But information in use, when information is in memory and becoming operated upon, has normally been more challenging to protected. Confidential computing addresses this significant hole—what Bhatia calls the “lacking third leg in the three-legged facts defense stool”—by means of a components-based mostly root of rely on. vehicle-suggest he