Главная
Study mode:
on
1
Introduction
2
What is Confidential Computing
3
Confidential Containers overview
4
attestation
5
image download
6
Access control
7
Debugability
8
Conclusion
9
Questions
Description:
Explore the five major technical and commercial challenges facing confidential containers in this conference talk. Delve into attestation of workloads, performance issues, image download optimizations, access control considerations, and debuggability concerns. Learn about existing solutions, ongoing developments, and potential strategies to mitigate these challenges. Gain insights into how hypervisors and KVM are involved in addressing these problems, and understand the current state of confidential computing technologies like Intel's TDX and AMD's SEV.

The Five Big Problems with Confidential Containers

Linux Foundation
Add to list