This documentation focuses on Confidential Computing using hardware-graded security technologies.

This documentation is a work in progress and subject to updates and revisions. Keep an eye out for version changes and new additions to ensure you have the latest information.

This documentation assumes that you have a foundational understanding of computer architecture, information security, cryptography and familiarity with basic cloud computing concepts. If you are new to cloud computing or lack the necessary knowledge, we recommend exploring introductory tutorials on Virtual Machines, Docker, and Kubernetes before proceeding.

In an era defined by escalating concerns over data privacy and security breaches, the demand for innovative solutions to safeguard sensitive information has never been more pressing. Enter confidential computing, a paradigm-shifting approach that promises to revolutionize how we handle and process data in the digital age. By enabling computations on encrypted data without compromising confidentiality, confidential computing opens up a realm of possibilities for industries ranging from finance to healthcare, where preserving the privacy and integrity of data is paramount. In this technical documentation, we delve into the intricacies of confidential computing, exploring its principles, applications, and the transformative impact it holds for the future of secure data processing in the cloud.

Confidential Computing

By Technology


Intel TDX

Intel SGX




(work in progress)

Open Source Tooling

Last updated