Arm Newsroom Blog

What Is Confidential Computing? Here’s A Great Example

Confidential computing is the next step in securing devices, but what does that mean for you, your data and the world at large? We’ve created a comic book to explain…
By Arm Editorial Team
Confidential Compute Comics

Confidential computing refers to the protection of data in use by performing computation within a hardware-backed secure environment. This shields code and data from observation or modification by privileged software and hardware agents, reducing the burden of trust on a computer’s operating system or hypervisor.

Confidential Computing in action

Sounds great, but what does that mean in reality? Can you give me an example of confidential computing in action?

Sure! We’ve created this easy-to-read comic book to bring the idea of confidential computing to life. Read on to discover how two scientists might use the concepts behind confidential computing to help diagnose a rare bone disease by aggregating encrypted patient data…

Click to read Confidential Computing Comics: The Hippocratic Oath

Arm Confidential Compute Architecture

The Arm Confidential Compute Architecture (CCA), introduced in the Armv9 architecture, is the latest in a series of hardware and software architecture innovations designed to extend the broad adoption of confidential computing to every industry sector where microprocessors are in use.

Article Text
Copy Text

Any re-use permitted for informational and non-commercial or personal use only.

Editorial Contact

Brian Fuller and Jack Melling
Subscribe to Blogs and Podcasts
Get the latest blogs & podcasts direct from Arm

Latest on Twitter