Confidential computing technologies isolates sensitive data in a safeguarded CPU enclave in the course of processing. The contents of the enclave, which incorporate the data becoming processed plus the approaches which have been utilized to system it, are available only to approved programming codes. They can be invisible and unknowable to just abo