Confidential computing technologies isolates sensitive data within a secured CPU enclave for the duration of processing. The contents on the enclave, which include the data getting processed and also the approaches which might be accustomed to process it, are available only to authorized programming codes. These are invisible and unknowable to some