THE LINUX FOUNDATION PROJECTS
Category

Announcement

New Study Finds Confidential Computing Emerging as a Strategic Imperative for Secure AI and Data Collaboration

By Announcement, Blog No Comments

Research commissioned by the Confidential Computing Consortium highlights accelerating adoption driven by AI innovation, compliance standards, and data sovereignty

Summary

  • The Confidential Computing Consortium (CCC), a project community at the Linux Foundation, announced new IDC research, “Unlocking the Future of Data Security: Confidential Computing as a Strategic Imperative.”
  • The global survey of 600+ IT leaders across 15 industries finds that 75% of organizations are adopting Confidential Computing, signaling its shift from niche to mainstream.
  • By adding protection of data in-use, Confidential Computing is emerging as a core enabler of secure, data-centric innovation, delivering measurable gains in data integrity, confidentiality and compliance.
  • Despite strong momentum, skills gaps, validation challenges and interoperability barriers persist, highlighting the need for open standards and industry collaboration led by the CCC.

SAN FRANCISCO, Dec 3, 2025 – The Confidential Computing Consortium (CCC), a project community at the Linux Foundation dedicated to defining and accelerating the adoption of Confidential Computing, today announced findings from a new survey conducted by IDC. Based on insights from more than 600 global IT leaders across 15 industries, the study, “Unlocking the Future of Data Security: Confidential Computing as a Strategic Imperative,” reveals that Confidential Computing has become a foundational enabler of modern data-centric innovation, but implementation complexities are hindering widespread adoption.

“Confidential Computing has grown from a niche concept into a vital strategy for data security and trusted AI innovation,” said Nelly Porter, governing board chair, Confidential Computing Consortium. “As international security and compliance regulations tighten, organizations must invest in education and interoperability to meet heightened data confidentiality, integrity and availability standards – and enable secure AI adoption across sensitive environments.”

Major benefits push Confidential Computing into the mainstream

Awareness and adoption of Confidential Computing continue to grow, expanding its footprint into more industries and applications. According to IDC, “this momentum reflects a broader shift toward securing data in use, driven by the need to mitigate urgent threats and enable secure collaboration in environments where sensitive data is routinely handled.” The study finds:

  • 75% of organizations are adopting Confidential Computing; 57% have started piloting/testing, joining the 18% of organizations already in production
  • 88% of respondents report improved data integrity as the primary benefit of Confidential Computing, followed by confidentiality with proven technical assurances (73%) and better regulatory compliance (68%)
  • Confidential Computing enables top business outcomes, including accelerated innovation, enhanced regulatory compliance, increased cost efficiency and more. Confidential Computing combined with AI-driven analytics accelerates innovation by enabling secure model training, inference and AI agents on sensitive data.
  • Confidential Computing stands out as a practical and scalable alternative especially when compared with more complex or resource-intensive methods. It is also applicable for standard computing workloads, without requiring rewriting of applications or algorithms. 

Adoption drivers shift gears

As security, compliance, and innovation imperatives converge, Confidential Computing adoption is being fueled as a response to external regulations and an enabler for internal business transformation goals. The study finds:

  • Regulatory frameworks like the Digital Operational Resilience Act (DORA) are driving adoption as 77% of organizations are more likely to consider Confidential Computing due to DORA’s specific requirement to protect data in-use.
  • Workload security/external threats (56%), Personally Identifiable Information (PII) protection (51%), and compliance (50%) are the top drivers for adoption, but new use cases – especially in AI and cloud – are expanding relevance, with organizations leveraging Confidential Computing to train AI models, run inference, and deploy AI agents on regulated datasets without compromising privacy
  • Public cloud users are the most likely to implement Confidential Computing technology (71%), followed by hybrid/distributed cloud users (45%), with the acceleration in these environments, driven by the need for scalable security and compliance with evolving regulatory requirements.

Geographic and industry differences highlight early leaders and emerging priorities in Confidential Computing

  • Canada and the United States reported the highest percent of Confidential Computing services in full production, at 26% and 24%, respectively, followed by China and the United Kingdom, both at 20%
  • Greater protection from outside attackers is the highest priority use case in the United States and Britain, whereas Canada, France, Germany and China prioritized protection of personally identifiable information, reflecting more stringent privacy regulations
  • The financial services industry has the highest number percent of full production deployments (37%), followed by healthcare (29%) and government (21%)
  • Healthcare respondents place a significantly higher priority on privacy-preserving data collaborations with multiple parties (78%) than financial services (61%) or government (26%), reflecting medical’s need to safeguard highly regulated data, and enable AI-powered diagnostics through privacy-preserving collaborations.

Addressing barriers and accelerating readiness

Despite strong momentum, the IDC study identifies several adoption challenges, including attestation validation (84%), misconception of Confidential Computing as niche technology (77%), and a skills gap (75%), which must be addressed through industry collaboration, education and standardization. 

To address these challenges and realize the full benefits of Confidential Computing, IDC recommends that organizations: 

  • Start with pilot initiatives to demonstrate measurable value
  • Adopt open standards and vendor-agnostic frameworks 
  • Invest in third-party attestation and interoperability testing 
  • Engage in industry-led initiatives such as those led by the CCC to align on technical assurance and trust frameworks

The next era of Confidential Computing unlocks new possibilities in identity, AI, multi-party collaboration and privacy-preserving analytics that were previously out of reach. For more information, read the full white paper here.

About Confidential Computing Consortium

The Confidential Computing Consortium (CCC) is a community focused on projects securing data in use and accelerating the adoption of Confidential Computing through open collaboration. CCC brings together hardware vendors, cloud providers, and software developers to accelerate the adoption of Trusted Execution Environment (TEE) technologies and standards. Learn more at www.confidentialcomputing.io

The SIMI Group Joins the Confidential Computing Consortium to Advance Data Security and Public Health Innovation

By Announcement, Blog No Comments

The SIMI Group, Inc. (SIMI), a pioneer in health information exchange and analytics services since 1996, continues to push boundaries in public health and healthcare informatics. By addressing critical data gaps across public health agencies, healthcare systems, community organizations, payers, pharmaceutical companies, and researchers, SIMI delivers near real-time situation awareness while prioritizing privacy. Their expertise transforms complex data into actionable insights that drive community health and wellness.

The Confidential Computing Consortium (CCC) is excited to welcome The SIMI Group, Inc. (SIMI) as a startup member. By joining the CCC, SIMI reinforces its commitment to advancing data security and driving the global adoption of trusted execution environments (TEEs). This strategic collaboration with industry leaders like Microsoft and AMD positions SIMI to meet the rigorous privacy, security, and compliance standards of healthcare and public health, while building trust among the public and community partners.

“SIMI is excited to join the CCC and collaborate with Microsoft and AMD,” said Nilesh Dadi, Director of Trusted & Predictive Analytics at SIMI. “This partnership empowers us to support healthcare systems and public health by leveraging trusted execution environments. With this technology, we enable near real-time situation awareness of vaccinations, outbreaks, and medical emergencies in a transparent and privacy-protecting manner.”

SIMI’s leadership in public health innovation stems from firsthand experience with real-world challenges. “SIMI was boots-on-the-ground from the earliest days of the COVID-19 pandemic in the United States,” said Dan Desmond, President & Chief Innovation Officer at SIMI. “The world can no longer rely on faxes, massive group phone calls, and spreadsheets to manage medical and public health emergencies. We’re working with CCC collaborators to build on our progress with the Confidential Consortium Framework, moving toward an accountable and attestable zero-trust future.”

As a CCC member, SIMI is poised to drive the adoption of secure, privacy-first technologies, shaping the future of public health and healthcare informatics through collaboration and innovation.

Confidential Computing Consortium Resources:

MITRE Joins the Confidential Computing Consortium to Advance Cloud Security

By Announcement, Blog No Comments

We are thrilled to announce that MITRE has joined the Confidential Computing Consortium (CCC), further solidifying its commitment to advancing cybersecurity innovation. As a leader in providing technical expertise to the U.S. MITRE’s participation will play a pivotal role in shaping the future of secure cloud computing.

A New Era of Cloud Security

With the growing migration of IT resources to the cloud, securing sensitive data has become more critical than ever. Confidential Computing represents a groundbreaking advancement in cybersecurity by enabling encryption for “data in use” and supporting hardware-bound “enclave attestation.” These capabilities reduce the cyber threat surface, offering unparalleled protection for sensitive data processed in cloud environments.

MITRE’s cybersecurity engineers regularly address the most complex and critical challenges in information systems security as they partner with the Government. By leveraging Confidential Computing, MITRE seeks to enhance cloud security while addressing uncertainties and mitigating potential new risks introduced by emerging technologies.

Through its membership in the CCC, MITRE aims to stay at the forefront of:

  • Understanding Emerging Use Cases: Identifying practical applications of Confidential Computing across industries and government sectors.
  • Evaluating Implementation Methods: Exploring best practices for adopting Confidential Computing standards and technologies.
  • Assessing Value Propositions: Demonstrating the tangible benefits of Confidential Computing for cloud security and operational efficiency.
  • Analyzing Vulnerabilities: Investigating potential risks and threats associated with emerging products, standards, and cloud services.

Driving Collaboration and Innovation

MITRE’s expertise in cybersecurity will contribute significantly to the CCC’s mission of broadening the adoption of Confidential Computing. By collaborating with industry leaders, MITRE will help establish robust standards, develop practical solutions, and ensure secure implementation methods that meet the needs of both Government and private sectors.

As Confidential Computing continues to evolve, MITRE’s involvement will enable greater innovation and confidence in cloud security, benefiting the Government and the broader technology community. Together, we can address the challenges of tomorrow and build a more secure digital landscape.

Confidential Computing Consortium Resources:

Applied Blockchain Joins the Confidential Computing Consortium as a General Member

By Announcement, Blog No Comments

We are excited to announce that Applied Blockchain has rejoined the Confidential Computing Consortium (CCC) as a General Member, reinforcing its longstanding commitment to advancing innovation in Confidential Computing and Trusted Execution Environment (TEE) technology. This move aligns with CCC’s mission to enhance trust and privacy in business applications and marks a continued dedication to tackling some of the most pressing challenges in digital privacy.

As one of the few organizations that are members of the Confidential Computing Consortium and the LF Decentralised Trust, Applied Blockchain stands out for its cross-domain expertise in privacy-preserving technology. This dual membership uniquely positions the company to foster collaboration and drive progress across both ecosystems, promoting secure, transparent, and trustworthy solutions for the future of technology.

Applied Blockchain’s renewed involvement comes directly from its groundbreaking work on the Silent Data platform. By integrating TEE technology with blockchain, Silent Data provides a robust solution for privacy-conscious companies.

“We are thrilled to rejoin the Confidential Computing Consortium as a General Member, reinforcing our commitment to advancing Trusted Execution Environment (TEE) technologies. Our continued work on Silent Data demonstrates how we can tackle privacy challenges, and we look forward to collaborating with CCC members to drive innovation, enhance trust, and protect sensitive data.”
— Adi Ben-Ari, Founder & CEO at Applied Blockchain

Applied Blockchain focuses on safeguarding consumer and business data in critical sectors such as banking, energy trading, and supply chains. With its renewed membership, the company is positioned to make significant strides in evolving privacy-enhancing technologies, helping organizations across industries protect sensitive data while driving trust and security in their operations.

We look forward to Applied Blockchain’s continued impact as they collaborate with CCC members and help shape the future of Confidential Computing.

Honeypotz Inc. Joins the Confidential Computing Consortium as a Startup Tier Member

By Announcement, Blog No Comments

Honeypotz Inc., a leader in the field of Confidential Computing, has joined the Confidential Computing Consortium (CCC) as a start up member. This partnership underscores Honeypotz’s commitment to enhancing data security and contributing to the broader adoption of trusted execution environments (TEEs) worldwide.

As part of the CCC, Honeypotz will collaborate with industry leaders like RedHat to elevate security standards and foster innovation in data privacy and protection. This partnership underscores a shared commitment to delivering cutting-edge solutions that ensure data remains secure and private, even in the most sensitive computing environments.

Honeypotz specializes in secure computing technologies that protect data in use, empowering organizations to confidently deploy and manage mission-critical applications. By working alongside RedHat and other CCC members, Honeypotz aims to push the boundaries of Confidential Computing, making secure and reliable solutions more accessible to businesses around the globe.

“We are excited to join the CCC and collaborate with RedHat,” said Vladimir Lialine, Founder of Honeypotz Inc. “This partnership will enable us to accelerate the adoption of trusted execution environments and continue delivering innovative solutions that address the evolving security needs of our customers.”

The CCC unites industry leaders, innovators, and experts to create a collaborative ecosystem for advancing the adoption of Confidential Computing technologies. By joining this consortium, Honeypotz reaffirms its position as a leader in data security and a driving force behind the future of Confidential Computing.

Learn more about Honeypotz’s mission and its role in the CCC by visiting Confidential Computing Consortium.

Confidential Computing Consortium Resources

Confidential Computing Consortium Welcomes ManaTEE as a New Open-Source Project

By Announcement No Comments

The Confidential Computing Consortium is delighted to announce ManaTEE, a new open-source project designed to enable secure data collaboration without compromising the privacy of individual data. Published by TikTok in June 2024 as part of their ongoing Privacy Innovation efforts, ManaTEE started as a core use case of TikTok. Now part of the Confidential Computing Consortium, ManaTEE addresses the growing challenges of balancing privacy, usability, and accuracy in enterprise data collaboration.

The Challenge of Data Collaboration

While data collaboration is essential, designing and building a secure framework involves significant effort and numerous caveats. Existing solutions, such as differential privacy or commercial data clean rooms, often fail to provide a balance between privacy, accuracy, and usability, particularly when handling large-scale data.

Introducing ManaTEE: A Two-Stage Data Clean Room

ManaTEE introduces a two-stage data clean room model to provide an interactive interface for exploring data while protecting private data during processing. It combines different privacy-enhancing technologies (PETs) across two stages:

  • Programming Stage: Data consumers explore datasets using low-risk data, employing different PETs such as pseudonymization or differentially private synthetic data generation.
  • Secure Execution Stage: Workloads run in a trusted execution environment (TEE), which provides attestable integrity and confidentiality guarantees for the workload in the cloud.

Key Benefits of ManaTEE

  • Cloud-Ready: ManaTEE can be easily deployed to existing cloud TEE backends such as Google Confidential Space. We plan to support other backends as well, eliminating the need to build the entire TEE infrastructure to set up the framework.
  • Flexible PET: Data providers can control the protection mechanisms at each stage to tailor to specific privacy requirements of the data.
  • Trusted Execution Environment: By leveraging TEEs, ManaTEE ensures a high level of confidence in data confidentiality and program integrity for both data providers and data consumers.
  • Accuracy and Utility: ManaTEE employs a two-stage design to ensure that result accuracy is not compromised for the sake of privacy.

Features of ManaTEE’s Data Clean Room

  • Interactive Programming: Integrated with Jupyter Notebook, allowing data consumers to work with Python and other popular languages.
  • Multiparty Collaboration: Enables collaboration with multiple data providers.
  • Flexibility: Adaptable to specific enterprise needs.

ManaTEE Use Cases

  • Trusted Research Environments (TREs): Secure data analysis for public health, economics, and more, while maintaining data privacy.
  • Advertising & Marketing: Lookalike segment analysis and private ad tracking without compromising user data.
  • Machine Learning: Enables private model training without exposing sensitive data or algorithms.

Open Collaboration and Governance

ManaTEE encourages open collaboration within its growing community. Currently led by TikTok’s founding developers, ManaTEE plans to expand its leadership through a Technical Steering Committee (TSC). Eventually, future project milestones and growth plans will be publicly discussed and governed transparently.

The ManaTEE project welcomes anyone interested in confidential computing and private data collaboration to participate and contribute.

Conclusion

ManaTEE is a significant step forward in secure data collaboration, balancing privacy, usability, and accuracy. Organizations can safely collaborate on sensitive datasets by leveraging TEEs and a two-stage clean room approach.

To learn more, visit the Confidential Computing Consortium or explore ManaTEE on GitHub.

Fr0ntierX Joins the Confidential Computing Consortium as a Startup Member

By Announcement No Comments

 

August 26, 2024 – Fr0ntierX, a leader in secure AI and cybersecurity, has officially joined the Confidential Computing Consortium. This recognition, driven by Fr0ntierX’s cutting-edge Janus platform, marks a significant milestone for the company.

Janus offers a novel approach to secure AI through confidential computing. This technology ensures complete data encryption at every level, making it indispensable for industries requiring top-tier security.

Fr0ntierX’s inclusion in the Consortium underscores its commitment to advancing secure computing in collaboration with the industry’s best.

“This community is unique. Nowhere else do you have competing companies come together with a shared goal of advancing the industry together. For us, it’s an incredible opportunity to integrate Janus with new ideas, ensuring our solutions continue to meet the highest standards,” said Jonathan Begg, CEO of Fr0ntierX. 

With a team of industry experts, Ph.D.s, and strategic advisors, Fr0ntierX provides guidance and support to help businesses maximize the benefits of AI adoption while maintaining the highest standards of security and compliance.

Fr0ntierX empowers enterprises, government agencies, and academic institutions to leverage the power of AI and Large Language Models (LLMs) without compromising security. Their flagship product, Janus, features advanced encryption and robust cybersecurity – powered by confidential computing – safeguarding data from storage to processing. By eliminating master keys, Janus mitigates common threats and ensures data integrity. Unlike typical AI models, which may expose data to third-parties, Janus operates within a fully isolated environment, providing a secure container for AI workflows and the compartmentalization of context data, making it ideal for sectors that handle sensitive information.

By joining the Confidential Computing Consortium, Fr0ntierX aims to further accelerate innovation in secure computing by collaborating with industry leaders to drive the adoption of confidential computing technologies.

Confidential Computing Consortium Resources

OPPO Joins the Confidential Computing Consortium: Advancing Privacy and Security for a Smarter Future

By Announcement No Comments

 

We are thrilled to announce that OPPO has become a General member of the Confidential Computing Consortium, a global community dedicated to advancing privacy and security through cutting-edge technology. This exciting development reflects our commitment to safeguarding user privacy and delivering secure, reliable smart life experiences.

Commitment to Privacy and Security

OPPO fully understands the significance of user privacy and consistently prioritizes security above all else. Their products and services are designed with robust security features, including high-strength data encryption, secure transmission and storage, and rigorous access control mechanisms. These measures ensure that our offerings meet high-level information security assessments and certifications, establishing a comprehensive privacy protection system.

As a member of the Confidential Computing Consortium, OPPO will collaborate with industry leaders, innovators, and researchers to push the boundaries of privacy protection. Our goal is to contribute to technological innovation and explore new frontiers in confidential computing, enhancing the security and reliability of smart devices and services.

By joining the Confidential Computing Consortium, OPPO aligns itself with a community committed to developing open-source technologies and standards that enhance data privacy. This partnership enables OPPO to: work alongside leading companies and organizations to share knowledge and best practices, drive innovation in privacy protection, enhance user trust and participate in groundbreaking research and development efforts that set new standards for data security in the technology industry.

What Is Confidential Computing?

Confidential computing is an emerging technology that focuses on protecting data while it is being processed. Unlike traditional security measures that protect data at rest or in transit, confidential computing ensures that data remains secure during computation by using hardware-based trusted execution environments (TEEs). This approach provides a higher level of assurance and privacy, particularly in cloud and edge computing environments

OPPO’s membership in the Confidential Computing Consortium is a significant milestone in our journey toward creating a more secure and trustworthy digital world. We are excited to work hand in hand with colleagues from various sectors to explore the limitless possibilities of confidential computing and to continue delivering unparalleled security and privacy to our users.

We invite our partners, customers, and stakeholders to join us in this exciting new chapter as we pave the way for a smarter, safer future. Together, we can make a difference in the world of technology and privacy.

Confidential Computing Consortium Resources

 

Automata Joins the Confidential Computing Consortium as a Startup Member

By Announcement No Comments

We are thrilled to announce that Automata has joined the Confidential Computing Consortium as the most recent Startup member and brings their expertise in machine attestation and secure computation to our community.  Automata is a machine attestation layer built by humans and designed for machines. It performs verifiable computation over stateless data using secure hardware, extending machine trust to Ethereum with Trusted Execution Environments (TEEs), also called TEE Coprocessors.

 Why TEE Coprocessors?

TEEs are a cornerstone of confidential computing. They create a secure enclave by encrypting the hardware memory, allowing us to guarantee the integrity and confidentiality of computations performed by a TEE.

  • Integrity: TEEs verify that the data and code being run are authentic. Through remote attestation, we can be confident that computations are executed by a genuine TEE.
  • Confidentiality: TEEs provide technical assurance that untrusted parties protect computations from access.

 Coprocessors extend blockchain functionality by performing off-chain computations over on-chain data within a parallel environment—in this case, a TEE. Our experience with TEEs on the blockchain, from moving TEE stack components on-chain to designing and deploying TEE-backed applications, has shown that secure hardware is a practical and promising way to handle workloads in a decentralized setting.

Automata and Confidential Computing

Recently, Automata has made significant advancements in on-chain computation. We have implemented what we believe to be the first complete DCAP attestation workflow on the blockchain, allowing for the caching of attestation collaterals in a decentralized repository that the community can contribute to and maintain.

 Additionally, we introduced Multi-Prover AVS on EigenLayer, a restaking protocol that enhances the security of rollups with a secondary TEE Prover. Our work with TEEs demonstrates the feasibility of using secure hardware as the building blocks for interacting with blockchains, upholding core values of openness and verifiability.

 This aligns with the spirit of the Confidential Computing Consortium. We are excited about the renewed energy around confidential computing. We are committed to contributing to the long-term success of TEEs as the de-facto medium of computational integrity on the web. We also aim to motivate further research into trust-minimized, confidential implementations for both applications and infrastructure.

 Confidential Computing Consortium Resources

Announcing Invary’s Membership and Our New Start-Up Tier

By Announcement No Comments

We are thrilled to announce that Invary has joined the Confidential Computing Consortium (CCC) as a start-up member! Invary’s mission to protect people, organizations, and governments from hidden cyber threats aligns perfectly with our commitment to advancing secure computing technologies.

Invary brings a wealth of expertise in cyberthreat detection and mitigation, enhancing the Consortium’s efforts to foster secure, privacy-preserving computing environments. Their innovative solutions and dedication to cybersecurity will be invaluable as we work together to promote and develop open standards for confidential computing.

Invary’s remote attestation service enhances the security of Trusted Execution Environments (TEEs), ensuring data remains encrypted and inaccessible to unauthorized users during processing.

We look forward to collaborating with Invary to drive forward the adoption of confidential computing, ensuring robust protection against cyberthreats for all users. Welcome, Invary, to the Confidential Computing Consortium!

Jason Rogers, CEO of Invary, on joining the CCC said, “We are excited to join the Confidential Computing Consortium and look forward to collaborating with experts focused on data privacy and cybersecurity. We are grateful for the opportunity provided by the CCC’s Startup Program and eager to share our expertise in Runtime Integrity and Attestation.”

In addition to welcoming Invary, we are thrilled to introduce a new membership tier tailored specifically for start-ups. This initiative empowers emerging companies by offering them a unique opportunity to join the CCC community free of charge for the first 12 months. We are excited about the potential of this new offer and look forward to seeing the innovative contributions from start-ups.

Why This Matters

Confidential Computing is revolutionizing data protection and processing. The use of hardware-based techniques to isolate sensitive data ensures security even during processing. As the field evolves, collaboration and innovation become increasingly crucial to keep up with advancements. The CCC plays a pivotal role by uniting industry leaders, researchers, and innovators to drive the future of secure computing. This is a call for start-ups to join this collaborative effort and contribute to the future of secure computing.

Invary brings expertise in cyber threat detection and mitigation, enhancing the Consortium’s efforts to foster secure, privacy-preserving computing environments. Their innovative solutions and dedication to cybersecurity will be invaluable as we work together to promote and develop open standards for confidential computing.

Join Us

We look forward to collaborating with Invary to accelerate the adoption of confidential computing and ensure robust protection against cyber threats for all users. Welcome, Invary, to the Confidential Computing Consortium!

For start-ups interested in joining, our new membership tier provides an excellent opportunity to be part of a leading community in secure computing. Take advantage of this chance to contribute, collaborate, and innovate in Confidential Computing.

Welcome to the future of secure computing. Welcome to the CCC!

Confidential Computing Consortium Resources