Felix SchusterThe relationship between zero trust and confidential computingIn this post, I’ll examine the intricate yet intriguing relationship of zero trust and confidential computing, two highly popular terms and…Jul 25, 2023Jul 25, 2023
Felix SchusterThe three levels of confidential computingConfidential computing is a powerful technology and tool. It can be used to protect a large variety of workloads in a range of settings…Jul 19, 20231Jul 19, 20231
Felix SchusterWhy and how companies do open sourceThis is a memo I initially wrote for internal consumption at Edgeless Systems to decide which open-source license to use for our…Mar 7, 20231Mar 7, 20231
Felix SchusterFounder story: my journey towards building a confidential cloudIt was on a flight to an internship with Microsoft Research in 2013 that I first read about a cool new technology that Intel just had…Feb 17, 20221Feb 17, 20221
Felix SchusterEGo: Effortlessly build confidential apps in GoWe just unveiled our new open-source project EGo. EGo makes it super-easy to build, debug, and run Go apps in secure enclaves. In essence…Feb 21, 2021Feb 21, 2021
Felix SchusterThe open-source landscape of confidential computing in 2021Ok let’s talk about the state of open source in confidential computing and why I believe that there is a special connection between the…Jan 21, 20213Jan 21, 20213