So the double key encryption is over there, yeah, and I’m quite familiar actually with confidential computing, general-purpose confidential virtual machines and containers…

Keyboard shortcuts

j previous speech k next speech