Featured

Trusted Compute Registry as a Public Utility and Why It is Important



Published
Trusted Computing (now often called Confidential Computing) has been gaining momentum over last couple of years, and all the signs indicate that its importance is only going to grow. It is about protecting your data while it is being processed, so that:
- You do not have to worry about where it is being processed and by whom (think: Cloud)
- You have confidence that it is being processed exactly in a way you have agreed to
- You have the peace of mind about who will be able to see which insights/results of the processing.
All the big cloud providers and all the processor makers offer today some flavor of Confidential Computing (if you do not know it, go and see the list of members of the Confidential Computing Consortium for an eye-opening moment).
However, today’s use cases mostly describe scenarios with small groups of actors and with pre-arranged trust relations.
To scale up from there, to go for a market-regulated, inclusive scenarios, one crucial component is missing:
A reliable registry, which (ideally) would allow for discovery, agreement of terms, verification and some sort of DvP for Confidential Computing services.
It is not difficult to see how blockchain registry could fit this bill:
Un-mutable, programmable registry able to interact with all sorts of smart contracts and DApps.
Standardized and operated in a transparent manner.
Think about this: the ubiquitous digital signatures of electronic documents would not work without the trusted CA (Certification Authority) hierarchy.
What CA’s are for digital signatures, blockchain based registry could be for Confidential Computing.
Category
Web design
Be the first to comment