The Linux Foundation Projects
Skip to main content
All Posts By

angelahliu

Welcome to the 2025 February Newsletter

By Newsletter No Comments

February’s Issue:

  • From the Executive Director
  • NEW! Outreach: Job Board Page Now Live!
  • Upcoming Events
  • From the TAC: Trustworthy Workload Identity
  • Recent News

Hello Community Member, welcome to our latest newsletter, where we share some highlights from my February travels across Europe and exciting updates in Confidential Computing.

From the Executive Director (ED)

February has been Europe-heavy for me, which  makes a change (and works for me as I’m based in the UK).  There were three different conferences – FOSDEM in Brussels, State of Open Con in London and the AI Security Summit in Paris.  FOSDEM was (as usual!) packed and chaotic, but with devrooms for Confidential Computing and Attestation both busy, and an extra pre-summit meeting around Attestation (there were just too many talks submitted to have them all in the official conference), the amount of interest at the developer level is clearly really picking up.

At State of Open Con, I presented at pun-heavy 15 minute session on PII (Personally Identifiable Information) and also appeared on a panel around Open Source Security, excellently moderated by Divya Mohan.  Sal Kimmich, our out-going Technical Community Arcthitect, presented a session on Secure Isolation and Trust Boundaries: A Crash Course for Engineers.  State of Open Con is now in its third year, and continues to be one of the best open source conferences of the year.

The AI Security Summit was held the day before the huge international AI summit in Paris, and was notable for me in that the number of people who had actually heard of Confidential Computing was much higher than I’m used to.  I gave an introduction to remote attestation and why it’s so important, and found myself able to dive deeper into the technical side than I’m used to: with FOSDEM and this, it really feels like the message is getting out there.

The last thing I’d like to do is mention a new Premier member to the CCC: Shielded Technologies joined us this month. We look forward to working with them and the various General and Associate members who have also recently joined.

Outreach: Job Board Page Now Live! 

We’re thrilled to announce that the CCC Job Board is now live! It features exciting career opportunities for professionals passionate about advancing secure computing technologies, with roles in research, development, and the implementation of cutting-edge confidential computing solutions. 

Check out the available positions and add your job postings to the board and connect with top talent! Visit the Job Board

Upcoming Events: 

From the TAC: Trustworthy Workload Identity 

The ability to identify a workload across the internet with cryptographic certainty is one of the key capabilities of Confidential Computing. However, much of the ecosystem still relies on less secure mechanisms, such as using filenames or other easily spoofable features, to identify code. Identifying workloads with Confidential Computing techniques offers significant benefits, but we still face ease-of-use challenges. A new community effort is emerging to improve both industry standards for Workload Identity and its ease of use. Like our other open source initiatives, these meetings and documents are publicly accessible. If you’d like to get involved, you can find the latest updates on meetings and discussions on the TAC mailing list.

Recent News

  • OC3 2025 Registrations are Open: The Open Confidential Computing Conference registrations are free and already open! Join us on March 27th, either online or on-site in Berlin, to learn all about the latest developments in confidential computing by thought leaders at Microsoft, Arm, NVIDIA and more!
    OC3
  • Intel Announces TEE-IO Support in Latest Xeon 6 Processors: On February 24, Intel launched the latest processors in the Intel Xeon 6 family and announced support for Trusted Execution Environment-IO (TEE-IO).  The Intel Xeon 6 processors with P-cores (formerly code-named “Granite Rapids”) include hardware support for Intel TDX Connect, Intel’s implementation of TEE-IO.  Intel TDX Connect will enhance the performance and flexibility of Confidential Computing use cases that include confidential operations on both the CPU and a PCIe-connected device such as GPU-accelerated confidential AI. Solutions based on Intel TDX Connect will require a capable CPU, an enabled host OS/hypervisor, and a TEE-IO capable device.  Intel is engaged throughout the ecosystem to accelerate enablement of complete solutions.

Image source: https://www.businesswire.com/news/home/20250224348229/en/

Subscribe to our newsletter!

🎉 Happy New Year! Welcome to the 2025 January Newsletter

By Newsletter No Comments

January’s Issue:

  • From the TAC:  Path Forward for Confidential Computing in 2025
  • Welcome 2025 Leadership
  • NEW! Confidential Computing Messaging Guide
  • Confidential Computing Summit Call for Papers
  • Recent News

From the TAC

Confidential Computing in 2024: Growth, Security, and Collaboration Pave the Way for an Exciting 2025

In 2024 We did a great job working together on the TAC to make the world more secure with Confidential Computing, than any of us could have done as individuals or individual companies.

As an open source organization, seeing our projects grow is nearest and dearest to our hearts. Long standing projects like Gramine advanced with more and more adoption.

We grew our portfolio by 60% with new projects contributed by Intel, Samsung, Suse, and TikTok. These new projects span:

  • Fundamental support for AI Accelerators to directly enable AI Cleanroom Capabilities. 
  • As 2025 kicks off we already have a new project in the pipeline. Stay tuned for some news coming up real soon on that.

Our projects, already security focused, improved their security posture adopting best practices from the Open Source Security Foundation. All CCC projects have completed or initiated the OpenSSF Best Practice BadgeIn 2025, we’ll help our projects get even more robust as we assess how Scorecards can identify additional improvements.  

Special Interest Groups

We revamped our mentorship program, welcoming a new cohort of mentees who are actively contributing to CCC projects and gaining security expertise—thanks to our dedicated maintainers who generously mentor them.

Our Special Interest Groups (SIGs) made great strides:

  • The Kernel SIG is accelerating Confidential Computing feature upstreaming in the Linux Kernel.
  • The Attestation SIG fosters collaboration on attestation data standards and protocols, with impactful developments expected in 2025.
  • The Governance, Risk, and Compliance (GRC) SIG is driving awareness of critical concepts like Workload Identity, which the TAC will explore further this year.

Curious about Workload Identity? Come join us at a TAC or GRC SIG meeting or follow the discussion on our mailing lists.

Welcome to Our 2025 CCC Leaders

We’re excited to kick off 2025 by introducing our new leadership team:

Governing Board

Chair: Nelly Porter (Google)

Vice-Chair: Emily Fox (Red Hat)

TAC

Chair: Dan Middleton (Intel)

Vice-Chair Yash Mankad (Red Hat)

Outreach Committee

Chair: Rachel Wan (IBM)

Vice-Chair: Mike Ferron-Jones (Intel)

CCC Outreach

Driving Adoption and Engagement: Reflecting on 2024 and the Path Forward for Confidential Computing in 2025

Looking back at 2024, the Outreach Committee launched brand repositioning efforts, completed the Confidential Computing Messaging Guide, and shifted the focus from “What is Confidential Computing” to “Why Confidential Computing Matters.” The committee also proposed creative agency work, updates to the CCC website, and refinements to the logo and mascot. Additionally, we engaged IDC for a market analysis white paper to update market data and expand Confidential Computing coverage. We participated in key industry events, including FOSDEM, OC3, RSAC, CC Summit, and OSFF.

For 2025, our strategy focuses on enhancing CCC’s presence through creative agency work, market analysis, community outreach, events, and educational resources. These initiatives aim to strengthen our mission while increasing engagement and visibility across industries.

We invite the community to contribute by submitting use cases, sharing insights, and participating in upcoming events. Your involvement is vital to shaping the future of Confidential Computing and driving collective progress.

The Confidential Computing Summit Returns for Year 3!

Mark your calendar for June 17-18 in San Francisco as the Confidential Computing Consortium collaborates with Opaque Systems for the third annual Confidential Computing Summit.

Bringing together the brightest minds in confidential computing, secure AI, and privacy-preserving technologies, the Summit will explore the transformative potential of generative AI across industries like finance, healthcare, and manufacturing while learning how to keep sensitive data secure.

Snag the Early Bird rate now and watch last year’s inspiring keynotes.

Call for Speakers: Deadline February 17

Have a real-world use case or breakthrough to share? Submit your session proposal and join the conversation shaping the future of confidential computing and trustworthy AI. Submit here.

Recent News

Subscribe to our newsletter