Confidential computing technologies isolates delicate data within a protected CPU enclave for the duration of processing. The contents in the enclave, which contain the data staying processed plus the approaches that are accustomed to method it, are available only to licensed programming codes. They can be invisible and unknowable to everything or