confidential-computing Confidential computing explained. Part 3: data in use protection Deep dive into the data-in-use protection mechanisms of secure enclaves