Secure Virtual Machines and Memory Encryption on Desktop Ryzen?

AMD's evil server guy could get your data if you ask me

AMD's selling point was even server admin could not get access to your VM

As I've said

Cant get the key out of ram when you boot the host ?

You could boot the host in a VM if needed ?

I'm really not sure you've read my posts lol

No code on the host, not even OS or hypervisor can see the key.

Towards what end?

So how does any code ever run on the cpu ?

Noone has the key !

Seriously now?

Clearly the CPU has the key in ram at some point or its a door stop...Physical access is still game over

No, just no. Why would it store the key in RAM? It's just stored in the CPU itself.
Even if it was stored in RAM, the CPU could just deny access to reading from that address.

CPU's step through memory one byte at a time.....CPUs need memory to ever work....

At some point the key has to be loaded into the CPUI. then your done.

No. CPUs copy large swathes of memory all at once.

Yes, but not for storing the keys. (Actually, technically, they don't need memory at all.)
EDIT: Yes they do need memory, but not RAM.

No. The key is generated in the CPU. Where would it come from anyway?

I think you are thinking too much about the simple, clean, theoretical concept of a CPU. In reality modern processors are vast, complex machines that can do a lot more than simply read data byte by byte and process it.

FOR fucks sack CPUs run machine code. One instruction after another...step by step.

Yes, unencrypted, from the cache. So?

It's really simple. The keys don't leave the CPU. Ever.
Nor do they enter it.

At least not unencrypted.

How do they get into the CPU to start with ?

Seriously now, read my responses.

So even in a VM the software would not work ?