The Linux Foundation Projects
Skip to main content
Monthly Archives

August 2025

Welcome to the August 2025 Newsletter

By Newsletter No Comments

In Today’s Issue

  1. From the Executive Director
  2. Outreach
  3. Upcoming Events
  4. From the TAC
  5. Recent News

Hello Community Member,

This month’s update highlights important progress across the Consortium, including insights from the TAC, Outreach, and Executive Director, as well as recent member news. From preparing strategic priorities for 2026 to hands-on technical advances and upcoming events like the AI Infrastructure Summit and our October workshop, the CCC continues to bring members together to shape the future of Confidential Computing. Read on for the latest updates!

From the Executive Director 

While the Consortium isn’t very busy with activities like conferences over August, that doesn’t mean that important work stands still.  I’ve been working with members of the leadership team to prepare us for 2026.  Budgets need to be approved towards the end of the year, of course, but we can’t start on that without a good understanding of what our strategic priorities should be for the next 12 months.  So we’ve been looking at what our options might be and are looking forward to the Governing Board meeting at the end of this month, where we hope to have a robust debate about what we might do.

One of the interesting things about the Consortium is the high number of start-ups who are (mostly) General Members, and balancing their interests with those of our larger members, some of whom are Premier Members. We work hard to ensure that the views, goals and concerns of smaller members are considered and represented at the strategic level, and the make-up of the Governing Board includes three representatives of the General Members, elected once a year to the Board.  We value their input and they each have a vote, equal with those of the Premier Members.

Outreach

Outreach took the month off to lay by the pool and drink mojitas (we wish!).  Actually, it’s been a sprint to prepare for upcoming events including the AI Infrastructure Summit in Santa Clara, California and plan our customer workshop in San Francisco.  CCC presence at AI Infrastructure Summit (September 9-11) is packed with member participation on panels, pre-show workshops, at-show sessions, podcasts, and a booth.  Thanks to members Anjuna, Hushmesh, Invary, and Mainsail for their leadership at the event.  Outreach is also planning a customer workshop for ~30 attendees on October 20 in San Francisco with a strong line-up of speakers on topics ranging from confidential AI, regulatory compliance, and even a build-your-own-use case exercise.  Tip of the hat to members Nvidia and TikTok for taking point on workshop planning.  And finally, the international survey results from our market research project with IDC are in, and we are looking forward to seeing the initial report at the Outreach meeting on September 3.  IDC is targeting delivery of their full report in early October, which will be available to all members.  Maybe we’ll get to lay by the pool in November?  We can hope.

Upcoming Events

Blog-Aug-27-2025-02-14-55-4391-PM

From the TAC

Despite August vacations a lot transpired this month in the Technical Advisory Council. ManaTEE delivered its first annual report from Mingshen Sun. Since joining a year ago the project has made its first community release, refactored a lot of the initial research code, and added a new TEE backend (Intel TDX). They also added documentation which is great for first time users and contributors and have a slick webpage.

We also got an update on the RISC-V confidential computing architecture, CoVE from Ravi Sahita. Ravi walked us through the CoVE Application Binary Interface and Reference Architecture. Much of the collaboration for this work takes place in a sister organization in the Linux Foundation. Learn more.

We also heard from Red Hat’s Dr. Chris Butler. Chris talked about his experiences in the field applying Confidential Computing to real customer problems. It was a great ground truth on customer perceptions of the technology. One of my main takeaways was the importance of compliance in customer decisions. This has been a big topic across the Consortium and one that we need even more focus on. You can watch all of this in our TAC playlist on youtube – check out the August 7th meeting.

Recent News

  • We’re excited to welcome QLAD to the CCC as a new Start-up Member! QLAD is a Kubernetes-native confidential computing platform delivering pod-level TEEs, encrypted Armored Containers™, and post-quantum resilience—making confidentiality scalable and production-ready. With contributions already in the Confidential Containers project and a vision to simplify secure computing, QLAD is helping define the next era of Confidential Computing. Read the announcement.

Best regards,

The Confidential Computing Consortium

QLAD Joins the Confidential Computing Consortium

By Blog No Comments

We’re pleased to welcome QLAD to the Confidential Computing Consortium (CCC), as the latest innovator helping define the next era of secure computing.

QLAD is a Kubernetes-native confidential computing platform that provides runtime protection by default, delivering pod-level Trusted Execution Environments (TEEs) and featuring encrypted Armored Containers™ for enhanced IP protection and post-quantum resilience. With post-quantum resilience and seamless integration, no code rewrites or infrastructure changes required, QLAD enables scalable, production-ready confidentiality for modern workloads.

“At QLAD, we believe confidential computing should be simple. We’re building a platform that delivers drop-in protection for sensitive workloads, without code rewrites or infrastructure disruption. We’re proud to join the CCC community and contribute to the standards, tooling, and trust models that help organizations stay secure across clouds, edges, and collaborative environments.”
Jason Tuschen, CEO, QLAD

Confidential computing is undergoing a transformation, from experimental to essential. QLAD was founded to help accelerate that shift by making trusted execution practical and DevOps-friendly, especially for organizations deploying at scale across cloud, hybrid, and edge environments.

Why QLAD joined CCC

The CCC provides a powerful venue to drive industry alignment on standards, reference architectures, and transparent governance. QLAD sees the consortium as a collaborative platform to:

  • Champion workload-first adoption patterns (beyond VM- or node-level models)
  • Demystify confidential computing for developers and security teams
  • Share insights as it prepares to open-source components of its container security layer in late 2025

What QLAD brings to the community
QLAD engineers are already contributing to CCC-hosted initiatives, including the Confidential Containers (CoCo) project. Contributions to date include:

  • QLAD engineers have contributed directly to the Confidential Containers (CoCo) project, including adding AWS SNP VLEK support across three repositories (trustee, guest-components, and azure-cvm-tooling)
  • Submitted eight pull requests (all merged) to cloud-api-adaptor, advancing workload orchestration in confidential environments
  • Engaged with members of U.S. Congress to raise awareness of Confidential Computing and Confidential Containers, helping ensure the technology receives attention and potential funding at the federal level

As QLAD prepares to open source additional components, it plans to work closely with the CCC Technical Advisory Council to align on contribution pathways and ensure long-term technical alignment.

What QLAD hopes to gain
In joining CCC, QLAD looks forward to:

  • Advancing attestation frameworks, policy enforcement models, and container standards
  • Collaborating with industry peers solving real-world deployment challenges
  • Participating in working groups that shape the future of confidential computing across AI, hybrid cloud, and zero-trust environments

We’re excited to welcome QLAD into the CCC community and look forward to their continued contributions to making confidential computing scalable, practical, and trusted by default.

Welcome to the July 2025 Newsletter

By Newsletter No Comments
JulyNewsletter

In Today’s Issue

  1. From the Executive Director
  2. Outreach
  3. Upcoming Events
  4. From the TAC
  5. Recent News

Hello Community Member,

This month’s update features progress across our technical community, including updates from the TAC and Outreach Committees, new project proposals, upcoming event plans for the fall, and exciting member news. From standards engagement to real-world demo planning, the CCC continues to build momentum across the ecosystem. Read on for the latest news!

From the Executive Director (ED)

As the summer hits in the Northern Hemisphere, things sometimes slow down, but although there are no major conferences for a month or so at which the CCC is appearing, committee and SIG meetings are continuing apace.  Of particular note is the Outreach Committee’s has task force to evaluate the effectiveness and value for money of the various activities in which we engage.  A number of TAC SIG members have been working with standards bodies to ensure that Confidential Computing is appropriately represented in their outputs and also to work on various protocols that include Confidential Computing primitives. We always welcome involvement in our various committees and SIGs – and you don’t need to be a member to contribute, so please come along.  

It’s also worth noting that almost all of our meetings are recorded and made available on the Confidential Computing Consortium’s YouTube channel, allowing you to catch up on any topics you’ve missed.  There are Slack channels and mailing lists for asynchronous communication as well: visit the Committees page on the website for more information.

Finally, we have a number of new members expected to join us in the next few weeks, so keep an eye out for news around that!

Outreach

The Outreach Committee carried the Confidential Computing message to the market across a range of channels.  Website, blog, and social metrics were all up over the quarter.  We also came away from CC Summit and OSS North America with a good archive of talks from many members available for promotion.  We are gearing up for two major in-person events in Q4’25: AI Infrastructure Summit (Silicon Valley) in September, and a bespoke customer workshop in San Francisco in October.  For the AI Infrastructure Summit, we have a full slate of activities including on-line workshops, panel discussions, sessions, podcast appearances, and the CCC booth.  The October event will be a one-day workshop featuring speakers, demos, and customer success stories.  Thanks to all the members contributing their efforts to these events.

Outreach is also in the midst of a strategy reassessment.  We are looking at our objectives and tactics and plan to report out to the Governing Board soon with recommendations we believe will drive more awareness, engagement, and adoption of Confidential Computing.

Upcoming Events

From the TAC

The Open Enclave SDK project recently completed its 2025 annual review, highlighting its continued role as one of the most mature and widely adopted projects within the Confidential Computing Consortium. Designed to support hardware-backed Trusted Execution Environments, OE remains central to production deployments—particularly in Intel SGX-based systems—offering a stable, well-maintained foundation for building secure enclave applications. The project’s ongoing contributions, robust documentation, and ecosystem integration make it a critical pillar of the CCC’s technical landscape. Its long-standing reliability continues to benefit both new developers and organizations building trusted workloads at scale.

In addition, the TAC is currently reviewing a proposal for a new project: dstack, an open-source confidential AI orchestration framework. Designed for secure deployment of AI workloads in TEEs, dstack represents a promising direction for expanding the Consortium’s footprint into privacy-preserving machine learning. The proposal is available on the TAC mailing list for community review, and a resolution is expected next month. We encourage members to explore the project and share feedback as part of our open, collaborative governance process.

Screenshot 2025-07-31 at 4.06.37 PM

Recent News

  • Missed the Confidential Computing Consortium Mini Summit at OSSNA 2025? The full session recordings are now live on the CCC YouTube channel! From ecosystem updates to deep dives into real-world applications, catch talks from leaders at NVIDIA, Microsoft, and more. Catch up now.
  • Confidential Computing underpins the “Mesh”, a secure-by-design alternative to the web. CCC member Hushmesh—a 2024 NATO DIANA startup (DIANA being NATO’s Defence Innovation Accelerator for the North Atlantic)—has been selected for NATO’s Rapid Adoption Action Plan, ratified at the 2025 NATO Summit in The Hague. In collaboration with NATO DIANA, the NATO Communications and Information Agency (NCIA), and NATO HQ, Hushmesh will begin pilots of its Confidential Computing-based technologies: Universal Zero Trust, Entity-Centric Information Security, and “Meshaging.” This selection highlights the strategic relevance of Hushmesh’s “Mesh” infrastructure for defense and alliance-wide trustworthy collaboration.
    At the core of Hushmesh’s approach is Confidential Computing, which ensures that information remains protected not only at rest and in transit, but also in use—secured within hardware-based Trusted Execution Environments (TEEs). This secure-by-design foundation underpins the Mesh: a next-generation global information infrastructure that automates end-to-end information provenance, integrity, authenticity, confidentiality, privacy, and zero trust at the computing process and chip levels. It represents a fundamental shift from legacy IT-centric, and domain-centric web paradigms—addressing foundational vulnerabilities with today’s computing approaches. Built on Confidential Computing, the Mesh offers a path to universal cybersecurity and cross-domain trust to meet the secure collaboration needs of NATO and other large-scale organizations operating across national and corporate boundaries.
  • Are open source attestation tools speaking the same language? In Harsh Vardhan Mahawar’s LFX mentorship with the CCC, he tackled this challenge – mapping Keylime, Veraison & JANE to the IETF’s RATS model, implementing the CMW wrapper, and introducing python-ear for EAT attestation results. Read the blog.
  • What is Confidential Computing—and why does it matter? Watch the interview with Mike Bursell, Executive Director of the Confidential Computing Consortium, as he breaks down the fundamentals of confidential computing, attestation, and their growing importance in today’s security landscape.
CCCInterview

We’re excited to welcome Tinfoil as the newest start-up member of the Confidential Computing Consortium. Tinfoil is an open source platform delivering cryptographically verifiable privacy for AI workloads—ensuring user data remains protected, even from the cloud provider. Learn more about their work and how they plan to contribute to the CCC community.

Best regards,

The Confidential Computing Consortium

Let’s grow our community!  Share this with your network.