PinnedWe’re moving our blog to our website!Service announcement: this blog is now moving to https://www.edgeless.systems/blog/.Sep 4, 20231Sep 4, 20231
PinnedHow to setup Mattermost on the Kubernetes engine ConstellationAnd get memory and storage encryption for freeDec 7, 2022Dec 7, 2022
Confidential computing will take Blockchain to the next level of securityBlockchain is one of the biggest technology trends in recent years, with exciting potential across a seemingly endless range of use cases…Nov 8, 2022Nov 8, 2022
How is the performance of Constellation, the always-encrypted Kubernetes, compared to AKS and GKE?As you may know, we’ve recently released Constellation, the first confidential Kubernetes engine, as open source. Constellation keeps all…Oct 21, 2022Oct 21, 2022
Hi open-source community, confidential Kubernetes is now on GitHub!Constellation has landed open source on GitHub and you can now have your own confidential Kubernetes. Finally, the public cloud becomes the…Oct 4, 20221Oct 4, 20221
The differences between Homomorphic Encryption and Confidential Computing and when to use whatSoftware applications typically need to decrypt data to process it. This offers a big attack surface and poses security and privacy risks…Jul 20, 2022Jul 20, 2022
GDPR Compliance in the Public Cloud with Confidential ComputingThe tensions surrounding GDPR, Schrems II and the US CLOUD Act are leading to major risks associated with the cloud transformation. In…Jun 30, 20221Jun 30, 20221
How to make your existing microservice architecture end-to-end confidentialAugmenting Open Service Mesh on Kubernetes with confidential computingOct 21, 2021Oct 21, 2021