Content-type: text/html Downes.ca ~ Stephen's Web ~ What Is Confidential Computing?

Stephen Downes

Knowledge, Learning, Community

I think it's likely we'll hear a lot more about confidential computing in the future (along with other privacy-preserving functions, like homomorphic encryption and zero-knowledge proofs). Basically, "Confidential computing uses hardware-based techniques to isolate data, specific functions, or an entire application from the operating system, hypervisor or virtual machine manager, and other privileged processes." This allows you to run an application in the cloud, say, with the expectation that there is no way the cloud provider could spy on your data while it's being processed.

Today: 1 Total: 1090 [Direct link] [Share]


Stephen Downes Stephen Downes, Casselman, Canada
stephen@downes.ca

Copyright 2024
Last Updated: Apr 16, 2024 06:30 a.m.

Canadian Flag Creative Commons License.

Force:yes