Welcome to our series of tutorials on Confidential Computing!
β
Our goal is to give developpers a better understanding of this amazing security technology. By the end of all the tutorials, you'll know how to securely run an enclave, attest it, communicate with it and store it.
β
We will go start by explaining the current security challenges it can solve in the introduction. Then we'll move on to practice because we believe in learning by coding!
β
All the tutorials will be oriented toward implementing an application with Confidential Computing. We'll go over how to build it, show how it works and highlight the strengths and constraints.
β
π§ The course is still in construction π§
β
β