THE LINUX FOUNDATION PROJECTS
Category

Blog

End-User Devices for Confidential Computing: Exploring Islet

By Blog No Comments

Author:  Sal Kimmich

As technology evolves, the need for secure and confidential computing extends beyond servers and data centers to end-user devices such as smartphones, tablets, and personal computers. These devices are increasingly used to collect and process sensitive data, necessitating robust security measures to protect user privacy. One notable project within the Confidential Computing Consortium that addresses this need is Islet.

What is Confidential Computing?

Confidential computing is a security paradigm that aims to protect data in use by performing computation in a hardware-based Trusted Execution Environment (TEE). This approach ensures that sensitive data remains encrypted and secure even when being processed, mitigating the risk of unauthorized access and tampering.

The Importance of Trusted Firmware

Trusted Firmware is the cornerstone of Confidential Computing, providing the essential security features and isolation needed to establish a trusted execution environment. Unlike regular firmware, Trusted Firmware includes mechanisms for secure boot, cryptographic verification, and hardware-based isolation of secure and non-secure execution environments. To understand more on this topic, view our blog on Trusted Firmware. 

Islet: A Platform for On-Device Confidential Computing

Islet is an open-source project designed to enable Confidential Computing on ARM architecture devices using the ARMv9 Confidential Compute Architecture (CCA). Its primary objective is to provide a secure platform for on-device Confidential Computing, thereby protecting user privacy and enabling secure processing of sensitive data directly on end-user devices. Islet is implemented in the Rust programming language, and utilizes Rust’s inherent memory safety features to create a robust and secure environment.

Key Features of Islet

  1. Realm Management Monitor (RMM):
    • Operates at EL2 in the Realm world on the application processor cores.
    • Manages confidential virtual machines (VMs), known as realms, ensuring their secure execution.
    • Islet RMM complies with ARm’s specifications for platform ABIs, which enables Islet to integrate seamlessly with the ARM ecosystem, supporting Linux and KVM patch for ARM CCA.
  2. Hardware Enforced Security (HES):
    • Performs device boot measurement and generates platform attestation reports.
    • Manages sealing key functionality within a secure hardware IP separate from the main application processor.
  3. Automated Verification:
    • Incorporates formal verification techniques to enhance the security of Islet, ensuring robustness against various attack vectors.

Use Case: Confidential Machine Learning

Islet showcases its capabilities through a confidential machine learning demo. In this scenario, a mobile device user interacts with a chat-bot application that runs on Islet. The chat-bot processes the request and communicates with an ML server through a secure channel, demonstrating end-to-end confidential computing. This use case highlights Islet’s potential in enabling secure and private machine-to-machine computing without relying on server-side intervention.

Why End-User Devices Need Confidential Computing

While traditional confidential computing solutions focus on server-side protection, securing end-user devices is equally important for several reasons:

  1. Initial Data Collection:
    • Sensitive data collection often begins at the user device level, making it crucial to protect this data from the outset.
  2. Privacy Apps:
    • As users increasingly rely on privacy-focused applications such as secure messengers, password managers, and private browsers, ensuring the confidentiality of data on these devices becomes essential.
  3. End-to-End Security:
    • By enabling confidential computing on user devices, Islet helps establish end-to-end security throughout the entire data processing path, from collection to computation.
  4. Machine-to-Machine Computing:
    • On-device confidential computing facilitates secure machine-to-machine communication, reducing the need for server intervention and enhancing overall security.

Conclusion

Confidential computing is not just for servers and data centers; it is equally critical for end-user devices. Projects like Islet within the Confidential Computing Consortium exemplify the application of Trusted Firmware principles to secure user devices. By providing a robust platform for on-device confidential computing, Islet ensures the privacy and security of sensitive data, paving the way for more secure and private user experiences.

For more information on Islet and its capabilities, visit the Islet GitHub repository.

Understanding Trusted Firmware in Confidential Computing: Coconut SVSM and VirTEE 

By Blog No Comments

Author:  Sal Kimmich

Trusted Firmware serves as the foundational layer in confidential computing, ensuring that the hardware and software environment’s security and integrity are maintained. Unlike regular firmware, Trusted Firmware is designed with additional security features and responsibilities to establish a Trusted Execution Environment (TEE). Here’s a deeper dive into what makes Trusted Firmware different and its role in confidential computing.

 

Differences Between Trusted Firmware and Regular Firmware

  1. Enhanced Security Features:
    • Regular Firmware: Primarily focuses on initializing hardware components and providing basic services to the operating system.
    • Trusted Firmware: Includes enhanced security features such as cryptographic verification of firmware components, secure boot, and mechanisms to enforce hardware-based isolation of secure and non-secure execution environments.
  2. Isolation and Trust:
    • Regular Firmware: Does not inherently provide mechanisms to isolate critical operations or sensitive data from the rest of the system.
    • Trusted Firmware: Establishes a TEE, isolating sensitive operations from the general-purpose operating system and protecting them from potential threats and unauthorized access.
  3. Responsibility and Scope:
    • Regular Firmware: Manages standard hardware initialization and operational tasks.
    • Trusted Firmware: Manages secure initialization of hardware features, authenticates and validates software components, and provides a secure execution environment for critical tasks.

Why Trusted Firmware is Necessary

Trusted Firmware is crucial for confidential computing because it provides a secure foundation that prevents unauthorized access and tampering. Here’s why Trusted Firmware is needed and how it differs from the regular OS and firmware:

Need for Trusted OS:

  • Purpose: To prevent resources from being accessed directly by the generalist OS running concurrently with it, such as preventing a user with root privileges from accessing sensitive resources.
  • Security: The Trusted OS operates with higher privileges and tighter security controls, ensuring that critical operations and data are protected even if the general OS is compromised.

Differences from Normal OS:

  • Size and Scope: The Trusted OS is designed to be small and secure, running with higher privileges than the general OS. For instance, in an ARMv8-a system, parts of the Trusted OS run at EL3 (highest privilege), while a hypervisor runs at EL2, and Linux at EL1.
  • Purpose: The Trusted OS is not meant to replace the general OS like Linux, which is extensive and feature-rich. Instead, it secures specific resources and operations from the general OS.

Security Provided by Trusted OS:

  • Threat Protection: It protects against attempts by users of the general OS to access resources managed by the Trusted OS, including both legitimate and illegitimate access attempts.
  • Mechanism: It uses secure mechanisms, such as the SMC instruction, to switch between the general OS and the Trusted OS when necessary to access secure resources.

Switching Between Trusted OS and Normal World:

  • Context Switching: Occurs when code running in the general OS needs to access a resource managed by the Trusted OS, such as decrypting content using a key only accessible by the Trusted OS.
  • Interrupt Handling: Hardware interrupts may also trigger a switch to the Trusted OS, allowing safe handling of interrupts within the TEE context.

Example Projects

COCONUT Secure VM Service Module (SVSM)

The COCONUT Secure VM Service Module (SVSM) exemplifies Trusted Firmware in confidential computing by providing secure services and device emulations for Confidential Virtual Machines (CVMs). Key features include:

  • Integration with AMD SEV-SNP: Utilizes AMD’s Secure Encrypted Virtualization with Secure Nested Paging, including the VM Privilege Level feature, to ensure robust hardware-based security.
  • Secure Boot and Authentication: Ensures a secure boot process and component authentication, maintaining a trusted execution path from the firmware to the CVM.

VirTEE

VirTEE is another project that demonstrates the application of Trusted Firmware principles. It focuses on:

  • Open Community Development: Collaborative development of tools for TEE bring-up, attestation, and management, supporting a wide range of virtualization platforms.
  • Support for Multiple Technologies: Includes tools and libraries for AMD SEV, SEV-SNP, and Intel TDX, providing comprehensive support for secure virtualization across different hardware platforms.

Discover more about VirTEE via their project repository. 

Conclusion

Trusted Firmware is essential for establishing and maintaining secure and reliable confidential computing environments. It provides enhanced security features, isolation, and trust mechanisms that are not present in regular firmware. Projects like COCONUT-SVSM and VirTEE illustrate the practical application of Trusted Firmware principles, showcasing robust frameworks for secure virtualized environments and cross-platform confidential computing. These projects ensure the integrity and confidentiality of sensitive data and operations, advancing the field of secure computing.

 

 

Catch the Exclusive Interview with Mike Bursell at the Confidential Computing Summit 2024

By Blog, CCC Events No Comments

The Confidential Computing Summit 2024, the premier event for confidential data and AI, triumphantly returned to San Francisco this summer on June 5-6. With a larger and more comprehensive two-day conference, this year’s event brought together the brightest minds in confidential computing and privacy-preserving AI to explore emerging technologies and innovative solutions.

Did you miss the Summit? We’ve Got You Covered!

If you missed this year’s conference, don’t worry,  you can still catch the sessions including an exclusive interview with Mike Bursell, Executive Director at the Confidential Computing Consortium. Mike’s insights offer an in-depth look at the latest developments and future directions in confidential computing and privacy-preserving AI.

Learn from the Best

Hear from  industry leaders, innovators, and researchers as they delve into the cutting-edge technologies shaping the future of confidential data and analytics. Gain valuable knowledge from experts on how confidential computing is revolutionizing data security and AI applications, offering new privacy and data protection solutions.

  • Mike Bursell’s Interview: Discover his perspective on the critical role of confidential computing in safeguarding sensitive data and the future of privacy-preserving AI.
  • Conference Sessions: Explore other engaging sessions and panel discussions from the Summit to stay ahead of the curve in confidential computing technologies.

Why You Should Tune In

  • Exclusive Insights: Gain access to thought leadership from key figures in the industry.
  • Emerging Technologies: Get a front-row seat to the latest advancements and trends in confidential data and AI.
  • Networking Opportunities: Connect with fellow professionals and experts in the field.

Confidential Computing Consortium Resources

Hushmesh: Building a Secure Future with Confidential Computing

By Blog No Comments

Author: Manu Fontaine

At Hushmesh, a U.S.-based Public Benefit cybersecurity startup, we see Confidential Computing as a foundational technology for all things digital, paving the way for an inherently secure and private Internet. Imagine a future where Confidential Computing underpins a “universal zero trust” model at the chip level, whereby privacy and security are built into our digital infrastructure instead of bolted on.

Traditionally, data security and privacy are bolted on after the fact with a patchwork of point-solutions on top of an insecure infrastructure. However, with Confidential Computing, these critical  elements can become inherent to the infrastructure, automated  directly at the chip level without human intervention.

Our vision at Hushmesh is to utilize Confidential Computing to build the Mesh, a global information space and infrastructure, like the Web, but with automated end-to-end cryptographic security and privacy built in for everything and everyone. As Hushmesh CEO Manu Fontaine puts it, “Confidential Computing is the necessary technology to deliver digital peace of mind at internet scale. The Mesh is the definitive solution to identity theft, data breaches, fakes, and fraud.”

The potential of Confidential Computing extends beyond what is currently imaginable. By embedding security into the very fabric of our digital infrastructure, we aim to eliminate the vulnerabilities that threaten our digital lives, and to move towards a future where trust is inherent, not an afterthought. The need for this transformation is urgent, and we must act now to secure our digital future.

Confidential Computing is not just a technological advancement but a paradigm shift. It challenges us to rethink how we approach security and privacy for the next phase of the digital age, pushing us towards an inherently secure and trustworthy Internet for everyone. At Hushmesh, we are excited to be at the forefront of this revolution, working towards a future where Confidential Computing is ubiquitous. Without Confidential Computing, universal zero trust is simply not possible.

Join us on this journey to redefine digital security and privacy with Confidential Computing. Together, we can shape a future where our digital lives are secure and private, where trust is inherent, not an afterthought. Your participation is crucial in this collective effort to make the Internet what we all need it to be.

Read The Case for Confidential report here.

Manu Fontaine is the Founder and CEO of Hushmesh, the public benefit corporation developing and operating the Mesh. You can think of the Mesh as a global information space, like the Web, but with universal zero trust built in. Secured by the Universal Name System (UNS) and Universal Certificate Authority (UCA), the Mesh delivers what the Web never could: the global assurance of provenance, integrity, authenticity, reputation, confidentiality, and privacy for all bits within it, be they code or data, at internet scale. The Mesh is the definitive solution to identity theft, data breaches, fakes, and fraud. Hushmesh is developing privacy-preserving wallet and verifier Mesh agents for DHS SVIP, alongside secure “meshaging” for the North Atlantic Treaty Organization Defence Innovation Accelerator for the North Atlantic (NATO DIANA) Secure Information Sharing Challenge. www.hushmesh.com

Confidential Computing Consortium Enhances PETs Integration at Asia Pacific PET Summit

By Blog, Event No Comments

Authored by Mike Bursell

On Tuesday, July 16th, the Confidential Computing Consortium proudly served as the Associate Sponsor for the third PET Summit in the Asia Pacific region, held once again in Singapore. This year’s event occurred at the Marina Bay Sands Expo & Convention Centre, perfectly timed to coincide with Singapore’s PDP (Privacy Data Protection) week. The IMDA, Singapore’s leading organization for promoting digital innovation in business and society, supported it.

The summit saw a fantastic turnout. With over 400 registrations, the main hall was buzzing with activity, and the breakout hall next door was equally busy, hosting lively discussions among customers, ISVs, government representatives, and academic researchers. Your active participation and engagement were key to the success of the event.

IMDA’s Chief Executive, Chuen Hong LEW, kicked off the event, followed by an introduction from Mike Bursell, the CCC’s Executive Director. This year, the summit shifted the focus from simply educating about Privacy-Enhancing Technologies (PETs) to exploring their implementation, real-world use cases, and evangelization. A key highlight recognized the diverse range of PETs as an opportunity to match solutions to business needs, allowing organizations to choose the best-suited technologies rather than being limited to a single approach.

This addition is a significant win for Confidential Computing, which can integrate seamlessly with various PETs, enhancing privacy and transparency. This was highlighted in a panel discussion moderated by Mike Bursell titled “How Privacy-Enhancing Technologies (PETs) & Confidential Computing Balance Privacy & Transparency.” Panelists included Jesse Schrater (Intel), Zheng Leong (Automata Network), Anubhav Nayyar (Silence Laboratories), and Mark Bundgaard (Partisia). Following this, Mike introduced Confidential Computing and its potential, especially in multi-party and collaborative computing use cases.  Another session, also moderated by Mike, emphasized the need for PET evangelization at the organizational level, advocating for solutions that address specific business needs rather than adopting a “technology looking for a problem” approach.

The summit also highlighted the growing interest in Confidential Computing across the Asia Pacific region. Attendees included representatives from global organizations with a regional presence, local companies, and regional and national business organizations. A common theme in the moderated roundtable session was the importance of collaborating with regulators and standards bodies to promote accepted norms for deployments. The CCC actively encourages and coordinates this effort through its GRC (Governance, Risk, and Compliance) Special Interest Group.

For more information about the GRC Special Interest Group or other parts of the CCC, please visit here.

The Challenges and Rewards of Confidential Computing

By Blog No Comments

Discover how Confidential Computing can revolutionize data security, compliance, and innovation by reading The Case for Confidential Computing by Suzanne Ambiel. This report offers valuable insights for business leaders looking to leverage this emerging technology to secure data in use and unlock new opportunities.

Who should read this report?

The target audience includes business leaders, IT professionals, and decision-makers across various industries. Specifically, it is aimed at CIOs, CTOs, CISOs, and data protection officers who are responsible for safeguarding sensitive data and ensuring compliance with data privacy regulations.

Anyone else?

Additionally, the report is relevant to healthcare providers, financial institutions, and marketing strategists seeking innovative solutions to securely process and collaborate on data. It also addresses technology vendors, cloud service providers, and enterprise architects interested in the latest advancements in secure data processing and trusted execution environments.

DOWNLOAD THE REPORT

Why is Confidential Computing important?

The protection and confidential processing of data are crucial for maintaining competitive advantage, regulatory compliance, and customer trust. The report offers comprehensive insights into how businesses across various industries can leverage Confidential Computing to secure data in use. This technology not only enhances data privacy and security but also unlocks new opportunities for cloud computing, multiparty data collaboration, and innovation. With the insights achieved from this report, business leaders will gain a clear understanding of how Confidential Computing can address the pressing challenges of data security, especially in the context of AI, cloud computing, and multiparty data collaboration.

Transformative benefits shown through real world examples

The report dives deep into industry-specific use cases, illustrating how Confidential Computing can transform operations in sectors like healthcare, financial services, and marketing. For instance, it explains how Confidential Computing enables secure data aggregation in healthcare, leading to better patient outcomes and more efficient research processes.

By exploring these use cases, readers will see how implementing Confidential Computing can lead to significant business benefits, including enhanced data security, compliance with global regulations, and improved operational efficiency. The report is a valuable resource for any organization looking to harness the full potential of its data while safeguarding it against modern cyber threats.

A surprising reward

One of the most surprising findings from the report relates to how financial institutions are leveraging Confidential Computing to combat money laundering. By securely pooling transaction data from multiple institutions in a Confidential Computing environment, these organizations can detect suspicious activities more effectively and comply with stringent anti-money laundering regulations. This collaboration not only enhances fraud detection and reduces compliance costs but also accelerates innovation in financial crime prevention, illustrating the transformative potential of Confidential Computing in the financial sector.

Go deeper with practical next steps

The report offers detailed insights into how Confidential Computing can enable secure multiparty data collaboration, which is crucial for industries like healthcare and financial services that deal with highly sensitive data. By understanding these mechanisms, organizations can better protect their data while leveraging collaborative opportunities. It provides actionable recommendations for improving data security practices, including the implementation of trusted execution environments (TEEs) and secure enclaves. These practical steps can help organizations enhance their overall cybersecurity posture and ensure compliance with global data protection regulations. The report includes industry-specific use cases that demonstrate the tangible benefits of Confidential Computing in various sectors. Readers can learn how leading organizations are successfully using this technology to innovate, improve operational efficiency, and gain a competitive edge while maintaining stringent security standards.

Take it from the experts

The primary research for “The Case for Confidential Computing” involved comprehensive interviews with key industry experts from leading organizations such as TikTok, Google, Hushmesh, Intel, Decentriq, RedHat, and the Confidential Computing Consortium. Participants included Vini Jaiswal, Mingshen Sun, and Dayeol Lee from TikTok; Manu Fontaine from Hushmesh; Marcus Hartwig from Google; Malini Bhandaru, Mike Ferron-Jones, Mona Vij, and Paul O’Neill from Intel; Nikolas Molyndris and Andrew Knox from Decentriq; and Mike Bursell from the Confidential Computing Consortium. These experts provided insights into the practical applications, benefits, and challenges of Confidential Computing across various sectors, highlighting the technology’s potential to enhance data security, facilitate compliance, and drive innovation.

Revolutionizing Data Security with Confidential Computing

Confidential Computing offers transformative benefits across multiple sectors by providing a secure, hardware-based environment that protects data in use. This technology enables efficient marketing by enriching first-party data, supports the adoption of AI by safeguarding proprietary models, and enhances financial security through secure data pooling. It also fosters collaboration in healthcare, allowing for better patient outcomes and accelerated medical research This approach could revolutionize data security, making it an inherent feature of the infrastructure, thus automating and securing the entire digital ecosystem.

Learn more about these important concepts and how your business can benefit by diving in to The Case for Confidential Computing by Suzanne Ambiel.

COCONUT-SVSM Joins the Confidential Computing Consortium: Enhancing Security for SensitiveWorkloads

By Announcement, Blog No Comments

The Confidential Computing Consortium (CCC) welcomes a new project: The COCONUT
Secure VM Service Module (COCONUT-SVSM), which aims to be a game-changer for secure
service provision within confidential virtual machines (CVMs). This is a significant step forward
for the project.


Published by SUSE in March 2023 the project built an active developer community with major
industry players contributing, including AMD, Microsoft, IBM, Intel, Redhat and Google. By
joining the CCC the project gains enhanced visibility and even more collaboration opportunities
within the confidential computing community and is set for further community growth.

Building a Secure Foundation for Confidential VMs

COCONUT-SVSM was started by SUSE and is now hosted by the Linux Foundation (LF),
known for fostering open-source collaboration. This choice reflects the project’s commitment to
open development and community involvement. COCONUT-SVSM aims to become a platform
that delivers essential services to CVMs. These services, which can not be provided by the host
VMM in a secure way, include:

  • Virtual TPM emulation: This functionality provides a secure Trusted Platform Modulewithin the CVM, enabling functionalities like secure key generation and storage, but alsoenable full remote attestation of workloads.
  • UEFI variable store: This secure storage area safeguards critical configuration data forthe CVM and enables secure boot on some platforms.
  • Live migration for CVMs: This feature allows for seamless movement of running CVMsacross different physical hosts without compromising security.

The key advantage of COCONUT-SVSM lies in its secure execution environment. It operates
within the trust boundary of the CVM, but is still isolated from the actual operating system. This
isolation ensures that even if the underlying system gets compromised, the security of services
offered by COCONUT-SVSM remains intact

Benefits for Confidential Computing

This integration will enable users to enhance their confidential VM setups with features like:

  • Secure Remote Attestation: This allows for verifying the integrity and trustworthiness of the execution environment, a crucial requirement for running sensitive workloads and protecting data.
  • End-To-End Data Security: Users can guarantee that their data is always encrypted and never visible to any unauthorized party during storage, transmission, and processing.

Ultimately, these features empower users to fully protect their data even in untrusted
environments like the public cloud. This paves the way for secure cloud deployments and
confidential computing adoption across various industries.

Industry Leaders Support COCONUT-SVSM

COCONUT-SVSM is gaining traction within the tech industry, with key partners recognizing its
potential to advance confidential computing. Here’s what some industry leaders have to say
about COCONUT-SVSM:

AMD
“SUSE and AMD have a long history of collaborating on the development of the Linux
ecosystem and confidential computing technologies for AMD EPYC Processors” said
Frank Gorishek, corporate vice president, Software Development, AMD. “We are thrilled
to see COCONUT-SVSM join the CCC as an open source implementation of the AMD
SVSM specification for SEV-SNP. AMD is committed to open source technologies such
as COCONUT-SVSM as a catalyst for collaborative innovation on transformative
technologies such as confidential compute.”

Microsoft
“A secure environment like COCONUT-SVSM can play a valuable role in confidential
computing.” a spokesperson from Microsoft Hyper-V said. ”It can hold secrets and
provide virtualization services seamlessly to improve the usability of CVMs.”

Open Governance and Continued Growth

The COCONUT-SVSM project fosters open collaboration. SUSE’s Jörg Rödel, as the founding
developer, is the current lead maintainer. In the future, a broader project leadership will be
established by a Technical Steering Committee (TSC) consisting of at least 3 lead people to
ensure diverse perspectives guide the project’s direction.


The project community collaborates via its GitHub organization, a mailing list and in weekly
community meetings. There the project’s future, current challenges, and contributions from a
broad developer base are discussed.


Every developer passionate about confidential computing and secure service provisioning is
invited to start contributing to COCONUT-SVSM and support the continued growth of the
project.

The Meaning Behind the Name

The name COCONUT is a play on the term “CoCo,” a common abbreviation for confidential
computing. The “coconut” metaphor reflects the project’s focus on robust security, symbolizing a
hard-to-crack shell protecting the integrity of sensitive data.


By joining the Confidential Computing Consortium, COCONUT-SVSM is set to make significant
contributions to the field of confidential computing. The community excited to see the project
flourish within the CCC and invite all those interested in secure virtualization technology to join
the thriving COCONUT-SVSM project. Together, we can bring confidential computing and
end-to-end data protection forward for a wide range of industries and applications.

Exciting News: New Start-up Membership Tier from the Confidential Computing Consortium

By Blog No Comments

The Confidential Computing Consortium (CCC) is thrilled to announce the launch of a new membership tier tailored specifically for start-ups.  This initiative is designed to empower emerging companies by offering them a unique opportunity to join the CCC community free of charge for the first 12 months. Here’s everything you need to know about this fantastic new offer.

Why This Matters

Confidential Computing is transforming data protection and processing. By using hardware-based techniques to isolate sensitive data, it ensures security even during processing. As the field evolves, collaboration and innovation are essential to keep up with advancements. The CCC plays a pivotal role by uniting industry leaders, researchers, and innovators to drive the future of secure computing.

What is the CCC?

The Confidential Computing Consortium (CCC) unites hardware vendors, cloud providers, and software developers to accelerate the adoption of Trusted Execution Environment (TEE) technologies and standards. As a project community within the Linux Foundation, the CCC is dedicated to defining and promoting Confidential Computing through open governance and collaboration. This initiative includes commitments from numerous member organizations and contributions from several open-source projects, following the successful model of other ambitious efforts.

Introducing the Start-up Membership Tier

We understand the unique challenges that start-ups face, from limited resources to the need for rapid innovation. To support these dynamic enterprises, the CCC has introduced a Start-up Membership Tier, providing eligible start-ups with complimentary membership for their first year. This new tier aims to foster innovation and collaboration among the next generation of leaders in Confidential Computing.

Benefits of Joining

By becoming a CCC member, start-ups gain access to a wealth of resources, including:

  • Collaborative Opportunities: Connect with leading companies, researchers, and developers in the field of Confidential Computing.
  • Educational Resources: Access cutting-edge research, training materials, and industry insights to stay ahead of the curve.
  • Networking: Participate in exclusive events, workshops, and forums to share ideas and explore potential partnerships.
  • Influence and Visibility: Contribute to the direction of Confidential Computing standards and gain visibility within the industry.

Eligibility Criteria

To qualify for this exciting new membership tier, start-ups must meet the following criteria:

  • Current Member of the Linux Foundation: Your organization must already be a part of the Linux Foundation community.
  • Employee Count: Your organization must have fewer than 100 employees.

How to Apply

Applying for the Start-up Membership Tier is simple! If your start-up meets the eligibility criteria, you can submit your application through the CCC website. Once approved, your start-up will enjoy a full year of membership benefits without any fees.

Join Us in Shaping the Future

This is a remarkable opportunity for start-ups to engage with the forefront of Confidential Computing technology. We invite all eligible start-ups to take advantage of this offer and join us in shaping the future of secure, private computing.

For more details and to apply, visit the Confidential Computing Consortium website.

Let’s innovate, collaborate, and shape the future of Confidential Computing together


Stay connected with the CCC community by following us on X, LinkedIn, and GitHub.

Unlocking AI for the Enterprise: Confidential Computing Summit

By Blog, CCC Events No Comments

Author: Raluca Ada Popa

With the rapid rise of generative AI and LLMs, we’re on the cusp of one of the largest technology super cycles in history; the global AI market size was already valued at $196B in 2023. However, C-suite execs and IT professionals alike cite data privacy concerns as the #1 obstacle to AI adoption for their organizations.

This is the year for confidential computing innovators and researchers, users and makers to come together, crack the code and unlock AI for the enterprise. The Confidential Computing Consortium, together with Opaque Systems, is co-hosting the Confidential Computing Summit this June with exactly that goal in mind: to expose and accelerate organizational initiatives around confidential data and AI.

Think of the Summit as our Consortium’s mission made manifest. A mega collaboration of the world’s top minds in confidential data, trustworthy AI and privacy-preserving generative AI unfolding over two days of learning and networking.

We anticipate hundreds of decision-makers and thought leaders in sectors such as financial services, insurance, telco, manufacturing, and healthcare. We have over 30 use cases lined up, selected from over 86 submissions, as well as dynamic discussions and visionary keynotes that include:

  • Mike Bursell, Executive Director, Confidential Computing Consortium
  • Raluca Ada Popa, Co-founder and President of Opaque, Associate Professor CS at UC Berkeley, and Chair of the Confidential Computing Summit
  • Anand Pashupathy, VP & GM, Security Software and Services Division, Product Assurance and Security, Intel
  • Karthik Narain, Group Chief Executive – Technology, Accenture
  • Mark Russinovich, Chief Technology Officer, Microsoft Azure
  • Nelly Porter, Director of Product Management, Google
  • Jason Clinton, Chief Information Security Officer, Anthropic
  • Sello Nevo, Director of the Meselson Center, RAND Corporation

And we’ll be delving deep into confidential computing and sensitive data – from national security to genomic epidemiology, noteworthy trends to critical best practices. You’ll learn about: 

  • Confidential Computing
  • Confidential Analytics
  • Confidential AI
  • Privacy-preserving Generative AI and LLM’s
  • Privacy Enhancing Technologies
  • Data Privacy and Compliance
  • Secure Enclaves
  • Confidential Computing Cloud Environments
  • Confidential VM’s

With two full days to roll up our sleeves, open our collars and truly dig into the opportunities and challenges, we’re excited to see where the Summit will take us and what new possibilities will emerge. Check out the full agenda here.

In case you missed it, we’re offering a discount to all of our Confidential Computing Consortium members. Register here and get 50% off with our special promo code CCC50.

Unlocking AI for the Enterprise: Confidential Computing Summit

By Blog, Event No Comments

With the rapid rise of generative AI and LLMs, we’re on the cusp of one of the largest technology super cycles in history; the global AI market size was already valued at $196B in 2023. However, C-suite execs and IT professionals alike cite data privacy concerns as the #1 obstacle to AI adoption for their organizations.

This is the year for confidential computing innovators and researchers, users and makers to come together, crack the code and unlock AI for the enterprise. The Confidential Computing Consortium, together with Opaque Systems, is co-hosting the Confidential Computing Summit this June with exactly that goal in mind: to expose and accelerate organizational initiatives around confidential data and AI.

Think of the Summit as our Consortium’s mission made manifest. A mega collaboration of the world’s top minds in confidential data, trustworthy AI and privacy-preserving generative AI unfolding over two days of learning and networking.

We anticipate hundreds of decision-makers and thought leaders in sectors such as financial services, insurance, telco, manufacturing, and healthcare. We have over 30 use cases lined up, selected from over 86 submissions, as well as dynamic discussions and visionary keynotes that include:

  • Mike Bursell, Executive Director, Confidential Computing Consortium
  • Raluca Ada Popa, Co-founder and President of Opaque, Associate Professor CS at UC Berkeley, and Chair of the Confidential Computing Summit
  • Anand Pashupathy, VP & GM, Security Software and Services Division, Product Assurance and Security, Intel
  • Karthik Narain, Group Chief Executive – Technology, Accenture
  • Mark Russinovich, Chief Technology Officer, Microsoft Azure
  • Nelly Porter, Director of Product Management, Google
  • Jason Clinton, Chief Information Security Officer, Anthropic
  • Sello Nevo, Director of the Meselson Center, RAND Corporation

And we’ll be delving deep into confidential computing and sensitive data – from national security to genomic epidemiology, noteworthy trends to critical best practices. You’ll learn about: 

  • Confidential Computing
  • Confidential Analytics
  • Confidential AI
  • Privacy-preserving Generative AI and LLM’s
  • Privacy Enhancing Technologies
  • Data Privacy and Compliance
  • Secure Enclaves
  • Confidential Computing Cloud Environments
  • Confidential VM’s

With two full days to roll up our sleeves, open our collars and truly dig into the opportunities and challenges, we’re excited to see where the Summit will take us and what new possibilities will emerge. Check out the full agenda here.

In case you missed it, we’re offering a discount to all of our Confidential Computing Consortium members. Register here and get 15% off with our special promo code CCC15!