#confidentialcomputing kết quả tìm kiếm

We are excited to welcome Phala Network as the newest General Member of the CCC! Phala is a secure cloud platform enabling developers to run AI workloads inside hardware-protected #TEEs. Welcome to the #ConfidentialComputing community! Announcement: hubs.la/Q03M0J1b0

ConfidentialC2's tweet image. We are excited to welcome Phala Network as the newest General Member of the CCC!

Phala is a secure cloud platform enabling developers to run AI workloads inside hardware-protected #TEEs.

Welcome to the #ConfidentialComputing community!

Announcement: hubs.la/Q03M0J1b0

Gmpc guys💜 Imagine a world where your data shines like stars in encrypted galaxies, you collaborate without anyone knowing your secrets. This is Privacy 2.0 and the power of @ArciumHQ,the future of confidential computing. #Privacy20 #MPC #ConfidentialComputing #Arcium #Web3Infra

zahra_payandeh's tweet image. Gmpc guys💜
Imagine a world where your data shines like stars in encrypted galaxies,
you collaborate without anyone knowing your secrets.
This is Privacy 2.0 and the power of @ArciumHQ,the future of confidential computing.
#Privacy20 #MPC #ConfidentialComputing #Arcium
#Web3Infra

The CCC Compliance page is live! Explore guidance on: ✅ Workload governance ✅ Verifier responsibilities ✅ Ecosystem expectations ✅ GDPR compliance in the AI era Visit the page now: hubs.la/Q03KkGlc0 #ConfidentialComputing #Compliance


💬 We’re excited to welcome QLAD to the CCC! With contributions already in the Confidential Containers project and a vision to simplify secure computing, QLAD is helping define the next era of #ConfidentialComputing. 👉 Learn more: hubs.la/Q03DVxMs0

ConfidentialC2's tweet image. 💬 We’re excited to welcome QLAD to the CCC!

With contributions already in the Confidential Containers project and a vision to simplify secure computing, QLAD is helping define the next era of #ConfidentialComputing.

👉 Learn more: hubs.la/Q03DVxMs0

CCC September newsletter just dropped! 📢 Get highlights from the AI Infra Summit, details on the upcoming AI-Ready Data Safeguards Workshop (Oct 20, SF), OSFF New York, plus new resources and member news! Read now: hubs.la/Q03LNbrN0 #CCC #ConfidentialComputing

ConfidentialC2's tweet image. CCC September newsletter just dropped! 📢 Get highlights from the AI Infra Summit, details on the upcoming AI-Ready Data Safeguards Workshop (Oct 20, SF), OSFF New York, plus new resources and member news! 

Read now: hubs.la/Q03LNbrN0

#CCC #ConfidentialComputing

Blockchain transparency is a bug — Zama is the patch. 🔒 Compute on encrypted data, deploy confidential smart contracts, all without exposing your inputs. The era of private Web3 is here. #Zama #ConfidentialComputing #FHE


Confidential computing significantly improves the security and privacy of cloud computing by ensuring that data is inaccessible and encrypted while in use. Source Ledidi AS - Link bit.ly/3tcMMV1 rt @antgrasso #ConfidentialComputing #DataProtection #CloudComputing

VR_ARTech's tweet image. Confidential computing significantly improves the security and privacy of cloud computing by ensuring that data is inaccessible and encrypted while in use.

Source Ledidi AS - Link bit.ly/3tcMMV1 rt @antgrasso #ConfidentialComputing #DataProtection #CloudComputing

MULTI-PARTY COMPUTATION (SMPC) Only @tenprotocol supports native secure multi-party computation. Multiple users compute together— No one sees each other’s data. That’s next-level privacy. Everyone collaborates- no one leaks a thing. #TENprotocol #ConfidentialComputing


Why Oasis Remains Secure Amid Recent TEE Attacks #OasisNetwork #Web3Security #ConfidentialComputing 1️⃣ The Breaking News: Two new physical attacks — Battering RAM & Wiretap — recently broke the protection of Intel SGX and AMD SEV-SNP. Several TEE-based networks like Phala,…

Satoureireal's tweet image. Why Oasis Remains Secure Amid Recent TEE Attacks
#OasisNetwork #Web3Security #ConfidentialComputing

1️⃣ The Breaking News:
Two new physical attacks — Battering RAM & Wiretap — recently broke the protection of Intel SGX and AMD SEV-SNP.
Several TEE-based networks like Phala,…

A few days ago, we released a video bit.ly/41BDAdX about Super Protocol's new technology called Super Swarm. If you haven't watched it yet, today we'll briefly explain what Swarm is all about. 👇 #SuperSwarm #SuperProtocol #ConfidentialComputing #TEE

super__protocol's tweet image. A few days ago, we released a video bit.ly/41BDAdX about Super Protocol's  new technology called Super Swarm. If you haven't watched it yet, today we'll briefly explain what Swarm is all about. 👇

#SuperSwarm #SuperProtocol #ConfidentialComputing #TEE

Excited for tomorrow’s session on one of the most powerful (yet underrated) techs driving data privacy, compliance & cloud security. See you there! Register 👉bit.ly/ILC-Sept1025 #ConfidentialComputing #CyberSecurity #PrivacyTech #ISACA #ISACALondonChapter

ISACALondon's tweet image. Excited for tomorrow’s session on one of the most powerful (yet underrated) techs driving data privacy, compliance & cloud security.

See you there!

Register 👉bit.ly/ILC-Sept1025
#ConfidentialComputing #CyberSecurity #PrivacyTech #ISACA #ISACALondonChapter

CCC July newsletter is here! ☀️ Our latest newsletter is packed with updates from across the ecosystem, from new project proposals and standards engagement, to membership announcement! Catch up on all things #ConfidentialComputing now ⬇️ 🔗 hubs.ly/Q03BqKvJ0

ConfidentialC2's tweet image. CCC July newsletter is here! ☀️ Our latest newsletter is packed with updates from across the ecosystem, from new project proposals and standards engagement, to membership announcement!

Catch up on all things #ConfidentialComputing now ⬇️
🔗 hubs.ly/Q03BqKvJ0

Healthcare needs security, not exposure. On @tenprotocol, medical data stays encrypted during use not just in storage. Better outcomes without sacrificing privacy. #TEN #HealthTech #ConfidentialComputing

Alfatimiyya73's tweet image. Healthcare needs security, not exposure.
On @tenprotocol, medical data stays encrypted during use  not just in storage.
Better outcomes without sacrificing privacy.
#TEN #HealthTech #ConfidentialComputing

Encryption at rest isn't enough. At Mizzle, your data stays encrypted even while it's being processed, thanks to Fully Homomorphic Encryption (FHE) and Zero-Knowledge Proofs (ZK). This is privacy, redefined. #ConfidentialComputing #FHE #ZeroKnowledge

MizzleFi's tweet image. Encryption at rest isn't enough.

At Mizzle, your data stays encrypted even while it's being processed, thanks to Fully Homomorphic Encryption (FHE) and Zero-Knowledge Proofs (ZK).

This is privacy, redefined.

#ConfidentialComputing #FHE #ZeroKnowledge

Confidential computing significantly improves the security and privacy of cloud computing by ensuring that data is inaccessible and encrypted while in use. Source Ledidi AS - Link bit.ly/3tcMMV1 rt @antgrasso #ConfidentialComputing #DataProtection #CloudComputing

ABetterInnovat1's tweet image. Confidential computing significantly improves the security and privacy of cloud computing by ensuring that data is inaccessible and encrypted while in use.

Source Ledidi AS - Link bit.ly/3tcMMV1 rt @antgrasso #ConfidentialComputing #DataProtection #CloudComputing

AI is taking over Web3 but without privacy, it’s just surveillance. @tenprotocol is changing the game with TEE powered smart contracts: AI agents that think and act in private Secure logic, no data leaks Runs on Ethereum #TENProtocol #AIinWeb3 #ConfidentialComputing #TEE

AMuhammad14103's tweet image. AI is taking over Web3  but without privacy, it’s just surveillance.
@tenprotocol is changing the game with TEE powered smart contracts:  AI agents that think and act in private
 Secure logic, no data leaks
 Runs on Ethereum
#TENProtocol #AIinWeb3 #ConfidentialComputing #TEE

Blockchain transparency is a bug — Zama is the patch. 🔒 Compute on encrypted data, deploy confidential smart contracts, all without exposing your inputs. The era of private Web3 is here. #Zama #ConfidentialComputing #FHE


The future is encrypted, and it's open for builders. 🚀 Joining the @zama_fhe #ZamaCreatorProgram to explore the power of FHE. Let's build a more private web3, together! #ZamaCreatorProgram #ConfidentialComputing

chunshuidonglai's tweet image. The future is encrypted, and it's open for builders. 🚀 Joining the @zama_fhe #ZamaCreatorProgram to explore the power of FHE. Let's build a more private web3, together! #ZamaCreatorProgram #ConfidentialComputing

Dude, this hardware leap by @zama_fhe is absolutely solid. Making FHE practical for real-world applications like private AI is awesome and totally game-changing. #ConfidentialComputing #ZeroKnowledge #Web3


Zama’s testnet is live, and devs are already experimenting with confidential smart contracts on top of existing chains. This is a privacy revolution wrapped in compatibility. #Zama #ConfidentialComputing #Web3 @zama_fhe #zam

AI needs data. Crypto needs privacy. Zama builds the bridge between both. 🤖 #Zama #AI #FHE @zama_fhe



AI sees your data. Zama’s FHE lets AI learn from it without seeing it. 🤯 Imagine private medical AI, confidential DeFi, or encrypted governance — it’s already happening. #ZamaProtocol #ConfidentialComputing


Why Oasis Remains Secure Amid Recent TEE Attacks #OasisNetwork #Web3Security #ConfidentialComputing 1️⃣ The Breaking News: Two new physical attacks — Battering RAM & Wiretap — recently broke the protection of Intel SGX and AMD SEV-SNP. Several TEE-based networks like Phala,…

Satoureireal's tweet image. Why Oasis Remains Secure Amid Recent TEE Attacks
#OasisNetwork #Web3Security #ConfidentialComputing

1️⃣ The Breaking News:
Two new physical attacks — Battering RAM & Wiretap — recently broke the protection of Intel SGX and AMD SEV-SNP.
Several TEE-based networks like Phala,…

this is a game-changer! 🙌 #ConfidentialComputing


Wow, Zama's approach truly brings together the best of ZK, MPC, and FHE for ultimate confidentiality! #ConfidentialComputing #PrivacyTech ��️✨


Who knew that combining ZK, MPC, and FHE could create the ultimate privacy trio? Mind blown! �� #ConfidentialComputing


We are excited to welcome Phala Network as the newest General Member of the CCC! Phala is a secure cloud platform enabling developers to run AI workloads inside hardware-protected #TEEs. Welcome to the #ConfidentialComputing community! Announcement: hubs.la/Q03M0J1b0

ConfidentialC2's tweet image. We are excited to welcome Phala Network as the newest General Member of the CCC!

Phala is a secure cloud platform enabling developers to run AI workloads inside hardware-protected #TEEs.

Welcome to the #ConfidentialComputing community!

Announcement: hubs.la/Q03M0J1b0

Gmpc guys💜 Imagine a world where your data shines like stars in encrypted galaxies, you collaborate without anyone knowing your secrets. This is Privacy 2.0 and the power of @ArciumHQ,the future of confidential computing. #Privacy20 #MPC #ConfidentialComputing #Arcium #Web3Infra

zahra_payandeh's tweet image. Gmpc guys💜
Imagine a world where your data shines like stars in encrypted galaxies,
you collaborate without anyone knowing your secrets.
This is Privacy 2.0 and the power of @ArciumHQ,the future of confidential computing.
#Privacy20 #MPC #ConfidentialComputing #Arcium
#Web3Infra

CCC September newsletter just dropped! 📢 Get highlights from the AI Infra Summit, details on the upcoming AI-Ready Data Safeguards Workshop (Oct 20, SF), OSFF New York, plus new resources and member news! Read now: hubs.la/Q03LNbrN0 #CCC #ConfidentialComputing

ConfidentialC2's tweet image. CCC September newsletter just dropped! 📢 Get highlights from the AI Infra Summit, details on the upcoming AI-Ready Data Safeguards Workshop (Oct 20, SF), OSFF New York, plus new resources and member news! 

Read now: hubs.la/Q03LNbrN0

#CCC #ConfidentialComputing

💬 We’re excited to welcome QLAD to the CCC! With contributions already in the Confidential Containers project and a vision to simplify secure computing, QLAD is helping define the next era of #ConfidentialComputing. 👉 Learn more: hubs.la/Q03DVxMs0

ConfidentialC2's tweet image. 💬 We’re excited to welcome QLAD to the CCC!

With contributions already in the Confidential Containers project and a vision to simplify secure computing, QLAD is helping define the next era of #ConfidentialComputing.

👉 Learn more: hubs.la/Q03DVxMs0

Confidential computing significantly improves the security and privacy of cloud computing by ensuring that data is inaccessible and encrypted while in use. Source Ledidi AS - Link bit.ly/3tcMMV1 rt @antgrasso #ConfidentialComputing #DataProtection #CloudComputing

VR_ARTech's tweet image. Confidential computing significantly improves the security and privacy of cloud computing by ensuring that data is inaccessible and encrypted while in use.

Source Ledidi AS - Link bit.ly/3tcMMV1 rt @antgrasso #ConfidentialComputing #DataProtection #CloudComputing

AI is taking over Web3 but without privacy, it’s just surveillance. @tenprotocol is changing the game with TEE powered smart contracts: AI agents that think and act in private Secure logic, no data leaks Runs on Ethereum #TENProtocol #AIinWeb3 #ConfidentialComputing #TEE

AMuhammad14103's tweet image. AI is taking over Web3  but without privacy, it’s just surveillance.
@tenprotocol is changing the game with TEE powered smart contracts:  AI agents that think and act in private
 Secure logic, no data leaks
 Runs on Ethereum
#TENProtocol #AIinWeb3 #ConfidentialComputing #TEE

Healthcare needs security, not exposure. On @tenprotocol, medical data stays encrypted during use not just in storage. Better outcomes without sacrificing privacy. #TEN #HealthTech #ConfidentialComputing

Alfatimiyya73's tweet image. Healthcare needs security, not exposure.
On @tenprotocol, medical data stays encrypted during use  not just in storage.
Better outcomes without sacrificing privacy.
#TEN #HealthTech #ConfidentialComputing

A few days ago, we released a video bit.ly/41BDAdX about Super Protocol's new technology called Super Swarm. If you haven't watched it yet, today we'll briefly explain what Swarm is all about. 👇 #SuperSwarm #SuperProtocol #ConfidentialComputing #TEE

super__protocol's tweet image. A few days ago, we released a video bit.ly/41BDAdX about Super Protocol's  new technology called Super Swarm. If you haven't watched it yet, today we'll briefly explain what Swarm is all about. 👇

#SuperSwarm #SuperProtocol #ConfidentialComputing #TEE

GN While the world sleeps, @Tenprotocol is working enabling private smart agents, encrypted execution, and secure coordination across Web3. Privacy doesn’t rest. #TENProtocol #ConfidentialComputing #Web3

DEGENP_'s tweet image. GN 

While the world sleeps, @Tenprotocol is working enabling private smart agents, encrypted execution, and secure coordination across Web3.
Privacy doesn’t rest.
 #TENProtocol #ConfidentialComputing #Web3

🔟 @tenprotocol is redefining Web3 with private, programmable agents. Built on secure enclaves, TEN enables encrypted smart contracts, on-chain AI, and scalable coordination — all without leaking data. Privacy meets performance. #Web3Infra #ConfidentialComputing #TENProtocol

DEGENP_'s tweet image. 🔟 @tenprotocol is redefining Web3 with private, programmable agents.

Built on secure enclaves, TEN enables encrypted smart contracts, on-chain AI, and scalable coordination — all without leaking data.

Privacy meets performance.
#Web3Infra #ConfidentialComputing #TENProtocol

Most chains make you choose: privacy or transparency. @tenprotocol says: why not both? With TEEs + encryption, developers finally get a shared, secret state. Imagine playing poker... onchain... in private. #ConfidentialComputing #TENProtocol #Ethereum

NaffeeFi's tweet image. Most chains make you choose: privacy or transparency.

@tenprotocol says: why not both?
With TEEs + encryption, developers finally get a shared, secret state.

Imagine playing poker... onchain... in private.
#ConfidentialComputing #TENProtocol #Ethereum

Just wrapped up a talk on the main stage at @ETHSofiaBG! It was a bit stressful but super exciting to share about #DeCC , #confidentialcomputing and #Depin !

martinlecl's tweet image. Just wrapped up a talk on the main stage at @ETHSofiaBG! It was a bit stressful but super exciting to share about #DeCC , #confidentialcomputing and #Depin !

CCC July newsletter is here! ☀️ Our latest newsletter is packed with updates from across the ecosystem, from new project proposals and standards engagement, to membership announcement! Catch up on all things #ConfidentialComputing now ⬇️ 🔗 hubs.ly/Q03BqKvJ0

ConfidentialC2's tweet image. CCC July newsletter is here! ☀️ Our latest newsletter is packed with updates from across the ecosystem, from new project proposals and standards engagement, to membership announcement!

Catch up on all things #ConfidentialComputing now ⬇️
🔗 hubs.ly/Q03BqKvJ0

Welcome @eqtylab to the Confidential Computing Consortium! 🚀 They’re building cryptographic tools to bring trust, privacy & accountability to AI - starting at the processor. 🔐 Read more on the CCC Blog: hubs.la/Q03mtSlC0 #ConfidentialComputing #AITrust #CCC

ConfidentialC2's tweet image. Welcome @eqtylab to the Confidential Computing Consortium! 🚀
They’re building cryptographic tools to bring trust, privacy & accountability to AI - starting at the processor. 🔐

Read more on the CCC Blog: hubs.la/Q03mtSlC0

 #ConfidentialComputing #AITrust #CCC

Join us at the #ConfidentialComputing Summit 2025 as Mike Bursell, Executive Director of the #CCC, takes the stage to explore two of the most pressing topics in secure AI and infrastructure. Learn more & register: hubs.la/Q03p7FBk0

ConfidentialC2's tweet image. Join us at the #ConfidentialComputing Summit 2025 as Mike Bursell, Executive Director of the #CCC, takes the stage to explore two of the most pressing topics in secure AI and infrastructure. 

Learn more & register: hubs.la/Q03p7FBk0

AI is now safe for industries with sensitive data. Discover why @EdgelessSystems chose Lllama 3.1 and 3.3 70B Instruct AWQ INT4 for the first cloud-based LLM service using #ConfidentialComputing. Read the case study: bit.ly/4mrjqLE

MetaforDevs's tweet image. AI is now safe for industries with sensitive data. Discover why @EdgelessSystems chose Lllama 3.1 and 3.3 70B Instruct AWQ INT4 for the first cloud-based LLM service using #ConfidentialComputing.

Read the case study: bit.ly/4mrjqLE

🚀 The TITAN Consortium Meeting is underway in Brussels, where the team is focused on accelerating advancements for the last half of the project. Stay tuned for updates! #TITANProject #Brussels #ConfidentialComputing #EOSC #Day1

titan_eosc's tweet image. 🚀 The TITAN Consortium Meeting is underway in Brussels, where the team is focused on accelerating advancements for the last half of the project.

Stay tuned for updates!

#TITANProject #Brussels #ConfidentialComputing #EOSC #Day1

Arcium – Encrypted Computing for Web3 Arcium lets apps and AI work on encrypted data without ever exposing it. Powered by gMPC, ZK, and confidential compute. Testnet is live. Build private DeFi, AI, and more. 👉 arcium.com #Arcium #Web3 #ConfidentialComputing #gMPC

yrickey01's tweet image. Arcium – Encrypted Computing for Web3
Arcium lets apps and AI work on encrypted data without ever exposing it. Powered by gMPC, ZK, and confidential compute.
Testnet is live. Build private DeFi, AI, and more.

👉 arcium.com

#Arcium #Web3 #ConfidentialComputing #gMPC

Loading...

Something went wrong.


Something went wrong.


United States Trends