From the blog:

(Page 1 of 4)
January 03, 2022
January 03, 2022

Persistence in Conclave 1.2

Conclave 1.2 is here! It brings with it a load of important features, an important one being the Enclave Persistent Filesystem and the Persistent Map.

December 30, 2021
December 30, 2021

Using the New Web Host Server in Your Conclave Application

The Conclave web host server has been introduced as part of the v1.2 release of the Conclave platform. It allows developers to concentrate on building their enclave and client components without worrying about the host part. It serves as a ready-made host for your Conclave application.

December 28, 2021
December 28, 2021

Unleashing Enclaves From Being Tied to a CPU—Using KDS in Conclave Applications

In my previous blog, I spoke about why we need KDS – Key Derivation Service. Now in this blog, let’s dive into the technical details of KDS. I will divide my blog into three parts: the need for KDS, how KDS works and how we can retrieve a key from KDS in our Conclave application.

December 21, 2021
December 21, 2021

Accessing Enclave Data in Today’s World of Virtualization

Cloud computation is a need of the day, as companies want to minimize time-to-market by outsourcing computation to the cloud. However, this exposes them to security concerns of data being stolen from untrusted clouds, operating systems or hypervisors.

December 14, 2021
December 14, 2021

Introducing Conclave Web Host Server: Do More With Less Code

The confidential computing landscape has been emerging quickly. Organizations are now starting to understand the value of secure data processing. We at R3 are working towards supporting the fast-evolving confidential computing field with our platform Conclave by making it more robust and developer-friendly.

December 07, 2021
December 07, 2021

Introducing Conclave 1.2

We are pleased to announce the release of Conclave 1.2, which delivers two data persistence features, a key-derivation service to simplify cloud development, a common host, and other features that improve the developer experience.

September 30, 2021
September 30, 2021

How to Think About Threat Modeling

When we talk about a “threat,” it doesn’t seem like a word that usually applies to computing, right? In fact, when we say threat in the context of computing, we mean any actor that would deliberately cause your program to behave in an unintended way.

September 23, 2021
September 23, 2021

The story behind the x86_amd64 architecture

There are many  fascinating things to understand about processors and how computer architecture works. R3’s newest product, Conclave, abstracts away a lot of the work you’d otherwise have to do in understanding the CPU, but it’s essential to understand what’s happening under the hood. Let’s zoom out a little bit to get a better view of what x86 is.

September 20, 2021
September 20, 2021

Privacy-Preserving Techniques—and the Power of Confidential Computing

Privacy-preserving techniques (PPTs) are a family of modern cybersecurity techniques that make it possible to protect data even when it is shared with a third party for processing or analysis. These techniques are very powerful and can provide solutions to key data privacy issues.

September 01, 2021
September 01, 2021

Conclave — a new approach to private set intersection protocol

Privacy, trust, and security are paramount in today’s digital era. Policy makers all over the world are pushing for further research into privacy-enhancing technologies; regulators are introducing stricter rules to govern the collection and use of private and confidential data; and even Facebook is looking for ways to reduce the amount of data it collects.… Read more »