How can you protect your sensitive data and algorithms, even if they’re residing on untrusted devices? Encrypting the data on the disk is not sufficient. A hardware-based confidential computing environment, however, protects the data even in this case.
Published: May 28, 2025
Have you ever wondered if you should blindly run that Docker container image you found in some tutorial or guide? Can you trust every container image you find on the internet? What if that image you just pulled contains some malicious code? In this post, I will be going over the risks of blindly running any container image you find on the internet and why you may want to think twice when running that container image you just found.
Published: Oct 25, 2023