But details in use, when information is in memory and becoming operated on, has normally been more challenging to protected. Confidential computing addresses this significant gap—what Bhatia phone calls the “lacking 3rd leg in the 3-legged knowledge security stool”—via a components-centered root of belief. DOE’s testbeds may also be bein