PinnedWe’re moving our blog to our website!Service announcement: this blog is now moving to https://www.edgeless.systems/blog/.Sep 4, 2023A response icon1Sep 4, 2023A response icon1
PinnedHow to setup Mattermost on the Kubernetes engine ConstellationAnd get memory and storage encryption for freeDec 7, 2022Dec 7, 2022
Confidential computing will take Blockchain to the next level of securityBlockchain is one of the biggest technology trends in recent years, with exciting potential across a seemingly endless range of use cases…Nov 8, 2022Nov 8, 2022
How is the performance of Constellation, the always-encrypted Kubernetes, compared to AKS and GKE?As you may know, we’ve recently released Constellation, the first confidential Kubernetes engine, as open source. Constellation keeps all…Oct 21, 2022Oct 21, 2022
Hi open-source community, confidential Kubernetes is now on GitHub!Constellation has landed open source on GitHub and you can now have your own confidential Kubernetes. Finally, the public cloud becomes the…Oct 4, 2022A response icon1Oct 4, 2022A response icon1
The differences between Homomorphic Encryption and Confidential Computing and when to use whatSoftware applications typically need to decrypt data to process it. This offers a big attack surface and poses security and privacy risks…Jul 20, 2022Jul 20, 2022
GDPR Compliance in the Public Cloud with Confidential ComputingThe tensions surrounding GDPR, Schrems II and the US CLOUD Act are leading to major risks associated with the cloud transformation. In…Jun 30, 2022A response icon1Jun 30, 2022A response icon1
How to make your existing microservice architecture end-to-end confidentialAugmenting Open Service Mesh on Kubernetes with confidential computingOct 21, 2021Oct 21, 2021
Spotlight: OcclumA look at the open-source confidential computing landscapeSep 8, 2021A response icon1Sep 8, 2021A response icon1