Search Articles

Search Results: ConfidentialComputing

Microsoft Unveils Signing Transparency Preview: Revolutionizing Software Supply Chain Security

Microsoft Unveils Signing Transparency Preview: Revolutionizing Software Supply Chain Security

Microsoft has introduced Signing Transparency, a preview cloud service that logs every code signature in a tamper-evident, publicly auditable ledger to thwart supply chain attacks beyond traditional code signing. Powered by confidential computing and SCITT standards, it delivers cryptographic receipts for independent verification, ensuring even compromised keys leave indelible traces. This Zero Trust innovation promises enhanced accountability for developers and enterprises alike.
GPU TEEs: The Hardware Revolution Securing AI's Final Vulnerability

GPU TEEs: The Hardware Revolution Securing AI's Final Vulnerability

As AI workloads explode in scale, traditional encryption fails to protect data during GPU computation, leaving models and inputs exposed to hypervisors, admins, and snooping attacks. GPU Trusted Execution Environments (TEEs) solve this by embedding hardware-enforced security directly into accelerators like NVIDIA's H100, enabling confidential AI with near-zero performance overhead. Phala Network's open-source stack is now making this accessible, allowing developers to deploy verifiable, tamper-proof AI inference onchain.