Confidential computing – technological foundations and challenges
Confidential computing - this term sounds pompous at first, but it is a decisive factor when it comes to ensuring the security and confidentiality of our data in the cloud. But what exactly do we mean by confidential computing? In this article and our Rock the Prototype podcast episode, we look at various technologies that play a role in the context of confidential computing. I will illustrate how Trusted Execution Environments or Multi-Party Computation, Zero-Knowledge Proofs and other exciting technologies help to create a more secure environment for our data.



