AMD SME protects against physical access attacks. To my knowledge no process-based enclave solution was presented by AMD based on SME.
Instead AMD went the route of VM-based enclaves in the form of SEV. Intel is following this direction with TDX.
The concept of VM-based enclaves is slightly different and trades a larger Trusted-Computing-Base (TCB) for better lift-and-shift.
You could run unmodified Go applications in your SEV/TDX VM so there is no need for EGo in this context.
Potentially we'll add attestation features for SEV/TDX for our enclave- and client-libraries that are part of EGo.
Here is a (slightly outdated comparison) of SGX and SME/SEV: https://caslab.csl.yale.edu/workshops/hasp2018/HASP18_a9-mof...
m1ghtym0|4 years ago