confidential-computing Confidential computing explained. Part 2 : attestation An introduction to remote attestation, which is the key to trust a remote enclave.
introduction Confidential computing explained. Part 1: introduction An introduction to Confidential Computing and the problems it solves