Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Chains of Trust in Confidential Computing

DevConf via YouTube

Overview

Explore the intricacies of Confidential Computing in this 35-minute conference talk from DevConf.CZ 2023. Delve into the various chains of trust required to preserve confidentiality in Confidential Virtual Machines, Containers, and Clusters. Learn about the roots of trust, proof mechanisms, verification processes, and the implications of successful verification in each scenario. Discover key techniques and technologies, including local and remote attestation, firmware-based certification, virtual TPM implementations, and attested TLS. Gain insights into the different requirements for attesting execution environments, workloads, users, and nodes joining clusters. Access accompanying slides for a comprehensive understanding of this cutting-edge technology that protects data in use through memory encryption and other advanced methods.

Syllabus

Chains of trust in Confidential Computing - DevConf.CZ 2023

Taught by

DevConf

Reviews

Start your review of Chains of Trust in Confidential Computing

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.