
In Today’s Issue
- From the Executive Director
- Outreach
- Upcoming Events
- From the TAC
- Recent News
Hello Community Member,
This month’s update features progress across our technical community, including updates from the TAC and Outreach Committees, new project proposals, upcoming event plans for the fall, and exciting member news. From standards engagement to real-world demo planning, the CCC continues to build momentum across the ecosystem. Read on for the latest news!
From the Executive Director (ED)
As the summer hits in the Northern Hemisphere, things sometimes slow down, but although there are no major conferences for a month or so at which the CCC is appearing, committee and SIG meetings are continuing apace. Of particular note is the Outreach Committee’s has task force to evaluate the effectiveness and value for money of the various activities in which we engage. A number of TAC SIG members have been working with standards bodies to ensure that Confidential Computing is appropriately represented in their outputs and also to work on various protocols that include Confidential Computing primitives. We always welcome involvement in our various committees and SIGs – and you don’t need to be a member to contribute, so please come along.
It’s also worth noting that almost all of our meetings are recorded and made available on the Confidential Computing Consortium’s YouTube channel, allowing you to catch up on any topics you’ve missed. There are Slack channels and mailing lists for asynchronous communication as well: visit the Committees page on the website for more information.
Finally, we have a number of new members expected to join us in the next few weeks, so keep an eye out for news around that!
Outreach
The Outreach Committee carried the Confidential Computing message to the market across a range of channels. Website, blog, and social metrics were all up over the quarter. We also came away from CC Summit and OSS North America with a good archive of talks from many members available for promotion. We are gearing up for two major in-person events in Q4’25: AI Infrastructure Summit (Silicon Valley) in September, and a bespoke customer workshop in San Francisco in October. For the AI Infrastructure Summit, we have a full slate of activities including on-line workshops, panel discussions, sessions, podcast appearances, and the CCC booth. The October event will be a one-day workshop featuring speakers, demos, and customer success stories. Thanks to all the members contributing their efforts to these events.
Outreach is also in the midst of a strategy reassessment. We are looking at our objectives and tactics and plan to report out to the Governing Board soon with recommendations we believe will drive more awareness, engagement, and adoption of Confidential Computing.
Upcoming Events
- AI Infra Summit September 9-11, 2025
From the TAC
The Open Enclave SDK project recently completed its 2025 annual review, highlighting its continued role as one of the most mature and widely adopted projects within the Confidential Computing Consortium. Designed to support hardware-backed Trusted Execution Environments, OE remains central to production deployments—particularly in Intel SGX-based systems—offering a stable, well-maintained foundation for building secure enclave applications. The project’s ongoing contributions, robust documentation, and ecosystem integration make it a critical pillar of the CCC’s technical landscape. Its long-standing reliability continues to benefit both new developers and organizations building trusted workloads at scale.
In addition, the TAC is currently reviewing a proposal for a new project: dstack, an open-source confidential AI orchestration framework. Designed for secure deployment of AI workloads in TEEs, dstack represents a promising direction for expanding the Consortium’s footprint into privacy-preserving machine learning. The proposal is available on the TAC mailing list for community review, and a resolution is expected next month. We encourage members to explore the project and share feedback as part of our open, collaborative governance process.

Recent News
- Missed the Confidential Computing Consortium Mini Summit at OSSNA 2025? The full session recordings are now live on the CCC YouTube channel! From ecosystem updates to deep dives into real-world applications, catch talks from leaders at NVIDIA, Microsoft, and more. Catch up now.
- Confidential Computing underpins the “Mesh”, a secure-by-design alternative to the web. CCC member Hushmesh—a 2024 NATO DIANA startup (DIANA being NATO’s Defence Innovation Accelerator for the North Atlantic)—has been selected for NATO’s Rapid Adoption Action Plan, ratified at the 2025 NATO Summit in The Hague. In collaboration with NATO DIANA, the NATO Communications and Information Agency (NCIA), and NATO HQ, Hushmesh will begin pilots of its Confidential Computing-based technologies: Universal Zero Trust, Entity-Centric Information Security, and “Meshaging.” This selection highlights the strategic relevance of Hushmesh’s “Mesh” infrastructure for defense and alliance-wide trustworthy collaboration.
At the core of Hushmesh’s approach is Confidential Computing, which ensures that information remains protected not only at rest and in transit, but also in use—secured within hardware-based Trusted Execution Environments (TEEs). This secure-by-design foundation underpins the Mesh: a next-generation global information infrastructure that automates end-to-end information provenance, integrity, authenticity, confidentiality, privacy, and zero trust at the computing process and chip levels. It represents a fundamental shift from legacy IT-centric, and domain-centric web paradigms—addressing foundational vulnerabilities with today’s computing approaches. Built on Confidential Computing, the Mesh offers a path to universal cybersecurity and cross-domain trust to meet the secure collaboration needs of NATO and other large-scale organizations operating across national and corporate boundaries. - Are open source attestation tools speaking the same language? In Harsh Vardhan Mahawar’s LFX mentorship with the CCC, he tackled this challenge – mapping Keylime, Veraison & JANE to the IETF’s RATS model, implementing the CMW wrapper, and introducing python-ear for EAT attestation results. Read the blog.
- What is Confidential Computing—and why does it matter? Watch the interview with Mike Bursell, Executive Director of the Confidential Computing Consortium, as he breaks down the fundamentals of confidential computing, attestation, and their growing importance in today’s security landscape.

We’re excited to welcome Tinfoil as the newest start-up member of the Confidential Computing Consortium. Tinfoil is an open source platform delivering cryptographically verifiable privacy for AI workloads—ensuring user data remains protected, even from the cloud provider. Learn more about their work and how they plan to contribute to the CCC community.

Best regards,
The Confidential Computing Consortium
Let’s grow our community! Share this with your network.