This is the third article in a series on confidential computing published originally on the Red Hat blog. To read the original in its entirety, click HERE. In the existing implementations (with the notable exception of Intel SGX), confidential computing is fundamentally…
The Need for Attestation In Confidential Computing
This is the second article in a series on confidential computing published originally on the Red Hat blog. To read the original in its entirety, click HERE. In a confidential computing environment, another form of proof called attestation becomes increasingly…
An Introduction to Confidential Computing
This is the first article in a six-part series on Confidential Computing being featured on the Red Hat blog. Click HERE to read the original in its entirety. More than two decades ago, the computing industry saw a need to…