Welcome
This documentation focuses on Confidential Computing using hardware-graded security technologies.
Last updated
This documentation focuses on Confidential Computing using hardware-graded security technologies.
Last updated
This documentation is a work in progress and subject to updates and revisions. Keep an eye out for version changes and new additions to ensure you have the latest information.
This documentation assumes that you have a foundational understanding of computer architecture, information security, cryptography and familiarity with basic cloud computing concepts. If you are new to cloud computing or lack the necessary knowledge, we recommend exploring introductory tutorials on Virtual Machines, Docker, and Kubernetes before proceeding.
In an era defined by escalating concerns over data privacy and security breaches, the demand for innovative solutions to safeguard sensitive information has never been more pressing. Enter confidential computing, a paradigm-shifting approach that promises to revolutionize how we handle and process data in the digital age. By enabling computations on encrypted data without compromising confidentiality, confidential computing opens up a realm of possibilities for industries ranging from finance to healthcare, where preserving the privacy and integrity of data is paramount. In this technical documentation, we delve into the intricacies of confidential computing, exploring its principles, applications, and the transformative impact it holds for the future of secure data processing in the cloud.
RISC-V AP-TEE
NVIDIA CC
(work in progress)
What is Confidential Computing
What Problems solves Confidential Computing
Why Confidential Computing
How Confidential Computing works
Technologies
Cloud Service Provider
AMD SEV SNP
Intel TDX
Intel SGX
ARM CC