jointly, remote attestation, encrypted interaction, and memory isolation supply everything that's required to increase a confidential-computing setting from the CVM or maybe a secure enclave to some GPU.
With that in https://aadamuhfy301980.blog-gold.com/37302904/getting-my-ai-act-safety-to-work