Privacy Enhancing Technologies Confidential computing explained. Part 2 : attestation An introduction to remote attestation, which is the key to trust a remote enclave.
Privacy Enhancing Technologies Confidential computing explained. Part 1: introduction An introduction to Confidential Computing and the problems it solves