“you'll find now no verifiable data governance and safety assurances concerning confidential enterprise information. whilst licensed end users can see effects to queries, they are isolated from the info and processing in hardware. Confidential computing thus shields us from ourselves in a powerful, danger-preventative way. Confidential inferenc