Featured

Intel SGX vs TDX: what is the difference?
Intel has been a pioneer in Confidential ComputingConfidential Computing is a new hardware security mechanism to protect data in-use. It allows processing sensitive workl... More by introducing Software Guard Extensions - better known as SGX - as early as 2013. It continues this trend with the upcoming Trusted Domain Extensions or TDX. But when it comes to Intel SGX vs Intel TDX, what is the...
Insights
Standardising Confidential Computing
Trusted Execution Environments have been around for a while now and keep evolving. As support for confidential computing is included in more commodity platform, standardising this approach is becoming increasingly important to accelerate updake. This is part one of a...
Giving up privacy for the benefits of precision farming?
Agriculture plays a crucial role in all societies, and innovative technologies in precision farming can enable a wide range of benefits. Often, these benefits come with a cost: an increased risk of losing control of proprietary information. How does precision farming...
Confidential Quartet: comparing confidential computing platforms
Awesome AI start-up offers a proprietary algorithm for voice recognition. Health-hero hospital collected a large set of patient interviews audio recordings; it needs to transcribe and index them to define a new treatment protocol for an elusive rare condition. They...
Intel SGX vs TDX: what is the difference?
Intel has been a pioneer in Confidential Computing by introducing Software Guard Extensions - better known as SGX - as early as 2013. It continues this trend with the upcoming Trusted Domain Extensions or TDX. But when it comes to Intel SGX vs Intel TDX, what is the...
Security of Confidential Computing in Open Infrastructure
Confidential computing enables isolation of sensitive data in a secure domain during processing. It protects data in use by running the computation in a Trusted Execution Environment created using a combination of firmware and hardware features. Next, we review the...
Confidential Computing on IBM Protected Execution Facility
This year's EuroSys conference included papers with significant contributions to the growing field of Confidential Computing. This blog post reviews Confidential Computing on IBM Protected Execution Facility (PEF). It follows the...