Trends in Confidential Computing