with each other, distant attestation, encrypted communication, and memory isolation give anything that is required to lengthen a confidential-computing surroundings from a CVM or even a secure enclave to the GPU. When it involves employing generative AI for perform, there are two vital parts of contractual threat that firms need to know about. Fir