Completed
Software dependencies
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Trust No One - Bringing Confidential Computing to Containers
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Existing Trust Computing Base
- 3 What is Trust No One
- 4 How do we get there
- 5 Protecting data
- 6 Verifying software stack
- 7 Hardware dependencies
- 8 Software dependencies
- 9 Blockers
- 10 Solutions
- 11 KATA Containers
- 12 Service Offload
- 13 Walkthrough
- 14 What does this mean for the user
- 15 Gaps
- 16 Summary