So the double key encryption is over there, yeah, and I’m quite familiar actually with confidential computing, general-purpose confidential virtual machines and containers…
j previous speech k next speech