The Hard Facts About Confidential Computing