-
We probably want to suppress this to log_trace(). I doesn't seem useful even at debug level:
![image](https://github.com/user-attachments/assets/6aeee8bb-4fb3-42fb-8346-aea4b374c65f)
-
**Description:**
This issue presents a **demo of the Attested-TLS (aTLS) protocol** in action, utilising a Large Language Model (LLM) chat application as a practical use case. The primary goal is to …
-
@rdgordon-index and @michaelkleber et al, I've been thinking about https://github.com/WICG/turtledove/issues/824 a bit recently. The specific issue there is exposure of rate cards, pricing logic, and …
-
The primary goal of Miralis is to remove the firmware from the trusted computing base (TCB), so far we mostly tested that firmware and payloads works without modifications but we didn't demonstrate a …
-
**Describe the bug**
I want to use AKS confidential computing for my tasks, and I found that when I created pods using my images, the pod failed to create, and if I replace the image in the k8s yaml …
-
As the SCS community, we want to have an overview of the technology that is available to build platforms that allow confidential computing.
There are:
- SGX (intel)
- TDX (intel) - upcoming?
- SEV (…
-
- Feature Name: hyperenclave_driver_kylinOS(To be determined)
- Start Date: 2024-11-22
# Summary
[summary]: #summary
This RFC proposes the adaptation of the HyperEnclave driver to support th…
-
# Customer view
As a SCS Customer, I want to place workloads onto a SCS environment where I can be sure that the operator can't view the contents of memory enclaves in order to enable me to run data …
-
# Summary
[Confidential Computing](https://confidentialcomputing.io/wp-content/uploads/sites/85/2020/10/Confidential-Computing-Deep-Dive-white-paper.pdf) is *the protection of data in use by perfor…
sameo updated
2 years ago
-
### Community Note
* Please vote on this issue by adding a 👍 [reaction](https://blog.github.com/2016-03-10-add-reactions-to-pull-requests-issues-and-comments/) to the original issue to help the…