Skip to content

Confidential Computing University

As part of our CC University*, we will present a sequence of screencasts introducing confidential computing with the help of SCONE. The target audience of these screencasts are all that want to understand the concepts of confidential computing. These will be taught as part of the lectures. We will also include screencasts that focus on how to implement these concepts with the help of SCONE.

This is an alpha release

This is a very first version of an upcoming university course on confidential computing. The hope is that this is already useful despite not being very polished yet. The content and presentation will be iterated within the next months. We plan to use some nice animations and a pleasant AI speaker instead. Ideally, eventually this will look as our CC Telenovela but until then, we would be happy to get constructive feedback on how to improve the content.


The first episode focuses on the protection objectives, i.e., protecting confidentiality and integrity of data, code and secrets. We need to defend against a very strong adversary who has control of the infrastructure, e.g., the adversary has root access on the servers. For example, if we outsource the management of our computing infrastructure to external providers, we might need to expect such an adversary. Even if we use our own computing infrastructure to host some valuable data, we might also facing some powerful adversary.

The next question that we address is on why do we need confidential computing at all? Don't we already know how to build secure systems and should we not focus on system security anyhow? If we need to outsource the management of resources to external providers, we need a new approach as confidential computing.

While we use the term confidential computing, we actually prefer the term application-oriented security to emphasize that we protect applications - even against powerful adversaries that have hardware and root access on the machines that we run our applications on.