PETs

Daniel Huynh
Members Public

Confidential Computing: A History

Here, we provide a deep dive into Confidential Computing, how it can protect data privacy, and where it comes from?

Daniel Huynh
Members Public

Discover Confidential Computing by Coding Your Own KMS Inside an Enclave

Discover confidential computing with our tutorials. Fill the knowledge gap, become proficient in secure enclaves, and craft applications with their strengths. Join us to become a Confidential Computing wizard! Dive into our content and start your journey today.

Corentin Lauverjat
Members Public

Identifying a Critical Attestation Bypass Vulnerability in Apache Teaclave

This vulnerability can be used to mount a Man in the Middle attack. We found a fix that Teaclave implemented following the release of this article.

Daniel Huynh
Members Public

Data Science: The Short Guide to Privacy Technologies

If you’re wondering what the benefits and weaknesses of differential privacy, confidential computing, federated learning, etc are, and how they can be combined to improve artificial intelligence and data privacy, you’ve come to the right place.

Daniel Huynh
Members Public

Confidential Computing Explained. Part 3: Data In Use Protection

Deep dive into the data-in-use protection mechanisms of secure enclaves

Daniel Huynh
Members Public

Confidential Computing Explained. Part 2 : Attestation

An introduction to remote attestation, which is the key to trust a remote enclave.

Daniel Huynh
Members Public

Confidential Computing Explained. Part 1: Introduction

An introduction to Confidential Computing and the problems it solves