What is Confidential Computing? Explained in 3 minutes.

preview_player
Показать описание
Nelly Cornejo, Head of Adoption at iExec, explains Confidential Computing.

When protecting data, standard security measures typically protect data in only two states: at rest and in transit. Data at rest is when data is stored, and data in transit is when it moves through the network.
The problem is data also needs to be protected while it's being used. Why? Because when a program or an application use data, they need to see it, this means the data is unencrypted in the memory.
The problem is that since the data is exposed, malicious actors cant take advantage.
Another challenge is that data moves to multiple environments from data centers to the cloud to the edge. This makes data breaches more common and security more challenging than ever.
This is where Confidential Computing comes to play.
Рекомендации по теме
Комментарии
Автор

This is really an excellent explanation on confidential computing. Great timing given the recent focus on confidential computing.

iexec-rlc-ambassadorchanne
Автор

Thank you Nelly! That was really helpful!

jasonkaufman
Автор

Great explanation about iExec's Confidential Computing! Exciting times ahead! 🚀💻🏆

paulo
Автор

hmm confidential computing seems interesting, is Intel the only player on the market, chip side? i wonder if it can ever be scalable for mass market. is it even necessary?

brion