Sharing data always carries the risk of losing privacy, unless it is done in a safe environment. This applies to precision farming as well. The solution lies in scope-limited data collaboration where secrecy is protected, like the Confidential Cloud platform by Canary Bit.
Insights
Insights, articles and latest news for our followers and readers.
Confidential Quartet: comparing confidential computing platforms
Awesome AI start-up offers a proprietary algorithm for voice recognition. Health-hero hospital collected a large set of patient interviews audio recordings; it needs to transcribe and index them to define a new treatment protocol for an elusive rare condition. They...
Intel SGX vs TDX: what is the difference?
Intel has been a pioneer in Confidential Computing by introducing Software Guard Extensions - better known as SGX - as early as 2013. It continues this trend with the upcoming Trusted Domain Extensions or TDX. But when it comes to Intel SGX vs Intel TDX, what is the...
Security of Confidential Computing in Open Infrastructure
Confidential computing enables isolation of sensitive data in a secure domain during processing. It protects data in use by running the computation in a Trusted Execution Environment created using a combination of firmware and hardware features. Next, we review the...
Confidential Computing on IBM Protected Execution Facility
This year's EuroSys conference included papers with significant contributions to the growing field of Confidential Computing. This blog post reviews Confidential Computing on IBM Protected Execution Facility (PEF). It follows the...
Review of the ENISA cybersecurity cloud-certification scheme
In December 2020, the European Union Network and Information Security Agency (ENISA) launched a public consultation on a new candidate cybersecurity certification scheme. ENISA's primary goal with this is to "enhance trust in cloud services across Europe". The...
Review of Confidential VMs in Google Cloud Platform
Google Cloud Platform (GCP) recently announced Confidential VMs as first, beta product in the Confidential Computing ecosystem. Google's Confidential VMs build on top of the existing shielded VMs technology. This efforts adds a...
What is Confidential Computing and Why Should I Care?
Individuals and enterprises all around the globe are widely using cloud computing. It allows seamless data access across multiple devices, collaborative work and centralised data storage. However, using the cloud means a compromise in terms of data privacy, control...