Welcome to our series of tutorials on Confidential Computing!
Our goal is to give developpers a better understanding of this amazing security technology. By the end of all the tutorials, you'll know how to securely run an enclave, attest it, communicate with it and store it.
We will go start by explaining the current security challenges it can solve in the introduction. Then we'll move on to practice because we believe in learning by coding!
All the tutorials will be oriented toward implementing an application with Confidential Computing. We'll go over how to build it, show how it works and highlight the strengths and constraints.
🚧 The course is still in construction 🚧