloader</description>
    </item>
    <item>
      <title>QEMU cheatsheet</title>
      <link>https://gjolly.fr/blog/qemu_cheatsheet/</link>
      <pubDate>Fri, 19 Nov 2021 11:10:00 +0000</pubDate>
      <guid>https://gjolly.fr/blog/qemu_cheatsheet/</guid>
      <description>How to use QEMU and a few tricks</description>
    </item>
    <item>
      <title>Firewall, Tailscale and Ubuntu</title>
      <link>https://gjolly.fr/blog/ufw/</link>
      <pubDate>Sun, 14 Nov 2021 13:10:00 +0000</pubDate>
      <guid>https://gjolly.fr/blog/ufw/</guid>
      <description>How to configure Ubuntu&amp;#39;s Firewall to allow SSH in with Tailscale</description>
    </item>
    <item>
      <title>The UNIX `who` command</title>
      <link>https://gjolly.fr/blog/who/</link>
      <pubDate>Mon, 31 Aug 2020 11:40:00 +0000</pubDate>
      <guid>https://gjolly.fr/blog/who/</guid>
      <description>Understanding where `who` gets its data</description>
    </item>
  </channel>
</rss>
