D5 · Crypto

What is confidential computing?

Confidential computing protects data in use (while being processed) through hardware-based Trusted Execution Environments (TEEs). Intel SGX, AMD SEV are examples.
Completes the encryption trilogy: at rest + in transit + in use. Critical for cloud environments where the CSP could theoretically access running workloads. Emerging tech but appearing on exams.
← Back to Glossary Practice Questions →