Data protection

Daniel Huynh
Members Public

Confidential Computing Explained. Part 3: Data In Use Protection

Deep dive into the data-in-use protection mechanisms of secure enclaves

Daniel Huynh
Members Public

Confidential Computing Explained. Part 2 : Attestation

An introduction to remote attestation, which is the key to trust a remote enclave.

Daniel Huynh
Members Public

Confidential Computing Explained. Part 1: Introduction

An introduction to Confidential Computing and the problems it solves