{"id":40873,"date":"2023-02-11T19:37:46","date_gmt":"2023-02-11T19:37:46","guid":{"rendered":"https:\/\/mailinvest.blog\/index.php\/2023\/02\/11\/digging-into-googles-point-of-view-on-confidential-computing\/"},"modified":"2023-02-11T19:38:46","modified_gmt":"2023-02-11T19:38:46","slug":"digging-into-googles-point-of-view-on-confidential-computing","status":"publish","type":"post","link":"https:\/\/mailinvest.blog\/index.php\/2023\/02\/11\/digging-into-googles-point-of-view-on-confidential-computing\/","title":{"rendered":"Digging into Google&#8217;s point of view on confidential computing"},"content":{"rendered":"<p> <a href=\"https:\/\/go.fiverr.com\/visit\/?bta=1052423&nci=17043\" Target=\"_Top\"><img loading=\"lazy\" decoding=\"async\" border=\"0\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/fiverr.ck-cdn.com\/tn\/serve\/?cid=40081059\"  width=\"601\" height=\"201\"><\/a>\n<\/p>\n<div>\n<p>Confidential computing is a know-how that goals to boost information privateness and safety by offering encrypted computation on delicate information and isolating information from apps and different host sources in a fenced off enclave throughout processing. The idea of confidential computing is gaining recognition, particularly within the cloud computing house the place delicate information is commonly saved and processed.<\/p>\n<p>Nonetheless, there are some who view confidential computing as an pointless know-how and a advertising ploy by cloud suppliers, geared toward calming prospects who&#8217;re cloud-phobic.<\/p>\n<p>On this Breaking Evaluation, we\u00a0<a href=\"https:\/\/wikibon.com\/breaking-analysis-how-the-cloud-is-changing-security-defenses-in-the-2020s\/\">revisit<\/a>\u00a0the notion of confidential computing and discover whether or not it\u2019s simply advertising or a key a part of a trusted safety technique.\u00a0To take action we\u2019ll invite two Google LLC consultants to the present. However earlier than we get there, let\u2019s summarize the general market local weather briefly with some Enterprise Know-how Analysis information.<\/p>\n<h3>Throughout the board, safety continues to be the No. 1 precedence<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-303745 aligncenter\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-Google%E2%80%99s-Point-of-View-on-Confidential-Computing.jpg\" data-sizes=\"auto, (max-width: 1706px) 100vw, 1706px\" data-srcset=\"https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-Google\u2019s-Point-of-View-on-Confidential-Computing.jpg 1706w, https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-Google\u2019s-Point-of-View-on-Confidential-Computing-300x169.jpg 300w, https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-Google\u2019s-Point-of-View-on-Confidential-Computing-768x432.jpg 768w, https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-Google\u2019s-Point-of-View-on-Confidential-Computing-1024x576.jpg 1024w, https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-Google\u2019s-Point-of-View-on-Confidential-Computing-610x343.jpg 610w\" alt=\"\" width=\"1706\" height=\"959\"\/><\/p>\n<p>There\u2019s not a ton within the ETR dataset on the subject of confidential computing. It\u2019s a know-how that\u2019s deeply embedded into silicon and computing architectures, so it\u2019s not as seen to chief info officers and the data know-how choice makers in ETR\u2019s quarterly surveys. However on the highest degree, safety stays the No. 1 precedence being addressed by organizations within the coming 12 months, as proven above.<\/p>\n<p>That is just about throughout the board by trade, by area and by dimension of firm. The one slight deviation from the imply is in monetary companies. The second- and third-most-cited priorities, cloud migration and analytics, are noticeably nearer to cybersecurity than different sectors, seemingly as a result of monetary companies has at all times been hyper security-conscious. However safety continues to be a transparent No. 1 precedence in that sector.<\/p>\n<h3>Defending information in use: advertising hype or an actual want?<\/h3>\n<p>The thought behind confidential computing is to raised handle risk fashions for information in execution. Defending information at relaxation and information in transit have lengthy been a give attention to safety applied sciences, however extra just lately, silicon producers have launched architectures to separate information and functions from the host system. Arm Ltd., Intel Corp., Superior Micro Units Inc., Nvidia Corp. and different suppliers are all on board as are the massive cloud gamers and system producers resembling Dell Applied sciences Inc., IBM Corp. and Hewlett Packard Enterprise Co.<\/p>\n<p>The argument towards confidential computing is that it narrowly focuses on reminiscence encryption and it doesn\u2019t remedy the largest issues. A number of system photos, updates, totally different companies and the whole code circulation aren\u2019t immediately addressed by reminiscence encryption. Slightly,11 to really assault these issues, many imagine that working methods should be reengineered with the attacker in thoughts. There are such a lot of variables and on the finish of the day, critics say the emphasis on confidential computing made by cloud suppliers is overstated and largely hype.<\/p>\n<p><iframe id=\"twitter-widget-0\" class=\"\" title=\"Twitter Tweet\" data-lazy=\"true\" data-src=\"https:\/\/platform.twitter.com\/embed\/Tweet.html?creatorScreenName=Wikibon&amp;dnt=false&amp;embedId=twitter-widget-0&amp;features=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&amp;frame=false&amp;hideCard=false&amp;hideThread=false&amp;id=1624087809572184066&amp;lang=en&amp;origin=https%3A%2F%2Fwikibon.com%2Fbreaking-analysis-googles-point-of-view-on-confidential-computing%2F&amp;sessionId=f9107a334a755950923623415eaecd2188fa258b&amp;siteScreenName=Wikibon&amp;theme=light&amp;widgetsVersion=aaf4084522e3a%3A1674595607486&amp;width=550px\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"allowfullscreen\" data-tweet-id=\"1624087809572184066\" data-mce-fragment=\"1\"><\/iframe><\/p>\n<p>This tweet above from safety researcher @bsdaemon sums up the sentiment of many skeptics. He says:<\/p>\n<blockquote>\n<p>Confidential computing is usually a advertising marketing campaign for reminiscence encryption. It\u2019s not driving the trade in direction of the laborious, open issues\u2026 it&#8217;s promoting an phantasm.<\/p>\n<\/blockquote>\n<p>Nonetheless, encrypting information in use and fencing off key parts of the system isn\u2019t a foul factor\u2026 particularly if it comes with the package deal basically totally free.<\/p>\n<h3>The seller politics of confidential computing<\/h3>\n<p>There was an absence of standardization and interoperability between totally different confidential computing approaches and the\u00a0<a href=\"https:\/\/confidentialcomputing.io\/\">Confidential Computing Consortium<\/a>\u00a0was established in 2019, ostensibly to speed up the market and affect requirements.<\/p>\n<p>Notably, Amazon Internet Companies Inc. will not be a part of the consortium probably as a result of: 1) The politics of the consortium had been a conundrum for AWS as the bottom know-how outlined by the consortium is seen as limiting by AWS (our assertion, not AWS\u2019); 2) Becoming a member of the consortium would validate a definition with which AWS isn\u2019t aligned; and three) AWS might really feel it has a lead with its Annapurna acquisition and doesn\u2019t need to validate its opponents.<\/p>\n<p>Moreover, our analysis leads us to invest that AWS could also be working deep inside the U.S. authorities on a extra superior and complete definition of confidential computing that it probably intends to evolve as an official customary. It will be basic AWS to make a transfer like this as an aggressive and defensible technique round confidential computing that&#8217;s extremely differentiated from its competitors.<\/p>\n<h3>Google\u2019s perspective on confidential computing<\/h3>\n<p>One of many premier members of the Confidential Computing Consortium is Google, together with many high-profile names, together with Arm, Intel, Meta Platforms Inc., Crimson Hat, Microsoft Corp. and others.<\/p>\n<p>On this Breaking Evaluation, we\u2019re happy to welcome two consultants on confidential computing from Google to unpack the subject: Nelly Porter, head of product for GCP Confidential Computing and Encryption, and Dr. Patricia Florissi, technical director within the\u00a0 Workplace of the CTO at Google Cloud.<\/p>\n<p>What follows is a curated abstract of our dialog with the total video embedded beneath. After every query we embed a video clip of the solutions you possibly can look ahead to added context.<\/p>\n<p><strong>Q: Nelly after which Patricia, please describe your respective roles at Google Cloud.<\/strong><\/p>\n<p><strong>Porter:\u00a0<\/strong>I work on loads of attention-grabbing actions in Google with a give attention to safety\u00a0 and infrastructure safety.\u00a0And we\u2019re speaking about encryption and confidential computing is a crucial a part of the portfolio. As well as, I collaborate with Google colleagues and our prospects on safe software program provide chains. As a result of it is advisable belief your software program. Is it working safely in your confidential atmosphere? I work on having end-to-end confidence that your software program and your atmosphere are doing what you count on.<\/p>\n<p><strong>Florissi:\u00a0<\/strong>I&#8217;m a technical director within the workplace of the CTO, OCTO for brief, in Google Cloud. And we&#8217;re a world group. We embody former CTOs like myself and senior technologists from giant companies, establishments and loads of profitable startups as nicely. And we have now two fundamental objectives. First, we work side-by-side with a few of our largest, most strategic prospects and we assist them remedy complicated engineering technical issues. And second, we focus with Google Cloud engineering and product administration on rising developments and applied sciences to information the trajectory of our enterprise. We&#8217;re a novel group as a result of we have now created this collaborative tradition with our prospects. And inside OCTO I spend loads of time collaborating with prospects and the trade at giant on applied sciences that may handle privateness, safety and sovereignty of information normally.<\/p>\n<p><a href=\"https:\/\/video.cube365.net\/c\/940429\"><strong>Watch and listen to Nelly and Patricia describe their respective roles in their own words.<\/strong><\/a><\/p>\n<p><strong>Q: Nelly, what&#8217;s confidential computing from Google\u2019s perspective \u2013 i.e. how do you outline it?<\/strong><\/p>\n<p><strong>Porter:<\/strong> Confidential computing is without doubt one of the instruments in Google\u2019s toolbox to assist prospects defend their information all through its total lifecycle. Confidential computing addresses the necessity to defend information and workloads. Not solely when it&#8217;s saved or in transit but additionally when it&#8217;s being processed and used within the cloud. With confidential computing, Google can present end-to-end safety of buyer information and workloads, guaranteeing the information stays safe whereas nonetheless with the ability to extract insights and course of it.<\/p>\n<p><a href=\"https:\/\/video.cube365.net\/c\/940439\"><strong>Watch Nelly Porter\u2019s explanation of how Google defines confidential computing.<\/strong><\/a><\/p>\n<p><strong>Q: Patricia, why do you assume this confidential computing is such an necessary know-how?\u00a0<\/strong><\/p>\n<p><strong>Florissi:<\/strong> Confidential computing is a crucial and transformative know-how as a result of it reduces the client\u2019s risk boundaries and assault floor. It&#8217;s a pure development from encrypting information in transit and at relaxation, to now encrypting information whereas in use. Confidential computing permits organizations to collaborate with one another whereas retaining the confidentiality of the information, which is useful for all industries, not simply extremely regulated ones. For instance, in finance, bankers can collaborate to detect fraud whereas preserving the confidentiality and privateness of the information.<\/p>\n<p><a href=\"https:\/\/video.cube365.net\/c\/940438\"><strong>Watch this clip of Patricia Florissi explaining why she believes confidential computing is transformative for customers.<\/strong><\/a><\/p>\n<p><strong>Q: Nelly, there&#8217;s a narrative on the market that claims confidential computing is a advertising ploy by cloud suppliers placating individuals with cloud phobia. Whilst you might strongly disagree, the argument is that confidential computing is simply reminiscence encryption and doesn\u2019t handle many different issues. Additional, it\u2019s overhyped by cloud suppliers. What would you say to this line of considering?<\/strong><\/p>\n<p>Not surprisingly, Porter strongly disagrees with the premise that confidential computing is simply advertising hype for reminiscence encryption. In line with Porter, the idea of confidential computing goes past simply the mechanism of defending buyer information. Confidential computing presents stronger safety for tenants in multitenant cloud environments by cryptographic isolation, which offers prospects with extra belief within the safety of their information. This cryptographic layer of isolation not solely protects prospects from different tenants within the atmosphere, but additionally from errors made by the software program supplier or potential zero-day assaults. By offering this layer of safety, confidential computing eliminates a few of the safety considerations that prospects might have when working their workloads in multitenant areas or collaborating with delicate information.<\/p>\n<p><a href=\"https:\/\/video.cube365.net\/c\/940440\"><strong>Watch Nelly Porter\u2019s explanation as to why she feels confidential computing is more than marketing hype.<\/strong><\/a><\/p>\n<p><strong>Q: Nelly, what\u2019s architecturally totally different with confidential computing versus how working methods and digital machines have labored traditionally? Please clarify and we\u2019ll put up this slide for context.\u00a0<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-303756 aligncenter\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-Google%E2%80%99s-Point-of-View-on-Confidential-Computing-1.jpg\" data-sizes=\"auto, (max-width: 1706px) 100vw, 1706px\" data-srcset=\"https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-Google\u2019s-Point-of-View-on-Confidential-Computing-1.jpg 1706w, https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-Google\u2019s-Point-of-View-on-Confidential-Computing-1-300x169.jpg 300w, https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-Google\u2019s-Point-of-View-on-Confidential-Computing-1-768x432.jpg 768w, https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-Google\u2019s-Point-of-View-on-Confidential-Computing-1-1024x576.jpg 1024w, https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-Google\u2019s-Point-of-View-on-Confidential-Computing-1-610x343.jpg 610w\" alt=\"\" width=\"1706\" height=\"959\"\/><\/p>\n<p><strong>Porter:<\/strong> Google\u2019s method to confidential computing is designed to protect three fundamental properties: 1) Clients don\u2019t want to alter their code; 2) low latency; and three) scalability. To realize this, the whole system has to alter to supply the safety ensures of confidential computing. The next are the important thing architectural modifications in confidential computing:<\/p>\n<ul>\n<li><strong>Root of belief:<\/strong>\u00a0Making certain the integrity of the machine by the usage of ASICs that validate the configuration of the low-level system code and kernel.\u00a0[Note: Porter mentioned Google\u2019s Titan chip in this dialogue \u2013 watch the clip below for additional detail].<\/li>\n<li><strong>Belief in silicon distributors:<\/strong>\u00a0Validating the integrity of the firmware and software program of silicon distributors to make sure that the machine will not be modified or modified.<\/li>\n<li><strong>Safe processor:<\/strong>\u00a0Particular ASICs that generate a key for every VM, node or employee thread, which aren&#8217;t accessible to Google. The keys are random, ephemeral and saved in {hardware}.<\/li>\n<li><strong>Encrypted reminiscence:<\/strong>\u00a0The reminiscence is encrypted, however solely the safe processor has entry to the important thing, not Google. The info within the VM is in clear, however can&#8217;t be accessed exterior of the confidential field.<\/li>\n<li><strong>Modified OS:<\/strong>\u00a0The OS is modified to supply integrity and efficiency.<br \/>These modifications permit prospects to run their VMs with out altering their functions, with improbable efficiency and scalability, as they&#8217;d count on from a cloud supplier like Google.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/video.cube365.net\/c\/940441\"><strong>Watch and listen to Nelly Porter explain the architecture of confidential computing and how it differs from traditional approaches.<\/strong><\/a><\/p>\n<p><strong>Q: Patricia, what are the ensures that these hardware-based applied sciences present to cloud prospects?<\/strong><\/p>\n<p><strong>Florissi:<\/strong> Google makes the next guarantees to its prospects with respect to confidential computing:<\/p>\n<ul>\n<li><strong>Code and information confidentiality:<\/strong>\u00a0Confidential computing ensures that the functions and information stay secret, with the reminiscence decrypting the information utilizing a key that&#8217;s ephemeral, per VM, and generated on demand.<\/li>\n<li><strong>Code and information integrity:<\/strong>\u00a0Confidential computing ensures that the appliance internals usually are not tampered with and that the workload processing the information preserves its integrity.<\/li>\n<li><strong>Verifiable:<\/strong>\u00a0Confidential computing offers attestation, which generates a log path that gives proof that the confidentiality and integrity of code and information had been preserved.<\/li>\n<li><strong>Ceiling:<\/strong>\u00a0Confidential computing ensures that the secrets and techniques have been preserved and never tampered with.<\/li>\n<\/ul>\n<p>In line with Google, these ensures present prospects with the reassurance that their methods are shielded from unauthorized entry and that their information has not been corrupted or impacted by exterior actors.<\/p>\n<p><a href=\"https:\/\/video.cube365.net\/c\/940442\"><strong>Watch and listen to Patricia Florissi share what Google guarantees its customers with respect to confidential computing.<\/strong><\/a><\/p>\n<p><strong>Q: Nelly, h<span class=\"transcript-item inside-selection\" data-index=\"256\">ow does Google make sure the compatibility of confidential<\/span>\u00a0<span class=\"transcript-item inside-selection\" data-index=\"257\">computing with the present methods and functions?<\/span>\u00a0<\/strong><\/p>\n<p><strong>Porter:<\/strong> To make sure compatibility with present functions with regards to confidential computing, Google has executed the next:<\/p>\n<ul>\n<li><strong>Labored with the working system repository and OS distributors:<\/strong>\u00a0Google has labored with the working system repository and OS distributors to make sure that the capabilities wanted for confidential computing are a part of their kernels and releases.<\/li>\n<li><strong>Modified the kernel with silicon distributors:<\/strong>\u00a0Google has modified the host kernel along with silicon distributors to assist the confidential computing functionality.<\/li>\n<li><strong>Labored with silicon distributors:<\/strong>\u00a0Google has labored with each single silicon vendor to grasp the worth of simple to make use of confidential computing and eradicating limitations.<\/li>\n<li><strong>Contributions to the Confidential Computing Consortium:<\/strong>\u00a0Google has contributed to consortiums to make sure interoperability between totally different confidential environments of cloud suppliers.<\/li>\n<li><strong>Labored with different cloud suppliers:<\/strong>\u00a0Google has labored with different cloud suppliers in addition to silicon distributors resembling Arm and Intel to make sure that they will talk securely and trade information in a verifiable and managed manner.<\/li>\n<li><strong>Contributed to the open group:<\/strong>\u00a0Google has contributed to the open group and continues to work overtly to contribute to the function of confidential computing turning into a utility that can be utilized by prospects with none particular necessities.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/video.cube365.net\/c\/940443\"><strong>Watch and listen to Nelly Porter\u2019s explanation about how Google ensures compatibility with existing systems and applications.<\/strong><\/a><\/p>\n<p><strong>Q: Patricia, How will confidential computing be sure that information sovereignty and that privateness edicts are adhered to? Please clarify Google\u2019s method and the important thing components of this graphic.\u00a0<\/strong><\/p>\n<h4><b><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-303758 aligncenter\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-Google%E2%80%99s-Point-of-View-on-Confidential-Computing-2.jpg\" data-sizes=\"auto, (max-width: 1706px) 100vw, 1706px\" data-srcset=\"https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-Google\u2019s-Point-of-View-on-Confidential-Computing-2.jpg 1706w, https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-Google\u2019s-Point-of-View-on-Confidential-Computing-2-300x169.jpg 300w, https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-Google\u2019s-Point-of-View-on-Confidential-Computing-2-768x432.jpg 768w, https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-Google\u2019s-Point-of-View-on-Confidential-Computing-2-1024x576.jpg 1024w, https:\/\/d2axcg2cspgbkk.cloudfront.net\/wp-content\/uploads\/Breaking-Analysis_-Google\u2019s-Point-of-View-on-Confidential-Computing-2-610x343.jpg 610w\" alt=\"\" width=\"1706\" height=\"959\"\/>\u00a0<\/b><\/h4>\n<p>In line with Florissi, information sovereignty is just one of many pillars to digital sovereignty. From Google\u2019s perspective, digital sovereignty consists of three pillars: 1) Knowledge sovereignty; 2) operational sovereignty; and three) software program sovereignty.<\/p>\n<ul>\n<li>Knowledge sovereignty focuses on the situation, encryption, and entry management of the information.<\/li>\n<li>Operational sovereignty offers full transparency and visibility to Google Cloud prospects over supplier operations.<\/li>\n<li>Software program sovereignty ensures that prospects can run their workloads with out dependence on supplier software program.<\/li>\n<li>Confidential computing is on the coronary heart of information safety and ensures the confidentiality, integrity, and availability of the information.<\/li>\n<li>One other necessary facet of information sovereignty is consumer management, which considerations what occurs to the information when it&#8217;s given to another person.<\/li>\n<li>Confidential computing and coverage enforcement can assure that the information will solely be processed inside a confidential computing atmosphere and that will probably be utilized in accordance with the consumer\u2019s insurance policies.<\/li>\n<li>Confidential computing is a crucial and important know-how for guaranteeing information sovereignty, particularly with regard to consumer management.<\/li>\n<\/ul>\n<p>Right here\u2019s a deeper-dive abstract of the dialog:<\/p>\n<p>In line with Florissi, information sovereignty is often involved with two issues: the place the information resides (information residency) and guaranteeing the confidentiality, integrity and availability of the information (information safety). Confidential computing is on the coronary heart of information safety.<\/p>\n<p>Nonetheless, there may be one other facet of information sovereignty that&#8217;s usually neglected, which is consumer management. This refers to what occurs to the information when entry is granted to it. Florissi underscores the significance of trusting that the processing of information will abide by the insurance policies set by the consumer.<\/p>\n<p>She additionally notes that there&#8217;s a motion in regulation and initiatives, such because the Worldwide Knowledge House Affiliation and GAIA-X, for suppliers and receivers of information to agree on a contract for a way the information will probably be used. The problem is to make sure that the information is used as supposed as soon as it crosses boundaries.<\/p>\n<p>Google\u2019s view is that confidential computing, mixed with coverage enforcement in guaranteeing information sovereignty, notably with regards to consumer management. Coverage enforcement ensures that information is just processed inside the confines of a confidential computing atmosphere, that the workload is verified, and that the information will solely be utilized in accordance with the confidentiality and integrity of the confidential computing atmosphere.<\/p>\n<p><a href=\"https:\/\/video.cube365.net\/c\/940444\"><strong>Watch and listen to Patricia Florissi\u2019s deeper dive explanation regarding Google\u2019s perspective on data sovereignty and digital sovereignty.<\/strong><\/a><\/p>\n<p><strong>Q: To each. What\u2019s your prediction as to how widespread the adoption of confidential computing will probably be in 2023 and past?<\/strong><\/p>\n<p><strong>Porter:\u00a0<\/strong>My prediction in 5, seven years as I said, it\u2019ll change into like a utility. Ten years in the past we couldn\u2019t think about that web sites would have certificates and we might assist encrypted site visitors. Now we do, and it\u2019s change into ubiquitous. It\u2019s precisely the place our confidential computing is headed and heading. I don\u2019t know if we&#8217;re there but but. It\u2019ll take a number of years of maturity for us, however we\u2019ll get there.<\/p>\n<p><strong>Florissi:\u00a0<\/strong>I might double down on that and say sooner or later, within the very close to future, you will be unable to afford not having it [confidential computing]. I imagine as digital sovereignty turns into ever extra prime of thoughts with sovereign states and in addition for multinational organizations and for organizations that need to collaborate with one another, confidential computing will change into the norm. It\u2019ll change into the default mode of operation. For the younger technologists on the market, it\u2019s inconceivable to assume that in some unspecified time in the future in historical past information in transit was not encrypted. And I feel that will probably be inconceivable in some unspecified time in the future within the close to future to have unencrypted information whereas in use.<\/p>\n<p><strong><a href=\"https:\/\/video.cube365.net\/c\/940445\">Watch and listen to Google\u2019s technical experts predict the future of confidential computing.<\/a><\/strong><\/p>\n<h3>In abstract<\/h3>\n<p>Confidential computing is being touted by the cloud gamers as a promising know-how for enhancing information privateness and safety, however there are additionally those that stay skeptical of its deserves and necessity. The reality most likely lies someplace in between, and it&#8217;ll rely upon the precise implementation and the use case as to how efficient confidential computing will probably be. Confidential computing will not be a panacea for all safety challenges, in fact. However\u00a0the great thing about the tech trade is as a result of there\u2019s a lot competitors confidential computing basically comes at low or no price to prospects. And there&#8217;s no apparent draw back.<\/p>\n<p>As with every new know-how, it is very important fastidiously its adoption and make knowledgeable selections based mostly on the precise necessities and constraints of every particular person scenario. However the backside line is: Silicon producers are working with cloud suppliers and different methods firms to incorporate confidential computing into their architectures. Competitors will average worth hikes and, on the finish of the day, this under-the-covers know-how basically will come totally free.<\/p>\n<p>So we\u2019ll gladly take it.<\/p>\n<h3>Be in contact<\/h3>\n<p>Many because of our friends right this moment Google, Nelly Porter and Dr. Patricia Florissi. Alex Myerson and Ken Shifman are on manufacturing, podcasts and media workflows for Breaking Evaluation. Particular because of Kristen Martin and Cheryl Knight who assist us maintain our group knowledgeable and get the phrase out, and to Rob Hof, our editor in chief at SiliconANGLE.<\/p>\n<p>Keep in mind we publish every week on\u00a0<a href=\"https:\/\/wikibon.com\/\">Wikibon<\/a>\u00a0and\u00a0<a href=\"http:\/\/siliconangle.com\/\">SiliconANGLE<\/a>. These episodes are all accessible as\u00a0<a href=\"https:\/\/open.spotify.com\/show\/7u9nQywKYm1s8hoqIjCcoM\" target=\"_blank\" rel=\"noopener\">podcasts wherever you listen<\/a>.<\/p>\n<p>E-mail\u00a0<a href=\"https:\/\/siliconangle.com\/2023\/02\/11\/digging-googles-point-view-confidential-computing\/mailto:david.vellante@siliconangle.com\">david.vellante@siliconangle.com<\/a>, DM\u00a0<a href=\"https:\/\/twitter.com\/dvellante?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor\">@dvellante on Twitter<\/a>\u00a0and touch upon\u00a0<a href=\"https:\/\/www.linkedin.com\/in\/dvellante\/detail\/recent-activity\/shares\/\">our LinkedIn posts<\/a>.<\/p>\n<p>Additionally, take a look at this\u00a0<a href=\"https:\/\/www.youtube.com\/watch?v=apdwumDkDCI\">ETR Tutorial we created<\/a>, which explains the spending methodology in additional element.\u00a0Be aware:\u00a0<a href=\"http:\/\/etr.ai\/\">ETR<\/a>\u00a0is a separate firm from Wikibon and SiliconANGLE<i>.<\/i>\u00a0If you need to quote or republish any of the corporate\u2019s information, or inquire about its companies, please contact ETR at authorized@etr.ai.<\/p>\n<p>Right here\u2019s the total video evaluation:<\/p>\n<p><iframe loading=\"lazy\" title=\"Breaking Analysis: Google&#039;s Point of View on Confidential Computing\" width=\"720\" height=\"405\" data-lazy=\"true\" data-src=\"https:\/\/www.youtube.com\/embed\/4E7MK7lKdzM?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe><\/p>\n<p><em>All statements made relating to firms or securities are strictly beliefs, factors of view and opinions held by SiliconANGLE Media, Enterprise Know-how Analysis, different friends on theCUBE and visitor writers. Such statements usually are not suggestions by these people to purchase, promote or maintain any safety. The content material offered doesn&#8217;t represent funding recommendation and shouldn&#8217;t be used as the premise for any funding choice. You and solely you&#8217;re accountable for your funding selections.<\/em><\/p>\n<p><em>Disclosure: Most of the firms cited in Breaking Evaluation are sponsors of theCUBE and\/or purchasers of Wikibon. None of those corporations or different firms have any editorial management over or superior viewing of what\u2019s revealed in Breaking Evaluation.<\/em><\/p>\n<h5>Picture: <a href=\"https:\/\/stock.adobe.com\/contributor\/200898058\/alex-mit?load_type=author&amp;prev_url=detail\">Alex Mit\/Adobe Stock<\/a><\/h5>\n<div class=\"silic-after-content\" id=\"silic-798434206\">\n<hr style=\"border: 1px solid; color: #d8d8d8; height: 0px; margin-top: 20px;\"\/>\n<h3><span style=\"font-size: 16px;\">Present your assist for our mission by becoming a member of our Dice Membership and Dice Occasion Neighborhood of consultants. Be a part of the group that features Amazon Internet Companies and Amazon.com CEO Andy Jassy, Dell Applied sciences founder and CEO Michael Dell, Intel CEO Pat Gelsinger and plenty of extra luminaries and consultants.<\/span><\/h3>\n<\/div><\/div>\n<iframe data-lazy=\"true\" data-src=\"https:\/\/www.fiverr.com\/gig_widgets?id=U2FsdGVkX18x7XQvttUTrv1oEqmGNGTgvvCUiUoJ\/AP4z\/UyMz8lXGOLpu15jIMxBbTR0gmD5uBoFvhC4KWeALQRp3h\/X\/AwcVD0K8Wj9H\/ZzYKzcCNHosB9oS4SCJJFWiN85P9ICAc4OgCoE\/wHKIY7CDkf2\/DQ1vqGvk4smVe5cRDEmrLPCWi4FC8p40VUhSmWQ5udCm0zoJtorgWv3vbDQw0kKYkwn39ozAnQXDe+YvWMxkLFWA+O3TFwkJvdkIK+\/AUSnRssPKt5WHY0FhNOxnSPcLslEL4G4\/RfP95ve99U+kRnDy3X+KtzdQLY+u935ghON\/o3UE4IMv9oN6JX9RnxzL\/LRcOgnHigxStSGPKsZYtnz8RWNVT\/rOLAibqiWJadC5MYHRbekF3eg6FOGrQGkXYbsn0+a5aovnlLCbLwIqY9fcS17UX8J235iQ6cdmHNbrPeS84CMm34RA==&affiliate_id=1052423&strip_google_tagmanager=true\" loading=\"lazy\" data-with-title=\"true\" class=\"fiverr_nga_frame\" frameborder=\"0\" height=\"350\" width=\"100%\" referrerpolicy=\"no-referrer-when-downgrade\" data-mode=\"random_gigs\" onload=\" var frame = this; var script = document.createElement('script'); script.addEventListener('load', function() { window.FW_SDK.register(frame); }); script.setAttribute('src', 'https:\/\/www.fiverr.com\/gig_widgets\/sdk'); document.body.appendChild(script); \" ><\/iframe>\n<br \/><a href=\"https:\/\/siliconangle.com\/2023\/02\/11\/digging-googles-point-view-confidential-computing\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Confidential computing is a know-how that goals to boost information privateness and safety by offering encrypted computation on delicate information and isolating information from apps&#8230;<\/p>\n","protected":false},"author":1,"featured_media":40874,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-40873","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-universe"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Digging into Google&#039;s point of view on confidential computing - mailinvest.blog<\/title>\n<meta name=\"description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mailinvest.blog\/index.php\/2023\/02\/11\/digging-into-googles-point-of-view-on-confidential-computing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Digging into Google&#039;s point of view on confidential computing - mailinvest.blog\" \/>\n<meta property=\"og:description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mailinvest.blog\/index.php\/2023\/02\/11\/digging-into-googles-point-of-view-on-confidential-computing\/\" \/>\n<meta property=\"og:site_name\" content=\"mailinvest.blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/freelanceracademic\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-11T19:37:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-11T19:38:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mailinvest.blog\/wp-content\/uploads\/2023\/02\/AdobeStock_46647398-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1920\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin@mailinvest.blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin@mailinvest.blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"17 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/02\\\/11\\\/digging-into-googles-point-of-view-on-confidential-computing\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/02\\\/11\\\/digging-into-googles-point-of-view-on-confidential-computing\\\/\"},\"author\":{\"name\":\"admin@mailinvest.blog\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\"},\"headline\":\"Digging into Google&#8217;s point of view on confidential computing\",\"datePublished\":\"2023-02-11T19:37:46+00:00\",\"dateModified\":\"2023-02-11T19:38:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/02\\\/11\\\/digging-into-googles-point-of-view-on-confidential-computing\\\/\"},\"wordCount\":3523,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/02\\\/11\\\/digging-into-googles-point-of-view-on-confidential-computing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/AdobeStock_46647398-scaled.jpeg\",\"articleSection\":[\"Tech Universe\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/02\\\/11\\\/digging-into-googles-point-of-view-on-confidential-computing\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/02\\\/11\\\/digging-into-googles-point-of-view-on-confidential-computing\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/02\\\/11\\\/digging-into-googles-point-of-view-on-confidential-computing\\\/\",\"name\":\"Digging into Google's point of view on confidential computing - mailinvest.blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/02\\\/11\\\/digging-into-googles-point-of-view-on-confidential-computing\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/02\\\/11\\\/digging-into-googles-point-of-view-on-confidential-computing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/AdobeStock_46647398-scaled.jpeg\",\"datePublished\":\"2023-02-11T19:37:46+00:00\",\"dateModified\":\"2023-02-11T19:38:46+00:00\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/02\\\/11\\\/digging-into-googles-point-of-view-on-confidential-computing\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/02\\\/11\\\/digging-into-googles-point-of-view-on-confidential-computing\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/02\\\/11\\\/digging-into-googles-point-of-view-on-confidential-computing\\\/#primaryimage\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/AdobeStock_46647398-scaled.jpeg\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/AdobeStock_46647398-scaled.jpeg\",\"width\":2560,\"height\":1920},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/02\\\/11\\\/digging-into-googles-point-of-view-on-confidential-computing\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/mailinvest.blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Digging into Google&#8217;s point of view on confidential computing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"name\":\"mailinvest.blog\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/mailinvest.blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\",\"name\":\"mailinvest\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"width\":1000,\"height\":1000,\"caption\":\"mailinvest\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/freelanceracademic\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\",\"name\":\"admin@mailinvest.blog\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"caption\":\"admin@mailinvest.blog\"},\"sameAs\":[\"https:\\\/\\\/mailinvest.blog\",\"admin@mailinvest.blog\"],\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/author\\\/adminmailinvest-blog\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Digging into Google's point of view on confidential computing - mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mailinvest.blog\/index.php\/2023\/02\/11\/digging-into-googles-point-of-view-on-confidential-computing\/","og_locale":"en_US","og_type":"article","og_title":"Digging into Google's point of view on confidential computing - mailinvest.blog","og_description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","og_url":"https:\/\/mailinvest.blog\/index.php\/2023\/02\/11\/digging-into-googles-point-of-view-on-confidential-computing\/","og_site_name":"mailinvest.blog","article_publisher":"https:\/\/www.facebook.com\/freelanceracademic\/","article_published_time":"2023-02-11T19:37:46+00:00","article_modified_time":"2023-02-11T19:38:46+00:00","og_image":[{"width":2560,"height":1920,"url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2023\/02\/AdobeStock_46647398-scaled.jpeg","type":"image\/jpeg"}],"author":"admin@mailinvest.blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin@mailinvest.blog","Est. reading time":"17 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mailinvest.blog\/index.php\/2023\/02\/11\/digging-into-googles-point-of-view-on-confidential-computing\/#article","isPartOf":{"@id":"https:\/\/mailinvest.blog\/index.php\/2023\/02\/11\/digging-into-googles-point-of-view-on-confidential-computing\/"},"author":{"name":"admin@mailinvest.blog","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4"},"headline":"Digging into Google&#8217;s point of view on confidential computing","datePublished":"2023-02-11T19:37:46+00:00","dateModified":"2023-02-11T19:38:46+00:00","mainEntityOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2023\/02\/11\/digging-into-googles-point-of-view-on-confidential-computing\/"},"wordCount":3523,"commentCount":0,"publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2023\/02\/11\/digging-into-googles-point-of-view-on-confidential-computing\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2023\/02\/AdobeStock_46647398-scaled.jpeg","articleSection":["Tech Universe"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/mailinvest.blog\/index.php\/2023\/02\/11\/digging-into-googles-point-of-view-on-confidential-computing\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/mailinvest.blog\/index.php\/2023\/02\/11\/digging-into-googles-point-of-view-on-confidential-computing\/","url":"https:\/\/mailinvest.blog\/index.php\/2023\/02\/11\/digging-into-googles-point-of-view-on-confidential-computing\/","name":"Digging into Google's point of view on confidential computing - mailinvest.blog","isPartOf":{"@id":"https:\/\/mailinvest.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2023\/02\/11\/digging-into-googles-point-of-view-on-confidential-computing\/#primaryimage"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2023\/02\/11\/digging-into-googles-point-of-view-on-confidential-computing\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2023\/02\/AdobeStock_46647398-scaled.jpeg","datePublished":"2023-02-11T19:37:46+00:00","dateModified":"2023-02-11T19:38:46+00:00","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","breadcrumb":{"@id":"https:\/\/mailinvest.blog\/index.php\/2023\/02\/11\/digging-into-googles-point-of-view-on-confidential-computing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mailinvest.blog\/index.php\/2023\/02\/11\/digging-into-googles-point-of-view-on-confidential-computing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/index.php\/2023\/02\/11\/digging-into-googles-point-of-view-on-confidential-computing\/#primaryimage","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2023\/02\/AdobeStock_46647398-scaled.jpeg","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2023\/02\/AdobeStock_46647398-scaled.jpeg","width":2560,"height":1920},{"@type":"BreadcrumbList","@id":"https:\/\/mailinvest.blog\/index.php\/2023\/02\/11\/digging-into-googles-point-of-view-on-confidential-computing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mailinvest.blog\/"},{"@type":"ListItem","position":2,"name":"Digging into Google&#8217;s point of view on confidential computing"}]},{"@type":"WebSite","@id":"https:\/\/mailinvest.blog\/#website","url":"https:\/\/mailinvest.blog\/","name":"mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mailinvest.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mailinvest.blog\/#organization","name":"mailinvest","url":"https:\/\/mailinvest.blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","width":1000,"height":1000,"caption":"mailinvest"},"image":{"@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/freelanceracademic\/"]},{"@type":"Person","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4","name":"admin@mailinvest.blog","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","caption":"admin@mailinvest.blog"},"sameAs":["https:\/\/mailinvest.blog","admin@mailinvest.blog"],"url":"https:\/\/mailinvest.blog\/index.php\/author\/adminmailinvest-blog\/"}]}},"_links":{"self":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/40873","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/comments?post=40873"}],"version-history":[{"count":1,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/40873\/revisions"}],"predecessor-version":[{"id":40875,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/40873\/revisions\/40875"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media\/40874"}],"wp:attachment":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media?parent=40873"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/categories?post=40873"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/tags?post=40873"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}